• Title/Summary/Keyword: Computer usage

Search Result 1,226, Processing Time 0.023 seconds

Performance Analysis of an Adaptive Link Status Update Scheme Based on Link-Usage Statistics for QoS Routing

  • Yang, Mi-Jeong;Kim, Tae-Il;Jung, Hae-Won;Jung, Myoung-Hee;Choi, Seung-Hyuk;Chung, Min-Young;Park, Jae-Hyung
    • ETRI Journal
    • /
    • v.28 no.6
    • /
    • pp.815-818
    • /
    • 2006
  • In the global Internet, a constraint-based routing algorithm performs the function of selecting a routing path while satisfying some given constraints rather than selecting the shortest path based on physical topology. It is necessary for constraint-based routing to disseminate and update link state information. The triggering policy of link state updates significantly affects the volume of update traffic and the quality of services (QoS). In this letter, we propose an adaptive triggering policy based on link-usage statistics in order to reduce the volume of link state update traffic without deterioration of QoS. Also, we evaluate the performance of the proposed policy via simulations.

  • PDF

A Motivational Model of E-mail Usage (전자우편의 사용에 관한 동기적 모형)

  • 손달호
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.23 no.3
    • /
    • pp.169-184
    • /
    • 1998
  • Despite the adoption of advanced computer technologies by organizational makers, the actual use of E-mail by managers and professionals has tended to be lagging and the potential benefits of these technologies have not been fully realized. Much of the prior research in this area has focused on the utility or perceived usefulness of E-mail as the principal motivating factor in using them. Relatively little attention has been given to the recreational basis of E-mail usage. The limited research in this area indicates the use of E-mail can be stimulated by the intrinsic joy and enjoyment derived. The objective of this study is to integrate these perspectives on the reasons underlying the use of E-mail and to examine simultaneously the relative influence of motivators identified in the literature as affecting individuals' decision to use E-mail. The study focuses specifically on E-mail because of its ubiquitous usage.

  • PDF

A Study on the Characteristics of Drafting Process by Using CAD (CAD를 이용한 도면 작성의 과정적 특성에 관한 연구 -AutoCAD 교재에 나타난 설계 사례를 중심으로-)

  • 홍승대
    • Korean Institute of Interior Design Journal
    • /
    • no.18
    • /
    • pp.16-22
    • /
    • 1999
  • The purpose of this study is to analyze the drafting process by using AutoCAD for the basic course as well as to suggest the educational basic data of CAD in interior desigv. This research is to show not only practical use of CAD as a drafting tool function, but offering optimizing ways of AutoCAD command usage. The method used for this study is based on an analyzing of 6 types of total 98 types AutoCAD tutorial manual in CAD section of Kyobo book center. After the analysis of the AutoCAD command usage in creating floor plan, characteristics of drafting process is nearly the same as traditional drafting process. It means that traditional drafting process grafted on to computer aided drafting process. And the practical usage of AutoCAD command type is Draw, Modify, Format and View command in creating floor plav. That is emphasis on a specific functiov. Therefore, it should be developed basic course program which adapted various function of AutoCAD.

  • PDF

Optimal Two-Section Layouts for the Two-Dimensional Cutting Problem

  • Ji, Jun;Huang, Dun-hua;Xing, Fei-fei;Cui, Yao-dong
    • Journal of Information Processing Systems
    • /
    • v.17 no.2
    • /
    • pp.271-283
    • /
    • 2021
  • When generating layout schemes, both the material usage and practicality of the cutting process should be considered. This paper presents a two-section algorithm for generating guillotine-cutting schemes of rectangular blanks. It simplifies the cutting process by allowing only one size of blanks to appear in any rectangular block. The algorithm uses an implicit enumeration and a linear programming optimal cutting scheme to maximize the material usage. The algorithm was tested on some benchmark problems in the literature, and compared with the three types of layout scheme algorithm. The experimental results show that the algorithm is effective both in computation time and in material usage.

"Needs to Learn" as a Moderator for Computer Self-Efficacy (컴퓨터 자기효능의 조절변수로서의 필요성의 인식에 관한 연구)

  • 이정우;김사임
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.29 no.1
    • /
    • pp.127-146
    • /
    • 2004
  • While 'Computer self-efficacy' is widely studied In the social science field with regard to the training effectiveness, little research has focused on clarifying the role of 'needs' in relation to self-efficacy and outcome expectations. in this regard, this study investigated the effects of 'needs to learn computer shills,' extending the social cognitive theory. A survey instrument was adopted and modified from previous studies to measure behavioral modeling, prior experience, Perceived computer self-efficacy, Perceived needs to learn computer skills and outcome expectations. A total of 209 practitioners were surveyed in this study. As a result, most part of the social cognitive theory was again Proven to be effective, and the 'needs to learn computer skills' was proven to be significant as a moderating variable between computer self-efficacy and outcome expectations. Implications of the research were discussed, and further studies were suggested at the end.

Performance Comparison of Machine Learning Models to Detect Screen Use and Devices (스크린 사용 여부 및 사용 디바이스 감지를 위한 머신러닝 모델 성능 비교)

  • Hwang, Sangwon;Kim, Dongwoo;Lee, Juhwan;Kang, Seungwoo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.5
    • /
    • pp.584-590
    • /
    • 2020
  • Long-term use of digital screens in daily life can lead to computer vision syndrome including symptoms such as eye strain, dry eyes, and headaches. To prevent computer vision syndrome, it is important to limit screen usage time and take frequent breaks. There are a variety of applications that can help users know the screen usage time. However, these apps are limited because users see various screens such as desktops, laptops, and tablets as well as smartphone screens. In this paper, we propose and evaluate machine learning-based models that detect the screen device in use using color, IMU and lidar sensor data. Our evaluation shows that neural network-based models show relatively high F1 scores compared to traditional machine learning models. Among neural network-based models, the MLP and CNN-based models have higher scores than the LSTM-based model. The RF model shows the best result among the traditional machine learning models, followed by the SVM model.

A Strategy for Adopting Server Virtualization in the Public Sector: NIPA Computer Center

  • Song, Jong-Cheol;Ryu, Jee-Woong;Moon, Byung-Joo;Jung, Hoe-Kyung
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.1
    • /
    • pp.61-65
    • /
    • 2012
  • Many public organizations have been adopting and operating various servers. These servers run on Windows, Unix, and Linux operating systems that generally use less than 10% of their capacity. For migrating a public organization to cloud computing, we must first virtualize the server environment. This article proposes a strategy for server virtualization that the National IT Industry Promotion Agency (NIPA) has done and describes the effects of a public organization migrating to cloud computing. The NIPA Computer Center planned an effective virtualization migration on various servers. This project of virtualization migration was conducted with the existing policy of separate x86 servers and Unix servers. There are three popular approaches to server virtualization: a virtual machine model, a paravirtual machine model, and virtualization at the operating system layer. We selected a VMware solution that uses the virtual machine model. We selected servers for virtualization in the following manner. Servers were chosen that had the highest rate of service usage and CPU usage and had been operating for five years or more. However, we excluded servers that require 80% or greater rates of CPU usage. After adopting the server virtualization technique, we consolidated 32 servers into 3 servers. Virtualization is a technology that can provide benefits in these areas: server consolidation and optimization, infrastructure cost reduction and improved operational flexibility, and implementation of a dual computing environment.

An Analysis of Web Courseware Development, Dissemination and Usage Status in Elementary School (웹 코스웨어 개발·보급·활용 실태 및 개선 방안에 관한 연구 - 초등학교 중심으로)

  • Lee, Mi Jar;Kim, In-Sook;Park, Seung-Ryul
    • The Journal of Korean Association of Computer Education
    • /
    • v.4 no.2
    • /
    • pp.71-83
    • /
    • 2001
  • The purpose of this study was to explore the status of development, dissemination, and usage of web courseware for elementary school. Also, this study investigated the problems and improvement strategies. The subjects were 52 researchers from Offices of Education and private companies and 528 teachers and 527 students from elementary schools. Questionnaires were used to collect the data. The study results indicated as follows: First, web courseware are insufficient. It is necessary to provide sufficient budgetary support for development of web courseware. Second, many of web courseware are inconsistent with the curriculum and class environment. To resolve this problem, more teachers should be involved in web courseware development. Third, web courseware usage level was very low because of the lack of information and training. In-service training program should be changed from computer literacy oriented to teaching method with web courseware.

  • PDF

A Study on Utilization Frequency by Beginning Secondary Mathematics Teachers' Perception of Computer Utilization (중등 초임 수학교사들의 컴퓨터 활용의 인식에 따른 활용도에 대한 연구)

  • Lee, Kang Sup;Shim, Sang Kil
    • The Mathematical Education
    • /
    • v.51 no.4
    • /
    • pp.415-427
    • /
    • 2012
  • This study investigated the perception and utilization about computer of beginning secondary mathematics teachers by utilization frequency of computer. To increase utilization frequency of computer in school mathematics, our finding shows that beginning secondary mathematics teachers should have an interest in computer utilization and perceive computers as an important tool for mathematics learning. In addition, they are likely to use more frequently computer under the condition that computers have sufficient class materials and supplement their shortcomings that have derived less usage in math classes. Therefore, future studies have to investigate not only how to develope textbooks and run after-school classes but also how to make creative discretional activities by computer, which makes computers more useful for teacher training. In sum, the results of case studies for computer usability should be released to motivate computer utilization and increase mathematical thinking ability.

A Resource-Optimal Key Pre-distribution Scheme for Secure Wireless Sensor Networks

  • Dai Tran Thanh;Hieu Cao Trong;Hong Choong-Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.1113-1116
    • /
    • 2006
  • Security in wireless sensor networks is very pressing especially when sensor nodes are deployed in hostile environments. To obtain security purposes, it is essential to be able to encrypt and authenticate messages sent amongst sensor nodes. Keys for encryption and authentication must be agreed upon by communicating nodes. Due to resource limitations and other unique features, obtaining such key agreement in wireless sensor network is extremely complex. Many key agreement schemes used in general networks, such as trusted server, Diffie-Hellman and public-key based schemes, are not suitable for wireless sensor networks [1], [2], [5], [7], [8]. In that situation, key pre-distribution scheme has been emerged and considered as the most appropriate scheme [2], [5], [7]. Based on that sense, we propose a new resource-optimal key pre-distribution scheme utilizing merits of the two existing key pre-distribution schemes [3], [4]. Our scheme exhibits the fascinating properties: substantial improvement in sensors' resource usage, rigorous guarantee of successfully deriving pairwise keys between any pair of nodes, greatly improved network resiliency against node capture attack. We also present a detailed analysis in terms of security and resource usage of the scheme.

  • PDF