• 제목/요약/키워드: Computer usage

검색결과 1,226건 처리시간 0.029초

Performance Analysis of an Adaptive Link Status Update Scheme Based on Link-Usage Statistics for QoS Routing

  • Yang, Mi-Jeong;Kim, Tae-Il;Jung, Hae-Won;Jung, Myoung-Hee;Choi, Seung-Hyuk;Chung, Min-Young;Park, Jae-Hyung
    • ETRI Journal
    • /
    • 제28권6호
    • /
    • pp.815-818
    • /
    • 2006
  • In the global Internet, a constraint-based routing algorithm performs the function of selecting a routing path while satisfying some given constraints rather than selecting the shortest path based on physical topology. It is necessary for constraint-based routing to disseminate and update link state information. The triggering policy of link state updates significantly affects the volume of update traffic and the quality of services (QoS). In this letter, we propose an adaptive triggering policy based on link-usage statistics in order to reduce the volume of link state update traffic without deterioration of QoS. Also, we evaluate the performance of the proposed policy via simulations.

  • PDF

전자우편의 사용에 관한 동기적 모형 (A Motivational Model of E-mail Usage)

  • 손달호
    • 한국경영과학회지
    • /
    • 제23권3호
    • /
    • pp.169-184
    • /
    • 1998
  • Despite the adoption of advanced computer technologies by organizational makers, the actual use of E-mail by managers and professionals has tended to be lagging and the potential benefits of these technologies have not been fully realized. Much of the prior research in this area has focused on the utility or perceived usefulness of E-mail as the principal motivating factor in using them. Relatively little attention has been given to the recreational basis of E-mail usage. The limited research in this area indicates the use of E-mail can be stimulated by the intrinsic joy and enjoyment derived. The objective of this study is to integrate these perspectives on the reasons underlying the use of E-mail and to examine simultaneously the relative influence of motivators identified in the literature as affecting individuals' decision to use E-mail. The study focuses specifically on E-mail because of its ubiquitous usage.

  • PDF

CAD를 이용한 도면 작성의 과정적 특성에 관한 연구 -AutoCAD 교재에 나타난 설계 사례를 중심으로- (A Study on the Characteristics of Drafting Process by Using CAD)

  • 홍승대
    • 한국실내디자인학회논문집
    • /
    • 제18호
    • /
    • pp.16-22
    • /
    • 1999
  • The purpose of this study is to analyze the drafting process by using AutoCAD for the basic course as well as to suggest the educational basic data of CAD in interior desigv. This research is to show not only practical use of CAD as a drafting tool function, but offering optimizing ways of AutoCAD command usage. The method used for this study is based on an analyzing of 6 types of total 98 types AutoCAD tutorial manual in CAD section of Kyobo book center. After the analysis of the AutoCAD command usage in creating floor plan, characteristics of drafting process is nearly the same as traditional drafting process. It means that traditional drafting process grafted on to computer aided drafting process. And the practical usage of AutoCAD command type is Draw, Modify, Format and View command in creating floor plav. That is emphasis on a specific functiov. Therefore, it should be developed basic course program which adapted various function of AutoCAD.

  • PDF

Optimal Two-Section Layouts for the Two-Dimensional Cutting Problem

  • Ji, Jun;Huang, Dun-hua;Xing, Fei-fei;Cui, Yao-dong
    • Journal of Information Processing Systems
    • /
    • 제17권2호
    • /
    • pp.271-283
    • /
    • 2021
  • When generating layout schemes, both the material usage and practicality of the cutting process should be considered. This paper presents a two-section algorithm for generating guillotine-cutting schemes of rectangular blanks. It simplifies the cutting process by allowing only one size of blanks to appear in any rectangular block. The algorithm uses an implicit enumeration and a linear programming optimal cutting scheme to maximize the material usage. The algorithm was tested on some benchmark problems in the literature, and compared with the three types of layout scheme algorithm. The experimental results show that the algorithm is effective both in computation time and in material usage.

컴퓨터 자기효능의 조절변수로서의 필요성의 인식에 관한 연구 ("Needs to Learn" as a Moderator for Computer Self-Efficacy)

  • 이정우;김사임
    • 한국경영과학회지
    • /
    • 제29권1호
    • /
    • pp.127-146
    • /
    • 2004
  • While 'Computer self-efficacy' is widely studied In the social science field with regard to the training effectiveness, little research has focused on clarifying the role of 'needs' in relation to self-efficacy and outcome expectations. in this regard, this study investigated the effects of 'needs to learn computer shills,' extending the social cognitive theory. A survey instrument was adopted and modified from previous studies to measure behavioral modeling, prior experience, Perceived computer self-efficacy, Perceived needs to learn computer skills and outcome expectations. A total of 209 practitioners were surveyed in this study. As a result, most part of the social cognitive theory was again Proven to be effective, and the 'needs to learn computer skills' was proven to be significant as a moderating variable between computer self-efficacy and outcome expectations. Implications of the research were discussed, and further studies were suggested at the end.

스크린 사용 여부 및 사용 디바이스 감지를 위한 머신러닝 모델 성능 비교 (Performance Comparison of Machine Learning Models to Detect Screen Use and Devices)

  • 황상원;김동우;이주환;강승우
    • 한국정보통신학회논문지
    • /
    • 제24권5호
    • /
    • pp.584-590
    • /
    • 2020
  • 일상생활에서 디지털 스크린을 오랜 시간 사용하면 눈의 피로, 안구 건조, 두통 등 컴퓨터 시각 증후군을 경험하게 된다. 컴퓨터 시각 증후군을 예방하기 위해서는 스크린 사용 시간을 제한하고 수시로 휴식을 취하는 것이 중요하다. 최근 스마트폰에서는 스크린 사용 시간을 알 수 있도록 도와주는 다양한 애플리케이션이 존재한다. 하지만, 사용자는 스마트폰 스크린뿐만 아니라 데스크탑, 노트북, 태블릿 등 다양한 스크린을 보기 때문에 이러한 앱만으로는 한계가 있다. 본 논문에서는 color, IMU, lidar 센서 데이터를 이용하여, 사용 중인 스크린 디바이스를 감지하는 머신 러닝 기반 모델을 제안하고 여러 가지 모델의 성능을 비교한다. 성능 비교 결과 신경망 기반 모델이 전통적인 머신 러닝 모델보다 높은 F1 스코어를 보였다. 신경망 기반 모델에서는 MLP, CNN 기반 모델이 LSTM 기반 모델보다 높은 스코어를 보였으며, 전통적인 머신 러닝 모델에서는 RF 모델이 가장 우수했으며, 다음으로는 SVM 모델이었다.

A Strategy for Adopting Server Virtualization in the Public Sector: NIPA Computer Center

  • Song, Jong-Cheol;Ryu, Jee-Woong;Moon, Byung-Joo;Jung, Hoe-Kyung
    • Journal of information and communication convergence engineering
    • /
    • 제10권1호
    • /
    • pp.61-65
    • /
    • 2012
  • Many public organizations have been adopting and operating various servers. These servers run on Windows, Unix, and Linux operating systems that generally use less than 10% of their capacity. For migrating a public organization to cloud computing, we must first virtualize the server environment. This article proposes a strategy for server virtualization that the National IT Industry Promotion Agency (NIPA) has done and describes the effects of a public organization migrating to cloud computing. The NIPA Computer Center planned an effective virtualization migration on various servers. This project of virtualization migration was conducted with the existing policy of separate x86 servers and Unix servers. There are three popular approaches to server virtualization: a virtual machine model, a paravirtual machine model, and virtualization at the operating system layer. We selected a VMware solution that uses the virtual machine model. We selected servers for virtualization in the following manner. Servers were chosen that had the highest rate of service usage and CPU usage and had been operating for five years or more. However, we excluded servers that require 80% or greater rates of CPU usage. After adopting the server virtualization technique, we consolidated 32 servers into 3 servers. Virtualization is a technology that can provide benefits in these areas: server consolidation and optimization, infrastructure cost reduction and improved operational flexibility, and implementation of a dual computing environment.

웹 코스웨어 개발·보급·활용 실태 및 개선 방안에 관한 연구 - 초등학교 중심으로 (An Analysis of Web Courseware Development, Dissemination and Usage Status in Elementary School)

  • 이미자;김인숙;박승렬
    • 컴퓨터교육학회논문지
    • /
    • 제4권2호
    • /
    • pp.71-83
    • /
    • 2001
  • 본 연구는 초등학교 교과교육용 웹코스웨어 개발 보급 활용 실태를 분석하고 실태분석을 기초로 웹코스웨어 개발 보급 활용에 관한 문제점 및 발전 방안을 탐구하고자 하였다. 연구 대상자는 웹코스웨어 개발 보급 실태 분석을 위해 시 도 교육청 담당 장학사와 민간업체 개발자 등 52명을 선정하였고 활용 실태 분석을 위해 초등학교 교사 529명과 학생 527명을 선정하였다. 연구 도구는 설문지를 사용하였다. 연구 결과 우선 현재까지 개발된 웹코스웨어는 수량적으로 매우 부족하였다. 웹코스웨어 연구 개발을 위한 적극적인 예산 지원이 필요하며, 특히 민간업체에 대한 제도적 지원을 하여 공공기관과 민간업체간의 균형 있는 개발을 유도해야 한다. 둘째, 개발된 웹코스웨어는 교육과정 및 현장여건과의 연계성이 매우 적었다. 웹코스웨어의 연구 개발과정에 교사의 참여를 더욱 더욱 높여야 한다고 지적되었다. 셋째, 웹코스웨어 활용정도는 미흡했으며 주된 이유는 개발된 자료 홍보 미흡과 교사의 활용 능력 부족이었다. 정보화관련 연수를 하드웨어와 컴퓨터소양 중심에서 교수-학습에 웹코스웨어를 포함한 정보통신기술활용 수업 중심으로 개선하는 것이 필요하다고 지적되었다.

  • PDF

중등 초임 수학교사들의 컴퓨터 활용의 인식에 따른 활용도에 대한 연구 (A Study on Utilization Frequency by Beginning Secondary Mathematics Teachers' Perception of Computer Utilization)

  • 이강섭;심상길
    • 한국수학교육학회지시리즈A:수학교육
    • /
    • 제51권4호
    • /
    • pp.415-427
    • /
    • 2012
  • This study investigated the perception and utilization about computer of beginning secondary mathematics teachers by utilization frequency of computer. To increase utilization frequency of computer in school mathematics, our finding shows that beginning secondary mathematics teachers should have an interest in computer utilization and perceive computers as an important tool for mathematics learning. In addition, they are likely to use more frequently computer under the condition that computers have sufficient class materials and supplement their shortcomings that have derived less usage in math classes. Therefore, future studies have to investigate not only how to develope textbooks and run after-school classes but also how to make creative discretional activities by computer, which makes computers more useful for teacher training. In sum, the results of case studies for computer usability should be released to motivate computer utilization and increase mathematical thinking ability.

A Resource-Optimal Key Pre-distribution Scheme for Secure Wireless Sensor Networks

  • Dai Tran Thanh;Hieu Cao Trong;Hong Choong-Seon
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2006년도 춘계학술발표대회
    • /
    • pp.1113-1116
    • /
    • 2006
  • Security in wireless sensor networks is very pressing especially when sensor nodes are deployed in hostile environments. To obtain security purposes, it is essential to be able to encrypt and authenticate messages sent amongst sensor nodes. Keys for encryption and authentication must be agreed upon by communicating nodes. Due to resource limitations and other unique features, obtaining such key agreement in wireless sensor network is extremely complex. Many key agreement schemes used in general networks, such as trusted server, Diffie-Hellman and public-key based schemes, are not suitable for wireless sensor networks [1], [2], [5], [7], [8]. In that situation, key pre-distribution scheme has been emerged and considered as the most appropriate scheme [2], [5], [7]. Based on that sense, we propose a new resource-optimal key pre-distribution scheme utilizing merits of the two existing key pre-distribution schemes [3], [4]. Our scheme exhibits the fascinating properties: substantial improvement in sensors' resource usage, rigorous guarantee of successfully deriving pairwise keys between any pair of nodes, greatly improved network resiliency against node capture attack. We also present a detailed analysis in terms of security and resource usage of the scheme.

  • PDF