• Title/Summary/Keyword: Computer usage

Search Result 1,229, Processing Time 0.03 seconds

Fruit price prediction study using artificial intelligence (인공지능을 이용한 과일 가격 예측 모델 연구)

  • Im, Jin-mo;Kim, Weol-Youg;Byoun, Woo-Jin;Shin, Seung-Jung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.4 no.2
    • /
    • pp.197-204
    • /
    • 2018
  • One of the hottest issues in our 21st century is AI. Just as the automation of manual labor has been achieved through the Industrial Revolution in the agricultural society, the intelligence information society has come through the SW Revolution in the information society. With the advent of Google 'Alpha Go', the computer has learned and predicted its own machine learning, and now the time has come for the computer to surpass the human, even to the world of Baduk, in other words, the computer. Machine learning ML (machine learning) is a field of artificial intelligence. Machine learning ML (machine learning) is a field of artificial intelligence, which means that AI technology is developed to allow the computer to learn by itself. The time has come when computers are beyond human beings. Many companies use machine learning, for example, to keep learning images on Facebook, and then telling them who they are. We also used a neural network to build an efficient energy usage model for Google's data center optimization. As another example, Microsoft's real-time interpretation model is a more sophisticated translation model as the language-related input data increases through translation learning. As machine learning has been increasingly used in many fields, we have to jump into the AI industry to move forward in our 21st century society.

A Smart Image Classification Algorithm for Digital Camera by Exploiting Focal Length Information (초점거리 정보를 이용한 디지털 사진 분류 알고리즘)

  • Ju, Young-Ho;Cho, Hwan-Gue
    • Journal of the Korea Computer Graphics Society
    • /
    • v.12 no.4
    • /
    • pp.23-32
    • /
    • 2006
  • In recent years, since the digital camera has been popularized, so users can easily collect hundreds of photos in a single usage. Thus the managing of hundreds of digital photos is not a simple job comparing to the keeping paper photos. We know that managing and classifying a number of digital photo files are burdensome and annoying sometimes. So people hope to use an automated system for managing digital photos especially for their own purposes. The previous studies, e.g. content-based image retrieval, were focused on the clustering of general images, which it is not to be applied on digital photo clustering and classification. Recently, some specialized clustering algorithms for images clustering digital camera images were proposed. These algorithms exploit mainly the statistics of time gap between sequent photos. Though they showed a quite good result in image clustering for digital cameras, still lots of improvements are remained and unsolved. For example the current tools ignore completely the image transformation with the different focal lengths. In this paper, we present a photo considering focal length information recorded in EXIF. We propose an algorithms based on MVA(Matching Vector Analysis) for classification of digital images taken in the every day activity. Our experiment shows that our algorithm gives more than 95% success rates, which is competitive among all available methods in terms of sensitivity, specificity and flexibility.

  • PDF

Development of Backward Safety Analysis Tool for CPN Models (CPN 모델의 역방향 안전성 분석 도구 개발)

  • Lee, U-Jin;Chae, Heung-Seok;Cha, Seong-Deok;Lee, Jang-Su;Gwon, Yong-Rae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.5 no.4
    • /
    • pp.457-466
    • /
    • 1999
  • 원자력 발전소 계측 제어 시스템, 의료 관련 시스템, 항공 관련 시스템 등 실생활과 밀접한 시스템에 소프트웨어의 사용이 점차 증가하고 있다. 이러한 시스템에서 소프트웨어의 오류는 예기치 않는 사고를 유발하여 인명, 재산상의 심각한 타격을 줄 수 있다. 그러므로 고신뢰도 소프트웨어의 개발 시에는 반드시 시스템의 안전성을 보장해 주어야 한다. 역방향 안전성 분석 방법은 시스템의 안전성을 분석하는 한가지 방법으로서 시스템의 위험 상태를 정의하고 그 위험의 원인들을 추적, 분석함으로써 안전성에 대한 효율적인 분석을 수행할 수 있는 장점을 갖는다. 이 논문에서는 소프트웨어 개발 초기 단계에서 안전성을 분석할 수 있는 방법으로 Colored Petri Nets(CPN)에 기반을 둔 역방향 안전성 분석 방법을 제시한다. 또한 CPN 역방향 안전성 분석 도구인 SAC(Safety Analyzer for CPN)의 설계 및 구현에 대해 언급한다. SAC은 기존의 상용 CPN 모델링 도구인 Design/CPN과 연계하여 사용될 수 있으므로 CPN으로 모델링된 시스템의 안전성을 분석할 수 있다는 장점이 있다. 이 논문에서는 예제로 자동 교통 제어 시스템의 일부를 CPN으로 모델링하고 SAC을 이용한 분석 과정을 기술한다.Abstract In safety-critical systems such as nuclear power plants, medical machines, and avionic systems which are closely related with our livings, the usage of software in the controlling part is growing rapidly. Since software errors in safety-critical systems may cause serious accidents leading to financial or human damages, system safety should be ensured during and after development of a system. A backward safety analysis technique defines system hazards and tries to trace their causes by analyzing system states backward. In this paper, we provide a backward safety analysis technique based on Colored Petri Nets(CPN), which is applicable to the early software development phase. Also Safety Analyzer for CPN(SAC), the supporting tool, is designed and implemented. Since SAC is compatible with Design/CPN, a commercial tool for supporting CPN, it can be applicable to analyze safety in practical problems. As an example, we model a part of the traffic light control system using CPN and analyze safety properties of the model using the SAC tool.

Efficient Pseudo Random Functions for the e-seal Protection Protocol (e-seal 보안 프로토콜을 위한 효율적인 Pseudo Random Function)

  • Min Jung-Ki;Kang Seok-Hun;Chung Sang-Hwa;Kim Dong-Kyue
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06c
    • /
    • pp.274-276
    • /
    • 2006
  • e-seal은 RFID(Radio Frequency IDentification) 기술을 사용하여 원격에서 자동으로 봉인상태를 확인할 수 있는 컨테이너 봉인 장치를 말한다. RFID의 특징상 반도체 칩에 기록된 정보를 제 삼자가 쉽게 판독 및 변조할 수 있다는 취약점으로 인하여 활성화되지 못하고 있는 실정이다. ISO에서는 RFID의 취약점을 보안하기 위한 표준작업(ISO 18185)을 진행 중이다. 이 중, ISO 18185-4는 e-seal에 저장되는 자료나 리더와의 RF통신에서 데이터 보호를 위한 표준이다. 이와 관련된 연구로는 인증 프로토콜과 ISO 18185-4를 위한 보고서로 제출된 보안 프로토콜이 있다. 제안된 e-seal 보안 프로토콜을 적용하기 위해서는 e-seal과 리더 간의 데이터를 암/복호화할 키가 필요하지만, 키 서버를 통해 전달받은 마스터 키를 데이터 암/복호화 키로 바로 사용하는 것은 보안 상의 문제점을 야기할 수 있기 때문에 PRF(Pseudo Random Function)을 이용하여 마스터 키로부터 MTK(Mutual Transient Key)를 유도하고, MTK를 암/복호화 키로 사용해야 한다. 기존의 PRF는 일방향 해시 함수(MD5, SHA 등)를 기반으로 하는 HMAC[2. 3]을 일반적으로 사용하였다. 그러나 일방향 해시 함수는 e-seal과 같은 제한된 자원을 갖는 환경에 적합하지 않다. 따라서, 본 논문에서는 e-seal 보안 프로토콜을 위한 효율적인 PRF을 제안한다. 기존의 일방향 해시 함수 기반이 아닌 블록 암호화 알고리즘을 기반으로 하는 MAC을 이용하여 PRF을 보다 효율적으로 구현하였고, 블록 암호화 알고리즘은 AES를 선택 합성체 $GF((2^4)^2)$을 통해 하드웨어 모듈을 최적화 하였다. AES를 기반으로 하는 MAC은 HMAC에 비해 면적 및 처리율에서 뛰어난 결과를 보여주었다.<0.01).이상의 연구 결과, cook-chill생산 시 녹차 추출물의 첨가가 미생물적 품질유지에 효과가 있다고 사료되는 바 본 연구결과를 기초로 급식소에서 음식 생산 시 녹차 추출물 및 천연 항균성 물질 첨가에 따른 미생물적 품질 및 관능적 품질검사를 통한 레시피 개발에 관한 지속적인 연구가 수행되어야 하겠다.다.다리다보니 점심시간을 활용할 수 없게 되는 문제점에 대한 재검토가 필요하다. 따라서 차후 학교급식의 안전성 확보를 위한 급식환경 개선의 일환으로 식당공간 확보 시 신속한 시간 내에 급식이 가능하도록 넓은 공간과 쾌적한 환경의 식당 조성에 대해 관심을 기울여야 할 것으로 사료된다. 이상 여부를 반영하는 임상증상의 빈도가 높은 청소년기 남녀 중학생의 경우 아침과 저녁의 결식빈도 및 외식과 간식의 빈도가 높았고, 아침식사의 질과 체형만족도가 낮은 것으로 나타나 청소년의 건강과 식습관 및 체형만족도가 상호 관련성이 높은 것으로 나타났다. 따라서 본 연구 결과는 성장기 청소년의 건강 유지를 위하여 바람직한 식습관의 중요성을 재인식할 수 있었으며, 올바른 식습관 확립을 위한 영양교육의 중요성이 재확인되었다.경제적일 것으로 판단된다.er 90 % of good relative dynamic modulus of elasticity due to fineness of formation caused by the increase of the unit powder content and the improvement of flowability, without regard to the replacement of crushed stone fines. Therefore, it can be said that the usage of crushed stone fines can control the strength of super flowing concrete by replacement and re

  • PDF

Performance Comparison of 28 GHz Array Antennas for 5G Mobile Devices (5G 단말용 28 GHz 배열안테나의 안테나 타입별 성능 비교 연구)

  • Kim, Sun-Ryul;Hong, Young-Taek;Bang, Ji-Hoon;Choi, Jae-Hoon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.30 no.1
    • /
    • pp.45-53
    • /
    • 2019
  • In this paper, three types of array antennas for 5G mobile devices operating at 28 GHz were designed, and their performances were compared. The isolation between antenna elements was compared based on $S_{21}$. The $S_{21}$ of dipole, slot, and patch type are -13.76 dB, -16.88 dB, and -11.47 dB, respectively, with the slot-type antenna having the highest isolation. In order to compare the beam coverage performance, several characteristics such as beam width and maximum beam steering angle were analyzed. The analysis shows that the slot type has the widest steering angle of $63^{\circ}$ while the patch type has narrowest with $36^{\circ}$. In addition, to verify the performance of the antennas in the actual usage environment of the device, antenna characteristics in talk mode and data mode were analyzed through simulation. The results confirmed that the slot-type array antenna is the most suitable array antenna element for 28 GHz 5G mobile devices.

A Balanced Cognition-Affect Model of Information Systems Continuance for Mobile Internet Service (모바일 인터넷 서비스를 위한 정보시스템 지속성에 대한 이성과 감성의 조화 모델)

  • Kim, Ki-Eun;Kim, Hee-Woong
    • Science of Emotion and Sensibility
    • /
    • v.11 no.4
    • /
    • pp.461-480
    • /
    • 2008
  • There are innumerable studies on technology adoption and usage continuance; most examine cognitive factors while affective factors or the feelings of users are left relatively unexplored. Although attitude and user satisfaction are factors commonly considered in Information Systems(IS) research, they represent only some aspects of feelings. In contrast, researchers in diverse fields have begun to note the importance of feelings in understanding and predicting human behavior. Feelings are anticipated to be essential particularly in the context of modern applications, such as mobile internet(M-internet) services, where users are not simply technology users but also service consumers. Drawing on the support of consumer research, social psychology and computer science, this study proposes a balanced cognition-affect model of IS continuance. Prior works in relation to IS research have already considered the emotional factors. The common factors are enjoyment, anxiety, affect and satisfaction. The main difference in our study is that the factors that we used are the primary dimensions of affect according to Circumplex Model of Affect. The horizontal axis of the model represents the pleasure dimension and the vertical represents the arousal dimension. Other emotional factors such as enjoyment and anxiety can be viewed as a combination of these two dimensions, and they can be placed in the vector space formed by these two primary dimensions. Affect has been defined as the enjoyment a person derives from using computers. Satisfaction has different conceptualizations. It has been conceptualized as judgment based on the expectation disconfirmation theory. Thus, while prior works considered the direct and indirect effects of "feeling-related constructs"(enjoyment and anxiety) on usage behavior, our study proposes effects of "feeling-based constructs"(pleasure and arousal). The balanced cognition-affect model is tested in a survey of, M-internet service users. The results establish the validity of the model.

  • PDF

Class Gated Dynamic Bandwidth Allocation Algorithm for supporting QoS in the EPON (EPON 시스템에서 효율적인 QoS 제공을 위한 Class Gated 동적 대역 할당 알고리즘)

  • Hwang Jun-Ho;Kim Hyo-Won;Yoo Myung-Sik
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.5 s.347
    • /
    • pp.94-103
    • /
    • 2006
  • Ethernet passive optical network (EPON) has drawn many attention as a promising access network technology for FTTH because it can provide a high bandwidth with a low cost. Since the uplink bandwidth in the EPON system is shared by many users, it is necessary for an EPON system to have an efficient bandwidth allocation mechanism. To support QoS in EPON, the previous bandwidth allocation schemes employ strict priority queueing (SPQ). Since SPQ gives unlimited priority to higher service class, the QoS of lower service classes gets worse. In this paper, we propose Class Gated DBA (Dynamic Bandwidth Allocation) algorithm in which the bandwidth is requested / granted in a service class basis. To avoid the monopoly in bandwidth usage by higher classes the maximum bandwidth that is allocate to each service class is limited (fairness between services classes). In addition, to avoid the monopoly in bandwidth usage by some particular users, each ONU runs fairness bandwidth allocation algorithm within each service classes. Through computer simulations, it is verified that the proposed algorithm achieves a good level of QoS, and at the same time maintains a good level of fairness between both service classes and users.

Using Web as CAI in the Classroom of Information Age (정보화시대를 대비한 CAI로서의 Web 활용)

  • Lee, Kwang-Hi
    • Journal of The Korean Association of Information Education
    • /
    • v.1 no.1
    • /
    • pp.38-48
    • /
    • 1997
  • This study is an attempt to present a usage of the Web as CAI in the classroom and to give a direction to the future education in the face of information age. Characteristcs of information society, current curriculum, educational and teacher education are first analyzed in this article. The features of internet and 'Web are then summarized to present benefits of usage in the classroom as a CAI tool. The literature shows several characteristics of information society as follows : a technological computer, a provision and sharing of information, multi functional society, a participative democracy', an autonomy, a time value..A problem solving and 4 Cs(e.g., cooperation, copying, communication, creativity) are newly needed in this learning environment. The Internet is a large collection of networks that are tied together so that users can share their vast resources, a wealth of information, and give a key to a successful, efficient. individual study over a time and space. The 'Web increases an academic achievement, a creativity, a problem solving, a cognitive thinking, and a learner's motivation through an easy access to : documents available on the Internet, files containing programs, pictures, movies, and sounds from an FTP site, Usenet newsgroups, WAIS seraches, computers accessible through telnet, hypertext document, Java applets and other multimedia browser enhancements, and much more, In the Web browser will be our primary tool in searching for information on the Internet in this information age.

  • PDF

A Study on Image Acquisition and Usage Trace Analysis of Stick-PC (Stick-PC의 이미지 수집 및 사용흔적 분석에 대한 연구)

  • Lee, Han Hyoung;Bang, Seung Gyu;Baek, Hyun Woo;Jeong, Doo Won;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.7
    • /
    • pp.307-314
    • /
    • 2017
  • Stick-PC is small and portable, So it can be used like a desktop if you connect it to a display device such as a monitor or TV anytime and anywhere. Accordingly, Stick-PC can related to various crimes, and various evidence may remain. Stick-PC uses the same Windows version of the operating system as the regular Desktop, the artifacts to be analyzed are the same. However, unlike the Desktop, it can be used as a meaningful information for forensic investigation if it is possible to identify the actual user and trace the usage by finding the traces of peripheral devices before analyzing the system due to the mobility. In this paper, We presents a method of collecting images using Bootable OS, which is one of the image collection methods of Stick-PC. In addition, we show how to analyze the trace of peripheral connection and network connection trace such as Display, Bluetooth through the registry and event log, and suggest the application method from the forensic point of view through experimental scenario.

An Analysis of the Public Data for Making the Ambient Intelligent Service (공간지능화서비스 구현을 위한 공공데이터 분석)

  • Kim, Mi-Yun;Seo, Dong-Jo
    • Journal of Digital Convergence
    • /
    • v.12 no.12
    • /
    • pp.313-321
    • /
    • 2014
  • In current society, the digital era that makes enormous amount of data, and the diversified city, the smart space, which has characteristics of creating, collecting and representing data, is appeared. After 2012, in the social media environment called hyper-connected society with wide-spread smart phone, people started to get interested in public data and big data by generalized mobile device and SNS. At first, development of forming platform of data was focused, but now, many different idea from diverse area have been suggested about data analysis and usage to visualize the space intellectualization service. To focus on the visualization process to increase the usage of this public data for ordinary people more than specialized people, this research grasps the present condition of open data and public data service from the current public data portal and considers the applicability of them. As the result of research, the analysis and application of data to ordinary people decrease the use of paper documents, and this research will help to develop the application which is fast and accurate about individual behavior and demand to utilize public data service in intellectual space.