• 제목/요약/키워드: Computer-Based

검색결과 33,457건 처리시간 0.048초

컴퓨터 적응형 알고리즘을 이용한 웹기반 시험 시스템 설계 및 구축 (A Design and Implementation of Web-based Test System using Computer-adaptive Test Algorithm)

  • 조성호
    • 컴퓨터교육학회논문지
    • /
    • 제7권6호
    • /
    • pp.69-76
    • /
    • 2004
  • e러닝을 교육과 학습을 위하여 e비즈니스 기술 및 서비스를 사용하는 응용프로그램이다. 이는 원격지 자원과 서비스에 접근을 수월하게 함으로서 교육의 질을 높이기 위한 새로운 멀티미디어 및 인터넷 기술을 사용한다. 본 논문은 실제 TOEFL CBT에 기반을 두어 신중하게 설계되고 구현된 인터넷기반의 시험 시스템에 대하여 기술한다. 본 시스템은 콘텐츠 전달 기술, 컴퓨터 적응형 시험 알고리즘, 리뷰엔진으로 구성되어 있다. 본 논문에서는 컴퓨터기반 시험 시스템을 설계 및 구현 시 고려사항들에 대하여 서술한다.

  • PDF

An X-ray Image Panorama System Using Robust Feature Matching and Per ception-Based Image Enhancement

  • Wang, Weiwei;Gwun, Oubong
    • 한국멀티미디어학회논문지
    • /
    • 제15권5호
    • /
    • pp.569-576
    • /
    • 2012
  • This paper presents an x-ray medical image panorama system which can overcome the smallness of the images that exist on a source computer during remote medical processing. In the system, after the standard medical image format DICOM is converted to the PC standard image format, a MSR algorithm is used to enhance X-ray images of low quality. Then SURF and Multi-band blending are applied to generate a panoramic image. Also, this paper evaluates the proposed SURF based system through the average gray value error and image quality criterion with X-ray image data by comparing with a SIFT based system. The results show that the proposed system is superior to SIFT based system in image quality.

트랜스퓨터를 사용한 피라미드형 병렬 어레이 컴퓨터 (TPPAC) 구조 (Transputer-based Pyramidal Parallel Array Computer(TPPAC) architecture (Prelimineary Version))

  • 정창성;정철환
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1988년도 전기.전자공학 학술대회 논문집
    • /
    • pp.647-650
    • /
    • 1988
  • This paper proposes and sketches out a new parallel architecture of transputer-based pyramidal parallel array computer (TPPAC) used to process computationally intensive problems for geometric processing applications such as computer vision, image processing etc. It explores how efficiently the pyramid computer architecture is designed using transputer chips, and poses a new interconnection scheme for TPPAC without using additional transputers.

  • PDF

A Study on the Efficient Management of Liberal Education for Improving Computer Literacy

  • Koo, GeumSeo;Sim, Gab-Sig
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권11호
    • /
    • pp.143-149
    • /
    • 2017
  • In this paper, we propose efficient management method of liberal education for improving computer literacy. We analyzed the actual conditions and factors affecting education and reflected the analysis results in education. The subject of the study is 'Practice Excel', and tested achievement based on computer literacy. In order to evaluate objectively, we conducted CBT(Computer Based Test) based on Computer Specialist in Spreadsheet & Database Level-2. Analysis of the questionnaire included the use of the popular statistical program, IBM SPSS 24 trial, and frequency, ANOVA, t-test, crossover analysis, and correlation. Evaluation results, An important factor influencing educational performance was active participation. It also proved to be very helpful for understanding excel functions & expression.

중학교 컴퓨터 교과에서의 웹기반 PBL 수업의 실제 및 평가 (Development and Assessment of Web-Based Problem-Based Learning for Computer Subject in Middle School)

  • 태원경;김민경
    • 컴퓨터교육학회논문지
    • /
    • 제9권4호
    • /
    • pp.1-14
    • /
    • 2006
  • 본 연구의 목적은 컴퓨터 교과에서 요구되는 정보소양 뿐 아니라 문제해결능력을 함양시킬 수 있는 방안을 모색하는 것이다. 이를 위하여 컴퓨터 교과의 대안적 교수 학습 방법으로 주목을 반기 시작한 문제중심학습(PBL)을 중학교 컴퓨터 교과에서 적용가능한 웹기반 수업을 설계하며, PBL 수업의 구체적인 실제를 살펴보기 위하여 중학교 2학년 PBL 수업에서 다루어진 과제에 대한 학습지의 문제해결 과정을 분석하는 것이다.

  • PDF

Virus Detection Method based on Behavior Resource Tree

  • Zou, Mengsong;Han, Lansheng;Liu, Ming;Liu, Qiwen
    • Journal of Information Processing Systems
    • /
    • 제7권1호
    • /
    • pp.173-186
    • /
    • 2011
  • Due to the disadvantages of signature-based computer virus detection techniques, behavior-based detection methods have developed rapidly in recent years. However, current popular behavior-based detection methods only take API call sequences as program behavior features and the difference between API calls in the detection is not taken into consideration. This paper divides virus behaviors into separate function modules by introducing DLLs into detection. APIs in different modules have different importance. DLLs and APIs are both considered program calling resources. Based on the calling relationships between DLLs and APIs, program calling resources can be pictured as a tree named program behavior resource tree. Important block structures are selected from the tree as program behavior features. Finally, a virus detection model based on behavior the resource tree is proposed and verified by experiment which provides a helpful reference to virus detection.

The Design of an Election Protocol based on Mobile Ad-hoc Network Environment

  • Park, Sung-Hoon;Kim, Yeong-Mok;Yoo, Su-Chang
    • 한국컴퓨터정보학회논문지
    • /
    • 제21권8호
    • /
    • pp.41-48
    • /
    • 2016
  • In this paper, we propose an election protocol based on mobile ad-hoc network. In distributed systems, a group of computer should continue to do cooperation in order to finish some jobs. In such a system, an election protocol is especially practical and important elements to provide processes in a group with a consistent common knowledge about the membership of the group. Whenever a membership change occurs, processes should agree on which of them should do to accomplish an unfinished job or begins a new job. The problem of electing a leader is very same with the agreeing common predicate in a distributed system such as the consensus problem. Based on the termination detection protocol that is traditional one in asynchronous distributed systems, we present the new election protocol in distributed systems that are based on MANET, i.e. mobile ad hoc network.

A Web-based Tool for Teaching Computer Programming

  • Cho, Sehyeong
    • 공학교육연구
    • /
    • 제17권4호
    • /
    • pp.58-61
    • /
    • 2014
  • This paper introduces a tool for effective teaching of introductory computer programming. In order for the class to be effective, we try to attain attention, relevance, confidence, and satisfaction based on Keller's ARCS model. A web-based tool is developed to help both the students and the instructors.

Performance Analysis of Distribution-based and Replication-based Model for High Performance Grid Information Service

  • Quan, Cheng-Hao;Kim, Hie-Cheol;Lee, Kang-Woo;Lee, Yong-Doo
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2003년도 하계종합학술대회 논문집 Ⅲ
    • /
    • pp.1621-1624
    • /
    • 2003
  • As the entities participating Grid become larger, performance requirement for the LDAP-based GIS(Grid Information Service) goes beyond that provided by a stand-alone single LDAP server. This entails the exploration of distributed LDAP systems. This paper presents the performance evaluation respectively for a distribution-based and a replication-based LDAP model. The analysis is based on an analytic performance model for each distributed system which is obtained by applying the M/M/1 queuing model. The performance evaluation made to these analytic models reveals that the distribution-based and the replication-based model show a significant tradeoff in their performance with respect to the system size as well as the amount of system load.

  • PDF

Concealed Policy and Ciphertext Cryptography of Attributes with Keyword Searching for Searching and Filtering Encrypted Cloud Email

  • Alhumaidi, Hind;Alsuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • 제22권6호
    • /
    • pp.212-222
    • /
    • 2022
  • There has been a rapid increase in the use of cloud email services. As a result, email encryption has become more commonplace as concerns about cloud privacy and security grow. Nevertheless, this increase in usage is creating the challenge of how to effectively be searching and filtering the encrypted emails. They are popular technologies of solving the issue of the encrypted emails searching through searchable public key encryption. However, the problem of encrypted email filtering remains to be solved. As a new approach to finding and filtering encrypted emails in the cloud, we propose a ciphertext-based encrypted policy attribute-based encryption scheme and keyword search procedure based on hidden policy ciphertext. This feature allows the user of searching using some encrypted emails keywords in the cloud as well as allowing the emails filter-based server toward filter the content of the encrypted emails, similar to the traditional email keyword filtering service. By utilizing composite order bilinear groups, a hidden policy system has been successfully demonstrated to be secure by our dual system encryption process. Proposed system can be used with other scenarios such as searching and filtering files as an applicable method.