• 제목/요약/키워드: Internet Based Laboratory

검색결과 491건 처리시간 0.031초

원거리 학습 기반 컴퓨터 비젼 실습 사례연구 (A Case Study on Distance Learning Based Computer Vision Laboratory)

  • 이성열
    • 한국경영과학회:학술대회논문집
    • /
    • 한국경영과학회 2005년도 추계학술대회 및 정기총회
    • /
    • pp.175-181
    • /
    • 2005
  • This paper describes the development of on-line computer vision laboratories to teach the detailed image processing and pattern recognition techniques. The computer vision laboratories include distant image acquisition method, basic image processing and pattern recognition methods, lens and light, and communication. This study introduces a case study that teaches computer vision in distance learning environment. It shows a schematic of a distant loaming workstation and contents of laboratories with image processing examples. The study focus more on the contents of the vision Labs rather than internet application method. The study proposes the ways to improve the on-line computer vision laboratories and includes the further research perspectives

  • PDF

Construction of a Genetic Information Database for Analysis of Oncolytic Viruses

  • Cho, Myeongji;Son, Hyeon Seok;Kim, Hayeon
    • International journal of advanced smart convergence
    • /
    • 제9권1호
    • /
    • pp.90-97
    • /
    • 2020
  • Oncolytic viruses are characterized by their ability to selectively kill cancer cells, and thus they have potential for application as novel anticancer agents. Despite an increase in the number of studies on methodologies involving oncolytic viruses, bioinformatic studies generating useful data are lacking. We constructed a database for oncolytic virus research (the oncolytic virus database, OVDB) by integrating scattered genetic information on oncolytic viruses and proposed a systematic means of using the biological data in the database. Our database provides data on 14 oncolytic viral strains and other types of viruses for comparative analysis. We constructed the OVDB using the basic local alignment search tool, and therefore can provides genetic information on highly homologous oncolytic viruses. This study contributes to facilitate systematic bioinformatics research, providing valuable data for development of oncolytic virus-based anticancer therapies.

Current issues on Requirement Traceability Mechanism for Software Organization of the 4th Industrial Revolution

  • Kim, Janghwan;Kim, R. Young Chul
    • International journal of advanced smart convergence
    • /
    • 제9권4호
    • /
    • pp.167-172
    • /
    • 2020
  • In the 4th industrial revolution, there are many projects for diverse software applications of smart city environments. Most of the stakeholders focus on considering software quality for their developed software. Nobody doesn't guarantee requirement satisfaction after complete development. At this time, we can only work on user acceptance testing for requirement satisfaction on frequently changing requirements. Why keeps the requirement traceability? This traceability is to identify risks related to requirements, to assure correct software development based on customer requirements. To solve this, we are researching how to implement requirement traceability across each artifact's relationship to each activity of a whole development lifecycle.

Quality Improvement by enhancing Informal Requirements with Design Thinking Methods

  • Kim, Janghwan;Kim, R. Young Chul
    • International journal of advanced smart convergence
    • /
    • 제10권2호
    • /
    • pp.130-137
    • /
    • 2021
  • In the current software project, it is still very difficult to extract and define clear requirements in the requirement engineering. Informal requirements documents based on natural language can be interpreted in different meanings depending on the degree of understanding or maturity level of the requirements analyst. Also, Furthermore, as the project progresses, requirements continue to change from the customer. This change in requirements is a catastrophic failure from a management perspective in software projects. In the situation of frequent requirements changes, a current issue of requirements engineering area is how to make clear requirements with unclear and ambigousrequirements. To solve this problem, we propose to extract and redefine clear requirements by incorporating Design Thinking methodologies into requirements engineering. We expect to have higher possibilities to improve software quality by redefining requirements that are ambiously and unclearly defined.

원격교육을 위한 클라이언트/서버구조의 웹 기반 시뮬레이션 환경 : SimDraw (A Web-based Simulation Environment based on the Client/Server Architecture for Distance Education: SimDraw)

  • 서현곤;사공봉;김기형
    • 한국정보과학회논문지:소프트웨어및응용
    • /
    • 제30권11호
    • /
    • pp.1080-1091
    • /
    • 2003
  • 최근 인터넷 및 초고속네트워크의 발전과 더불어 원격교육도 활발히 이용되고 있다. 온라인 강의(교수-학습)툴에 대한 상대적으로 많은 연구와는 비교되게 가상실험 툴에 대한 연구는 미진하다고 할수 있다. 본 논문에서는 원격교육용 가상실험실로 사용될 수 있는 웹 기반 시뮬레이션 툴, SimDraw를 설계 및 구현한다. 웹 기반 시뮬레이션기술을 원격교육에 적용시키기 위해서는 다음과 같은 몇 가지 요구사항이 만족되어야 한다. 첫째, 시뮬레이션 툴의 사용자 인터페이스가 간단해서 학생들이 쉽게 사용할 수 있어야 한다. 둘째, 원격 학생들의 다양한 컴퓨터 환경에서도 일관되게 실행될 수 있을 정도로 이식성이 있어야 한다. 마지막으로 셋째, 시뮬레이션 프로그램이 충분히 가벼워서 학생들이 설치 없이 사용이 가능하거나 혹은 설치가 매우 간결하고 쉽게 이루어질 수 있어야 한다. 이러한 요구조건을 만족시키기 위해 SimDraw는 클라이언트/서버구조에 기반하고 있다. 클라이언트프로그램은 모델작성 및 애니메이션 기능만을 가지고 있으므로 자바 애플릿으로 구현이 가능하고 웹 브라우져 내에서 실행될 수 있다. 즉 설치가 전혀 필요 없다. 서버프로그램은 원격컴파일, 모델저장, 라이브러리관리, 사용자관리 등의 기능을 클라이언트 측에 제공한다. SimDraw의 기능을 평가하기 위해 RIP(Routing Information Protocol) 라우팅 프로토콜의 가상 실험을 예로 들어서 시뮬레이션 과정을 보였다.

컴퓨터 네트워크 가상 실습을 위한 컴포넌트 기반의 시뮬레이터 설계 및 구현 (Design and Implementation of a Component-based Simulator for the Virtual Laboratory of Computer Networks)

  • 임명식;김기형
    • 한국시뮬레이션학회논문지
    • /
    • 제12권1호
    • /
    • pp.1-10
    • /
    • 2003
  • Recently, various network protocols have been developed to keep step with the rapid growth of Internet users. For the education of students in the computer networks classes, there have been many attempts to allow students experiment routers setting, operations and management of networks by themselves, in addition to the classroom lectures based on textbooks. One of the attempts is to install expensive real router experiment sets in laboratories for students, and one another is using router and network simulators for virtual experiments. This paper presents the design and implementation of NetSim, a scalable, component-based simulator environment for the network experimentation. NetSim expands the existing component-based JavaSim simulation tool for the education purpose, and it allows the design and experiment of various networks and protocols. For the evaluation of NetSim, it is shown that the network design and RIP-based router setting process is possible in NetSim.

  • PDF

Voice Quality Criteria for Heterogenous Network Communication Under Mobile-VoIP Environments

  • Choi, Jae-Hun;Seol, Soon-Uk;Chang, Joon-Hyuk
    • The Journal of the Acoustical Society of Korea
    • /
    • 제28권3E호
    • /
    • pp.99-108
    • /
    • 2009
  • In this paper, we suggest criteria for objective measurement of speech quality in mobile VoIP (Voice over Internet Protocol) services over wireless mobile internet such as mobile WiMAX networks. This is the case that voice communication service is available under other networks. When mobile VoIP service users in the mobile internet network based on packet call up PSTN and mobile network users, but there have not been relevant quality indexes and quality standards for evaluating speech quality of mobile VoIP. In addition, there are many factors influencing on the speech quality in packet network. Especially, if the degraded speech with packet loss transfers to the other network users through the handover, voice communication quality is significantly deteriorated by the transformation of speech codecs. In this paper, we eventually adopt the Gilbert-Elliot channel model to characterize packet network and assess the voice quality through the objective speech quality method of ITU-T P. 862. 1 MOS-LQO for the various call scenario from mobile VoIP service user to PSTN and mobile network users under various packet loss rates in the transmission channel environments. Our simulation results show that transformation of speech codecs results in the degraded speech quality for different transmission channel environments when mobile VoIP service users call up PSTN and mobile network users.

Identification of Fuzzy Inference System Based on Information Granulation

  • Huang, Wei;Ding, Lixin;Oh, Sung-Kwun;Jeong, Chang-Won;Joo, Su-Chong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제4권4호
    • /
    • pp.575-594
    • /
    • 2010
  • In this study, we propose a space search algorithm (SSA) and then introduce a hybrid optimization of fuzzy inference systems based on SSA and information granulation (IG). In comparison with "conventional" evolutionary algorithms (such as PSO), SSA leads no.t only to better search performance to find global optimization but is also more computationally effective when dealing with the optimization of the fuzzy models. In the hybrid optimization of fuzzy inference system, SSA is exploited to carry out the parametric optimization of the fuzzy model as well as to realize its structural optimization. IG realized with the aid of C-Means clustering helps determine the initial values of the apex parameters of the membership function of fuzzy model. The overall hybrid identification of fuzzy inference systems comes in the form of two optimization mechanisms: structure identification (such as the number of input variables to be used, a specific subset of input variables, the number of membership functions, and polyno.mial type) and parameter identification (viz. the apexes of membership function). The structure identification is developed by SSA and C-Means while the parameter estimation is realized via SSA and a standard least square method. The evaluation of the performance of the proposed model was carried out by using four representative numerical examples such as No.n-linear function, gas furnace, NO.x emission process data, and Mackey-Glass time series. A comparative study of SSA and PSO demonstrates that SSA leads to improved performance both in terms of the quality of the model and the computing time required. The proposed model is also contrasted with the quality of some "conventional" fuzzy models already encountered in the literature.

A Semi-fragile Image Watermarking Scheme Exploiting BTC Quantization Data

  • Zhao, Dongning;Xie, Weixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권4호
    • /
    • pp.1499-1513
    • /
    • 2014
  • This paper proposes a novel blind image watermarking scheme exploiting Block Truncation Coding (BTC). Most of existing BTC-based watermarking or data hiding methods embed information in BTC compressed images by modifying the BTC encoding stage or BTC-compressed data, resulting in watermarked images with bad quality. Other than existing BTC-based watermarking schemes, our scheme does not really perform the BTC compression on images during the embedding process but uses the parity of BTC quantization data to guide the watermark embedding and extraction processes. In our scheme, we use a binary image as the original watermark. During the embedding process, the original cover image is first partitioned into non-overlapping $4{\times}4$ blocks. Then, BTC is performed on each block to obtain its BTC quantized high mean and low mean. According to the parity of high mean and the parity of low mean, two watermark bits are embedded in each block by modifying the pixel values in the block to make sure that the parity of high mean and the parity of low mean in the modified block are equal to the two watermark bits. During the extraction process, BTC is first performed on each block to obtain its high mean and low mean. By checking the parity of high mean and the parity of low mean, we can extract the two watermark bits in each block. The experimental results show that the proposed watermarking method is fragile to most image processing operations and various kinds of attacks while preserving the invisibility very well, thus the proposed scheme can be used for image authentication.

A Blockchain-enabled Multi-domain DDoS Collaborative Defense Mechanism

  • Huifen Feng;Ying Liu;Xincheng Yan;Na Zhou;Zhihong Jiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권3호
    • /
    • pp.916-937
    • /
    • 2023
  • Most of the existing Distributed Denial-of-Service mitigation schemes in Software-Defined Networking are only implemented in the network domain managed by a single controller. In fact, the zombies for attackers to launch large-scale DDoS attacks are actually not in the same network domain. Therefore, abnormal traffic of DDoS attack will affect multiple paths and network domains. A single defense method is difficult to deal with large-scale DDoS attacks. The cooperative defense of multiple domains becomes an important means to effectively solve cross-domain DDoS attacks. We propose an efficient multi-domain DDoS cooperative defense mechanism by integrating blockchain and SDN architecture. It includes attack traceability, inter-domain information sharing and attack mitigation. In order to reduce the length of the marking path and shorten the traceability time, we propose an AS-level packet traceability method called ASPM. We propose an information sharing method across multiple domains based on blockchain and smart contract. It effectively solves the impact of DDoS illegal traffic on multiple domains. According to the traceability results, we designed a DDoS attack mitigation method by replacing the ACL list with the IP address black/gray list. The experimental results show that our ASPM traceability method requires less data packets, high traceability precision and low overhead. And blockchain-based inter-domain sharing scheme has low cost, high scalability and high security. Attack mitigation measures can prevent illegal data flow in a timely and efficient manner.