• Title/Summary/Keyword: Internet models

Search Result 1,419, Processing Time 0.022 seconds

Individualized Motivational & Instructional Teaching Strategy using Multimedia (Multimedia를 활용(活用)한 동기적(動機的) - 교수적(敎授的) 개별화(個別化) 수업전략(授業戰略))

  • Yoon, Hyun-Sang
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.11 no.1
    • /
    • pp.43-58
    • /
    • 1999
  • To instruct in accordance with learner's trait & preceding knowledge, letting the learner control the learning activities is the important task of educator & major goal of the Education Department this year. This article intends to provide useful Instructional Model for the teachers in fisheries marine high school, when they design the individualized teaching model using motivation. One of the major reason for the fisheries marine high school students' low learning achievement is due to the neglecting motivation elements in teaching - learning processes. Recently, with assistance of the information communication technology development, various teaching methods such as Individualized Multimedia Mediated Instruction, Internet Instruction, have come to the major method in activating motivation and computer-mediated instruction considering the learner's individual difference is the useful tools for the instructional efficiency. Because current navigation text book of fisheries marine high school have special characteristic considering the spacial context & time series from departing port to entering port, Teachers can maximize learner's learning accomplishment by using individualized multimedia & providing similar situation like a real navigation(simulating), representing this text characteristics. Thus this paper searches for the specifications of Keller's Motivation Model & Sweeter's Tutorial Model to solve instructional efficiency problems in fisheries marine high school & developed an efficient instructional design by integrating two models.

  • PDF

Real-Time Earlobe Detection System on the Web

  • Kim, Jaeseung;Choi, Seyun;Lee, Seunghyun;Kwon, Soonchul
    • International journal of advanced smart convergence
    • /
    • v.10 no.4
    • /
    • pp.110-116
    • /
    • 2021
  • This paper proposed a real-time earlobe detection system using deep learning on the web. Existing deep learning-based detection methods often find independent objects such as cars, mugs, cats, and people. We proposed a way to receive an image through the camera of the user device in a web environment and detect the earlobe on the server. First, we took a picture of the user's face with the user's device camera on the web so that the user's ears were visible. After that, we sent the photographed user's face to the server to find the earlobe. Based on the detected results, we printed an earring model on the user's earlobe on the web. We trained an existing YOLO v5 model using a dataset of about 200 that created a bounding box on the earlobe. We estimated the position of the earlobe through a trained deep learning model. Through this process, we proposed a real-time earlobe detection system on the web. The proposed method showed the performance of detecting earlobes in real-time and loading 3D models from the web in real-time.

A Comparative Study on OCR using Super-Resolution for Small Fonts

  • Cho, Wooyeong;Kwon, Juwon;Kwon, Soonchu;Yoo, Jisang
    • International journal of advanced smart convergence
    • /
    • v.8 no.3
    • /
    • pp.95-101
    • /
    • 2019
  • Recently, there have been many issues related to text recognition using Tesseract. One of these issues is that the text recognition accuracy is significantly lower for smaller fonts. Tesseract extracts text by creating an outline with direction in the image. By searching the Tesseract database, template matching with characters with similar feature points is used to select the character with the lowest error. Because of the poor text extraction, the recognition accuracy is lowerd. In this paper, we compared text recognition accuracy after applying various super-resolution methods to smaller text images and experimented with how the recognition accuracy varies for various image size. In order to recognize small Korean text images, we have used super-resolution algorithms based on deep learning models such as SRCNN, ESRCNN, DSRCNN, and DCSCN. The dataset for training and testing consisted of Korean-based scanned images. The images was resized from 0.5 times to 0.8 times with 12pt font size. The experiment was performed on x0.5 resized images, and the experimental result showed that DCSCN super-resolution is the most efficient method to reduce precision error rate by 7.8%, and reduce the recall error rate by 8.4%. The experimental results have demonstrated that the accuracy of text recognition for smaller Korean fonts can be improved by adding super-resolution methods to the OCR preprocessing module.

The fourth industrial revolution and the future of food industry (4차산업혁명과 식품산업의 미래)

  • Yoon, Suk Hoo
    • Food Science and Industry
    • /
    • v.50 no.2
    • /
    • pp.60-73
    • /
    • 2017
  • Recently, the whole world is facing an unprecedented moment of opportunity, so-called The Fourth Industrial Revolution. As emphasized in the World Economic Forum held in January of 2016 at Davos, the Fourth Industrial Revolution is not merely a changes of technological devices. The fundamental of the revolution is new, innovative, and visionary business models which change the whole systems dramatically. One of the greatest challenges is to feed an expected population of 9 billion by 2050 in a impactful way. The system should be sustainable as well as beneficial in improving the lives of people in the food chain along with the ecological health of environment. The technological advances of the Fourth Industrial Revolution are expected to improve our food system. The smart farm technology such as precision planting and irrigation techniques will improve the yields of food materials. The smart food transportation and logistics systems will substantially improve the safety and human nutrition. The adaptation the Fourth Industrial Revolution technology will induce the smart supply chains, smart production, and smart products in food industry due to its flexibility and standardization. This will lead the manufactures to adapt to customers' changing product specifications and traceable services in a timely manner.

A Study on DCAS Security Framework Model for Mobile IPTV (모바일 IPTV 환경에 적합한 DCAS 보안 프레임워크 연구)

  • Choi, Jung-Young;Cho, Kwan-Tae;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.105-116
    • /
    • 2011
  • Mobile IPTV is a IPTV interactive broadcasting service through wireless Internet. Mobile IPTV service would be much more promoted. Thus, the methods for protecting the broadcasting contents will be indispensible elements for the successful Mobile IPTV service achievement. This paper describes the characteristics of Mobile IPTV and the related contents protection techniques. To evaluate several security issues, we suggest a DCAS security framework model for Mobile IPTV, and speculate the most widespread, a security technologies for Mobile IPTV such as DCSA. Moreover, candidate models of Mobile IPTV protection system are suggested based on these technologies.

Finding Pluto: An Analytics-Based Approach to Safety Data Ecosystems

  • Barker, Thomas T.
    • Safety and Health at Work
    • /
    • v.12 no.1
    • /
    • pp.1-9
    • /
    • 2021
  • This review article addresses the role of safety professionals in the diffusion strategies for predictive analytics for safety performance. The article explores the models, definitions, roles, and relationships of safety professionals in knowledge application, access, management, and leadership in safety analytics. The article addresses challenges safety professionals face when integrating safety analytics in organizational settings in four operations areas: application, technology, management, and strategy. A review of existing conventional safety data sources (safety data, internal data, external data, and context data) is briefly summarized as a baseline. For each of these data sources, the article points out how emerging analytic data sources (such as Industry 4.0 and the Internet of Things) broaden and challenge the scope of work and operational roles throughout an organization. In doing so, the article defines four perspectives on the integration of predictive analytics into organizational safety practice: the programmatic perspective, the technological perspective, the sociocultural perspective, and knowledge-organization perspective. The article posits a four-level, organizational knowledge-skills-abilities matrix for analytics integration, indicating key organizational capacities needed for each area. The work shows the benefits of organizational alignment, clear stakeholder categorization, and the ability to predict future safety performance.

Wastewater Treatment Plant Control Strategies

  • Ballhysa, Nobel;Kim, Soyeon;Byeon, Seongjoon
    • International journal of advanced smart convergence
    • /
    • v.9 no.4
    • /
    • pp.16-25
    • /
    • 2020
  • The operation of a wastewater treatment plant (WWTP) is a complex task which requires to consider several aspects: adapting to always changing influent composition and volume, ensuring treated effluents quality complies with local regulations, ensuring dissolved oxygen levels in biological reaction tanks are sufficient to avoid anoxic conditions etc. all of it while minimizing usage of chemicals and power consumption. The traditional way of managing WWTPs consists in having employees on the field measure various parameters and make decisions based on their judgment and experience which holds various concerns such as the low frequency of data, errors in measurement and difficulty to analyze historical data to propose optimal solutions. In the case of activated sludge WWTPs, parts of the treatment process can be automated and controlled in order to satisfy various control objectives. The models developed by the International Water Association (IWA) have been extensively used worldwide in order to design and assess the performance of various control strategies. In this work, we propose to review most recent WWTP automation initiatives around the world and identify most currently used control parameters and control architectures. We then suggest a framework to select WWTP model, control parameters and control scheme in order to develop and benchmark control strategies for WWTP automation.

The Fourth Industrial Revolution and Changes of Pharmacists' Roles in the Future (제4차 산업혁명과 미래 약사 직능의 변화)

  • Kim, Yookyeong;Yoon, Jeong-Hyun
    • Korean Journal of Clinical Pharmacy
    • /
    • v.30 no.4
    • /
    • pp.217-225
    • /
    • 2020
  • The fourth industrial revolution, with its characteristics of "hyper-connectivity", "hyper-intelligence" and "automation", is a hot topic worldwide. It will fundamentally change industry, economy, and business models through technological innovations, such as big data, cloud computing, Internet of Things (IoT), artificial intelligence (AI), and 3D printing. In particular, the development of highly advanced information technology (IT) and AI is expected to replace human roles, thereby changing employment and occupation prospects in the future. Based on this, some predict that the profession of the pharmacist will soon disappear. To counter this, pharmacists' attention and efforts are required to seek innovative transformations in their functions by responding sensitively and promptly to changes of the fourth industrial revolution. It is also necessary to recognize the new roles of pharmacists and to develop the competencies to perform them. The fourth industrial revolution is an inevitable change of the times. At this time, we should take comprehensive and open perspectives on how the future society will change economically, culturally, and socially, and use it as an opportunity to shape the new future of pharmacists.

Neural Network and Cloud Computing for Predicting ECG Waves from PPG Readings

  • Kosasih, David Ishak;Lee, Byung-Gook;Lim, Hyotaek
    • Journal of Multimedia Information System
    • /
    • v.9 no.1
    • /
    • pp.11-20
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.

The Intelligent Blockchain for the Protection of Smart Automobile Hacking

  • Kim, Seong-Kyu;Jang, Eun-Sill
    • Journal of Multimedia Information System
    • /
    • v.9 no.1
    • /
    • pp.33-42
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.