• Title/Summary/Keyword: Knowledge-based platform

Search Result 283, Processing Time 0.025 seconds

Automatic recognition of the old and the infirm using Arduino technology implementation (아두이노를 사용하여 노약자 자동 인식 기술 구현)

  • Choi, Chul-kil;Lee, Sung-jin;Choi, Byeong-yoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.454-457
    • /
    • 2014
  • Arduino is for design based on open source prototyping platform, artist, designer, hobby activists, etc, i has been designed for all those who are interested in the environment construct. Arduino adventage you can easily create applications hardware, without deep knowledge about the hardware. Configuration of arduino using AVR microcontroller ATmage 168, software to action arduino using arduino program, MATLAB, Processing. Arduino is open source base, you can hardware production directly and using shield additionally, the arduino can be combined. Android is open source. Continue to expand through a combination of hardware, Arduino. It name is shield. Be given to the Arduino Uno board to the main board, the shield extends to the various aspects and help can be equipped with more features. The shield on top of the shield can be combined as a kind of shield and Ethernet shield, motor shield, the shield RFID hardware beyond a simple extension can be configured. In this paper, RFID technology Sealed for automatic recognition of the elderly by the elderly to identify and tag them SM130 13.56Mhz compatible hardware was constructed by combining tags.

  • PDF

Analysis on elements of policy changes in character industry (캐릭터산업의 정책변인연구)

  • Han, Chang-Wan
    • Cartoon and Animation Studies
    • /
    • s.33
    • /
    • pp.597-616
    • /
    • 2013
  • Character industry is not only knowledge-based industry chiefly with copyrights but also motive power for creative economy to take a role functionally over the fields of industries because it has industrial characteristic as complement product to promote sale value in manufacturing industry and service industry and increase profit on sales. Since 2003, the national policy related to character has aimed to maximize effect among connected industries, extend its business abroad, enforce copyrights through the improvement of marketing system, develop industrial infrastructure through raising quality of character products. With the result of this policy, the successful cases of connected contents have been crystallized and domestic character industry has stepped up methodically since 2007. It is needed to reset the scales of character industry and industrial stats because there are more know-how of self industry promotion and more related characters through strategy of market departmentalization starting with cartoon, animation, games, novels, movies and musicals. Especially, The Korea government set our target for 'Global Top Five Character Power' since 2009 and has started to carry out to find global star characters, support to establish network among connected industries, diversify promotion channels, and develop licensing business. Particularly, since 2013, There have been prospered the indoor character theme park with time management just like character experimental marketing or Kids cafes using characters, the demand market of digital character focusing on SNS emoticon, and the performance market for character musical consistently. Moreover, The domestic and foreign illegal black markets on off-line have been enlarged, so we need another policy alternative. To prepare for the era of exploding character demand market and diversifying platform, it is needed to set up a solid strategy that is required the elements of policy changes in character industry to vitalize character industry and support new character design and connected contents. the following shows that the elements of policy changes related to the existing policy, the current position of market. Nowadays, the elements of policy changes in domestic character industry are that variety of consumers in the digital character market according to platform diversification, Convergence contents of character goods for the Korean waves, legalization of the illegal black contents market, and controling the tendency of consumers in departmentalized market. This can help find the policy issue entirely deferent with the existing character powers like US, Japan or Europe. In its final analysis, the alternatives are the promotion of models with contract copyrights of domestic and foreign connected contents, the diversification of profit models of platform economy, the additive development of target market related to enlarging the Korean waves, and the strategy of character market for the age-specific tendency according to developing character demand market.

Using the METHONTOLOGY Approach to a Graduation Screen Ontology Development: An Experiential Investigation of the METHONTOLOGY Framework

  • Park, Jin-Soo;Sung, Ki-Moon;Moon, Se-Won
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.125-155
    • /
    • 2010
  • Ontologies have been adopted in various business and scientific communities as a key component of the Semantic Web. Despite the increasing importance of ontologies, ontology developers still perceive construction tasks as a challenge. A clearly defined and well-structured methodology can reduce the time required to develop an ontology and increase the probability of success of a project. However, no reliable knowledge-engineering methodology for ontology development currently exists; every methodology has been tailored toward the development of a particular ontology. In this study, we developed a Graduation Screen Ontology (GSO). The graduation screen domain was chosen for the several reasons. First, the graduation screen process is a complicated task requiring a complex reasoning process. Second, GSO may be reused for other universities because the graduation screen process is similar for most universities. Finally, GSO can be built within a given period because the size of the selected domain is reasonable. No standard ontology development methodology exists; thus, one of the existing ontology development methodologies had to be chosen. The most important considerations for selecting the ontology development methodology of GSO included whether it can be applied to a new domain; whether it covers a broader set of development tasks; and whether it gives sufficient explanation of each development task. We evaluated various ontology development methodologies based on the evaluation framework proposed by G$\acute{o}$mez-P$\acute{e}$rez et al. We concluded that METHONTOLOGY was the most applicable to the building of GSO for this study. METHONTOLOGY was derived from the experience of developing Chemical Ontology at the Polytechnic University of Madrid by Fern$\acute{a}$ndez-L$\acute{o}$pez et al. and is regarded as the most mature ontology development methodology. METHONTOLOGY describes a very detailed approach for building an ontology under a centralized development environment at the conceptual level. This methodology consists of three broad processes, with each process containing specific sub-processes: management (scheduling, control, and quality assurance); development (specification, conceptualization, formalization, implementation, and maintenance); and support process (knowledge acquisition, evaluation, documentation, configuration management, and integration). An ontology development language and ontology development tool for GSO construction also had to be selected. We adopted OWL-DL as the ontology development language. OWL was selected because of its computational quality of consistency in checking and classification, which is crucial in developing coherent and useful ontological models for very complex domains. In addition, Protege-OWL was chosen for an ontology development tool because it is supported by METHONTOLOGY and is widely used because of its platform-independent characteristics. Based on the GSO development experience of the researchers, some issues relating to the METHONTOLOGY, OWL-DL, and Prot$\acute{e}$g$\acute{e}$-OWL were identified. We focused on presenting drawbacks of METHONTOLOGY and discussing how each weakness could be addressed. First, METHONTOLOGY insists that domain experts who do not have ontology construction experience can easily build ontologies. However, it is still difficult for these domain experts to develop a sophisticated ontology, especially if they have insufficient background knowledge related to the ontology. Second, METHONTOLOGY does not include a development stage called the "feasibility study." This pre-development stage helps developers ensure not only that a planned ontology is necessary and sufficiently valuable to begin an ontology building project, but also to determine whether the project will be successful. Third, METHONTOLOGY excludes an explanation on the use and integration of existing ontologies. If an additional stage for considering reuse is introduced, developers might share benefits of reuse. Fourth, METHONTOLOGY fails to address the importance of collaboration. This methodology needs to explain the allocation of specific tasks to different developer groups, and how to combine these tasks once specific given jobs are completed. Fifth, METHONTOLOGY fails to suggest the methods and techniques applied in the conceptualization stage sufficiently. Introducing methods of concept extraction from multiple informal sources or methods of identifying relations may enhance the quality of ontologies. Sixth, METHONTOLOGY does not provide an evaluation process to confirm whether WebODE perfectly transforms a conceptual ontology into a formal ontology. It also does not guarantee whether the outcomes of the conceptualization stage are completely reflected in the implementation stage. Seventh, METHONTOLOGY needs to add criteria for user evaluation of the actual use of the constructed ontology under user environments. Eighth, although METHONTOLOGY allows continual knowledge acquisition while working on the ontology development process, consistent updates can be difficult for developers. Ninth, METHONTOLOGY demands that developers complete various documents during the conceptualization stage; thus, it can be considered a heavy methodology. Adopting an agile methodology will result in reinforcing active communication among developers and reducing the burden of documentation completion. Finally, this study concludes with contributions and practical implications. No previous research has addressed issues related to METHONTOLOGY from empirical experiences; this study is an initial attempt. In addition, several lessons learned from the development experience are discussed. This study also affords some insights for ontology methodology researchers who want to design a more advanced ontology development methodology.

Study on Development of LED Camping Light Design Based on IOT and Emotional Lighting Contents (IOT 및 감성조명 콘텐츠 기반의 LED 캠핑등 디자인 개발에 관한 연구)

  • Kim, Hee-Jun
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.12
    • /
    • pp.332-342
    • /
    • 2018
  • This study is aimed at suggesting information about technical choices for designing LED camping lights based on emotional lighting contents of integrated IOT and design areas which take a central role in creation and knowledge based industries and the procedure for materializing them. 'i-Light,' a portable LED camping light, is 'connected lighting' connecting men, space and emotion and a smart camping light based on IOT and emotional lighting contents. 'i-Light' has two functions. One is about lighting for adjusting color and color temperature naturally and the other is about safety for detecting harmful gases. 'i-Light' also has various emotional functions for experiencing interaction and taste of light. For the purpose, portable LED camping lights were designed, first of all, and then a highly color rendering/full-color lighting module, a smart sensor module and an IOT device platform were developed. In addition, efforts were made to establish detailed data about emotional lighting contents and to develop a Web application based on them. Finally, prototypes of portable LED camping lights were made to get a test bench and usability evaluation from related organizations. According to the results, all of 12 developed emotional lighting contents and three IOT safety sensors were suitable and prototypes were satisfactory. This paper will suggest a direction about actual technical choices for development of contents and products integrating artificial intelligence and big data and about the procedure for materializing them.

Review on Artificial Intelligence Education for K-12 Students and Teachers (K-12 학생 및 교사를 위한 인공지능 교육에 대한 고찰)

  • Kim, Soohwan;Kim, Seonghun;Lee, Minjeong;Kim, Hyeoncheol
    • The Journal of Korean Association of Computer Education
    • /
    • v.23 no.4
    • /
    • pp.1-11
    • /
    • 2020
  • The purpose of this study is to propose the direction of AI education in K-12 education through investigating and analyzing aspects of the purpose, content, and methods of AI education as the curriculum and teacher training factors. We collected and analyzed 9 papers as the primary literature and 11 domestic and foreign policy reports as the secondary literature. The collected literatures were analyzed by applying a descriptive reviews, and the implications were derived by analyzing the curriculum components and TPACK elements for multi-dimensional analysis. As a result of this study, AI education targets were divided into three steps: AI users, utilizer, and developers. In K-12 education, the user and utilizer stages are appropriate, and artificial intelligence literacy must be included for user education. Based on the current computing thinking ability and coding ability for utilizer education, the implication was derived that it is necessary to target the ability to create creative output by applying the functions of artificial intelligence. In addition to the pedagogical knowledge and the ability to use the platform, The teacher training is necessary because teachers need content knowledge such as problem-solving, reasoning, learning, perception, and some applied mathematics, cognitive / psychological / ethical of AI.

Problems of Applying Information Technologies in Public Governance

  • Goshovska, Valentyna;Danylenko, Lydiia;Hachkov, Andrii;Paladiiichuk, Sergii;Dzeha, Volodymyr
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.71-78
    • /
    • 2021
  • The relevance of research provides the necessity to identify the basic problems in the public governance sphere and information technology relations, forasmuch as understanding such interconnections can indicate the consequences of the development and spreading information technologies. The purpose of the research is to outline the issues of applying information technologies in public governance sphere. 500 civil servants took part in the survey (Ukraine). A two-stage study was conducted in order to obtain practical results of the research. The first stage involved collecting and analyzing the responses of civil servants on the Mentimeter online platform. In the second stage, the administrator used the SWOT-analysis system. The tendencies in using information technologies have been determined as follows: the institutional support development; creation of analytical portals for ensuring public control; level of accountability, transparency, activity of civil servants; implementation of e-government projects; changing the philosophy of electronic services development. Considering the threats and risks to the public governance system in the context of applying information technologies, the following aspects generated by societal requirements have been identified, namely: creation of the digital bureaucracy system; preservation of information and digital inequality; insufficient level of knowledge and skills in the field of digital technologies, reducing the publicity of the state and municipal governance system. Weaknesses of modern public governance in the context of IT implementation have been highlighted, namely: "digitization for digitalization"; lack of necessary legal regulation; inefficiency of electronic document management (issues caused by the imperfection of the interface of reporting interactive forms, frequent changes in the composition of indicators in reporting forms, the desire of higher authorities to solve the problem of their introduction); lack of data analysis infrastructure (due to imperfections in the organization of interaction between departments and poor capacity of information resources; lack of analytical databases), lack of necessary digital competencies for civil servants. Based on the results of SWOT-analysis, the strengths have been identified as follows: (possibility of continuous communication; constant self-learning); weaknesses (age restrictions for civil servants; insufficient acquisition of knowledge); threats (system errors in the provision of services through automation); opportunities for the introduction of IT in the public governance system (broad global trends; facilitation of the document management system). The practical significance of the research lies in providing recommendations for eliminating the problems of IT implementation in the public governance sphere outlined by civil servants..

Data-driven Persona Analysis for Understanding Web Novel Users: Focusing on Quantitative Behavioral Pattern Data (웹소설 사용자 이해를 위한 데이터 기반 페르소나 분석: 정량적 행동 패턴 데이터 중심으로)

  • Ha, Sangjip;Park, Do-Hyung
    • Knowledge Management Research
    • /
    • v.23 no.3
    • /
    • pp.259-284
    • /
    • 2022
  • In order to help the understanding of web novel users, this study was intended to quantitatively verify the user's behavioral types according to the characteristics of web novels. For this purpose, the direction of the study proceeded as follows. First, the motives of web novel users were investigated by referring to the motives of other digital content users. In addition, specific behavioral types of users were also collected. As a result, the motivation for using web novels was found to be 'interpersonal relationships and information acquisition with others', 'leisure activities', and 'escape from reality/relieve tension'. After that, the groups were classified as to whether there was a difference between groups according to the motives of use. As a result, the 'hobbies' type, a group with a particularly high motivation for using leisure activities, the 'stress relief' type, a group with very high escapism and tension relief characteristics, and a group with high interpersonal relationships and information acquisition with others The 'communication' type was classified as a 'multipurpose' type with high overall motivation characteristics. Then, in order to find out the specific characteristics between the types, personas were constructed based on the different behavior type data. Through this, the theoretical contribution of this study is meaningful in that it revealed the motives of web novel users. As a practical contribution, the persona was formed by combining the users' motives and behavioral patterns and visualized to be close to the actual representative users. These results are expected to help improve the web novel service by providing useful indicators for actual writers, platform managers, and users.

The Development of Software Teaching-Learning Model based on Machine Learning Platform (머신러닝 플랫폼을 활용한 소프트웨어 교수-학습 모형 개발)

  • Park, Daeryoon;Ahn, Joongmin;Jang, Junhyeok;Yu, Wonjin;Kim, Wooyeol;Bae, Youngkwon;Yoo, Inhwan
    • Journal of The Korean Association of Information Education
    • /
    • v.24 no.1
    • /
    • pp.49-57
    • /
    • 2020
  • The society we are living in has being changed to the age of the intelligent information society after passing through the knowledge-based information society in the early 21st century. In this study, we have developed the instructional model for software education based on the machine learning which is a field of artificial intelligence(AI) to enhance the core competencies of learners required in the intelligent information society. This model is focusing on enhancing the core competencies through the process of problem-solving as well as reducing the burden of learning about AI itself. The specific stages of the developed model are consisted of seven levels which are 'Problem Recognition and Analysis', 'Data Collection', 'Data Processing and Feature Extraction', 'ML Model Training and Evaluation', 'ML Programming', 'Application and Problem Solving', and 'Share and Feedback'. As a result of applying the developed model in this study, we were able to observe the positive response about learning from the students and parents. We hope that this research could suggest the future direction of not only the instructional design but also operation of software education program based on machine learning.

A Scheme for Identifying Malicious Applications Based on API Characteristics (API 특성 정보기반 악성 애플리케이션 식별 기법)

  • Cho, Taejoo;Kim, Hyunki;Lee, Junghwan;Jung, Moongyu;Yi, Jeong Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.187-196
    • /
    • 2016
  • Android applications are inherently vulnerable to a repackaging attack such that malicious codes are easily inserted into an application and then resigned by the attacker. These days, it occurs often that such private or individual information is leaked. In principle, all Android applications are composed of user defined methods and APIs. As well as accessing to resources on platform, APIs play a role as a practical functional feature, and user defined methods play a role as a feature by using APIs. In this paper we propose a scheme to analyze sensitive APIs mostly used in malicious applications in terms of how malicious applications operate and which API they use. Based on the characteristics of target APIs, we accumulate the knowledge on such APIs using a machine learning scheme based on Naive Bayes algorithm. Resulting from the learned results, we are able to provide fine-grained numeric score on the degree of vulnerabilities of mobile applications. In doing so, we expect the proposed scheme will help mobile application developers identify the security level of applications in advance.

Proposal of Big Data Analysis and Visualization Technique Curriculum for Non-Technical Majors in Business Management Analysis (경영분석 업무에 종사하는 비 기술기반 전공자를 위한 빅데이터 분석 및 시각화 기법 교육과정 제안)

  • Hong, Pil-Tae;Yu, Jong-Pil
    • Journal of Practical Engineering Education
    • /
    • v.12 no.1
    • /
    • pp.31-39
    • /
    • 2020
  • Big data analysis is analyzed and used in a variety of management and industrial sites, and plays an important role in management decision making. The job competency of big data analysis personnel engaged in management analysis work does not necessarily require the acquisition of microscopic IT skills, but requires a variety of experiences and humanities knowledge and analytical skills as a Data Scientist. However, big data education by state-run and state-run educational institutions and job education institutions based on the National Competency Standards (NCS) is proceeding in terms of software engineering, and this teaching methodology can have difficult and inefficient consequences for non-technical majors. Therefore, we analyzed the current Big Data platform and its related technologies and defined which of them are the requisite job competency requirements for field personnel. Based on this, the education courses for big data analysis and visualization techniques were organized for non-technical-based majors. This specialized curriculum was conducted by working-level officials of financial institutions engaged in management analysis at the management site and was able to achieve better educational effects The education methods presented in this study will effectively carry out big data tasks across industries and encourage visualization of big data analysis for non-technical professionals.