• Title/Summary/Keyword: Using Computer for Learning

Search Result 3,410, Processing Time 0.03 seconds

A study on average changes in college students' credits earned and grade point average according to face-to-face and non-face-to-face classes in the COVID-19 situation

  • Jeong-Man, Seo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.3
    • /
    • pp.167-175
    • /
    • 2023
  • In the context of COVID-19, this study was conducted to study how college students' earned grades and average grade point averages changed according to face-to-face and non-face-to-face classes. For this study, grade data was extracted using an access database. For the study, 152 students during the 3rd semester were compared and analyzed the grade point average, average grade point average, midterm exam, final exam, assignment score, and attendance score of students who participated in non-face-to-face and face-to-face classes. As an analysis method, independent sample t-test statistical processing was performed. It was concluded that the face-to-face class students had better grades and average GPA. As a result, the face-to-face class students showed 4.39 points higher than the non-face-to-face class students, and the average grade value was 0.6642 points higher. As a result of the comparative analysis, it was statistically significant, and the face-to-face class averaged 21.22 and the non-face-to-face class had 16.83 points. In conclusion, it was confirmed that face-to-face students' grades were generally higher than those of non-face-to-face students, and that face-to-face students showed higher participation in class.

A study on end-to-end speaker diarization system using single-label classification (단일 레이블 분류를 이용한 종단 간 화자 분할 시스템 성능 향상에 관한 연구)

  • Jaehee Jung;Wooil Kim
    • The Journal of the Acoustical Society of Korea
    • /
    • v.42 no.6
    • /
    • pp.536-543
    • /
    • 2023
  • Speaker diarization, which labels for "who spoken when?" in speech with multiple speakers, has been studied on a deep neural network-based end-to-end method for labeling on speech overlap and optimization of speaker diarization models. Most deep neural network-based end-to-end speaker diarization systems perform multi-label classification problem that predicts the labels of all speakers spoken in each frame of speech. However, the performance of the multi-label-based model varies greatly depending on what the threshold is set to. In this paper, it is studied a speaker diarization system using single-label classification so that speaker diarization can be performed without thresholds. The proposed model estimate labels from the output of the model by converting speaker labels into a single label. To consider speaker label permutations in the training, the proposed model is used a combination of Permutation Invariant Training (PIT) loss and cross-entropy loss. In addition, how to add the residual connection structures to model is studied for effective learning of speaker diarization models with deep structures. The experiment used the Librispech database to generate and use simulated noise data for two speakers. When compared with the proposed method and baseline model using the Diarization Error Rate (DER) performance the proposed method can be labeling without threshold, and it has improved performance by about 20.7 %.

A study on the improvement of artificial intelligence-based Parking control system to prevent vehicle access with fake license plates (위조번호판 부착 차량 출입 방지를 위한 인공지능 기반의 주차관제시스템 개선 방안)

  • Jang, Sungmin;Iee, Jeongwoo;Park, Jonghyuk
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.2
    • /
    • pp.57-74
    • /
    • 2022
  • Recently, artificial intelligence parking control systems have increased the recognition rate of vehicle license plates using deep learning, but there is a problem that they cannot determine vehicles with fake license plates. Despite these security problems, several institutions have been using the existing system so far. For example, in an experiment using a counterfeit license plate, there are cases of successful entry into major government agencies. This paper proposes an improved system over the existing artificial intelligence parking control system to prevent vehicles with such fake license plates from entering. The proposed method is to use the degree of matching of the front feature points of the vehicle as a passing criterion using the ORB algorithm that extracts information on feature points characterized by an image, just as the existing system uses the matching of vehicle license plates as a passing criterion. In addition, a procedure for checking whether a vehicle exists inside was included in the proposed system to prevent the entry of the same type of vehicle with a fake license plate. As a result of the experiment, it showed the improved performance in identifying vehicles with fake license plates compared to the existing system. These results confirmed that the methods proposed in this paper could be applied to the existing parking control system while taking the flow of the original artificial intelligence parking control system to prevent vehicles with fake license plates from entering.

A study on the developing and implementation of the Cyber University (가상대학 구현에 관한 연구)

  • Choi, Sung;Yoo, Gab-Sang
    • Proceedings of the Technology Innovation Conference
    • /
    • 1998.06a
    • /
    • pp.116-127
    • /
    • 1998
  • The Necessity of Cyber University. Within the rapidly changing environment of global economics, the environment of higher education in the universities, also, has been, encountering various changes. Popularization on higher education related to 1lifetime education system, putting emphasis on the productivity of education services and the acquisition of competitiveness through the market of open education, the breakdown of the ivory tower and the Multiversitization of universities, importance of obtaining information in the universities, and cooperation between domestic and oversea universities, industry and educational system must be acquired. Therefore, in order to adequately cope wi th these kinds of rapid changes in the education environment, operating Cyber University by utilizing various information technologies and its fixations such as Internet, E-mail, CD-ROMs, Interact ive Video Networks (Video Conferencing, Video on Demand), TV, Cable etc., which has no time or location limitation, is needed. Using informal ion and telecommunication technologies, especially the Internet is expected to Or ing about many changes in the social, economics and educational area. Among the many changes scholars have predicted, the development and fixations of Distant Learning or Cyber University was the most dominant factor. In the case of U. S. A., Cyber University has already been established and in under operation by the Federate Governments of 13 states. Any other universities (around 500 universities has been opened until1 now), with the help of the government and private citizens have been able to partly operate the Cyber University and is planning on enlarging step-by-step in the future. It could be seen not only as U. S. A. trying to elevate its higher education through their leading information technologies, but also could be seen as their objective in putting efforts on subordinating the culture of the education worldwide. UTRA University in U. S. A., for example, is already exporting its class lectures to China, and Indonesia regions. Influenced by the Cyber University current in the U.S., the Universities in Korea is willing .to arrange various forms of Cyber Universities. In line with this, at JUNAM National University, internet based Cyber University, which has set about its work on July of 1997, is in the state of operating about 100 Cyber Universities. Also, in the case of Hanam University, the Distant Learning classes are at its final stage of being established; this is a link in the rapid speed project of setting an example by the Korean Government. In addition, the department of education has selected 5 universities, including Seoul Cyber Design University for experimentation and is in the stage of strategic operation. Over 100 universities in Korea are speeding up its preparation for operating Cyber University. This form of Distant Learning goes beyond the walls of universities and is in the trend of being diffused in business areas or in various training programs of financial organizations and more. Here, in the hope that this material would some what be of help to other Universities which are preparing for Cyber University, I would 1ike to introduce some general concepts of the components forming Cyber University and Open Education System which has been established by JUNAM University. System of Cyber University could be seen as a general solution offered by tile computer technologies for the management on the students, Lectures On Demand, real hour based and satellite classes, media product ion lab for the production of the multimedia Contents, electronic library, the Groupware enabling exchange of information between students and professors. Arranging general concepts of components in the aspect of Cyber University and Open Education, it would be expressed in the form of the establishment of Cyber University and the service of Open Education as can be seen in the diagram below.

  • PDF

A Study on Social Media Sentiment Analysis for Exploring Public Opinions Related to Education Policies (교육정책관련 여론탐색을 위한 소셜미디어 감정분석 연구)

  • Chung, Jin-Myeong;Yoo, Ki-Young;Koo, Chan-Dong
    • Informatization Policy
    • /
    • v.24 no.4
    • /
    • pp.3-16
    • /
    • 2017
  • With the development of social media services in the era of Web 2.0, the public opinion formation site has been partially shifted from the traditional mass media to social media. This phenomenon is continuing to expand, and public opinions on government polices created and shared on social media are attracting more attention. It is particularly important to grasp public opinions in policy formulation because setting up educational policies involves a variety of stakeholders and conflicts. The purpose of this study is to explore public opinions about education-related policies through an empirical analysis of social media documents on education policies using opinion mining techniques. For this purpose, we collected the education policy-related documents by keyword, which were produced by users through the social media service, tokenized and extracted sentimental qualities of the documents, and scored the qualities using sentiment dictionaries to find out public preferences for specific education policies. As a result, a lot of negative public opinions were found regarding the smart education policies that use the keywords of digital textbooks and e-learning; while the software education policies using coding education and computer thinking as the keywords had more positive opinions. In addition, the general policies having the keywords of free school terms and creative personality education showed more negative public opinions. As much as 20% of the documents were unable to extract sentiments from, signifying that there are still a certain share of blog posts or tweets that do not reflect the writers' opinions.

Comparison of Adversarial Example Restoration Performance of VQ-VAE Model with or without Image Segmentation (이미지 분할 여부에 따른 VQ-VAE 모델의 적대적 예제 복원 성능 비교)

  • Tae-Wook Kim;Seung-Min Hyun;Ellen J. Hong
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.23 no.4
    • /
    • pp.194-199
    • /
    • 2022
  • Preprocessing for high-quality data is required for high accuracy and usability in various and complex image data-based industries. However, when a contaminated hostile example that combines noise with existing image or video data is introduced, which can pose a great risk to the company, it is necessary to restore the previous damage to ensure the company's reliability, security, and complete results. As a countermeasure for this, restoration was previously performed using Defense-GAN, but there were disadvantages such as long learning time and low quality of the restoration. In order to improve this, this paper proposes a method using adversarial examples created through FGSM according to image segmentation in addition to using the VQ-VAE model. First, the generated examples are classified as a general classifier. Next, the unsegmented data is put into the pre-trained VQ-VAE model, restored, and then classified with a classifier. Finally, the data divided into quadrants is put into the 4-split-VQ-VAE model, the reconstructed fragments are combined, and then put into the classifier. Finally, after comparing the restored results and accuracy, the performance is analyzed according to the order of combining the two models according to whether or not they are split.

Ensemble of Nested Dichotomies for Activity Recognition Using Accelerometer Data on Smartphone (Ensemble of Nested Dichotomies 기법을 이용한 스마트폰 가속도 센서 데이터 기반의 동작 인지)

  • Ha, Eu Tteum;Kim, Jeongmin;Ryu, Kwang Ryel
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.4
    • /
    • pp.123-132
    • /
    • 2013
  • As the smartphones are equipped with various sensors such as the accelerometer, GPS, gravity sensor, gyros, ambient light sensor, proximity sensor, and so on, there have been many research works on making use of these sensors to create valuable applications. Human activity recognition is one such application that is motivated by various welfare applications such as the support for the elderly, measurement of calorie consumption, analysis of lifestyles, analysis of exercise patterns, and so on. One of the challenges faced when using the smartphone sensors for activity recognition is that the number of sensors used should be minimized to save the battery power. When the number of sensors used are restricted, it is difficult to realize a highly accurate activity recognizer or a classifier because it is hard to distinguish between subtly different activities relying on only limited information. The difficulty gets especially severe when the number of different activity classes to be distinguished is very large. In this paper, we show that a fairly accurate classifier can be built that can distinguish ten different activities by using only a single sensor data, i.e., the smartphone accelerometer data. The approach that we take to dealing with this ten-class problem is to use the ensemble of nested dichotomy (END) method that transforms a multi-class problem into multiple two-class problems. END builds a committee of binary classifiers in a nested fashion using a binary tree. At the root of the binary tree, the set of all the classes are split into two subsets of classes by using a binary classifier. At a child node of the tree, a subset of classes is again split into two smaller subsets by using another binary classifier. Continuing in this way, we can obtain a binary tree where each leaf node contains a single class. This binary tree can be viewed as a nested dichotomy that can make multi-class predictions. Depending on how a set of classes are split into two subsets at each node, the final tree that we obtain can be different. Since there can be some classes that are correlated, a particular tree may perform better than the others. However, we can hardly identify the best tree without deep domain knowledge. The END method copes with this problem by building multiple dichotomy trees randomly during learning, and then combining the predictions made by each tree during classification. The END method is generally known to perform well even when the base learner is unable to model complex decision boundaries As the base classifier at each node of the dichotomy, we have used another ensemble classifier called the random forest. A random forest is built by repeatedly generating a decision tree each time with a different random subset of features using a bootstrap sample. By combining bagging with random feature subset selection, a random forest enjoys the advantage of having more diverse ensemble members than a simple bagging. As an overall result, our ensemble of nested dichotomy can actually be seen as a committee of committees of decision trees that can deal with a multi-class problem with high accuracy. The ten classes of activities that we distinguish in this paper are 'Sitting', 'Standing', 'Walking', 'Running', 'Walking Uphill', 'Walking Downhill', 'Running Uphill', 'Running Downhill', 'Falling', and 'Hobbling'. The features used for classifying these activities include not only the magnitude of acceleration vector at each time point but also the maximum, the minimum, and the standard deviation of vector magnitude within a time window of the last 2 seconds, etc. For experiments to compare the performance of END with those of other methods, the accelerometer data has been collected at every 0.1 second for 2 minutes for each activity from 5 volunteers. Among these 5,900 ($=5{\times}(60{\times}2-2)/0.1$) data collected for each activity (the data for the first 2 seconds are trashed because they do not have time window data), 4,700 have been used for training and the rest for testing. Although 'Walking Uphill' is often confused with some other similar activities, END has been found to classify all of the ten activities with a fairly high accuracy of 98.4%. On the other hand, the accuracies achieved by a decision tree, a k-nearest neighbor, and a one-versus-rest support vector machine have been observed as 97.6%, 96.5%, and 97.6%, respectively.

Operational Definition of Components of Logical Thinking in Problem-solving Process on Informatics Subject (정보 교과의 문제해결과정에서 논리적 사고력 구성요소에 대한 조작적 정의)

  • Yoon, Il-Kyu;Kim, Jong-Hye;Lee, Won-Gyu
    • The Journal of Korean Association of Computer Education
    • /
    • v.13 no.2
    • /
    • pp.1-14
    • /
    • 2010
  • Previous researches on the improvement of logical thinking in Informatics subject have used general logical thinking test and only limited improvement of logical thinking by programming learning result. In this study, the operational definition of the logical thinking in problem-solving process on Informatics education is different from the general logical thinking and the logical thinking of the other subjects. Firstly, we suggested the operational definition of components of logical thinking using the open questionnaire by expert and research team discussion. Also, we suggested the relationship between the operational definition and contents of the 'problem-solving methods and procedure' section in secondary Informatics subject. Finally, this study developed the evaluation contents based on the operational definition of components of logical thinking. The components of logical thinking which was required in problem-solving process on Informatics subject were ordering reasoning, propositional logic, controlling variables, combinatorial logic, proportional reasoning. We suggested the relationship between operational definition and problem-solving process and assessment of logical thinking in problem-solving process on Informatics subject. This paper will give meaningful insight to supply the guideline of the teaching strategy and evaluation methods for improving the logical thinking in Informatics education.

  • PDF

A Study on MRD Methods of A RAM-based Neural Net (RAM 기반 신경망의 MRD 기법에 관한 연구)

  • Lee, Dong-Hyung;Kim, Seong-Jin;Park, Sang-Moo;Lee, Soo-Dong;Ock, Cheol-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.9
    • /
    • pp.11-19
    • /
    • 2009
  • A RAM-based Neural Net(RBNN) which has multi-discriminators is more effective than RBNN with a discriminator. Experience Sensitive Cumulative Neural Network and 3-D Neuro System(3DNS) that accumulate the features point improved the performance of BNN, which were enabled to train additional and repeated patterns and extract a generalized pattern. In recognition process of Neural Net with multi-discriminator, the selection of class was decided by the value of MRD which calculates the accumulated sum of each class. But they had a saturation problem of its memory cells caused by learning volume increment. Therefore, the decision of MRD has a low performance because recognition rate is decreased by saturation. In this paper, we propose the method which improve the MRD ability. The method consists of the optimum MRD and the matching ratio prototype to generalized image, the cumulative filter ratio, the gap of prototype response MRD. We experimented the performance using NIST database of NIST without preprocessor, and compared this model with 3DNS. The proposed MRD method has more performance of recognition rate and more stable system for distortion of input pattern than 3DNS.

Performance Improvement of Bearing Fault Diagnosis Using a Real-Time Training Method (실시간 학습 방법을 이용한 베어링 고장진단 성능 개선)

  • Cho, Yoon-Jeong;Kim, Jae-Young;Kim, Jong-Myon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.4
    • /
    • pp.551-559
    • /
    • 2017
  • In this paper, a real-time training method to improve the performance of bearing fault diagnosis. The traditional bearing fault diagnosis cannot classify a condition which is not trained by the classifier. The proposed 4-step method trains and recognizes new condition in real-time, thereby it can classify the condition accurately. In the first step, we calculate the maximum distance value for each class by calculating a Euclidean distance between a feature vector of each class and a centroid of the corresponding class in the training information. In the second step, we calculate a Euclidean distance between a feature vector of new acquired data and a centroid of each class, and then compare with the allowed maximum distance of each class. In the third step, if the distance between a feature vector of new acquired data and a centroid of each class is larger than the allowed maximum distance of each class, we define that it is data of new condition and increase count of new condition. In the last step, if the count of new condition is over 10, newly acquired 10 data are assigned as a new class and then conduct re-training the classifier. To verify the performance of the proposed method, bearing fault data from a rotating machine was utilized.