• 제목/요약/키워드: Using level of Computer

검색결과 2,883건 처리시간 0.026초

소셜 네트워크에서 감정단어의 단계별 코사인 유사도 기법을 이용한 추천시스템 (Personalized Recommendation System using Level of Cosine Similarity of Emotion Word from Social Network)

  • 권응주;김종우;허노정;강상길
    • 정보화연구
    • /
    • 제9권3호
    • /
    • pp.333-344
    • /
    • 2012
  • 본 논문에서는 개인의 취향과 관심이 반영 되어있는 소셜 정보를 활용하여 사용자에게 영화를 추천할 수 있는 시스템을 제안하였다. 시스템에서 데이터 구축은 포털사이트에서 영화 정보를 수집하고 페이스북과 트위터 같은 SNS를 통해 소셜 정보를 수집한다. 본 논문에서는 사용자의 감정에 따른 보다 정교한 처리를 위하여 6단계의 감정단계로 분류한 소셜 정보의 벡터공간 모형의 구축방법을 제안한다. 추천을 위한 유사도 측도 방법은 2단계로 구성되어 있다. 첫 번째는 일반적인 코사인 측도를 통한 영화 목록의 구축 단계이고, 두 번째는 기존의 코사인 측도(Cosine measure)를 활용한 좌표평면에서 감정 단계별 벡터 정보 표현 방법 및 유사도 측도 방법을 통해 추천 영화 목록의 결정 단계이다. 본 논문의 추천 시스템의 성능을 평가하기 위하여 기존의 추천 시스템과 비교 실험을 통하여 본 연구의 추천 시스템의 유용성을 검증하였다.

명암도 작용 길이에 따른 연삭 숫돌면의 이상 현상 분류 (Extraordinary State Classification of Grinding Wheel Surface Based on Gray-level Run Lengths)

  • 유은이;김광래
    • 한국공작기계학회논문집
    • /
    • 제13권3호
    • /
    • pp.24-29
    • /
    • 2004
  • The grinding process plays a key role which decides the quality of a product finally. But the grinding process is very irregular, so it is very difficult to analyse the process accurately. Therefore it is very important in the aspect of precision and automation to reduce the idle time and to decide the proper dressing time by watching. In this study, we choose the method which can be observed directly by using of computer vision and then apply pattern classification technique to the method of measuring the wheel surface. Pattern classification technique is proper to analyse complicated surface image. We observe the change of the wheel surface by using of the gray level run lengths which are representative in this technique.

다품종 및 다공정 환경 중소기업의 현장직 사원에 대한 작업분석 및 표준설정을 위한 Computer Application 사례연구 -M/M Chart Case를 중심으로- (A Case Study of Computer Application for Work Study and Standard Time Data in Mid-Level Factory having Working Circumstances of Multi-Item and Multi Process Type -Mainly Focused on the Case of Man-Machine Chart-)

  • 유왕진
    • 품질경영학회지
    • /
    • 제22권2호
    • /
    • pp.127-142
    • /
    • 1994
  • In these days, the PCs are widely used in the mid-level factory. But they have low-effectiveness for using them. The main reason should be the lack of useful and practical software in the market. This Case study aimed at the support of the software using DB Language to get M/M chart for aquiring work study and standard time data in the mid-level factory having multi-item and multi-process type. CVA (Chronocycle Video Analysis) is applied to get basic standard time data and working list. Standard time, Sequence of working and allowance time or rate for man and machine will be readily obtained through the menu when the software executing. Detailed program list is systematically shown in Appendix.

  • PDF

A UML-based Approach towards Test Case Generation and Optimization

  • Shahid Saleem;Saif U. R. Malik;Bilal Mehboob;Roobaea Alroobaea;Sultan Algarni;Abdullah M. Baqasah;Naveed Ahmad;Muhammad Hasnain
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제18권3호
    • /
    • pp.633-652
    • /
    • 2024
  • Software testing is an important phase as it ensures the software quality. The software testing process comprises of three steps: generation, execution, and evaluation of test cases. Literature claims the usage of single and multiple 'Unified Modeling Language' (UML) diagrams to generate test cases. Using multiple UML diagrams increases test case coverage. However, the existing approaches show limitations in test case generation from UML diagrams. Therefore, in this research study, we propose an approach to generate the test cases using UML State Chart Diagram (SCD), Activity Diagram (AD), and Sequence Diagram (SD). The proposed approach transforms UML diagrams into intermediate forms: SCD Graph, AD Graph, and SD Graph respectively. Furthermore, by integrating these three graphs, a System Testing Graph (STG) is formed. Finally, test cases are identified from STG by using a traversal algorithm such as Depth First Search (DFS) that is an optimization method. The results show that the proposed approach is better compared to existing approaches in terms of coverage and performance. Moreover, the generated test cases have the ability to detect faults at the unit level, integration, and system level testing.

Hypothetical Study of Student's Academic Performance influenced by Parent's Educational and Financial Status

  • Zohra Khatoon;Hussain Saleem;Ameer Ali Buriro;Uzma Murad Panhwar;Samina Saleem
    • International Journal of Computer Science & Network Security
    • /
    • 제24권7호
    • /
    • pp.79-86
    • /
    • 2024
  • This research is conducted in order to analyze the student's academic performance at the secondary school level in Sindh province of Pakistan. The study was focused on the students who have passed the Matriculation level recently. The sample of size equal to 1097 secondary level students was randomly selected in a way that from each college roughly up to 150 students took part in the survey. The sample selection was further divided on gender (Male=448, Female=649) and Locale (Urban=456, Rural=641). A survey questionnaire was circulated for data collection. The statistical analysis based on Pearson's Chi-Square and Correlation models were carried out using the collected data. The conclusion was drawn from results that strongly revealed that the student's academic achievement at high school level was highly associated to their parent's educational level and socio-economic background. Therefore, it is strongly recommended that the financial condition of the population must be enhanced by taking suitable measures. The affected students should be awarded adequate financial assistance or scholarships to face such hardships of their learning career. Free laptops, learning materials, books, and stationery should also be provided.

Three-Level NPC-Based Dual Active Bridge Converter의 도통손실 절감을 위한 새로운 스위칭 방법 (A Control Method to Improve Power Conversion Efficiency of Three-level NPC-Based Dual Active Bridge Converter)

  • 이준영;최현준;김주용;정지훈
    • 전력전자학회논문지
    • /
    • 제22권2호
    • /
    • pp.150-158
    • /
    • 2017
  • This study proposes a new pulse-width modulation switching pattern for the low conduction loss of a three-level neutral point clamped (NPC)-based dual-active bridge (DAB) converter. The operational principle for a bidirectional power conversion is a phase-shift modulation. The conventional switching method of the three-level NPC-based DAB converter shows a symmetric switching pattern. This method has a disadvantage of high root-mean-square (RMS) value of the coupling inductor current, which leads to high conduction loss. The proposed switching method shows an asymmetrical pattern, which can reduce the RMS value of the inductor current with lower conduction loss than that of the conventional method. The performance of the proposed asymmetrical switching method is theoretically analyzed and practically verified using simulation and experiment.

클라우드 데이터베이스를 이용한 커널 기반 고속 패킷필터링 임베디드 게이트웨이 및 방화벽 개발 (Development of Kernel based High Speed Packet Filtering Imbedded Gateway and Firewall Using Cloud Database)

  • 박대승;김수민;유한섭;문송철
    • 서비스연구
    • /
    • 제5권1호
    • /
    • pp.57-70
    • /
    • 2015
  • 본 논문에서는 라우터의 라우팅 기능, L7스위치의 컨텐츠 기반 보안, IPS 침입 방지 시스템의 기능과 클라우드, 빅데이터 기술을 혼합한 새로운 형태의 패턴분석 패킷 필터링 방화벽 장비를 저가형 임베디드 장비에서 구현해 SOHO(소규모 창업) 및 소규모 회사 또는 일반 가정의 보안 수준을 개선하고 새로운 시장을 개척하는 것을 목표로 하며, 또한, 고성능 스위치 및 기존 보안장비 기능 대체를 목표로 해 개발하고, 저 사양 장치에서 고성능 시스템을 구현할 수 있는 새로운 차세대 알고리즘을 제시한다.

Using Highly Secure Data Encryption Method for Text File Cryptography

  • Abu-Faraj, Mua'ad M.;Alqadi, Ziad A.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.53-60
    • /
    • 2021
  • Many standard methods are used for secret text files and secrete short messages cryptography, these methods are efficient when the text to be encrypted is small, and the efficiency will rapidly decrease when increasing the text size, also these methods sometimes have a low level of security, this level will depend on the PK length and sometimes it may be hacked. In this paper, a new method will be introduced to improve the data protection level by using a changeable secrete speech file to generate PK. Highly Secure Data Encryption (HSDE) method will be implemented and tested for data quality levels to ensure that the HSDE destroys the data in the encryption phase, and recover the original data in the decryption phase. Some standard methods of data cryptography will be implemented; comparisons will be done to justify the enhancements provided by the proposed method.

Effectiveness Analysis of Computer Science Textbooks focusing on Digital Therapeutics

  • Eunsun Choi;Namje Park
    • 인터넷정보학회논문지
    • /
    • 제25권3호
    • /
    • pp.9-18
    • /
    • 2024
  • Digital therapy has emerged as a novel treatment modality, propelled by advancements in information and communication technology. In the last five years, there has been a substantial surge in research publications addressing digital therapeutics (DTx) interventions, signaling a sustained upward trajectory in this field. The dynamic nature of computer science, marked by continuous innovation and development, underscores the need for agile adaptation to rapid changes. Consequently, computer science education is compelled to offer students insights into the latest trends. This research endeavors to contribute to the evolving landscape by developing textbooks that impart knowledge about DTx, an integration of information technology. The study focuses on the application of these textbooks to elementary and middle school students in South Korea. The instructional materials have been carefully organized to enable students to learn about the principle of Attention Deficit Hyperactivity Disorder (ADHD) DTx at the elementary level and the DTx that can prevent and address the digital drama at the middle school level. Based on the application of the textbook, students who received instruction using the textbook showed statistically significant improvements in all subcategories of creative problem-solving ability, including idea modification, visualization, task focus, analogy, idea generation, and elaboration (p<.01). Additionally, there were statistically significant changes in students' self-efficacy before and after using the textbook, with negative efficacy decreasing, and positive efficacy and social efficacy increasing (p<.001).

쿠키파일의 보안성을 향상하기 위한 보안영역 설계 (Designing on Security zone to improve Cookie File Security level)

  • 서희석;최요한
    • 컴퓨터교육학회논문지
    • /
    • 제14권6호
    • /
    • pp.75-81
    • /
    • 2011
  • 쿠키는 단순한 텍스트 파일로 사용자가 웹 서비스를 제공 받은 서비스 내용이 기록되어 있다. 쿠키파일에 기록 되는 정보 중에는 사용자의 개인정보도 포함된다. 개인정보가 기록된 쿠키파일을 공격자 획득하게 되면 사용자의 개인정보 유출로 인해 금전적인 피해까지 입을 수 있다. 본 논문에서는 쿠키 파일의 보안성 향상을 위해 제시된 관련연구와 쿠키파일의 낮은 보안성으로 인해 발생할 수 있는 취약성을 살펴본다. 관련 연구와 쿠키 파일의 취약성 분석을 통해 쿠키 파일을 안전하게 보관할 수 있는 보안영역에 대한 설계와 효율적인 보안영역을 제시를 위해 보안영역을 구현할 수 있는 방법에 대해서 알아본다. 또한, 성능평가를 통해서 보안성을 확인해 보았다. 보안영역을 통해서 사용자 PC에 저장된 쿠키파일의 보안성을 향상시켜 사용자의 개인정보를 안전하게 유지할 수 있을 것이다.

  • PDF