• Title/Summary/Keyword: computer science

Search Result 31,704, Processing Time 0.063 seconds

Recognition for Digitizing Historical Document Pages (고문서 전산화를 위한 문서 인식 기법)

  • Cho Kyutae;Kim Jinsik;Lee Seonghun;Kim Jahwan;Kim Minsoo;Kim JinHyung
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07b
    • /
    • pp.796-798
    • /
    • 2005
  • 역사적 가치가 높은 고문서의 훼손을 방지하고 접근을 용이하게 하기 위해서 고문서 전산화가 필요하다. 이를 위한 작업에서는 고문서의 방대한 양을 빠르고 정확하게 처리하는 기술이 필수적이다. 본 논문은 고문서 전산화를 위한 분할 방법과 인식 방법을 제안한다. 인식을 이용한 분할 방법을 통해 신속하면서도 정확하게 문서내의 문자영역을 찾아낸다. 또한 인식기로부터 생성된 점수를 확률화 하여 신뢰도를 높이고 이를 문자의 모양 및 문맥정보와 결합을 통해 분할과 후처리를 수행한다. 제안하는 방법은 고문서 전산화 과정에서 사람의 수작업을 최소화하기 위해 유용하다.

  • PDF

Recent Approaches to Dialog Management for Spoken Dialog Systems

  • Lee, Cheong-Jae;Jung, Sang-Keun;Kim, Kyung-Duk;Lee, Dong-Hyeon;Lee, Gary Geun-Bae
    • Journal of Computing Science and Engineering
    • /
    • v.4 no.1
    • /
    • pp.1-22
    • /
    • 2010
  • A field of spoken dialog systems is a rapidly growing research area because the performance improvement of speech technologies motivates the possibility of building systems that a human can easily operate in order to access useful information via spoken languages. Among the components in a spoken dialog system, the dialog management plays major roles such as discourse analysis, database access, error handling, and system action prediction. This survey covers design issues and recent approaches to the dialog management techniques for modeling the dialogs. We also explain the user simulation techniques for automatic evaluation of spoken dialog systems.

A Study on Computer Education Curriculum in Middle School for Computer Science Education (컴퓨터과학교육을 위한 중학교 컴퓨터교육과정 연구)

  • Park, Jung-Ho;Lee, Jae-Woon;Lee, Tae-Wuk
    • The Journal of Korean Association of Computer Education
    • /
    • v.9 no.2
    • /
    • pp.37-45
    • /
    • 2006
  • Computer education currently executed at middle schools showed problems of system of education curriculum, repetition, and lack of consistent system as a result of analyzing index for information and communication technology curriculum, and related literatures, and most of the education contents have difficulty to nurture logic thinking and problem-solving ability since they are composed mainly of software function learning. Concerning this issue, this study suggests an innovated computer education curriculum with reinforced information ethics field with computer principle, algorithm, and programming, in other words, a corrected and supplemented version of former content system based on computer science guidance cases of ACM computer science curriculum model of USA, computer science curriculum of Florida state, and Unplugged Project(http://www.unplugged.canterbury.ac.nz) judging that introduction of computer science factors are desperate to improve computer education curriculum in middle schools.

  • PDF

MFMAP: Learning to Maximize MAP with Matrix Factorization for Implicit Feedback in Recommender System

  • Zhao, Jianli;Fu, Zhengbin;Sun, Qiuxia;Fang, Sheng;Wu, Wenmin;Zhang, Yang;Wang, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2381-2399
    • /
    • 2019
  • Traditional recommendation algorithms on Collaborative Filtering (CF) mainly focus on the rating prediction with explicit ratings, and cannot be applied to the top-N recommendation with implicit feedbacks. To tackle this problem, we propose a new collaborative filtering approach namely Maximize MAP with Matrix Factorization (MFMAP). In addition, in order to solve the problem of non-smoothing loss function in learning to rank (LTR) algorithm based on pairwise, we also propose a smooth MAP measure which can be easily implemented by standard optimization approaches. We perform experiments on three different datasets, and the experimental results show that the performance of MFMAP is significantly better than other recommendation approaches.

ICA+OPCA for Artifact-Robust Classification of EEG (ICA+OPCA를 이용한 잡음에 강인한 뇌파 분류)

  • Park, Sungcheol;Lee, Hyekyoung;Park, Seungjin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10b
    • /
    • pp.739-741
    • /
    • 2003
  • Electroencephalogram (EEG)-based brain computer interface (BCI) provides a new communication channel between human brain and computer. EEG is very noisy data and contains artifacts, thus the extraction of features that are robust to noise and artifacts is important. In this paper we present a method with employ both independent component analysis (ICA) and oriented principal component analysis (OPCA) for artifact-robust feature extraction.

  • PDF

Contents Framework of Information Devices Education for the Computer Science Education in Elementary School (초등학교에서 정보과학교육을 위한 정보기기교육의 내용 체계)

  • Kim, Hyunbae
    • Journal of The Korean Association of Information Education
    • /
    • v.18 no.2
    • /
    • pp.335-344
    • /
    • 2014
  • This is the study of contents framework of information devices education for the computer science education in elementary school. In this study, we organize and suggest the educational contents of the information device education and its achievement for computer science education in elementary. For this, the educational contents of information device education in Korea and other countries were investigated. Then we selected some contents of information device education that can be applied to the computer science education. With this contents framework of information devices education for the computer science education in elementary school were made. This study will contribute to the curriculum development of computer science at the national level.

Modern Study on Internet of Medical Things (IOMT) Security

  • Aljumaie, Ghada Sultan;Alzeer, Ghada Hisham;Alghamdi, Reham Khaild;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.254-266
    • /
    • 2021
  • The Internet of Medical Things (IoMTs) are to be considered an investment and an improvement to respond effectively and efficiently to patient needs, as it reduces healthcare costs, provides the timely attendance of medical responses, and increases the quality of medical treatment. However, IoMT devices face exposure from several security threats that defer in function and thus can pose a significant risk to how private and safe a patient's data is. This document works as a comprehensive review of modern approaches to achieving security within the Internet of Things. Most of the papers cited here are used been carefully selected based on how recently it has been published. The paper highlights some common attacks on IoMTs. Also, highlighting the process by which secure authentication mechanisms can be achieved on IoMTs, we present several means to detect different attacks in IoMTs

Security of Web Applications: Threats, Vulnerabilities, and Protection Methods

  • Mohammed, Asma;Alkhathami, Jamilah;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.167-176
    • /
    • 2021
  • This is the world of computer science and innovations. In this modern era, every day new apps, webs and software are being introduced. As well as new apps and software are being introduced, similarly threats and vulnerable security matters are also increasing. Web apps are software that can be used by customers for numerous useful tasks, and because of the developer experience of good programming standards, web applications that can be used by an attacker also have multiple sides. Web applications Security is expected to protect the content of critical web and to ensure secure data transmission. Application safety must therefore be enforced across all infrastructure, including the web application itself, that supports the web applications. Many organizations currently have a type of web application protection scheme or attempt to build/develop, but the bulk of these schemes are incapable of generating value consistently and effectively, and therefore do not improve developers' attitude in building/designing stable Web applications. This article aims to analyze the attacks on the website and address security scanners of web applications to help us resolve web application security challenges.

Audio Steganography Method Using Least Significant Bit (LSB) Encoding Technique

  • Alarood, Alaa Abdulsalm;Alghamdi, Ahmed Mohammed;Alzahrani, Ahmed Omar;Alzahrani, Abdulrahman;Alsolami, Eesa
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.427-442
    • /
    • 2022
  • MP3 is one of the most widely used file formats for encoding and representing audio data. One of the reasons for this popularity is their significant ability to reduce audio file sizes in comparison to other encoding techniques. Additionally, other reasons also include ease of implementation, its availability and good technical support. Steganography is the art of shielding the communication between two parties from the eyes of attackers. In steganography, a secret message in the form of a copyright mark, concealed communication, or serial number can be embedded in an innocuous file (e.g., computer code, video film, or audio recording), making it impossible for the wrong party to access the hidden message during the exchange of data. This paper describes a new steganography algorithm for encoding secret messages in MP3 audio files using an improved least significant bit (LSB) technique with high embedding capacity. Test results obtained shows that the efficiency of this technique is higher compared to other LSB techniques.