• Title/Summary/Keyword: computer tools

Search Result 1,693, Processing Time 0.03 seconds

A Study on Tools for Agent System Development (클라우드 환경에서 오토 스케일링이 가능한 센서 데이터 수집 시스템 설계)

  • Park, Soo-Yong;Choi, Su-Min;Shin, Yong-Tae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.05a
    • /
    • pp.72-74
    • /
    • 2020
  • 센서 네트워크의 센서 개수가 늘어나고 데이터 수집 주기가 짧아지며 데이터의 용량도 늘어남에 따라 데이터를 수집하는 중앙서버의 과부하가 걸리는 현상이 발생할 수 있다. 본 논문에서 제안하는 시스템은 센서 데이터를 수집하는 모듈을 컨테이너화 하여 쿠버네티스로 관리한다. 또한 쿠버네티스의 오토 스케일링 기능을 이용하여 데이터 수집 모듈의 과부하가 발생할 경우 자동으로 수집 모듈을 복사하여 scale out 할 수 있다.

A Study on Tools for Agent System Development (브리더 - 분양 희망자 매칭을 통한 사회적 문제 해결 서비스)

  • Gil-Dong Hong;Ji-Soo Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.896-897
    • /
    • 2023
  • 인증받은 브리더와 분양 희망자의 매칭을 통해 사회적 문제인 유기 동물에 대한 해결방안을 제공하고자 한다. 분양 희망자는 신뢰도 있는 기초 지식 테스트를 통해 진행되며, 이를 통해 반려견 지식 또한 얻을 수 있다. 브리더는 요구되는 자격증을 제출하여 자격은 인증받을 수 있다. 또한 브리더의 존재를 사람들에게 인식시켜 건강한 반려 문화를 조성하고자 한다.

Development and User Study on Visualization Tools of Origin-Destination Data for Social Problems (Origin-Destination 기반 시각화 도구의 개발 및 사회 문제 해결을 위한 사용자 연구)

  • Changki Kim;Sungjin Hwang;Hansung Kim;Sugie Lee;Jaehyuk Cha;Kwanguk (Kenny) Kim
    • Journal of the Korea Computer Graphics Society
    • /
    • v.30 no.3
    • /
    • pp.9-22
    • /
    • 2024
  • Mobility data is important to understand social phenomena and problem. Previous studies have utilized Origin-Destination (OD) visualization methods to represent human's mobility. However, the effectiveness of visualization tools as a method for understanding social phenomena remains unexplored. Therefore, in this study, we developed a visualization tool called SeoulOD-Vis to facilitate understanding social issues. It included three different modules: map visualization, condition selection, and detailed information presentation. We recruited 28 participants to evaluate the SeoulOD-Vis and compared it with a publicly available visualization tool. The results suggested that the SeoulOD-Vis had higher usability and problem-solving performances. Interview results suggested that it attributed to its 'condition selection' and 'detailed information presentation' modules. Our results will contribute to develop visualization tools to solve social problems using mobility data.

A Computer-aided Design Tool with Semiautomatic Image-Processing Features for Visualizing Biological Pathways

  • Ham, Sung-Il;Yang, San-Duk;Thong, Chin-Ting;Park, Hyun-Seok
    • Genomics & Informatics
    • /
    • v.7 no.3
    • /
    • pp.168-170
    • /
    • 2009
  • The explosion in biological data resulting from high-throughput experiments requires new software tools to manipulate and display pathways in a way that can integrate disparate sources of information. A visual Java-based CAD tool for drawing and annotating biological pathways with semiautomatic image-processing features is described in this paper. The result of the image-editing process is an XML file for the appropriate links. This tool integrates the pathway images and XML file sources. The system has facilities for linking graphical objects to external databases and is capable of reproducing existing visual representations of pathway maps.

2-Dimensional Image Recovery Method Using Hadamard Transform (하다마드변환을 이용한 2차원 영상복원법)

  • Seo, Ik-Su;Park, Young-Jae;Lee, Tae-Hoon;Yoon, Tae-Sung;Park, Jin-Bae
    • Proceedings of the KIEE Conference
    • /
    • 1999.07b
    • /
    • pp.1017-1019
    • /
    • 1999
  • In this paper we present 2-dimensional image recovery method using Hadamard transform. Generally, the methods of Hadamard transform are more useful tools and much simplier than those of Fourier transform. The Hadamard transform can improve estimates when the detector is the source of noise. We take into account nonidealities in the system for the further improved image We also present the average mean square error(AMSE) associated with estimates with the results from computer simulations.

  • PDF

3D INTERACTIVE SEGMENTATION OF BRAIN MRI

  • Levinski, Konstantin;Sourin, Alexei;Zagorodnov, Vitali
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2009.01a
    • /
    • pp.55-58
    • /
    • 2009
  • Automatic segmentation of brain MRI data usually leaves some segmentation errors behind that are to be subsequently removed interactively, using computer graphics tools. This interactive removal is normally performed by operating on individual 2D slices. It is very tedious and still leaves some segmentation errors which are not visible on the slices. We have proposed to perform a novel 3D interactive correction of brain segmentation errors introduced by the fully automatic segmentation algorithms. We have developed the tool which is based on 3D semi-automatic propagation algorithm. The paper describes the implementation principles of the proposed tool and illustrates its application.

  • PDF

The Impact of Information System Control and Audit on the Perceived Risk of the Computer Crime in Case of Financial Institutions (정보시스템통제 및 감사가 컴퓨터범죄의 인지된 위험에 미치는 영향: 금융기관을 중심으로)

  • Han, In-Gu;Yun, Jong-Ho
    • Asia pacific journal of information systems
    • /
    • v.5 no.1
    • /
    • pp.112-128
    • /
    • 1995
  • The information system control includes organizational structure, control mechanism, and management tools which contribute to accomplish the goals of information system: asset safeguarding, data integrity, effectiveness, and efficiency. Information system audit is the process to evaluate whether the information system accomplishs the goals. Information system auditor examine the reliability of information system control and suggest recommendations to improve the information system control. Both information system control and information system audit activities contribute to prevent and detect the computer crime for the organization. This paper proposes a causal model of information system control/audit and the perceived risk of computer crime, and tests the model using a survey on 38 financial institutions in Korea. Statistical results show that information system control and audit significantly reduce the computer crime risk perceived by the user group. The general control has a stronger impact than the application control. In addition, it turns out that the greater the deviation between the importance and the actual level of information system control is, the higher the perceived risk of computer crime is.

  • PDF

Security Problems and Measures for IP Cameras in the environment of IoT

  • Kang, Gil-uk;Han, Sang-Hoon;Lee, Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.1
    • /
    • pp.107-113
    • /
    • 2019
  • Along with the development of IOT, the number of people using IOT devices has enormously increased and the IOT era has come. Especially, people using the IP cameras among Internet devices have been drastically increasing. It is because the IP cameras are well networked and comparatively cheap compared with CCTVs, and they can also be monitored and controlled in real time through PCs and smart phones for the purposes of general theft prevention and shop surveillance. However, due to the user's serious lack of security awareness and the fact that anyone can easily hack only with simple hacking tools and hacking sites information, security crimes that exploit those have been increasing as well. Therefore, this paper describes how easily the IP cameras can be hacked in the era of IOT, what kind of security incidents occurred, and also suggests possible government measures and new technical solutions to those problems.

Comparing U-Net convolutional network with mask R-CNN in Nuclei Segmentation

  • Zanaty, E.A.;Abdel-Aty, Mahmoud M.;ali, Khalid abdel-wahab
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.273-275
    • /
    • 2022
  • Deep Learning is used nowadays in Nuclei segmentation. While recent developments in theory and open-source software have made these tools easier to implement, expert knowledge is still required to choose the exemplary model architecture and training setup. We compare two popular segmentation frameworks, U-Net and Mask-RCNN, in the nuclei segmentation task and find that they have different strengths and failures. we compared both models aiming for the best nuclei segmentation performance. Experimental Results of Nuclei Medical Images Segmentation using U-NET algorithm Outperform Mask R-CNN Algorithm.

Design of Learning Process with Code Reconstruction Principle for Non-computer Majors

  • Hye-Wuk, Jung
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.175-180
    • /
    • 2022
  • To develop computational thinking skills, university students are learning how to solve problems with algorithms, program commands and grammar, and program writing. Because non-computer majors have difficulty with computer programming-related content, they need a learning method to acquire coding knowledge from the process of understanding, interpreting, changing, and improving source codes by themselves. This study explored clone coding, refactoring coding, and coding methods using reconstruction tools, which are practical and effective learning methods for improving coding skills for students who are accustomed to coding. A coding learning process with the code reconstruction principle was designed to help non-computer majors use it to understand coding technology and develop their problem-solving ability and applied the coding technology learning method used in programmer education.