• Title/Summary/Keyword: computer-based

Search Result 33,513, Processing Time 0.049 seconds

COVID-19 Prediction model using Machine Learning

  • Jadi, Amr
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.247-253
    • /
    • 2021
  • The outbreak of the deadly virus COVID-19 is said to infect 17.3Cr people around the globe since 2019. This outbreak is continuously affecting a lot of new people till this day and, most of it is said to under control. However, vaccines introduced around the world can help mitigate the risk of the virus. Apart from medical professionals, prediction models are also said to combinedly help predict the risk of infection based on given datasets. This paper is based on publication of a machine learning approach using regression models to predict the output based on dataset which have indictors grouped based on active, tested, recovered and critical cases along with regions and cities covering most of it from Dubai. Hence, the active cases are tested based on the other indicators and other attributes. The coefficient of the determination (r2) is 0.96, which is considered promising. This model can be used as an frame work, among others, to predict the resources related to the dangerous outbreak.

Effectiveness analysis based on PJBL of Liberal Arts Computing (PJBL기반의 교양컴퓨터 수업의 효과성 분석)

  • Jin-Ah, Yoo
    • Journal of Integrative Natural Science
    • /
    • v.15 no.4
    • /
    • pp.163-169
    • /
    • 2022
  • Currently, many universities are implementing software-oriented universities and artificial intelligence-oriented universities to foster software-oriented manpower. We are educating students to design and produce computational thinking and coding directly with their major knowledge. However, computer education is not easy for non-majors, and there are many difficulties in coding. The results of responses from 104 students from the College of Health Sciences and College of Social Management who took the liberal arts computer at University H were analyzed using SPSS 26.0 version. In the liberal arts computer class for non-majors, a PJBL-based class plan was proposed. The effectiveness of PJBL-based classes was confirmed through a questionnaire for the improvement of artificial intelligence liberal arts courses. As a result, PJBL-based education showed statistically significant results in terms of satisfaction, effectiveness, and self-efficiency of classes regardless of major.

A study on the development of a low cost CAD system (보급형 CAD 시스템 개발에 관한 연구)

  • 김문현;송진오
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1986.10a
    • /
    • pp.409-413
    • /
    • 1986
  • This paper deals with a micro computer based CAD(Computer Aided Design/Drafting) software developed by SERI/KAIST. The objectives of this software(hereinafter, CADMATE) development are to develop a low-cost CAD/CAE system, which means the micro-computer based graphic handling software including its geometrical primitives, graphic editor, external interface and output(drawing) control routine.

  • PDF

A Survey on Intrusion-Tolerant System

  • Heo, Seondong;Kim, Pyeong;Shin, Yongjoo;Lim, Jungmin;Koo, Dongyoung;Kim, Yonggon;Kwon, Ohmin;Yoon, Hyunsoo
    • Journal of Computing Science and Engineering
    • /
    • v.7 no.4
    • /
    • pp.242-250
    • /
    • 2013
  • Many information systems that provide useful services to people are connected to the Internet for convenience and efficiency. However, improper accessibility might make the systems susceptible to a variety of attacks. Although existing security solutions such as an intrusion detection system, intrusion prevention system, and firewalls have been designed to protect against such attacks, it is impossible to block all kinds of attacks. Furthermore, most of the proposed solutions require information about attacks for efficient prevention. Research on intrusion-tolerant systems (ITSs) have been conducted in order to continue providing proper services in threatening environments. The purpose of an ITS is to survive against every intrusion, rather than to prevent them. In this paper, previous studies on ITS are introduced and classified according to the centric scheme as middleware-based ITS, hardware-based ITS, and recovery-based ITS. Recent research focusing on adaptive transformation schemes is also introduced.

The Computer Programming Education of Based Project Learning (프로젝트학습 기반의 컴퓨터 프로그래밍 교육)

  • Bae, Young-Kwon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.5
    • /
    • pp.1038-1043
    • /
    • 2009
  • Recently, such education is required as the one to nurture the capability for higher order thinking such as creativity and problem-solving ability on the eduction field of not only elementary and middle school but also colleges. Thus, this study is aimed to discuss the computer programming education to enhance higher order thinking in conducting computer programming education for college students. To this end, this study is intended to suggest the computer programming education of based project learning based on preceeding studies and literature reviews. Through this research, the researcher expects that this study forms the small foundation for offering computer programing education covering the computer and engineering education across the board.

A Design and Implementation of Certificate-Based Hybrid Cryptosystem - CHyCK (인증서기반의 혼합방식 암호시스템 설계 및 구현 - CHyCK)

  • Hong, Sung-Min;Oh, Sang-Yup;Cho, Ki-Ho;Lee, Kyung-Eun;Cheon, Myung-Kwon;Lee, Young;Cheon, Jung-Hee;Yoon, Hyun-Soo
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1994.11a
    • /
    • pp.108-117
    • /
    • 1994
  • 본 논문에서는 공개키방식 알고리즘과 대칭키방식 알고리즘을 혼합하여 사용하는 혼합방식 암호시스템 (CHyCK:Certificate-based Hybrid Cryptosystem of KAIST) 의 구현에 대해 설명한다. CHyCK는 전송하고자 하는 메세지를 대칭키 암호알고리즘을 이용해서 암호화하고 이 때에 사용되는 대칭키를 공개키방식으로 암호화하여 상대방에게 암호화된 메세지와 함께 보내게 된다. CHyCK는 공개키방식에서 사용되는 키쌍 중 공개키를 안전하게 가입자에게 분배해 주는 방법으로 인증서기반(certificate-based)방식 을 채택하였다. 또한 이를 위해서는 인증서를 발급해 줄 인증기관(certifying authority)이 필요하게 된다. 그리고 시스템을 구성하는 기본 암호알고리즘들은 기존의 것들 중 적합한 것으로 선택했다. 마지막으로 본 논문에서는 시스템의 안전성을 키분배와 메세지 전송 측면에서 분석했다.

  • PDF

UniPy: A Unified Programming Language for MGC-based IoT Systems

  • Kim, Gayoung;Choi, Kwanghoon;Chang, Byeong-Mo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.3
    • /
    • pp.77-86
    • /
    • 2019
  • The advent of Internet of Things (IoT) makes common nowadays computing environments involving programming not a single computer but several heterogeneous distributed computers together. Developing programs separately, one for each computer, increases programmer burden and testing all the programs become more complex. To address the challenge, this paper proposes an RPC-based unified programming language, UniPy, for development of MGC (eMbedded, Gateway, and Cloud) applications in IoT systems configured with popular computers such as Arduino, Raspberry Pi, and Web-based DB server. UniPy offers programmers a view of classes as locations and a very simple form of remote procedure call mechanism. Our UniPy compiler automatically splits a UniPy program into small pieces of the program at different locations supporting the necessary RPC mechanism. An advantage of UniPy programs is to permit programmers to write local codes the same as for a single computer requiring no extra knowledge due to having unified programming models, which is very different from the existing research works such as Fabryq and Ravel. Also, the structure of UniPy programs allows programmers to test them by directly executing them before splitting, which is a feature that has never been emphasized yet.

A VISION SYSTEM IN ROBOTIC WELDING

  • Absi Alfaro, S. C.
    • Proceedings of the KWS Conference
    • /
    • 2002.10a
    • /
    • pp.314-319
    • /
    • 2002
  • The Automation and Control Group at the University of Brasilia is developing an automatic welding station based on an industrial robot and a controllable welding machine. Several techniques were applied in order to improve the quality of the welding joints. This paper deals with the implementation of a laser-based computer vision system to guide the robotic manipulator during the welding process. Currently the robot is taught to follow a prescribed trajectory which is recorded a repeated over and over relying on the repeatability specification from the robot manufacturer. The objective of the computer vision system is monitoring the actual trajectory followed by the welding torch and to evaluate deviations from the desired trajectory. The position errors then being transfer to a control algorithm in order to actuate the robotic manipulator and cancel the trajectory errors. The computer vision systems consists of a CCD camera attached to the welding torch, a laser emitting diode circuit, a PC computer-based frame grabber card, and a computer vision algorithm. The laser circuit establishes a sharp luminous reference line which images are captured through the video camera. The raw image data is then digitized and stored in the frame grabber card for further processing using specifically written algorithms. These image-processing algorithms give the actual welding path, the relative position between the pieces and the required corrections. Two case studies are considered: the first is the joining of two flat metal pieces; and the second is concerned with joining a cylindrical-shape piece to a flat surface. An implementation of this computer vision system using parallel computer processing is being studied.

  • PDF

Exploring of the Possibility to Construct the Items for Computer-based Assessment in Mathematics : Focused on Fence Items in PISA2012 or 2015 within an Environment of Dynamic Geometric Software (컴퓨터기반수학평가(CBAM)의 문항 제작 가능성 탐색: 동적 기하소프트웨어 환경에서 PISA2012 또는 2015 울타리 문항을 중심으로)

  • Lee, Seo Bin;Kim, Sun Ho;Choi-Koh, Sang Sook
    • Journal of the Korean School Mathematics Society
    • /
    • v.20 no.3
    • /
    • pp.325-344
    • /
    • 2017
  • Since PISA2006, the computer based assessment in mathematics(CBAM) was introduced for the first times and at last PISA2015 used all items in CBAM for problem solving. In this study, we focused on which important properties were considered in constructing geometric 'fence items' used in PISA 2015 to find the future direction over our teacher education, especially for constructing 'computer based assessment items.' For the purpose of the study, we analyzed the fence items on three components such as dependency, invariant, and path found in dragging activities, within a computer environment using the dynamic Geometry Software, GSP. Also, for the future, we provided an open-ended problem related to the fence items, which we could use as the merit of computer-based environment.

  • PDF