• Title/Summary/Keyword: information science high school

Search Result 2,139, Processing Time 0.042 seconds

A Study on Library Use Competency of High School Students (고등학교 학생들의 도서관 이용능력에 관한 연구)

  • Han Yoon-ok
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.5
    • /
    • pp.152-178
    • /
    • 1978
  • This has been designed for an attempt to survey a library use competency in order to provide basic information to plan more effective library use instruction for high school students. To get necessary data, a questionnaire was sent to 450 students in the 7 sample high schools in Seoul, and $80\%$ of them responded. The followings are the analysed results. 1. $42\%$ of them responded that they have heard about the decimal classification and $15\%$ of all the students have ever used decimal classification to search for the materials. 2. $3.6\%$ responded that they can understand the decimal classification and $66\%$ of all the students want to know about decimal classification. 3. $94\%$ responded that they have heard about the catalog cards and $41\%$ of all the students used catalog cards to search for the materials. 4. $29\%$ responded that they can understand the catalog cards and $68\%$ of all the students want to know about the catalog cards. 5. $61\%$ responded that they can use reference books. 6. $55.6\%$ responded that they know about the parts of a book. 7. $11\%$ responded that they can footnote. Reviewing the results of this study, library use competency of high school students can be said to be below level. And more effective approach is expected.

  • PDF

A Method for Service Evaluation Based on Fuzzy Theory for Cloud Computing

  • Guo, Liangmin;Luo, Yonglong;He, Xiaokang;Hu, Guiyin;Dong, Yan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.1820-1840
    • /
    • 2017
  • Aiming at the phenomenon of false information issued by service providers in cloud computing environment, a method for service evaluation based on fuzzy theory is put forward in this paper. According to the quality of services provided by cloud service providers and their behavior during interactions, a trust relationship between cloud service providers and cloud service consumers is established, which can be quantified by using fuzzy theory. The quality of services is evaluated by drawing on the trust relationship. In our method, the recommendation credibility of a cloud service consumer is determined through behavior similarity with evaluators and a praise factor. The introduction of the praise factor better suits the phenomenon of a high-quality service getting more repeat customers. The negative impact of dishonest customers is reduced, and the accuracy of trust and cloud service quality evaluation is improved by introducing a confidence factor that can be dynamically adjusted. The experimental results show that our method can effectively and accurately evaluate the trust value and service quality of providers, while weakening the influence of dishonest consumers, and quickly detect dishonest service providers. This is beneficial for consumers trying to find high quality service providers for similar services.

A Performance Measurement of Premium Service in Differentiated Service Testbed on KOREN (선도시험망에서 트래픽 측정을 통한 차등화 서비스의 성능 평가에 대한 연구)

  • Kim, Ki-Hwan;Seok, Woo-Jin;Kwak, Jai-Seung;Byeon, Ok-Hwan;Chin, Yong-Ohk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.1319-1322
    • /
    • 2001
  • 본 논문에서는 WAN 환경에서의 선도시험망 기반 QoS 테스트베드를 구성하고 차등화 서비스에 의한 QoS 의 성능을 측정하였다. 전송율, RTT, 패킷 손실, FTP 소요시간을 대상으로 QoS 보장 서비스와 베스트-에포트 서비스에 대한 성능을 비교 분석하였다. 모든 측정대상에 대하여 QoS 보장 트래픽이 좋은 성능을 보여주었으며, 특히 멀티미디어 어플리케이션의 비디오 트래픽에 대해서도 QoS 보장 서비스에 의한 전송서비스가 고품질의 영상을 제공하였다.

  • PDF

Network Analysis Infrastructure for KREONET (KREONET에서의 네트워크 분석 인프라 구축 연구)

  • Kim, Kook-Han;Lee, Man-Hee;Kwak, Jai-Seung;Byeon, Ok-Hwan;Chin, Yong-Ohk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.1375-1378
    • /
    • 2001
  • 네트워크에 흐르는 트래픽 측정을 효율적으로 함으로서 트래픽의 종류와 양을 알 수 있고, 이를 기반으로 측정 네트워크의 트래픽 특성과 상태를 파악할 수 있다. 본 고에서는 초고속 연구망 환경에 적합한 네트워크 분석 인프라(NAI) 구축을 제시한다. NAI 구성은 네트워크 링크를 모니터링하는 수동적 측정 방법 MRTG 와 NAVI, 그리고 인위적으로 트래픽을 발생시켜 그 결과를 분석하는 능동적 측정 방법 PingER 와 AMP 두 가지 종류로 나뉜다. 현재 초고속 연구망에서 적용중인 네트워크 트래픽 분석 측정 도구 하나씩 알아보고, 국내 외로 링크된 네트워크 트래픽의 특성과 상태를 균형적으로 분석 할 도구에 대한 모델을 알아본다.

  • PDF

A Study on Information Graphics in the 10th Grade Social Studies Textbooks

  • Lee, Sang-Bock
    • Journal of the Korean Data and Information Science Society
    • /
    • v.16 no.4
    • /
    • pp.843-848
    • /
    • 2005
  • The purpose of this qualitative case study is to understand how the idea of data view and information graphics is used in the social studies high school textbooks. Data were collected through national curriculum documents and social studies middle school textbooks for the 10th grade students. We set up three questions for this study; what kinds of information graphics are used in the textbooks, how the graphics are organized in the social studies middle school, and how the 7th social studies curriculum is related with the 7th national mathematics curriculum. Through the data analysis, we found that 1) photographs, information tables, illustrations, etc., are used and frequencies of their usages are in descending order, 2) double lines graphs, and stripe graphs are often adopted for the comparison of populations, 3) the relation of the two subjects curricula is not well developed, especially in the curriculum steps of information maps, scatter diagrams, and comparison of populations. Finally we suggest that new web site of data view or information graphics be provided for two curricula, workshop of information graphics be needed for social studies teachers, and modification of the 7th probability and statistics curriculum.

  • PDF

A Study on Node & Component Game Engine (노드 & 컴포넌트 게임엔진 개발 연구)

  • Kim, Do-Hyun;Choi, Su-Bin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.526-529
    • /
    • 2015
  • 이 연구에서는 노드 & 컴포넌트 기반 개발(Node & Component Based Development, NCBD)을 지원하는 게임엔진을 직접 설계, 제작하는 내용이다. NCBD를 지원하는 게임엔진은 이미 상용화된 유명게임엔진들(Unity, Unreal, Cocos2d-x)이 공통으로 지원하는 프로그래밍 패러다임이며, 이러한 노드 & 캠포넌트 구조는 깊은 상속구조를 지향하는 구조보다 유연하고 직관적이다.

Edge detection and noise removal algorithm (외곽선 검출 및 잡음 제거 알고리즘)

  • Moon, Woo-Hyeok;Jung, Si-Hun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.945-947
    • /
    • 2021
  • Canny Edge Detection은 필터와 방향벡터를 이용한 대표적인 외곽선 추출 알고리즘으로서 대부분의 외곽선 추출 연구에서 이를 변형하여 사용한다. 그러나 본 논문에서는 외곽선 추출의 전처리 과정으로서 이미지에서의 잡음을 제거하는 알고리즘과 이를 바탕으로 외곽선을 더욱 효율적으로 추출할 수 있는 독창적인 알고리즘을 제시한다.

Energy Efficient Processing Engine in LDPC Application with High-Speed Charge Recovery Logic

  • Zhang, Yimeng;Huang, Mengshu;Wang, Nan;Goto, Satoshi;Yoshihara, Tsutomu
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.12 no.3
    • /
    • pp.341-352
    • /
    • 2012
  • This paper presents a Processing Engine (PE) which is used in Low Density Parity Codec (LDPC) application with a novel charge-recovery logic called pseudo-NMOS boost logic (pNBL), to achieve high-speed and low power dissipation. pNBL is a high-overdriven and low area consuming charge recovery logic, which belongs to boost logic family. Proposed Processing Engine is used in LDPC circuit to reduce operating power dissipation and increase the processing speed. To demonstrate the performance of proposed PE, a test chip is designed and fabricated with 0.18 2m CMOS technology. Simulation results indicate that proposed PE with pNBL dissipates only 1 pJ/cycle when working at the frequency of 403 MHz, which is only 36% of PE with the conventional static CMOS gates. The measurement results show that the test chip can work as high as 609 MHz with the energy dissipation of 2.1 pJ/cycle.

Applying Machine Learning approaches to predict High-school Student Assessment scores based on high school transcript records

  • Nguyen Ba Tien;Hoai-Nam Nguyen;Hoang-Ha Le;Tran Thu Trang;Chau Van Dinh;Ha-Nam Nguyen;Gyoo Seok Choi
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.261-267
    • /
    • 2023
  • A common approach to the problem of predicting student test scores is based on the student's previous educational history. In this study, high school transcripts of about two thousand candidates, who took the High-school Student Assessment (HSA) were collected. The data were estimated through building a regression model - Random Forest and optimizing the model's parameters based on Genetic Algorithm (GA) to predict the HSA scores. The RMSE (Root Mean Square Error) measure of the predictive models was used to evaluate the model's performance.

An adaptive watermarking for remote sensing images based on maximum entropy and discrete wavelet transformation

  • Yang Hua;Xu Xi;Chengyi Qu;Jinglong Du;Maofeng Weng;Bao Ye
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.1
    • /
    • pp.192-210
    • /
    • 2024
  • Most frequency-domain remote sensing image watermarking algorithms embed watermarks at random locations, which have negative impact on the watermark invisibility. In this study, we propose an adaptive watermarking scheme for remote sensing images that considers the information complexity to select where to embed watermarks to improve watermark invisibility without affecting algorithm robustness. The scheme converts remote sensing images from RGB to YCbCr color space, performs two-level DWT on luminance Y, and selects the high frequency coefficient of the low frequency component (HHY2) as the watermark embedding domain. To achieve adaptive embedding, HHY2 is divided into several 8*8 blocks, the entropy of each sub-block is calculated, and the block with the maximum entropy is chosen as the watermark embedding location. During embedding phase, the watermark image is also decomposed by two-level DWT, and the resulting high frequency coefficient (HHW2) is then embedded into the block with maximum entropy using α- blending. The experimental results show that the watermarked remote sensing images have high fidelity, indicating good invisibility. Under varying degrees of geometric, cropping, filtering, and noise attacks, the proposed watermarking can always extract high identifiable watermark images. Moreover, it is extremely stable and impervious to attack intensity interference.