• Title/Summary/Keyword: software engineering education

Search Result 662, Processing Time 0.031 seconds

Investigation into a Prototyping Tool for Interactive Product Design: Development, Application and Feasibility Study of MIDAS (Media Interaction Design Authoring System) (인터랙티브 제품 디자인을 위한 프로토타이핑 도구: MIDAS의 활용 사례 및 유용성 연구)

  • Yim, Ji-Dong;Nam, Tek-Jin
    • Archives of design research
    • /
    • v.19 no.5 s.67
    • /
    • pp.213-222
    • /
    • 2006
  • This paper presents MIDAS (Media Interaction Design Authoring System), an authoring toolkit for designers and artists to develop working prototypes in new interaction design projects. Field research were conducted to identify the requirements and a case study of designing new interactive products was carried out to examine the feasibility of the new tool. MIDAS provides easier ways of integrating hardware and software, to manage a wide range of electric input and output elements and to employ 3D Augmented Reality technology within conventional multimedia authoring tools, such as Director and Flash, which are popularly used by designers. MIDAS was used in case study projects of design education as well as by voluntary designers for evaluation. From the result of case studies, it was found that many design projects were successfully accomplished using MIDAS. Designers who participated in the projects reported that MIDAS not only helped them to concentrate more on ideation but also was very easy to use as they implemented the physical interface concepts without advanced engineering skills. It is expected that MIDAS can also support prototyping in interactive media an, tangible user interface development and related human computer interaction fields.

  • PDF

User Access Patterns Discovery based on Apriori Algorithm under Web Logs (웹 로그에서의 Apriori 알고리즘 기반 사용자 액세스 패턴 발견)

  • Ran, Cong-Lin;Joung, Suck-Tae
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.6
    • /
    • pp.681-689
    • /
    • 2019
  • Web usage pattern discovery is an advanced means by using web log data, and it's also a specific application of data mining technology in Web log data mining. In education Data Mining (DM) is the application of Data Mining techniques to educational data (such as Web logs of University, e-learning, adaptive hypermedia and intelligent tutoring systems, etc.), and so, its objective is to analyze these types of data in order to resolve educational research issues. In this paper, the Web log data of a university are used as the research object of data mining. With using the database OLAP technology the Web log data are preprocessed into the data format that can be used for data mining, and the processing results are stored into the MSSQL. At the same time the basic data statistics and analysis are completed based on the processed Web log records. In addition, we introduced the Apriori Algorithm of Web usage pattern mining and its implementation process, developed the Apriori Algorithm program in Python development environment, then gave the performance of the Apriori Algorithm and realized the mining of Web user access pattern. The results have important theoretical significance for the application of the patterns in the development of teaching systems. The next research is to explore the improvement of the Apriori Algorithm in the distributed computing environment.

3D Visualization of Satellite Remote-Sensing Images Using an Array DBMS (Array DBMS을 이용한 위성원격탐사 영상의 3차원 시각화)

  • Choi, Jong Hyeok;Lee, Jong Yun
    • Journal of Digital Convergence
    • /
    • v.13 no.2
    • /
    • pp.193-204
    • /
    • 2015
  • An array DBMS has been expected widely from scientists because it is convenient to store and analyze the data of array type. In this paper, we describe how to handle satellite remote-sensing images in the array DBMS. However, previous works in their visualization have two problems as follows. First, the images are visualized as a state of distorted by the curvature of the earth. Second, it is difficult to apply the results of visualization by pre-written queries to other analyses. Therefore, this paper proposes a three dimensional visualization method of satellite remote-sensing images, not traditional 2D visualization. Our research contents are as follows. First, we describe how to store, process, and analyze the satellite remote-sensing images in the array DBMS. Second, we propose a three-dimensional visualization method for their processed outputs. Lastly, our contributions can be summarized that we propose a method of handling satellite remote-sensing images in the array DBMS and their 3D visualization techniques. It is also expected that their use be available widely in many industrial areas.

Development of Satisfaction Evaluation Items for Degree-linked High Skills Meister Courses using the Delphi Method (Delphi 기법을 활용한 학위연계형 고숙련마이스터 과정의 만족도 평가 문항 개발)

  • Kim, Seung-Hee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.5
    • /
    • pp.163-173
    • /
    • 2020
  • In this study, on-site corporate instructors participated as student-cum-workers in a degree-linked high skills Meister course to improve job competency and practical ability as proposed in the Work-Study Career Vision. Evaluation questions were then developed and their validity was verified by assessing satisfaction related to expected goals in enhancing advanced training guidance and competency as an evaluator. Satisfaction assessment was conducted based on training preparation, training implementation, training effectiveness and training administration. The Delphi Method was adopted and a total of 48 items were developed in 6 categories under 4 main areas. There were 7 evaluation items on the satisfaction of training course development under training preparation, 21 evaluation items related to the satisfaction of Off-JT and OJT courses under training implementation, 16 evaluation items related to the satisfaction of increased competency as an on-site corporate instructor and the satisfaction of enhanced practical skills and skills application at work under training effectiveness, as well as 6 evaluation items to assess satisfaction with administrative support under training administration. The final conformity assessment was conducted based on the stability, content validity ratio, consensus and convergence indicators of the developed items. Results of this study do not only apply to quality management of the high skills Meister course which is being promoted as a pilot project for work-study programs, but also serves as a rationale that may be considered as a basic research tool in the collection of various opinions to derive overall system improvement factors for the work-study high skills Meister course.

6TALK : Implementation of NAT-PT/SIIT and enhanced ALG

  • 이주철;호용근;신명기;김형준
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.701-705
    • /
    • 2002
  • This paper describes implementation of IPv6-IPv4 transition toolbox named as 6TALK(IPv6 TrAansLator of Krv6) and some scenarios using 6TALK which enables IPv6 island to connect other IPv6 island or IPv4 island seamlessly. 6TALK implements some transition mechanisms suggested in NGTrans Working Group of IETF. Those mechanisms are composed of basic mechanism, tunneling, and applied mechanism such as DSTM. 6TALK provides functions which enable IPv6 network at the edge of existing network to communicate with IPv4 network by using these transition mechanisms. As major transition mechanisms in 6TALK we adopt NAT-PT/SIIT and DSTM/DSTM options and as implementation environment we use Linux Kernel 2.4.18 and Netfilter framework. Software modules implemented in Linux kernel was ported to hardware box using Motorola MPC 8260 processor. The transition mechanisms used in 6TALK are the ones predicted to be used in initial transition step to IPv6.

  • PDF

A study on the Operation Algorithm for Bi-directional Sectonalizer in Distribution System Interconnected with Distributed Generations (분산전원이 연계된 배전계통의 양방향 구간개폐기의 동작 알고리즘에 관한 연구)

  • Yoon, Gi-Gab;Jeong, Jum-Soo;An, Tae-Pung;Rho, Dae-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.8
    • /
    • pp.1802-1809
    • /
    • 2009
  • Abstract The typical distribution systems have the power flow from distribution substations (sources) to customers (load) only as one direction. However, in the case where distributed generations (DG) such as PV system and wind power systems are connected to distribution systems, the DG output variations to distribution systems, so called reverse power flow, may cause the bi-directional power flow. So, the reverse power flow has severe impacts on typical power system, for example power quality problems, protection coordination problems, and so on. Especially, protection devices (sectionalizer) in primary feeder of distribution system interconnected with distributed generations may cause problems of malfunction, and then many customers could have problems like an interruption. So, this paper presents the bi-directional operation algorithm of protection devices to overcome the problems like mal-function. And, also this paper shows the effectiveness of proposed method by using both PSCAD/EMTDC software and test facility of protection devices to simulate the field distribution systems.

Analysis of the Impact Relationship for Risk Factors on Big Data Projects Using SNA (SNA를 활용한 빅데이터 프로젝트의 위험요인 영향 관계 분석)

  • Park, Dae-Gwi;Kim, Seung-Hee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.1
    • /
    • pp.79-86
    • /
    • 2021
  • In order to increase the probability of success in big data projects, quantified techniques are required to analyze the root cause of risks from complex causes and establish optimal countermeasures. To this end, this study measures risk factors and relationships through SNA analysis and presents a way to respond to risks based on them. In other words, it derives a dependency network matrix by utilizing the results of correlation analysis between risk groups in the big data projects presented in the preliminary study and performs SNA analysis. In order to derive the dependency network matrix, partial correlation is obtained from the correlation between the risk nodes, and activity dependencies are derived by node by calculating the correlation influence and correlation dependency, thereby producing the causal relationship between the risk nodes and the degree of influence between all nodes in correlation. Recognizing the root cause of risks from networks between risk factors derived through SNA between risk factors enables more optimized and efficient risk management. This study is the first to apply SNA analysis techniques in relation to risk management response, and the results of this study are significant in that it not only optimizes the sequence of risk management for major risks in relation to risk management in IT projects but also presents a new risk analysis technique for risk control.

Method of ChatBot Implementation Using Bot Framework (봇 프레임워크를 활용한 챗봇 구현 방안)

  • Kim, Ki-Young
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.1
    • /
    • pp.56-61
    • /
    • 2022
  • In this paper, we classify and present AI algorithms and natural language processing methods used in chatbots. A framework that can be used to implement a chatbot is also described. A chatbot is a system with a structure that interprets the input string by constructing the user interface in a conversational manner and selects an appropriate answer to the input string from the learned data and outputs it. However, training is required to generate an appropriate set of answers to a question and hardware with considerable computational power is required. Therefore, there is a limit to the practice of not only developing companies but also students learning AI development. Currently, chatbots are replacing the existing traditional tasks, and a practice course to understand and implement the system is required. RNN and Char-CNN are used to increase the accuracy of answering questions by learning unstructured data by applying technologies such as deep learning beyond the level of responding only to standardized data. In order to implement a chatbot, it is necessary to understand such a theory. In addition, the students presented examples of implementation of the entire system by utilizing the methods that can be used for coding education and the platform where existing developers and students can implement chatbots.

A Study on IT Curriculum Evaluation for College Students

  • Kim, Heon Joo;Kim, Kyung-mi;Yi, Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.10
    • /
    • pp.255-265
    • /
    • 2022
  • We compared and analyzed the factors affecting the lecture evaluation of IT subjects, which are mandatory for all students of H University. The purpose of this study is to determine whether lecture satisfaction has a significant correlation with academic achievement, attendance rate, and categories of courses. In this study, we check whether the lecture satisfaction of IT liberal arts subjects that require a lot of computer-based practice differs from that of other liberal arts subjects. We used the 2,149 evaluation data of 12 lectures submitted by 2,322 students in the first and second semesters of year 2019 at University H. As for the lecture evaluation results, in addition to the evaluation scores of the multiple choice questions, the subjective questions were also quantified by classifying the statements submitted by the students into positive and negative types to make the results of the lecture evaluation objective. Our research results show that student group who have the higher attendance rates and academic achievements have higher level of lecture satisfaction and they also use more positive words than negative words in subjective evaluation questions. Students with the lower score use the more negative words, but the ratio between positive and negative words does not differ between groups. Higher attendance rates groups in the basic programming courses and software applications courses have higher lecture satisfaction ratio. But in the intermediate programming courses, the higher attendances rate and the lecture satisfaction do not have any significant relationship. Also students in the intermediate programming courses use more negative words than those in the basic programming courses.

Extending StarGAN-VC to Unseen Speakers Using RawNet3 Speaker Representation (RawNet3 화자 표현을 활용한 임의의 화자 간 음성 변환을 위한 StarGAN의 확장)

  • Bogyung Park;Somin Park;Hyunki Hong
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.7
    • /
    • pp.303-314
    • /
    • 2023
  • Voice conversion, a technology that allows an individual's speech data to be regenerated with the acoustic properties(tone, cadence, gender) of another, has countless applications in education, communication, and entertainment. This paper proposes an approach based on the StarGAN-VC model that generates realistic-sounding speech without requiring parallel utterances. To overcome the constraints of the existing StarGAN-VC model that utilizes one-hot vectors of original and target speaker information, this paper extracts feature vectors of target speakers using a pre-trained version of Rawnet3. This results in a latent space where voice conversion can be performed without direct speaker-to-speaker mappings, enabling an any-to-any structure. In addition to the loss terms used in the original StarGAN-VC model, Wasserstein distance is used as a loss term to ensure that generated voice segments match the acoustic properties of the target voice. Two Time-Scale Update Rule (TTUR) is also used to facilitate stable training. Experimental results show that the proposed method outperforms previous methods, including the StarGAN-VC network on which it was based.