• Title/Summary/Keyword: 시간 체크

Search Result 219, Processing Time 0.026 seconds

Face detection system for the degree of concentration checking and analysis of learning attitude of learners in online learning (온라인 학습에서 학습자 학습태도 분석 및 집중도 체크를 위한 얼굴 검출 시스템)

  • Kim, Geun-Ho;Chung, Jung-In;Kim, Eui-Jeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.420-424
    • /
    • 2016
  • Recently, with the development of Internet technology and multi-media technology, the Internet is going to develop in many areas, a new application areas. In particular, in the area of education, has made a Epoch-making development in the Internet applications, it has presented the instructional methods of the new paradigm. Study using the online learning, instructional method of a conventional traditional new proposal that deviates from the off-line teaching, Unlike the existing off-line learning, without being bound by time and space, in terms of anytime, anywhere it is possible to attend the lecture, is a very efficient learning. Online lectures Despite many advantages, and containing a number of problems. In terms of space of the learning is performed on-line, there is a disadvantage that the student management and learning, the reliability of evaluation missing number. In this study, out of such a variety of problems, concentration to induce an active learning attitude of learners, learners of learning who attempt to increase the reliability and using the face detection system of attendance learning It proposed a degree system.

  • PDF

A Study on the Solution of Y2K Problem (Y2k 문제 해결 방안)

  • 박민수;최수길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.11a
    • /
    • pp.270-273
    • /
    • 1999
  • Y2k will be able to enormous disaster. The many make an effort to find a solution to problem of Y2k. Problem of Y2k must solution to as follow. First, problem of Y2k solution organization must constructed. Second, in step with each stage-the first, developing and complete stage, stage of Y2k solution must be constructed. Third, solution of Y2k must construct to hierarchy. hierarchy structure constructed form six stage to first stage, first stage is investigation resources, second stage is estimation influence, third stage is planing conversion, fourth stage is working conversion, fifte spot, sixth stage is diffusion on the spot.

  • PDF

Technology of Non-destructive Stress Measurement in Spot Welded Joint using ESPI Method (ESPI법에 의한 스폿 용접부의 비파괴적 응력측정 기술)

  • 김덕중;국정한;오세용;김봉중;유원일;김영호
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.1 no.1
    • /
    • pp.23-26
    • /
    • 2000
  • In spot welded joint. Electronic Speckle Pattern Interferometry(ESPI) method using the Model 95 Ar laser a video system and an image processor was applied to measure the stress Unlike traditional strain gauges or Moire method, ESPI method has no special surface preparation or attachments and can be measured in-plane displacement with non-contact and real time. In this experiment, specimens are loaded in parallel with a load cell. The specimens are made of the cold rolled steel sheet with 1mm thickness, are attached strain. gauges. This study Provides an example of how ESPI has been used to measure stress and strain inspecimen. The results measured by ESPI are compared with the data which was measured by strain gauge method under tensile testing.

  • PDF

A Study on the Application of AI and Linkage System for Safety in the Autonomous Driving (자율주행시 안전을 위한 AI와 연계 시스템 적용연구)

  • Seo, Dae-Sung
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.11
    • /
    • pp.95-100
    • /
    • 2019
  • In this paper, autonomous vehicles of service with existing vehicle accident for the prevention of the vehicle communication technology, self-driving techniques, brakes automatic control technology, artificial intelligence technologies such as well and developed the vehicle accident this occur to death or has been techniques, can prepare various safety cases intended to minimize the injury. In this paper, it is a study to secure safety in autonomous vehicles. This is determined according to spatial factors such as chip signals for general low-power short-range wireless communication and micro road AI. On the other hand, in this paper, the safety of boarding is improved by checking the signal from the electronic chip, up to "recognition of the emotion from residence time in the sensing area" to the biological electronic chip. As a result of demonstrating the reliability of the world countries the world, inducing safety autonomous system of all passengers in terms of safety. Unmanned autonomous vehicle riding and commercialization will lead to AI systems and biochips (Verification), linked IoT on the road in the near future, and the safety technology reliability of the world will be highlighted.

Simulation Analysis for Appointment Scheduling Patterns in a Private Plastic Surgery Clinic (시뮬레이션을 이용한 성형외과 예약패턴 분석)

  • Choi, Jiyeon;Chung, Yerim;Park, Sunju;Chung, Seungwha
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.1
    • /
    • pp.75-90
    • /
    • 2018
  • Generally, solutions that can increase patients' satisfaction are in conflict with the solutions that can increase the satisfaction and profitability of the medical personnels. In this paper, we compare appointment patterns using multiple performance measures that take into account both hospital's position and customers' position, and propose the best appointment pattern especially for an efficient scheduling in a plastic surgery clinic. A simulation model using ARENA is designed based on real hospital data. Based on this model, we compare 5 appointment patterns. To check the robustness of the appointment patterns, we have experimented on various appointment situations by considering peak, extreme peak seasons, and peak, off-peak days. We found that Triangle-like pattern turned out to be most efficient regardless of appointment situations.

Development of ordering chatbot that can process multiple keywords based on recursive slot-filling method (빈칸 되묻기 방식 기반 다중 키워드 처리가 가능한 주문용 챗봇 개발)

  • Choi, Hyeon-Jun;Bae, Seung-Ju;Jeong, Gu-Min
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.4
    • /
    • pp.440-448
    • /
    • 2019
  • In this paper, we propose an ordering chatbot that can process multiple keywords based on recursive slot-filling method. In general, in case of an order service using chatbots, the whole order process is performed only according to the sequence defined by the developer. That is, among all the information needed for the whole order process, only one input can be processed at one time. In order to reduce processing step for the order, we propose a recursive slot-filling method which fills out multiple slots per one time by extracting multiple keywords. First, a keyword array for the order is created according to the order related information. Next, from the input sentence of a user, multiple keywords is extracted. Corresponding slots for a keyword array will be filled with the extracted keywords. Finally, recursive routine will be executed to fill out all the blank in the keyword array. The usability and validity of the proposed method will be shown from the implementation of a smartphone application.

IIoT processing analysis model for improving efficiency and processing time through characteristic analysis by production product (생산제품별 특성 분석을 통한 효율성 및 처리시간 향상을 위한 IIoT 처리 분석 모델)

  • Jeong, Yoon-Su;Kim, Yong-Tae
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.397-404
    • /
    • 2022
  • Recently, in the industrial field, various studies are being conducted on converging IIoT devices that combine low-power processes and network cards into industrial sites to improve production efficiency and reduce costs. In this paper, we propose a processing model that can efficiently manage products produced by attaching IIoT sensor information to infrastructure built in industrial sites. The proposed model creates production data using IIoT data collection, preprocessing, characteristic generation, and labels to detect abnormally processed sensing information in real time by checking sensing information of products produced by IIoT at regular intervals. In particular, the proposed model can easily process IIoT data by performing tracking and monitoring so that product information produced in industrial sites can be processed in real time. In addition, since the proposed model is operated based on the existing production environment, the connection with the existing system is smooth.

An Study on Effective Maintenance and Operation System of Fiber Optic Lines (효과적인 광선로 유지 보수를 위한 시스템 개발에 관한 연구)

  • Jang, Eun-Sang;Park, Kap-Seok;Kim, Seong-Il;Choi, Sin-Ho;Lee, Byeong-Wook
    • Proceedings of the IEEK Conference
    • /
    • 1998.06a
    • /
    • pp.54-57
    • /
    • 1998
  • As the physical layer on telecommunication network is replaced fiber optic lines, it is increased the need of systematic maintenance for fiber optic lines. Korea Telecom has developed FLOMS in order to establish maintenance processes for optical fiber lines. FLOMS has functions which manages optical facilities and tests optical fiber lines automatically. As a resuls, this system can check and/or report a fault. Operator, who is reponsible for management of optical fiber lines, can test the characteristics of optical fiber lines remotely using FLOMS. As interpoerable with Digital Transmission Management System, FLOMS provides efficient management for optical fiber lines. This system improves the work process to find fault location fast, detect the degradation of fiber quality, and make database of optical facilities efficiently.

  • PDF

A Secure 6LoWPAN Re-transmission Mechanism for Packet Fragmentation against Replay Attacks (안전한 6LoWPAN 단편화 패킷 재전송 기법에 관한 연구)

  • Kim, Hyun-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.10
    • /
    • pp.101-110
    • /
    • 2009
  • The 6LoWPAN(IPv6 Low-power Wireless Personal Area Network) performs IPv6 header compression, TCP/UDP/IGMP header compression, packet fragmentation and re-assemble to transmit IPv6 packet over IEEE 802,15.4 MAC/PHY. However, from the point of view of security. It has the existing security threats issued by IP packet fragmenting and reassembling, and new security threats issued by 6LoWPAN packet fragmenting and reassembling would be introduced additionally. If fragmented packets are retransmitted by replay attacks frequently, sensor nodes will be confronted with the communication disruption. This paper analysis security threats introduced by 6LoWPAN fragmenting and reassembling, and proposes a re-transmission mechanism that could minimize re-transmission to be issued by replay attacks. Re-transmission procedure and fragmented packet structure based on the 6LoWPAN standard(RFC4944) are designed. We estimate also re-transmission delay of the proposed mechanism. The mechanism utilizes timestamp, nonce, and checksum to protect replay attacks. It could minimize reassemble buffer overflow, waste of computing resource, node rebooting etc., by removing packet fragmentation and reassemble unnecessary.

A Development of Framework for Selecting Labor Attendance Management System Considering Condition of Construction Site (건설 현장 특성을 고려한 출역관리시스템 선정 프레임워크 개발)

  • Kim, Seong-Ah;Chin, Sang-Yoon;Jang, Moon-Seok;Jung, Choong-Won;Choi, Cheol-Ho
    • Korean Journal of Construction Engineering and Management
    • /
    • v.16 no.4
    • /
    • pp.60-69
    • /
    • 2015
  • Labor attendance management has traditionally been carried out by writing a table for checking an attendance of labor, which requires a lot of time and effort. As electronic devices with additions such as barcodes, Quick Response codes, and Radio Frequency Identification(RFID) have been developed, however, automated labor attendance management systems have appeared. Recently, various types of labor recognition devices converged with biometrics (fingerprint, vein, face recognition, etc.) have been released. However, although these devices can be used to check attendance automatically, there is insufficient guidance when it comes to selecting the appropriate labor attendance management system for construction sites. Therefore, this study proposed a decision framework to determine which labor attendance management system would be suitable for a construction site and to select the labor recognition device. This study investigated different labor recognition devices, focusing on how they worked, and tested the performance of devices and their usability for construction labor attendance management. The test results showed that RFID is most suitable when verifying the attendance of many laborers over a short period of time. The devices for hand vein and fingerprint recognition did not function when there was a foreign material such as cement or paint on the laborer's hand, except for a deformed finger. Reflecting these test results, this study suggested a framework for selecting a labor attendance system and recognition device; this is expected to contribute to the development of more efficient labor management systems.