• Title/Summary/Keyword: Computer Studies

Search Result 4,607, Processing Time 0.032 seconds

EQUIVALENCE CLASSES OF MATRICES IN $GL_2(Q)$ AND $SL_2(Q)$

  • Darafsheh, M.R.;Larki, F. Nowroozi
    • Journal of applied mathematics & informatics
    • /
    • v.6 no.2
    • /
    • pp.433-446
    • /
    • 1999
  • Let G denote either of the groups $GL_2(q)$ or $SL_2(q)$. The mapping $theta$ sending a matrix to its transpose-inverse is an auto-mophism of G and therefore we can form the group $G^+$ = G.<$theta$>. In this paper conjugacy classes of elements in $G^+$ -G are found. These classes are closely related to the congruence classes of invert-ible matrices in G.

Issues and Empirical Results for Improving Text Classification

  • Ko, Young-Joong;Seo, Jung-Yun
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.2
    • /
    • pp.150-160
    • /
    • 2011
  • Automatic text classification has a long history and many studies have been conducted in this field. In particular, many machine learning algorithms and information retrieval techniques have been applied to text classification tasks. Even though much technical progress has been made in text classification, there is still room for improvement in text classification. In this paper, we will discuss remaining issues in improving text classification. In this paper, three improvement issues are presented including automatic training data generation, noisy data treatment and term weighting and indexing, and four actual studies and their empirical results for those issues are introduced. First, the semi-supervised learning technique is applied to text classification to efficiently create training data. For effective noisy data treatment, a noisy data reduction method and a robust text classifier from noisy data are developed as a solution. Finally, the term weighting and indexing technique is revised by reflecting the importance of sentences into term weight calculation using summarization techniques.

Design & Implementation of Metrics Evaluation Tool for Java Code (자바 코드 메트릭 측정 도구의 설계 및 구현)

  • Oh, Hyun-Chul;Kim, Tae-Gyun;Yoon, Seok-Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11c
    • /
    • pp.1991-1994
    • /
    • 2002
  • 본 논문은 기존에 작성된 자바 프로그램이나 현재 구현 중인 자바 프로그램을 대상으로 메트릭 정보를 측정하는 자동화 도구의 설계 및 구현 결과를 논한다. 이러한 도구의 구현을 위해 필요한 가장 핵심적인 기능은 자바코드에 대한 분석 기능이다. 본 논문의 내용은 한국전자통신연구원의 컴포넌트 공학 연구팀 주관으로 EJB(Enterprise Java Beans) 기술을 기반으로 컴포넌트를 개발하기 위한 환경인 COBALT(Component Based Application devlopment Tool) 시스템의 부 시스템으로 구현된 자바코드 메트릭 측정 도구의 설계 및 구현 결과를 다룬다. 본 논문에서 구현된 자바 코드 메트릭 측정 도구을 통하여 클래스의 적절한 분할, 클래스 멤버 자원의 적절한 배치, 상속 트리의 적절한 조직 등을 이룰 수 있다.

  • PDF

Effects of Perceptional Fidelity and Advice of a Scientific Inquiry Computer Simulations on T ask Achievement and Metacognition in Preschoolers (과학탐구 컴퓨터 시뮬레이션의 지각적 충실도와 조언이 유아의 과제성취도 및 초인지에 미치는 효과)

  • Kim, Jun Gyu;Park, Young Tae
    • Korean Journal of Child Studies
    • /
    • v.23 no.2
    • /
    • pp.49-69
    • /
    • 2002
  • This study investigated the effects of perceptional fidelity and advice of a computer simulation program(CSP) on task achievement and metacognition in preschoolers. the child's task was scientific inquiry into the growth process of frogs. Findings showed that instruction using the CSP resulted in higher task achievement and higher metacognition than conventional instructions. Advice provided by the CSP had no effect on task achievement but both the perceptional fidelity rate and the advice of the CSP were effective in increasing metacognition.

  • PDF

Design of the School-Bus Service Application Based on Android (안드로이드 기반 스쿨버스 서비스 어플리케이션 설계)

  • Kang, Ji-Hoon;Moon, Sang-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.605-607
    • /
    • 2011
  • 아이폰, 구글폰 등과 같은 스마트폰들이 대중화됨에 따라 다양한 형태의 어플리케이션이 개발되고 있다. 최근 대학교에서도 학생들의 효율적인 대학생활을 위해 수강신청, 식당메뉴, 강의시간표 등에 관련된 캠퍼스 관련 어플리케이션들이 개발되고 있다. 특히, 이 중에서도 스쿨-버스 관련 서비스는 가장 인기있는 애플리케이션이지만, 대부분이 버스 시간표, 버스 노선도 등의 단편적인 정보만을 제공하고 있어서 효용성이 떨어지는 실정이다. 본 논문에서는 버스에 GPS 수신기 등의 추가 장비 설치 없이 운전기사의 스마트폰 앱에서 주기적으로 위치정보를 전송받아 스쿨버스 서비스 앱에서 실시간으로 지도상에서 학생들이 버스 위치를 파악할 수 있는 스쿨버스 서비스 어플리케이션을 설계한다.

  • PDF

Now Techniques Of Digital Simulation Of Multimachine Power Systems For Dynamic Stability By Memory-Limited Computer (소형전자계산기에 의한 다기전력계통의 동적안정도 해석)

  • Young Moon Park
    • 전기의세계
    • /
    • v.23 no.1
    • /
    • pp.73-78
    • /
    • 1974
  • Digital simulation algorithms and program for multimachine dynamic stability have been developed which represent the effects of machines much more complety than have been available previously. Emphasis is given to the savings of the memory spaces required, thus making it possible to use a small computer with limited capacity of core storage (without auxiliary storage). Both d- and q- aris quantities are fully represented, and the speed-governing and voltage-regulating system available are ertensive, thus allowing a very close approximation to any physical system. Facilities for dynamic and nonlinear loads are also included. The computational algorithms and program developed have been shown to be extensive and complete, and are very desirable features minimizing memory spaces for stability calculations. The capabilities have been demonstrated by several case studies for an actual power system of 44 generators, 22 loads and 33 buses. About 13-K words of memory spaces have been required for the case studies on the basis of two words per real variable and a word per integer variable.

  • PDF

The influence of electronic-word-of-mouth on consumer decision-making for beauty products in a Kuwaiti Women's online community

  • Al-Haidari, Nahed;Coughlan, Jane
    • Journal of Contemporary Eastern Asia
    • /
    • v.13 no.2
    • /
    • pp.3-14
    • /
    • 2014
  • Online communities are an important source of electronic-word-of-mouth (eWOM), however few studies have examined these types of messages within the Middle Eastern context. This study focuses on Kuwaiti women as members of an online beauty forum; previous work has suggested a mediating effect of gender with women being more likely to trust and follow-up word-of-mouth with a purchase. A conceptual model, based on existing theoretical contributions, provides the basis of a coding framework for the message characteristics that influence members' eWOM adoption. A sub-set of the analysis is presented: 218 threads (1820 messages, coded into 6702 units) illustrating cases where eWOM was adopted and thereby demonstrating continuance intention with members returning to the forum. Content analysis revealed the prevalence of emotional aspects in messages, coded into a new category of 'community bonding'. Findings show that emotion expressed in messages is as influential and important as cognitive aspects of argument quality.

Computerized intraligamental anesthesia in children: A review of clinical considerations

  • Baghlaf, Khlood;Elashiry, Eman;Alamoudi, Najlaa
    • Journal of Dental Anesthesia and Pain Medicine
    • /
    • v.18 no.4
    • /
    • pp.197-204
    • /
    • 2018
  • Pain control by means of local anesthesia is an intrinsic part of clinical practice in dentistry. Several studies evaluated intraligamental anesthesia using a computer-controlled anesthetic device in children. There is a need to provide a clinical guide for the use of computerized intraligamental anesthesia in children. Intraligamental anesthesia using a computer-controlled anesthetic device was found to cause significantly lower pain perception scores and lower pain-related behavior than traditional techniques. This device proven to be effective in restorative and pulp treatment in children; however, its effectiveness in primary teeth extraction is controversial. It is important to withdraw recommendations necessity of future studies concerning the side effects of computerized intraligamental anesthesia in children. The present study aims to review different clinical aspects of computerized intraligamental anesthesia in children along with the side-effects, type of local anesthesia and postoperative pain of this technique. This study provides dentists with a clinical guide for the use of computerized intraligamental anesthesia.

A New Digital Watermarking for Architectural Design Drawing Using LINES and ARCs Based on Vertex (건축설계도면상에서 꼭지점에 기반한 LINE과 ARC를 이용한 디지털 워터마킹)

  • Jang, Bong-Ju;Moon, Kwang-Seok;Young Huh;Kwon, Ki-Ryong
    • Proceedings of the IEEK Conference
    • /
    • 2003.11b
    • /
    • pp.247-250
    • /
    • 2003
  • This paper proposed to digital watermarking technique for architectural drawing using LINES and ARCs based on vertex in CAD system to prevent infringement of copyright from unlawfulness reproductions and distribution. After extract LINES and ARCs from designed drawing, we embed watermarks using adaptive algorithm in each characteristics. Watermarks robust to various attacks like as geometrical transformation as being embedded in LINE's length and ARC's angle information. Also, the proposed method satisfies enough transparency about watermarked drawing because have suitable embedding strength to each component. By experimental result, we confirmed robustness and invisibility of embedded watermarks in several conversions of architectural design drawing.

  • PDF

Mobile Communications Data traffic using Self-Similarity Characteristic (Self-Similar 특성을 이용한 이동전화 데이터 트래픽 특성)

  • 이동철;양성현;김기문
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.7
    • /
    • pp.915-920
    • /
    • 2002
  • The classical queuing analysis has been tremendously useful in doing capacity planning and performance prediction. However, in many real-world cases. it has found that the predicted results form a queuing analysis differ substantially from the actual observed performance. Specially, in recent years, a number of studies have demonstrated that for some environments, the traffic pattern is self-similar rather than Poisson. In this paper, we study these self-similar traffic characteristics and the definition of self-similar stochastic processes. Then, we consider the examples of self-similar data traffic, which is reported from recent measurement studies. Finally, we wish yon that it makes out about the characteristics of actual data traffic more easily.

  • PDF