• Title/Summary/Keyword: Computer Use

Search Result 10,207, Processing Time 0.041 seconds

Enhancing Association Rule Mining with a Profit Based Approach

  • Li Ming-Lai;Kim Heung-Num;Jung Jason J.;Jo Geun-Sik
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.973-975
    • /
    • 2005
  • With the continuous growth of e-commerce there is a huge amount of products information available online. Shop managers expect to apply information techniques to increase profit and perfect service. Hence many e-commerce systems use association rule mining to further refine their management. However previous association rule algorithms have two limitations. Firstly, they only use the number to weight item's essentiality and ignore essentiality of item profit. Secondly, they did not consider the relationship between number and profit of item when they do mining. We address a novel algorithm, profit-based association rule algorithm that uses profit-based technique to generate 1-itemsets and the multiple minimum supports mining technique to generate N-items large itemsets.

  • PDF

A Method and Tool for Identifying Domain Components Using Object Usage Information

  • Lee, Woo-Jin;Kwon, Oh-Cheon;Kim, Min-Jung;Shin, Gyu-Sang
    • ETRI Journal
    • /
    • v.25 no.2
    • /
    • pp.121-132
    • /
    • 2003
  • To enhance the productivity of software development and accelerate time to market, software developers have recently paid more attention to a component-based development (CBD) approach due to the benefits of component reuse. Among CBD processes, the identification of reusable components is a key but difficult process. Currently, component identification depends mainly on the intuition and experience of domain experts. In addition, there are few systematic methods or tools for component identification that enable domain experts to identify reusable components. This paper presents a systematic method and its tool called a component identifier that identifies software components by using object-oriented domain information, namely, use case models, domain object models, and sequence diagrams. To illustrate our method, we use the component identifier to identify candidates of reusable components from the object-oriented domain models of a banking system. The component identifier enables domain experts to easily identify reusable components by assisting and automating identification processes in an earlier development phase.

  • PDF

A Study of USB Device Kernel Hardening Using DLM, in Linux Operating System (리눅스 운영체제에서 DLM을 이용한 USB 디바이스 커널 하드닝에 관한 연구)

  • Jang, Seung-Ju;Choi, Eun-Seok
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.693-698
    • /
    • 2009
  • Computer system to operate normally without interruption, is one of the important issues. Likewise, a computer system to operate without interruption, failure to endure a variety of techniques, development and commercial use is arranged. Most guards will take a lot of technique failure endure. In this paper on the Linux operating system, dynamic module (DLM) to connect using the USB device to use USB devices can cause the symptoms to reduce the kernel PANIC hadeuning technique for studying the kernel.

  • PDF

Assessment and Access Control for Ubiquitous Environments

  • Diep, Nguyen Ngoc;Lee, Sung-Young;Lee, Young-Koo;Lee, Hee-Jo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1107-1109
    • /
    • 2007
  • Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. However, these strategies are inadequate for the increased flexibility and performance that ubiquitous computing environment requires because such systems can not utilize effectively all benefit from this environment. In this paper, we propose a solution based on risk to make use of many context parameters in order to provide good decisions for a safety environment. We design a new model for risk assessment in ubiquitous computing environment and use risk as a key component in decision-making process in our access control model.

  • PDF

A Study on Robot Simulator by use of Personal Computer Graphics (개인용 컴퓨터 그래픽스를 사용한 로보트 시뮬레이터의 연구)

  • Jun, Hyang-Sig;Choi, Young-Kiu
    • Proceedings of the KIEE Conference
    • /
    • 1992.07a
    • /
    • pp.351-353
    • /
    • 1992
  • Recently, robot plays an important role in factory automation and its use is rapidly increasing. In paticular, modern industry tends to need the robot to adjust itself swiftly to new workcell. But, robot is to be taught of operator through teaching box in order that it can carry out new tasks. In the process, interruption of the production line is frequent and so much time and expense are required. Computer Graphic Simulator(CGS) provides a useful tool to overcome such a problem. In this paper, CGS consists of teaching mode and execution mode. The 5-axis Rhino robot is modelled in IBM-PC/386 compatible 32-bit personal computer with 80387 co-processor and the simulator performs defined operations on the computer screen.

  • PDF

An Analysis of 2D Positional Accuracy of Human Bodies Detection Using the Movement of Mono-UWB Radar

  • Kiasari, Mohammad Ahangar;Na, Seung You;Kim, Jin Young
    • Journal of Sensor Science and Technology
    • /
    • v.23 no.3
    • /
    • pp.149-157
    • /
    • 2014
  • This paper considers the ability of counting and positioning multi-targets by using a mobile UWB radar device. After a background subtraction process, distinguishing between clutters and human body signals, the position of targets will be computed using weighted Gaussian mixture methods. While computer vision offers many advantages, it has limited performance in poor visibility conditions (e.g., at night, haze, fog or smoke). UWB radar can provide a complementary technology for detecting and tracking humans, particularly in poor visibility or through-wall conditions. As we know, for 2D measurement, one method is the use of at least two receiver antennas. Another method is the use of one mobile radar receiver. This paper tried to investigate the position detection of the stationary human body using the movement of one UWB radar module.

A Study on the Development of Computer-Aided Fashion Design (컴퓨터를 활용한 패션디자인 전개방법 연구)

  • 이순자;박옥련;김주현
    • The Research Journal of the Costume Culture
    • /
    • v.8 no.5
    • /
    • pp.717-725
    • /
    • 2000
  • The purpose of this study was, as an experimental one, to suggest concrete ways to use computer in fashion design from information collection to design completion, and to present a real example based on the suggested ways. The first step to attain the purpose was gathering various sorts of worldwide fashion design information on the Internet, and then the collected data were inserted in a graphic file. Next, two methods of fashion design that use computer graphics were recommended : one was to produce fashion design just by altering some of the inputted Internet fashion materials, and the other was to do it after selected basic materials were put in database. Those methods could enable one to do fashion design just with rearrangement and smallest change of the prepared basic materials, without drawing directly, and at the same time, they could minimize time and efforts required for computer fashion design.

  • PDF

Critical Factors in the Integration of Information and Communication Technologies in Early Childhood Education in Kenya : A Case of Nairobi County

  • Begi, Nyakwara
    • Journal of Information Technology Applications and Management
    • /
    • v.21 no.3
    • /
    • pp.79-96
    • /
    • 2014
  • In Kenya during the last one decade, public and private sectors have invested a lot of resources in computer based Information and Communication Technologies (ICT) to improve the quality of education in schools. The main objective has been to integrate ICT in the delivery of curriculum in order to improve the quality of teaching-learning and to produce ICT literate workforce. The computer based technologies are used in management, pedagogy, and communication. This paper presents results from a study that was conducted in Nairobi County in Kenya to determine the key factors in the integration of computer based ICT in teaching-learning in pre-primary and lower primary schools. Results had revealed that the use of computer based ICT in teaching-learning by both pre-primary and lower primary schools was influenced by accessibility of resources, capacity to use the technology, availability of time, and provision of technical support.

Quality Inspection of Dented Capsule using Curve Fitting-based Image Segmentation

  • Kwon, Ki-Hyeon;Lee, Hyung-Bong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.12
    • /
    • pp.125-130
    • /
    • 2016
  • Automatic quality inspection by computer vision can be applied and give a solution to the pharmaceutical industry field. Pharmaceutical capsule can be easily affected by flaws like dents, cracks, holes, etc. In order to solve the quality inspection problem, it is required computationally efficient image processing technique like thresholding, boundary edge detection and segmentation and some automated systems are available but they are very expensive to use. In this paper, we have developed a dented capsule image processing technique using edge-based image segmentation, TLS(Total Least Squares) curve fitting technique and adopted low cost camera module for capsule image capturing. We have tested and evaluated the accuracy, training and testing time of the classification recognition algorithms like PCA(Principal Component Analysis), ICA(Independent Component Analysis) and SVM(Support Vector Machine) to show the performance. With the result, PCA, ICA has low accuracy, but SVM has good accuracy to use for classifying the dented capsule.

Soccer Image Sequences Mosaicing Using Reverse Affine Transform

  • Yoon, Ho-Sub;Jung Soh;Min, Byung-Woo;Yang, Young-Kyu
    • Proceedings of the IEEK Conference
    • /
    • 2000.07b
    • /
    • pp.877-880
    • /
    • 2000
  • In this paper, we develop an algorithm of soccer image sequences mosaicing using reverse affine transform. The continuous mosaic images of soccer ground field allows the user/viewer to view a “wide picture” of the player’s actions The first step of our algorithm is to automatic detection and tracking player, ball and some lines such as center circle, sideline, penalty line and so on. For this purpose, we use the ground field extraction algorithm using color information and player and line detection algorithm using four P-rules and two L-rules. The second step is Affine transform to map the points from image to model coordinate using predefined and pre-detected four points. General Affine transformation has many holes in target image. In order to delete these holes, we use reverse Affine transform. We tested our method in real image sequence and the experimental results are given.

  • PDF