• Title/Summary/Keyword: User Environment

Search Result 5,372, Processing Time 0.034 seconds

Educational Needs Analysis on NCS-based Intellectual Property Education (국가직무능력표준(NCS) 기반 지식재산교육을 위한 교육요구 분석)

  • Park, Ki-Moon
    • 대한공업교육학회지
    • /
    • v.43 no.1
    • /
    • pp.134-157
    • /
    • 2018
  • This study surveyed and analyzed satisfaction and issues about an intellectual property education system, and educational needs for intellectual property NCS (intellectual property management, intellectual property information survey analysis, intellectual property assessment trade), in order to introduce and operate NCS-based education system that trains practical manpower in the field. The results of this study are as follows. First, satisfaction for intellectual property education system showed education contents (M=3.86), followed by lecture (M=3.79), teaching method and environment (M=3.66) and education assessment (M=3.50). The issues to be improved are low application in the current occupation due to no reflection of demands of industrial fields, as well as insufficient education contents system, lectures who fall short of education capability and interactions with students tend to stress theoretical knowledge more than practical ability, teaching method lacks application of educational medium, insufficient interest and motivation, assessment methods that fall short of theoretical knowledge and practical ability achievement, and that is theory-centered. Second, educational needs for intellectual property NCS showed intellectual property assessment trade (4.33), followed by intellectual property management (3.68), and intellectual property information survey analysis (2.99), which should be reviewed to reform or newly develop NCS-based education course. Conclusively, intellectual property education showed satisfaction above the average, but a job-centered education is demanded to elevate application in the industrial field, which puts emphasis more on practical ability than theory. For this, it is necessary to introduce intellectual property NCS reflecting demands of industrial field, and to reform or newly develop into NCS-based education course. In addition, intellectual property education needs to be operated by changed education paradigm, such as user-centered teaching method, not provided-centered, and performance and course-centered assessment method, not theoretical knowledge-centered.

T-Cache: a Fast Cache Manager for Pipeline Time-Series Data (T-Cache: 시계열 배관 데이타를 위한 고성능 캐시 관리자)

  • Shin, Je-Yong;Lee, Jin-Soo;Kim, Won-Sik;Kim, Seon-Hyo;Yoon, Min-A;Han, Wook-Shin;Jung, Soon-Ki;Park, Se-Young
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.5
    • /
    • pp.293-299
    • /
    • 2007
  • Intelligent pipeline inspection gauges (PIGs) are inspection vehicles that move along within a (gas or oil) pipeline and acquire signals (also called sensor data) from their surrounding rings of sensors. By analyzing the signals captured in intelligent PIGs, we can detect pipeline defects, such as holes and curvatures and other potential causes of gas explosions. There are two major data access patterns apparent when an analyzer accesses the pipeline signal data. The first is a sequential pattern where an analyst reads the sensor data one time only in a sequential fashion. The second is the repetitive pattern where an analyzer repeatedly reads the signal data within a fixed range; this is the dominant pattern in analyzing the signal data. The existing PIG software reads signal data directly from the server at every user#s request, requiring network transfer and disk access cost. It works well only for the sequential pattern, but not for the more dominant repetitive pattern. This problem becomes very serious in a client/server environment where several analysts analyze the signal data concurrently. To tackle this problem, we devise a fast in-memory cache manager, called T-Cache, by considering pipeline sensor data as multiple time-series data and by efficiently caching the time-series data at T-Cache. To the best of the authors# knowledge, this is the first research on caching pipeline signals on the client-side. We propose a new concept of the signal cache line as a caching unit, which is a set of time-series signal data for a fixed distance. We also provide the various data structures including smart cursors and algorithms used in T-Cache. Experimental results show that T-Cache performs much better for the repetitive pattern in terms of disk I/Os and the elapsed time. Even with the sequential pattern, T-Cache shows almost the same performance as a system that does not use any caching, indicating the caching overhead in T-Cache is negligible.

A Study on the Vegetation Landscape and Management Methods of Buyongdae on Hahoe Village, Andong (안동 하회마을 부용대(芙蓉臺) 일원의 식물상 및 관리방안)

  • Oh, Hyun-Kyung;Rho, Jae-Hyun;Choi, Yung-Hyun
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.31 no.1
    • /
    • pp.13-27
    • /
    • 2013
  • This study investigated flora and vascular plants area around Buyongdae where include optimum view point Okyeonjeongsa and Gyeomamjeongsa in Hahoe Village, Andong. Based on the findings, the aim of results was attempted to suggest the management plan of the vegetation area around Buyongdae which designated UNESCO World cultural heritage and folk village in Korea. The results of the study is as the following. All flora of this site, Buyongdae in Andong, were 301 taxa; 89 families, 217 genera, 251 species, 1 subspecies, 38 varieties and 11 forms. Vegetation of each of areas in site was classified Pinus densiflora as representative forest around Buyongdae, Quercus variabilis forest around Gyeomamjjeongsa and Koelreuteria paniculata forest in river cliff of Buyongdae. The 14 taxa(Polygala tenuifolia, Koelreuteria paniculata, and others) as the rare plants and the 7 taxa(Weigela subsessilis, and others) as endemic species were recorded in the surveyed site among the whole flora. The specific plants which is categorized to degree by the Ministry of Environment appeared as 32 taxa; degree IV was 4 species; Polygala tenuifolia, etc. and degree III was 10 species; Hypodematium glandulosopilosum, Pyrrosia petiolosa, etc. and degree I was 13 species; Hemiptelea davidii, Zizyphus jujuba var. jujuba, etc. Also, the 11 taxa were recorded in limestone area as the chamaephyte; Hypodematium glandulosopilosum, Celtis koraiensis, Siphonostegia chinensis, Artemisia gmelini, and others. The naturalized plants recorded as 25 taxa; Viola arvensis, Erechtites hieracifolia, etc. and invasion of Sicyos angulatus which is ecosystem disturbing plants. The naturalization rate(NR) was 8.3% and the urbanization index(UI) was 7.8% by field survey. For recovery of indigenous to traditional vegetation landscape in Buyongdae, Pinus rigida of upper-growth and Alnus sibirica of middle-growth need thinning. In addition, the site demands both sustainable management through long-term monitering and gradual elimination method for the naturalized plants including Sicyos angulatus where found in Kyumamjeongsa. Particularly, intentional planting for decoration and cultivation around Hwachunseowon, Helianthus tuberosus must be substitute with the native plants. Meanwhile, Polygala tenuifolia is potently demanded preventing habitate, confirming additional habitate, seed securing and preservation of gene resource internally or externally. Koelreuteria paniculata; denoting feature of river cliff, including Hypodematium glandulosopilosum, Siphonostegia chinensis, Zizyphus jujuba var. jujuba, Pyrrosia petiolosa, and Celtis koraiensis, also need an assertive preservation. Futhermore, Wisteria floribunda for. floribunda, located around Galmo rock to Chunggil course, remained by colonizing form, need preservation and observation for a while. Beside that, the information boards are required to educate visiting user about safe regulations on the narrow way in rock hill.

A Control Method for designing Object Interactions in 3D Game (3차원 게임에서 객체들의 상호 작용을 디자인하기 위한 제어 기법)

  • 김기현;김상욱
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.3
    • /
    • pp.322-331
    • /
    • 2003
  • As the complexity of a 3D game is increased by various factors of the game scenario, it has a problem for controlling the interrelation of the game objects. Therefore, a game system has a necessity of the coordination of the responses of the game objects. Also, it is necessary to control the behaviors of animations of the game objects in terms of the game scenario. To produce realistic game simulations, a system has to include a structure for designing the interactions among the game objects. This paper presents a method that designs the dynamic control mechanism for the interaction of the game objects in the game scenario. For the method, we suggest a game agent system as a framework that is based on intelligent agents who can make decisions using specific rules. Game agent systems are used in order to manage environment data, to simulate the game objects, to control interactions among game objects, and to support visual authoring interface that ran define a various interrelations of the game objects. These techniques can process the autonomy level of the game objects and the associated collision avoidance method, etc. Also, it is possible to make the coherent decision-making ability of the game objects about a change of the scene. In this paper, the rule-based behavior control was designed to guide the simulation of the game objects. The rules are pre-defined by the user using visual interface for designing their interaction. The Agent State Decision Network, which is composed of the visual elements, is able to pass the information and infers the current state of the game objects. All of such methods can monitor and check a variation of motion state between game objects in real time. Finally, we present a validation of the control method together with a simple case-study example. In this paper, we design and implement the supervised classification systems for high resolution satellite images. The systems support various interfaces and statistical data of training samples so that we can select the most effective training data. In addition, the efficient extension of new classification algorithms and satellite image formats are applied easily through the modularized systems. The classifiers are considered the characteristics of spectral bands from the selected training data. They provide various supervised classification algorithms which include Parallelepiped, Minimum distance, Mahalanobis distance, Maximum likelihood and Fuzzy theory. We used IKONOS images for the input and verified the systems for the classification of high resolution satellite images.

An Exploratory Study on Determinants Affecting R Programming Acceptance (R 프로그래밍 수용 결정 요인에 대한 탐색 연구)

  • Rubianogroot, Jennifer;Namn, Su Hyeon
    • Management & Information Systems Review
    • /
    • v.37 no.1
    • /
    • pp.139-154
    • /
    • 2018
  • R programming is free and open source system associated with a rich and ever-growing set of libraries of functions developed and submitted by independent end-users. It is recognized as a popular tool for handling big data sets and analyzing them. Reflecting these characteristics, R has been gaining popularity from data analysts. However, the antecedents of R technology acceptance has not been studied yet. In this study we identify and investigates cognitive factors contributing to build user acceptance toward R in education environment. We extend the existing technology acceptance model by incorporating social norms and software capability. It was found that the factors of subjective norm, perceived usefulness, ease of use affect positively on the intention of acceptance R programming. In addition, perceived usefulness is related to subjective norms, perceived ease of use, and software capability. The main difference of this research from the previous ones is that the target system is not a stand-alone. In addition, the system is not static in the sense that the system is not a final version. Instead, R system is evolving and open source system. We applied the Technology Acceptance Model (TAM) to the target system which is a platform where diverse applications such as statistical, big data analyses, and visual rendering can be performed. The model presented in this work can be useful for both colleges that plan to invest in new statistical software and for companies that need to pursue future installations of new technologies. In addition, we identified a modified version of the TAM model which is extended by the constructs such as subjective norm and software capability to the original TAM model. However one of the weak aspects that might inhibit the reliability and validity of the model is that small number of sample size.

An Embedding /Extracting Method of Audio Watermark Information for High Quality Stereo Music (고품질 스테레오 음악을 위한 오디오 워터마크 정보 삽입/추출 기술)

  • Bae, Kyungyul
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.2
    • /
    • pp.21-35
    • /
    • 2018
  • Since the introduction of MP3 players, CD recordings have gradually been vanishing, and the music consuming environment of music users is shifting to mobile devices. The introduction of smart devices has increased the utilization of music through music playback, mass storage, and search functions that are integrated into smartphones and tablets. At the time of initial MP3 player supply, the bitrate of the compressed music contents generally was 128 Kbps. However, as increasing of the demand for high quality music, sound quality of 384 Kbps appeared. Recently, music content of FLAC (Free License Audio Codec) format using lossless compression method is becoming popular. The download service of many music sites in Korea has classified by unlimited download with technical protection and limited download without technical protection. Digital Rights Management (DRM) technology is used as a technical protection measure for unlimited download, but it can only be used with authenticated devices that have DRM installed. Even if music purchased by the user, it cannot be used by other devices. On the contrary, in the case of music that is limited in quantity but not technically protected, there is no way to enforce anyone who distributes it, and in the case of high quality music such as FLAC, the loss is greater. In this paper, the author proposes an audio watermarking technology for copyright protection of high quality stereo music. Two kinds of information, "Copyright" and "Copy_free", are generated by using the turbo code. The two watermarks are composed of 9 bytes (72 bits). If turbo code is applied for error correction, the amount of information to be inserted as 222 bits increases. The 222-bit watermark was expanded to 1024 bits to be robust against additional errors and finally used as a watermark to insert into stereo music. Turbo code is a way to recover raw data if the damaged amount is less than 15% even if part of the code is damaged due to attack of watermarked content. It can be extended to 1024 bits or it can find 222 bits from some damaged contents by increasing the probability, the watermark itself has made it more resistant to attack. The proposed algorithm uses quantization in DCT so that watermark can be detected efficiently and SNR can be improved when stereo music is converted into mono. As a result, on average SNR exceeded 40dB, resulting in sound quality improvements of over 10dB over traditional quantization methods. This is a very significant result because it means relatively 10 times improvement in sound quality. In addition, the sample length required for extracting the watermark can be extracted sufficiently if the length is shorter than 1 second, and the watermark can be completely extracted from music samples of less than one second in all of the MP3 compression having a bit rate of 128 Kbps. The conventional quantization method can extract the watermark with a length of only 1/10 compared to the case where the sampling of the 10-second length largely fails to extract the watermark. In this study, since the length of the watermark embedded into music is 72 bits, it provides sufficient capacity to embed necessary information for music. It is enough bits to identify the music distributed all over the world. 272 can identify $4*10^{21}$, so it can be used as an identifier and it can be used for copyright protection of high quality music service. The proposed algorithm can be used not only for high quality audio but also for development of watermarking algorithm in multimedia such as UHD (Ultra High Definition) TV and high-resolution image. In addition, with the development of digital devices, users are demanding high quality music in the music industry, and artificial intelligence assistant is coming along with high quality music and streaming service. The results of this study can be used to protect the rights of copyright holders in these industries.

Performance Analysis of Implementation on IoT based Smart Wearable Mine Detection Device

  • Kim, Chi-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.12
    • /
    • pp.51-57
    • /
    • 2019
  • In this paper, we analyzed the performance of IoT based smart wearable mine detection device. There are various mine detection methods currently used by the military. Still, in the general field, mine detection is performed by visual detection, probe detection, detector detection, and other detection methods. The detection method by the detector is using a GPR sensor on the detector, which is possible to detect metals, but it is difficult to identify non-metals. It is hard to distinguish whether the area where the detection was performed or not. Also, there is a problem that a lot of human resources and time are wasted, and if the user does not move the sensor at a constant speed or moves too fast, it is difficult to detect landmines accurately. Therefore, we studied the smart wearable mine detection device composed of human body antenna, main microprocessor, smart glasses, body-mounted LCD monitor, wireless data transmission, belt type power supply, black box camera, which is to improve the problem of the error of mine detection using unidirectional ultrasonic sensing signal. Based on the results of this study, we will conduct an experiment to confirm the possibility of detecting underground mines based on the Internet of Things (IoT). This paper consists of an introduction, experimental environment composition, simulation analysis, and conclusion. Introduction introduces the research contents such as mines, mine detectors, and research progress. It consists of large anti-personnel mine, M16A1 fragmented anti-mine, M15 and M19 antitank mines, plastic bottles similar to mines and aluminum cans. Simulation analysis is conducted by using MATLAB to analyze the mine detection device implementation performance, generating and transmitting IoT signals, and analyzing each received signal to verify the detection performance of landmines. Then we will measure the performance through the simulation of IoT-based mine detection algorithm so that we will prove the possibility of IoT-based detection landmine.

Trend and future prospect on the development of technology for electronic security system (기계경비시스템의 기술 변화추세와 개발전망)

  • Chung, Tae-Hwang;So, Sung-Young
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.225-244
    • /
    • 2009
  • Electronic security system is composed mainly of electronic-information-communication device, so system technology, configuration and management of the electronic security system could be affected by the change of information-communication environment. This study is to propose the future prospect on the development of technique for electronic security system through the analysis of the trend and the actual condition on the development of technique. This study is based on literature study and interview with user and provider of electronic security system, also survey was carried out by system provider and members of security integration company to come up with more practical result. Hybrid DVR technology that has multi-function such as motion detection, target tracking and image identification is expected to be developed. And 'Embedded IP camera' technology that internet server and image identification software are built in. Those technologies could change the configuration and management of CCTV system. Fingerprint identification technology and face identification technology are continually developed to get more reliability, but continual development of surveillance and three-dimension identification technology for more efficient face identification system is needed. As radio identification and tracking function of RFID is appreciated as very useful for access control system, hardware and software of RFID technology is expected to be developed, but government's support for market revitalization is necessary. Behavior pattern identification sensor technology is expected to be developed and could replace passive infrared sensor that cause system error, giving security guard firm confidence for response. The principle of behavior pattern identification is similar to image identification, so those two technology could be integrated with tracking technology and radio identification technology of RFID for total monitoring system. For more efficient electronic security system, middle-ware's role is very important to integrate the technology of electronic security system, this could make possible of installing the integrated security system.

  • PDF

Cloning and Transcription Analysis of Sporulation Gene (spo5) in Schizosaccharomyces pombe (Schizosaccharomyces bombe 포자형성 유전자(spo5)의 Cloning 및 전사조절)

  • 김동주
    • The Korean Journal of Food And Nutrition
    • /
    • v.15 no.2
    • /
    • pp.112-118
    • /
    • 2002
  • Sporulation in the fission yeast Schizosaccharomyces pombe has been regarded as an important model of cellular development and differentiation. S. pombe cells proliferate by mitosis and binary fission on growth medium. Deprivation of nutrients especially nitrogen sources, causes the cessation of mitosis and initiates sexual reproduction by matting between two sexually compatible cell types. Meiosis is then followed in a diploid cell in the absence of nitrogen source. DNA fragment complemented with the mutations of sporulation gene was isolated from the S. pombe gene library constructed in the vector, pDB 248' and designated as pDB(spo5)1. We futher analyzed six recombinant plasmids, pDB(spo5)2, pDB(spo5)3, pDB(spo5)4, pDB(spo5)5, pDB (spo5)6, pDB(spo5)7 and found each of these plasmids is able to rescue the spo5-2, spo5-3, spo5-4, spo5-5, spo5-6, spo5-7 mutations, respectively. Mapping of the integrated plasmid into the homologous site of the S. pombe chromosomes demonstrated that pDB(spo5)1, and pDB(spu5)Rl contained the spo5 gene. Transcripts of spo5 gene were analyzed by Northern hybridization. Two transcripts of 3.2 kb and 2.5kb were detected with 5kb Hind Ⅲ fragment containing a part of the spo5 gene as a probe. The small mRNA(2.5kb) appeared only when a wild-type strain was cultured in the absence of nitrogen source in which condition the large mRNA (3.2kb) was produced constitutively. Appearance of a 2.5kb spo5-mRNA depends upon the function of the meil, mei2 and mei3 genes.

Analysis of Consciousness and Model on Land for the Another use After Quarrying (채석장의 부지 활용에 대한 의식 및 모델 분석)

  • Park, Jae Hyeon
    • Journal of Korean Society of Forest Science
    • /
    • v.101 no.3
    • /
    • pp.387-394
    • /
    • 2012
  • The study was conducted to develop an effective forest resources use models for an alternate use of abandoned quarry by an attitude survey. According to the result of survey, a pessimistic view due to dust, noise pollution, and forest damage was 5% higher than an affirmative view by economic benefits from the development of quarry. The 42% of the respondents preferred the alternate use of abandoned quarry and the 25% of the respondents wanted an art and cultural space. The optimum size of alternate use was 5-10 ha (43%) with the requirement of nearby residents (32%). According to the SWOT analysis for abandoned quarry, the strength factors were an effective use of land, the content development of modern industrial inheritance + cultural and art fusion, attraction for nearby city and visitors, a harmony of beauty landscape and clean environment, and a sustainable increase of domestic and foreign visitors with the 5-day-work week. The opportunity factors were the improvement of traffic networks through KTX and local highway, the creation of the new growth engines with the establishment of artistic creation belts, the providing of unique cultural and art space through grafting of tour and education, the creation of local income through stone processed goods, and the vitalization of local development through eco-city. The weakness factors were a psychological remoteness and backwardness, and the weakness of staying tour infra. The threat factors were a poor financial support for sustainable development in nearby quarry and a modify of legal and institutional system for the alternated use of abandoned quarry. The developed restoration models for the alternate use in abandoned quarry are classified to a sculpture park, a waterfall and lake park, a rock-climbing, a sports park + forest park, a native botanical garden, a culture and art park, a complex park, a water storage site, a water storage site to extinguish forest fire, a geriatric hospital, an agricultural facility, and a school site types etc. The results suggest that the alternate use in the abandoned soil and stone quarry is needed to establish facility use models with consideration of user's preference.