• Title/Summary/Keyword: computer-based technology

Search Result 8,875, Processing Time 0.036 seconds

A Status Quo Study of Using Computer Technology for Language Testing (언어평가에 대한 컴퓨터 기술의 활용방안)

  • 이영식
    • Korean Journal of English Language and Linguistics
    • /
    • v.3 no.4
    • /
    • pp.571-588
    • /
    • 2003
  • The purpose of this study is to investigate into the various ways that the computer technology is used for language testing. Three uses of computer technology are mentioned: 1) computer-adaptive language testing and computer-based language testing, 2) the scoring of performance-based language assessment, and 3) the development and use of psychometric tools for analyzing the scoring results. Although the various uses of computer technology could provide expanded possibilities for language testing development, the developers should be reminded that they are currently subject to indepth research which could support their validity. In this regard, the advantages and limitations of some uses of computer technology for language testing are discussed.

  • PDF

Virus Detection Method based on Behavior Resource Tree

  • Zou, Mengsong;Han, Lansheng;Liu, Ming;Liu, Qiwen
    • Journal of Information Processing Systems
    • /
    • v.7 no.1
    • /
    • pp.173-186
    • /
    • 2011
  • Due to the disadvantages of signature-based computer virus detection techniques, behavior-based detection methods have developed rapidly in recent years. However, current popular behavior-based detection methods only take API call sequences as program behavior features and the difference between API calls in the detection is not taken into consideration. This paper divides virus behaviors into separate function modules by introducing DLLs into detection. APIs in different modules have different importance. DLLs and APIs are both considered program calling resources. Based on the calling relationships between DLLs and APIs, program calling resources can be pictured as a tree named program behavior resource tree. Important block structures are selected from the tree as program behavior features. Finally, a virus detection model based on behavior the resource tree is proposed and verified by experiment which provides a helpful reference to virus detection.

AIMS: AI based Mental Healthcare System

  • Ibrahim Alrashide;Hussain Alkhalifah;Abdul-Aziz Al-Momen;Ibrahim Alali;Ghazy Alshaikh;Atta-ur Rahman;Ashraf Saadeldeen;Khalid Aloup
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.225-234
    • /
    • 2023
  • In this era of information and communication technology (ICT), tremendous improvements have been witnessed in our daily lives. The impact of these technologies is subjective and negative or positive. For instance, ICT has brought a lot of ease and versatility in our lifestyles, on the other hand, its excessive use brings around issues related to physical and mental health etc. In this study, we are bridging these both aspects by proposing the idea of AI based mental healthcare (AIMS). In this regard, we aim to provide a platform where the patient can register to the system and take consultancy by providing their assessment by means of a chatbot. The chatbot will send the gathered information to the machine learning block. The machine learning model is already trained and predicts whether the patient needs a treatment by classifying him/her based on the assessment. This information is provided to the mental health practitioner (doctor, psychologist, psychiatrist, or therapist) as clinical decision support. Eventually, the practitioner will provide his/her suggestions to the patient via the proposed system. Additionally, the proposed system prioritizes care, support, privacy, and patient autonomy, all while using a friendly chatbot interface. By using technology like natural language processing and machine learning, the system can predict a patient's condition and recommend the right professional for further help, including in-person appointments if necessary. This not only raises awareness about mental health but also makes it easier for patients to start therapy.

Applying Mobile Agent for Internet-based Distributed Speech Recognition

  • Saaim, Emrul Hamide Md;Alias, Mohamad Ashari;Ahmad, Abdul Manan;Ahmad, Jamal Nasir
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.134-138
    • /
    • 2005
  • There are several application have been developed on internet-based speech recognition. Internet-based speech recognition is a distributed application and there were various techniques and methods have been using for that purposed. Currently, client-server paradigm was one of the popular technique that been using for client-server communication in web application. However, there is a new paradigm with the same purpose: mobile agent technology. Mobile agent technology has several advantages working on distributed internet-based system. This paper presents, applying mobile agent technology in internet-based speech recognition which based on client-server processing architecture.

  • PDF

Image Clustering using Color, Texture and Shape Features

  • Sleit, Azzam;Abu Dalhoum, Abdel Llatif;Qatawneh, Mohammad;Al-Sharief, Maryam;Al-Jabaly, Rawa'a;Karajeh, Ola
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.1
    • /
    • pp.211-227
    • /
    • 2011
  • Content Based Image Retrieval (CBIR) is an approach for retrieving similar images from an image database based on automatically-derived image features. The quality of a retrieval system depends on the features used to describe image content. In this paper, we propose an image clustering system that takes a database of images as input and clusters them using k-means clustering algorithm taking into consideration color, texture and shape features. Experimental results show that the combination of the three features brings about higher values of accuracy and precision.

Mathematical Knowledge Construction in Computer Based Learing

  • Lee, Joong-Kwoen
    • Research in Mathematical Education
    • /
    • v.5 no.1
    • /
    • pp.13-24
    • /
    • 2001
  • Using computer technology in teaching school mathematics creates new instructional environments. The emphases on the use of computer technology in the classrooms and in particular the use of computer-based exploration as a context of mathematics instruction have been reflected in the recommendation of the NCTM (Curriculum and Evaluation Standards for School Mathematics, 1989). Although the power of using computer technology in the exploration of mathematical problems has been recognized and stressed by many educators, we do not have many research studies on mathematics in computer-based explorations. Especially research has failed to clarify how computer technology can contribute to the construction of procedural and conceptual knowledge of mathematics. Up to now most researches on procedural and conceptual knowledge in computer environments have only focused on classifying programming languages which program language has more random access and rich interrelationship characteristic in relation to conceptual knowledge in humans, and which computer language has more characteristic flavor of procedural knowledge. How computer-based explorations affect the knowledge construction of mathematics, therefore, emerges as an issue of research on teacher education program for theoretical framework. This situation leads to do research on the effectiveness of using computer explorations in pre-service teacher education in terms of procedural and conceptual knowledge construction.

  • PDF

A Survey on Intrusion-Tolerant System

  • Heo, Seondong;Kim, Pyeong;Shin, Yongjoo;Lim, Jungmin;Koo, Dongyoung;Kim, Yonggon;Kwon, Ohmin;Yoon, Hyunsoo
    • Journal of Computing Science and Engineering
    • /
    • v.7 no.4
    • /
    • pp.242-250
    • /
    • 2013
  • Many information systems that provide useful services to people are connected to the Internet for convenience and efficiency. However, improper accessibility might make the systems susceptible to a variety of attacks. Although existing security solutions such as an intrusion detection system, intrusion prevention system, and firewalls have been designed to protect against such attacks, it is impossible to block all kinds of attacks. Furthermore, most of the proposed solutions require information about attacks for efficient prevention. Research on intrusion-tolerant systems (ITSs) have been conducted in order to continue providing proper services in threatening environments. The purpose of an ITS is to survive against every intrusion, rather than to prevent them. In this paper, previous studies on ITS are introduced and classified according to the centric scheme as middleware-based ITS, hardware-based ITS, and recovery-based ITS. Recent research focusing on adaptive transformation schemes is also introduced.

Identity-based Deniable Authenticated Encryption for E-voting Systems

  • Jin, Chunhua;Chen, Guanhua;Zhao, Jianyang;Gao, Shangbing;Yu, Changhui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3299-3315
    • /
    • 2019
  • Deniable authentication (DA) is a protocol in which a receiver can generate an authenticator that is probabilistically indistinguishable from a sender. DA can be applied in many scenarios that require user privacy protection. To enhance the security of DA, in this paper, we construct a new deniable authenticated encryption (DAE) scheme that realizes deniable authentication and confidentiality in a logical single step. Compared with existing approaches, our approach provides proof of security and is efficient in terms of performance analysis. Our scheme is in an identity-based environment; thus, it avoids the public key certificate-based public key infrastructure (PKI). Moreover, we provide an example that shows that our protocol is applicable for e-voting systems.

Blur Detection through Multinomial Logistic Regression based Adaptive Threshold

  • Mahmood, Muhammad Tariq;Siddiqui, Shahbaz Ahmed;Choi, Young Kyu
    • Journal of the Semiconductor & Display Technology
    • /
    • v.18 no.4
    • /
    • pp.110-115
    • /
    • 2019
  • Blur detection and segmentation play vital role in many computer vision applications. Among various methods, local binary pattern based methods provide reasonable blur detection results. However, in conventional local binary pattern based methods, the blur map is computed by using a fixed threshold irrespective of the type and level of blur. It may not be suitable for images with variations in imaging conditions and blur. In this paper we propose an effective method based on local binary pattern with adaptive threshold for blur detection. The adaptive threshold is computed based on the model learned through the multinomial logistic regression. The performance of the proposed method is evaluated using different datasets. The comparative analysis not only demonstrates the effectiveness of the proposed method but also exhibits it superiority over the existing methods.

Transputer-based Pyramidal Parallel Array Computer(TPPAC) architecture (Prelimineary Version) (트랜스퓨터를 사용한 피라미드형 병렬 어레이 컴퓨터 (TPPAC) 구조)

  • Jeong, Chang-Sung;Jeong, Chul-Hwan
    • Proceedings of the KIEE Conference
    • /
    • 1988.07a
    • /
    • pp.647-650
    • /
    • 1988
  • This paper proposes and sketches out a new parallel architecture of transputer-based pyramidal parallel array computer (TPPAC) used to process computationally intensive problems for geometric processing applications such as computer vision, image processing etc. It explores how efficiently the pyramid computer architecture is designed using transputer chips, and poses a new interconnection scheme for TPPAC without using additional transputers.

  • PDF