• Title/Summary/Keyword: full-information

Search Result 3,672, Processing Time 0.029 seconds

Research Design to Evaluate an Academic Library's Orientation Program Applying Mobile Augmented Reality

  • Kang, Ji Hei
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.49 no.2
    • /
    • pp.215-233
    • /
    • 2015
  • Despite the continuous efforts of academic libraries to develop various user-centered outreach programs, services and new processes, library anxiety still remains a threat to university students' full use of academic library resources. Meanwhile, a new generation of students, called the "Net Generation," has grown up with developed information and communication technology enter university and must be persuaded to turn to the library. To serve this new group of patrons better, libraries need to adopt new technologies. However, since an initial introduction cost and labor efforts are involved in the integration of the technology, identifying the right time for introduction and the right scope of innovation is essential but difficult. The study proposes a not-yet-well-known, novel experimental design, Regression Point Displacement (RPD), to evaluate an orientation program applying Mobile Augmented Reality (MAR) for STEM students. Since this RPD design requires only one treatment group, the model is expected to be the incomparable and rational way to evaluate the new MAR technology. In the context of an informal learning experience, the findings of the study will determine the effectiveness of an orientation employing the MAR technology.

Differential Fault Analysis of the Block Cipher LEA (블록 암호 LEA에 대한 차분 오류 공격)

  • Park, Myungseo;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1117-1127
    • /
    • 2014
  • Differential Fault Analysis(DFA) is widely known for one of the most powerful method for analyzing block cipher. it is applicable to block cipher such as DES, AES, ARIA, SEED, and lightweight block cipher such as PRESENT, HIGHT. In this paper, we introduce a differential fault analysis on the lightweight block cipher LEA for the first time. we use 300 chosen fault injection ciphertexts to recover 128-bit master key. As a result of our attack, we found a full master key within an average of 40 minutes on a standard PC environment.

A Study on the Use of Electronic Grey Literature (전자 회색문헌의 활용에 관한 연구)

  • 신은자
    • Journal of the Korean Society for information Management
    • /
    • v.16 no.3
    • /
    • pp.83-99
    • /
    • 1999
  • Grey literature which is dealing with the recent research outcomes has been neglected because of its difficulties in getting production information and collecting full-text. The research is about the characteristics, types and distribution tendencies of recently spot lighted electronic grey literature. It also analysed the current situation of producing and supplying the domestic electronic grey literature. The result showed that the level of providing the grey literature differed depending on the organization at present and, as a whole, didn't reach the level to fully satisfy the user's information needs. The research introduces the problems in utilizing electronic grey literature base on its results and specifically provides the ways to activate the use of grey literature.

  • PDF

Spanning Tree Aggregation Using Attribute of Service Boundary Line (서비스경계라인 속성을 이용한 스패닝 트리 집단화)

  • Kwon, So-Ra;Jeon, Chang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.18C no.6
    • /
    • pp.441-444
    • /
    • 2011
  • In this study, we present a method for efficiently aggregating network state information. It is especially useful for aggregating links that have both delay and bandwidth in an asymmetric network. Proposed method reduces the information distortion of logical link by integration process after similar measure and grouping of logical links in multi-level topology transformation to reduce the space complexity. It is applied to transform the full mesh topology whose Service Boundary Line (SBL) serves as its logical link into a spanning tree topology. Simulation results show that aggregated information accuracy and query response accuracy are higher than that of other known method.

Low-complexity de-mapping algorithms for 64-APSK signals

  • Bao, Junwei;Xu, Dazhuan;Zhang, Xiaofei;Luo, Hao
    • ETRI Journal
    • /
    • v.41 no.3
    • /
    • pp.308-315
    • /
    • 2019
  • Due to its high spectrum efficiency, 64-amplitude phase-shift keying (64-APSK) is one of the primary technologies used in deep space communications and digital video broadcasting through satellite-second generation. However, 64-APSK suffers from considerable computational complexity because of the de-mapping method that it employs. In this study, a low-complexity de-mapping method for (4 + 12 + 20 + 28) 64-APSK is proposed in which we take full advantage of the symmetric characteristics of each symbol mapping. Moreover, we map the detected symbol to the first quadrant and then divide the region in this first quadrant into several partitions to simplify the formula. Theoretical analysis shows that the proposed method requires no operation of exponents and logarithms and involves only multiplication, addition, subtraction, and judgment. Simulation results validate that the time consumption is dramatically decreased with limited degradation of bit error rate performance.

Cascaded Volume Bragg Grating for Narrow Spectral Linewidth in High-power Laser Diodes

  • Lee, Dong-Jin;Shim, Gyu-Beom;Jeong, Ji-Hun;O, Beom-Hoan
    • Current Optics and Photonics
    • /
    • v.6 no.3
    • /
    • pp.282-287
    • /
    • 2022
  • Narrowing the spectral linewidth and improving the wavelength stability of high-power laser diodes (HPLDs) are both in high demand for rapidly maturing industrial laser applications. In this study, we investigate the spectral behavior of a commercial HPLD bar module composed of 19 laser diodes (LDs) in a single-layered bar with a built-in volume Bragg grating (VBG) and an additional cascaded VBG. Optical loss due to the extra cascaded VBG is kept below 5% when the optical output is 5 W or more. The full width at half maximum of the Fabry-Perot peak from the cascaded VBG is reduced to about 12.4% and 29.1% at the edge (1st LD) and center (10th LD) of the HPLD bar module respectively, compared to using only a built-in VBG at an optical power of 10 W or more. In addition, fine wavelength tuning is achieved by temperature control of the extra VBG, and the obtained wavelength-tuning range amounts to about 10.6 pm/K.

A Video Cache Replacement Scheme based on Local Video Popularity and Video Size for MEC Servers

  • Liu, Pingshan;Liu, Shaoxing;Cai, Zhangjing;Lu, Dianjie;Huang, Guimin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.9
    • /
    • pp.3043-3067
    • /
    • 2022
  • With the mobile traffic in the network increases exponentially, multi-access edge computing (MEC) develops rapidly. MEC servers are deployed geo-distribution, which serve many mobile terminals locally to improve users' QoE (Quality of Experience). When the cache space of a MEC server is full, how to replace the cached videos is an important problem. The problem is also called the cache replacement problem, which becomes more complex due to the dynamic video popularity and the varied video sizes. Therefore, we proposed a new cache replacement scheme based on local video popularity and video size to solve the cache replacement problem of MEC servers. First, we built a local video popularity model, which is composed of a popularity rise model and a popularity attenuation model. Furthermore, the popularity attenuation model incorporates a frequency-dependent attenuation model and a frequency-independent attenuation model. Second, we formulated a utility based on local video popularity and video size. Moreover, the weights of local video popularity and video size were quantitatively analyzed by using the information entropy. Finally, we conducted extensive simulation experiments based on the proposed scheme and some compared schemes. The simulation results showed that our proposed scheme performs better than the compared schemes in terms of hit rate, average delay, and server load under different network configurations.

Analyzing the Impact of Lockdown on COVID-19 Pandemic in Saudi Arabia

  • Gyani, Jayadev;Haq, Mohd Anul;Ahmed, Ahsan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.39-46
    • /
    • 2022
  • The spread of Omicron, a mutated version of COVID-19 across several countries is leading to the discussion of lockdown once again for curbing the spread of the new virus. In this context, this research is showing the impact of lockdown for the successful control of the COVID-19 pandemic in Saudi Arabia. The outbreak of the COVID-19 pandemic around the globe has affected Saudi Arabia with around 2,37,803 confirmed cases within the initial 4 months of transmission. Saudi Arabia has announced a 21-day lockdown from March 23, 2020, to reduce the transmission of the COVID-19 pandemic. Machine Learning-based, Multinomial logistic regression was applied to understand the relationship between daily COVID-19 confirmed cases and lockdown in the 17 most-affected cities of KSA. We used secondary published data from the Ministry of Health, KSA daily dataset of COVID-19 confirmed case counts. These 17 cities were categorized into 4 classes based on lockdown dates. A total of three scenarios such as night lockdown, full lockdown, and no lockdown have been analyzed with the total number of confirmed cases with 4 classes. 15 out of 17 cities have shown a strong correlation with a confidence interval of 95%. These findings provide evidence that the COVID-19 pandemic may be partially suppressed with lockdown measures.

K-TIHM: Korean Technology Integration Hierarchy Model for Teaching and Learning in STEAM Education

  • Park, Chan Jung;Hyun, Jung Suk
    • Journal of Advanced Information Technology and Convergence
    • /
    • v.10 no.2
    • /
    • pp.111-123
    • /
    • 2020
  • The core competencies for the 21st century are creativity, critical thinking, collaboration, and communication. In recent classes where ICT (information, communication, and technology) is grafted, a lot of efforts are also being made to increase such competencies. According to a research work, ICT is most often used as a communication channel between teachers and students or as an online collaboration tool among students. However, ICT has only played a role as a guideline for instruction, but not included in the curriculum until now. The research on methods how to integrate technology into teaching and learning is in full swing due to the development of technology and the advent of Covid-19. In this paper, we propose a technology integration hierarchy model, namely K-TIHM that can be combined with STEAM education. Since only learning environments have been proposed in the existing research for technology-based STEAM education, our model proposes a series of technology integration hierarchy that can be applied by school age along with STEAM. Also, we analyze the differences in among the Korea's ICT education operation guidelines, the Korea's Software education guidelines, and ours. The proposed model can help developing the primary and secondary school curriculum integrated with technology.

Organizational Transformation Strategies for Adopting Building Information Modeling in the Engineering-Construction Industry

  • Yong Han Ahn;Young Hoon Kwak;Sung Jun Suk
    • International conference on construction engineering and project management
    • /
    • 2013.01a
    • /
    • pp.94-102
    • /
    • 2013
  • The architecture, engineering and construction (AEC) industry is beginning to utilize Building Information Modeling (BIM), benefiting from the resulting improved visualization and productivity, better coordination of construction drawings, building documents that contain embedded links to virtual information, faster delivery, and lower costs. However, construction firms often face challenges when reorganizing their company structure to take full advantage of these benefits. This paper proposes an organizational structure that will enable engineering-construction firms to successfully adopt and implement BIM for major construction projects. A case study research method is utilized based on in-depth interviews with four BIM directors and vice presidents charged with BIM adoption, implementation and education. Organizational transformation challenges and recommendations are discussed in detail for those considering implementing BIM in the engineering-construction industry. Topics such as organizational changes in the firm, costs and benefits of BIM implementation, strategies of BIM implementation (execution) plan, BIM education, risks and opportunities associated with BIM, BIM software, contract methods, human resource management and new hires, and the future implementation and direction of BIM are discussed in detail.

  • PDF