• Title/Summary/Keyword: internet program

Search Result 1,648, Processing Time 0.03 seconds

Artificial Engine Development through Reinforcement Learning on Jul-Gonu Game (강화학습을 이용한 줄고누게임의 인공엔진개발)

  • Shin, Yong-Woo
    • Journal of Internet Computing and Services
    • /
    • v.10 no.1
    • /
    • pp.93-99
    • /
    • 2009
  • Game program manufacture had been classed by 3D or on-line game etc. simply. But, atomized game programmer's kind now. So, Artificial Intelligence game programmer's role is important. This paper used reinforcement learning algorithm for Jul_Gonu board characters to learn, and so they can move intelligently. To compare a learned character to an random one, a board game was created, and then they fought against each other. As a result, learned character‘s ability was far more improved.

  • PDF

Design of XForms-based Web Application Tool (XForms 기반 웹 애플리케이션 개발 도구 설계)

  • Kim, Gui-Jung
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.05a
    • /
    • pp.436-439
    • /
    • 2006
  • To develop a business system of enterprise, there are so many problems such as increasing development time, cost, expanding network traffic, extension cost of network, and efficiency deterioration. In this paper, we propose the web application development tool based on XForms that is standard that can come up with solution problems of existing web program. This tool applied concept and specification of XForms to development environment. And it can efficiently implement X-internet.

  • PDF

A Software Watermarking for Java Programs (Java 프로그램에 적용가능한 소프트웨어 워터마킹)

  • Shin, Weon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.9
    • /
    • pp.2049-2056
    • /
    • 2010
  • The illegal copy of computer software have been one of the most serious threats in information society. But a number of protection schemes to solve it have proposed, there are a lot of difficulties for prevention from illegally distributing software through emerging Internet environments. In this paper, we propose a software watermarking scheme for Java programs which it have been popular on the Internet. The proposed scheme can be efficiently implemented and provide a robust software watermark for the protection of the copyright of Java programs.

Remote Control of a Mobile Robot using Embedded web server (Embedded web server를 이용한 이동로봇의 원격제어)

  • Park, Jeong-Hoon;Kim, Jin-Geun;Kang, Moon-Sung
    • Proceedings of the KIEE Conference
    • /
    • 2005.07d
    • /
    • pp.2693-2695
    • /
    • 2005
  • In this paper, we developed a more efficient system for the remote control and monitoring of a wheeled mobile robot using internet without spatial limitation. The hardware configuration of the remote control system for a wheeled mobile robot includes a client PC executed on the remote site, a embedded web-server and a mobile robot with many measuring equipments. The communication between a client PC and a embedded web-server is implemented through internet. And the Bluetooth module is used for connecting a embedded web-server and a mobile robot. A GUI program has been developed by using JavaScript in order to easily control a mobile robot on a client PC.

  • PDF

An Improved Cancelable Fingerprint Template Encryption System Research

  • Wang, Feng;Han, Bo;Niu, Lei;Wang, Ya
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2237-2253
    • /
    • 2017
  • For the existing security problem based on Fuzzy Vault algorithm, we propose a cancelable fingerprint template encryption scheme in this paper. The main idea is to firstly construct an irreversible transformation function, and then apply the function to transform the original template and template information is stored after conversion. Experimental results show it effectively prevents the attack from fingerprint template data and improves security of the system by using minutiae descriptor to encrypt abscissa of the vault. The experiment uses public FVC2004 fingerprint database to test, result shows that although the recognition rate of the proposed algorithm is slightly lower than the original program, but the improved algorithm security and complexity are better, and therefore the proposed algorithm is feasible in general.

Cyberloafing Across Generation X and Y in Indonesia

  • Hartijasti, Yanki;Fathonah, Nur
    • Journal of Information Technology Applications and Management
    • /
    • v.21 no.1
    • /
    • pp.1-16
    • /
    • 2014
  • Cyberloafing is as counterproductive behavior because it is the act of using internet for personal purposes which can affect employees' productivity, especially when done excessively (more than 4 hours a week). The objective of this study was to analyze whether gender and education level had significant effect on cyberloafing among generations in the workplace. From 267 respondents, gender was not found to have impact on cyberloafing because female and male respondents had the same frequency of low level cyberloafing. However, female had higher excessive cyberloafing than male. Gen Y had significant impact on the relationship between education and cyberloafing but Gen Y with diploma degree was revealed to have excessive cyberloafing. Furthermore, Gen X had started combining professional and personal lives throughout their daily lives. Hence, organizations should foster a culture of hard work by giving challenging job with clear target and worthy incentive but still implementing internet usage policy.

The Sustainability of Korean Management in Global Market: Competitive Strategy and Performance in Korean ICT Industry

  • Kwak, Kyu Tae;Cheon, Youngjoon;Lee, Bong Gyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1344-1361
    • /
    • 2016
  • ICT contents market is globally considered as an industry of high added value, where sustainability is accomplished through stories that cover wide range of consumers. However, the need for long-term internationalization strategy is growing as countless number of applications and games has pushed the local market to its limit. Thus, this research explored on the industrial characteristics and the internationalization of ICT contents firms through acquisition of competency. Based on Resource Dependence theory, the authors studied how pursuit of legitimacy and autonomy functioned in the expansion process of ICT contents firms. A survey analysis of 212 key decision makers of Korean ICT content firms were performed, to reveal that resource environment and interdependence must undergo a thorough consideration.

Implementation of a Real Time OS for the Education of PICmicro Controller (PICmicro controller 교육을 위한 RTOS 적용 연구)

  • Lee, Young-Dae;Moon, Chanwoo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.5
    • /
    • pp.167-172
    • /
    • 2008
  • The purpose of the project was intended to show an application method of RTOS to PICmicro with limited resources with several tasks controlling the peripheral devices. The application runs on the designed PIC16F87x evaluation board with a bootloader burned so the application program can be easily downloaded using the serial communication without using the ROM writer. Thus, it would also be a good example to use for instructional or tutorial purposes for PICmicro education. The demo shows a useful examples who wish to use the real time operation system in their own projects.

  • PDF

Clothing Purchase Behavior according to Consumer Self-Confidence (소비자 자신감에 따른 의복구매행동)

  • Jeon, Kyung-Sook
    • Journal of the Korean Home Economics Association
    • /
    • v.45 no.6
    • /
    • pp.1-9
    • /
    • 2007
  • Even though self-confidence is a personal factor of a people, it works as behavioristic factor in consumer behavior. In this study, the influence of consumer self-confidence on clothing purchase behavior was investigated. A total of 284 data sets were analyzed after collecting questionnaires from college students in Seoul using convenient sampling method. For data analysis, chi-square test, analysis of variance, reliability test and factor analysis were performed by SPSSWIN program. The results were as followed. First, the clothing purchase places were affected by the consumers' level of self-confidence. The more confident consumers preferred internet shopping and Dongdaemun market to large-scale shops. The discount stores were selected by the less confident consumers. Second, information search was one of the main reasons to visit internet shopping mall by the more confident consumers. Third, the more confident consumers showed the higher level of clothing involvement than the less confident consumers. Finally, unplanned purchases, such as pure impulse buying and reminder buying were more likely to occur by the more confident consumers with less purchase conflicts.

Implementation of RS232C and TCP/IP Connection Device Using ARM Processor (ARM프로세서를 이용한 RS232C와 TCP/IP 접속장치의 구현)

  • Lee, Young-Jun;Han, Kyong-Ho
    • Proceedings of the KIPE Conference
    • /
    • 2002.07a
    • /
    • pp.635-638
    • /
    • 2002
  • In this paper, the connection device of RS232C and TCP/IP implementation using ARM processor and LINUX is proposed. Data interaction flash memory the multiple serial ports are transferred to ARM processor and the data are processed and formed into data packet for transfer via internet protocol. Packet flash memory Internet is decoded to extract the serial port data. The serial ports supports RS232C asynchronous protocol communication and control program is developed in GNU-C and installed in the on-board memory for packet conversion and control. The research result can be applied to terminal server, printer server and multiple serial ports equipments.

  • PDF