• Title/Summary/Keyword: the pattern of information system use

Search Result 456, Processing Time 0.029 seconds

Analysis of Learning Hour in Cyber Classes of Major and Non-Major Subjects (사이버강의 수강생들의 교과목별 학습시간 분석)

  • Moon, Bong-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.1
    • /
    • pp.243-251
    • /
    • 2008
  • The cyber classes of an e-Learning system have been considered as one of the important form of education. Especially. some of non-major(liberal arts and science) and major subjects are held in cyber classes. However, there is no or little study of effectiveness and function for the students' position. In this study, we analyzed log files in the e-learning system. and classified login and learning hour patterns of students. who were enrolled in the cyber classes. into hourly pattern in a day, daily pattern in a week, and weekly pattern in a semester. We proposed general ideas to improve effectiveness and function of current e-learning. Over 50% of logins were for less than 30 minutes learning and there is wasteful use of e-learning system resources.

  • PDF

A Finger Crease Pattern Identification Algorithm Utilizing Clustering Method (클러스터링 기법을 이용한 손가락 마디지문 식별 알고리즘)

  • 주일용;안장용;최환수
    • Proceedings of the IEEK Conference
    • /
    • 2000.11d
    • /
    • pp.247-250
    • /
    • 2000
  • This paper proposes a finger crease pattern identification algorithm utilizing a clustering method. The algorithms has been developed for the use of biometric person identification system. Since the finger crease pattern may be well-imaged utilizing low cost imaging devices such as low-end CCD camera with LED lighting, the feasibility of commercialization of the algorithm and the system utilizing the algorithm may be well justified if the finger crease pattern is a reasonable choice for the biometric feature. In this paper, we exploit this possibility and show the potential of using the finger crease pattern as a feature for biometric person identification.

  • PDF

Construction of Oil-Spill Warning System based on Remote Sensing/Numerical Model and Its Application to the Natural Resource Damage Assessment and Restoration System

  • Goto, Shintaro;Kim, Sang-Woo
    • Proceedings of the KSRS Conference
    • /
    • 1999.11a
    • /
    • pp.243-248
    • /
    • 1999
  • From the lessons after the Nakhodka oil-spill in Jan. 1997, oil slick detection by using remote sensing data and assimilating the data to the simulation program is important for monitoring the oil-drift pattern. For this object, we are going to construct the oil-spill warning system for estimating the oil-drift pattern using remotesensing/numerical simulation Model. Additionally we plan to use this system for restorating oil-spill damage domestically, such as estimating the ecological damage and making the priority fur restorating the oil-spilled shoreline. This report is intended to summarize the role of geo-informatics in the oil spill accident by not only paying attention to the effect of information provision/information management via the map, but also reporting the interim result in part based on the details discussed in the processes of recovery support and environmental impact assessment during the Nakhodka's accident.

  • PDF

신발소재 재단용 채산 소프트웨어 개발

  • 류영근;김행렬
    • Proceedings of the Korea Association of Information Systems Conference
    • /
    • 1996.11a
    • /
    • pp.145-155
    • /
    • 1996
  • This paper is to describe the development of nesting software for the materials cutting plan of footwear manufacturing processes. In shoes cutting process, almost of the materials cutting plan is dependent upon worker's experience. Thus, the pattern nesting by worker's experience for materials cutting is different from the real cutting results and also different from the error size of yield in degree of worker's skill. Recently, a few of domestic shoes' makers make use of oversee's nesting software. But the nesting software unfits for the domestic actual circumstances, and is complex to use, and is expensive, and is not to be interfaced with the auto cutting machine. Therefore, we have developed the economic nesting systems that are easier for novice to use and fit for the domestic circumstances, which can syncronize with the development of the auto cutting machine. The system comprises interrelated modules for materials information, nesting simulation, utility. The architecture of system, the functions of each module, and the information processing procedures of each function are discussed.

  • PDF

A Euclidean Reconstruction of 3D Face Data Using a One-Shot Absolutely Coded Pattern (단일 투사 절대 코드 패턴을 이용한 3차원 얼굴 데이터의 유클리디안 복원)

  • Kim, Byoung-Woo;Yu, Sun-Jin;Lee, Sang-Youn
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.42 no.6
    • /
    • pp.133-140
    • /
    • 2005
  • This paper presents a rapid face shape acquisition system. The system is composed of two cameras and one projector. The technique works by projecting a pattern on the object and capturing two images with two cameras. We use a 'one shot' system which provides 3D data acquired by single image per camera. The system is good for rapid data acquisition as our purpose. We use the 'absolutely coded pattern' using the hue and saturation of pattern lines. In this 'absolutely coded pattern' all patterns have absolute identification numbers. We solve the correspondence problem between the two images by using epipolar geometry and absolute identification numbers. In comparison to the 'relatively coded pattern' which uses relative identification numbers, the 'absolutely coded pattern' helps obtain rapid 3D data by one to one point matching on an epipolar line. Because we use two cameras, we obtain two images which have similar hue and saturation. This enables us to have the same absolute identification numbers in both images, and we can use the absolutely coded pattern for solving the correspondence problem. The proposed technique is applied to face data and the total time for shape acquisition is estimated.

A Design and Implementation of JiKU/XML Object-oriented Code Generator Using for Design Pattern (디자인 패턴을 이용한 JiKU/XML 객체지향코드 생성기 설계 및 구현)

  • Sun, Su-Kyun
    • The KIPS Transactions:PartD
    • /
    • v.11D no.4
    • /
    • pp.907-916
    • /
    • 2004
  • The present code generation system, developing based on single system, Is not easy for developers or maintenance men to share pattern design information in distribution environment. So in this paper, we design and implement XML as basis of web environment, and JiKU/XML object-oriented code generator using pattern design. We use UML to change pattern design to XML code, and create code, suitable to PIML command, to generate design information designed by UML into XML code. This JiKU/XML Object-oriented Code Generator makes 10-step codes, and can be easily applied to web environment. It complements the disadvantage of present generator, F77/J++, and makes standardization of design because it uses UML and design pattern information. We compare it with present system by implement Eases, and as a result, generator suggested in this study gives more effective function.

Utilization Pattern Analysis of an Enterprise Information System using Event Log Data (로그 데이터를 이용한 기업 정보 시스템의 사용 패턴 분석)

  • Han, Kwan Hee
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.10
    • /
    • pp.723-732
    • /
    • 2022
  • The success of enterprise information system(EIS) is crucial to align with corporate strategies and eventually attain corporate goals. Since one of the factors to information system success is system use, managerial efforts to measure the level of EIS utilization is vital. In this paper, the EIS utilization level is analyzed using system access log data. In particular, process sequence patterns and clustering of similar functions are identified in more detail based on a process mining method, in addition to basic access log statistics. The result of this research can be used to improve existing information system design by finding real IS usage sequences and function clusters.

Hash-based Pattern Matching System for Detection Performance (침입탐지시스템 탐지성능 향상 위한 해시기반 패턴 매칭 시스템)

  • Kim, Byung-Hoon;Ha, Ok-Hyun;Shin, Jae-Chul
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.21-27
    • /
    • 2009
  • In the environment of development of network bandwidth and intrusion technology there is limit to the pattern analysis of all massed packets through the existing pattern matching method by the intrusion detection system. To detect the packets efficiently when they are received fragmented, it has been presented the matching method only the pattern of packets consisting with the operation system such as Esnort. Pattern matching performance is improved through the use of NMAP, the basic mechanism od Esnort, by scanning the operation system of the same network system and appling pattern match selectively scanned information and the same operation system as the received packets. However, it can be appeared the case of disregarding the receivied packets depending on the diversity of the kind of operation systems and recognition mistake of operation system of nmap. In this paper, we present and verify the improved intrusion detection system shortening the pattern matching time by the creation of hashy table through the pattern hash of intrusion detection system independently with the users system environment .in the state of flux.

  • PDF

Object Color Identification Embedded System Realization for Uninhabited Stock Management (무인물류관리시스템을 위한 물체컬러식별 임베디드시스템 구현)

  • Lar, Ki-Kong;Ryu, Kwang-Ryol
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.289-292
    • /
    • 2007
  • An object color identification and classification embedded system realization for uninhabited stock management is presented in this paper. The embedded system is realized by using ultrasonic sensor to extract the object and distance, and detecting binary image from USB CCD camera. The algorithm is identified by comparing the reference pattern with the color pattern of input image, and move to the settled rack at the store. The experimental result leads to use the uninhibited stock management with practice as a robot.

  • PDF

A two-dimensional positioning system by use of correlation of vague M-arrays

  • Kashiwagi, Hiroshi;Sakata, Masato;Ohtomo, Atsushi
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1989.10a
    • /
    • pp.1059-1062
    • /
    • 1989
  • This paper describes a new method for two-dimensional(2D) positioning system by use of crosscorrelation of vague M-arrays. An M-array pattern is attached on an object to be positioned and it is observed by a TV camera in out-of-focus condition. The crosscorrelation between the observed image data and the reference M-array gives us the information about the 2D position of the object.

  • PDF