2016 (80)
2015 (71)
2014 (86)
2013 (123)
2012 (121)
2011 (116)
2010 (65)
2009 (68)
2008 (12)
Electro-Dermal Activity, Heart Rate, Respiration under Emotional Stimuli in Schizophrenia
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology vol.9 2009.08 pp.1-8
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Patients with schizophrenia are known to be impaired in several areas of emotional processing, including psychophysiological reactivity. This study investigates the preliminary autonomic reactions and recognition of schizophrenic patients according to basic emotional conditions. The parameters such as electrodermal activity (Skin conductance response, skin conductance level), heart rat, and respiration were measured by using emotion evoked stimuli. We found out that there were no differences of accuracy for recognition with the target emotion between groups. Also, we found out that in anger (heart rate), fear (electrodermal activity, respiration), and sadness (heart rate, respiration) condition, there was a difference of physiological responses between groups.
Classification of Textures Based on Features Extracted from Preprocessing Images on Random Windows
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology vol.9 2009.08 pp.9-18
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Textures are one of the important features in computer vision for many applications. In the literature, most of the attention has been focused on the texture features with minimal consideration of the noise models and window selection. To overcome this, in the present paper the features are constructed on preprocessed methods applied on the texture image by considering different types of windows. These features offer a better classification rate. The experimental results on various Brodatz textures clearly demonstrate the efficiency of the proposed method.
Intelligent Feedback System (IFS) in Tele-Learning Environment
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology vol.9 2009.08 pp.19-30
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper describes the innovative Learner Intelligent Feedback System (IFS) in terms of a set of three agent: Interface Agent (IFA), Information Agent(IMA), and Intelligence Agent(ILA). The agent can deduce the correct answers to test questions and provide intelligent feedback and hints to the learner. The intelligent feedback system is : Firstly, system presents content in initial learning style. Secondly, learner takes a diagnostic test. Thirdly, system analyzes user performance. Fourth, system identifies concept deficiencies and chooses the best learning model. Finally, system dynamically creates a remedial course tailored to the learner. The learner takes the remedial course, at the end of which is another test. If the learner still does not get the concept, he or she is returned to another dynamically generated course presented in a different learning style. At the same time the tutor agent notifies that one of her students is having trouble. The Tutoring agents are the driving engine of the system. Their main tasks are to generate appropriate learning feedbacks for learners and provide new learning problems and advanced situations. IFS can be used for complete course training, including test from a remote site.
Simulation of Path Finding Algorithm – a Bird’s Eye Perspective
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology vol.9 2009.08 pp.31-38
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Path finding is one of those required elements of the computer network. Any path finding algorithm will work as long as there are no obstacles or distractions along the way. If there is an obstacle, then the character needs to figure out a way to move around and still reach the goal. In this paper, we have simulated the existing path-finding algorithms and state that A* is the most popular choice for path-finding and it is very flexible and can be used in a wide range of contexts.
Model of Business Service Management with Security Approach
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology vol.9 2009.08 pp.39-50
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper a structure of business service management integrated with security management is offered. Our BSM model with security approach is the hierarchy of data management in any growing business. It creates a logical flow of data from its inception into the organization through the management levels. Thus, allowing for proactive business decisions to be made on a consistent basis. The end result is an increase in both corporate flexibility and profitability. It encompasses the process and use of Customer Data Management, Customer Relationship Management, Enterprise Resource Planning and Business Insurance all supported by a robust Service Desk. Information is an essential resource for all businesses today and is the key to growth and success. However, we need to ensure that the information held on our IT systems is secure. The impact of a security breach may be far greater than we would expect. The loss of sensitive or critical information directly may not only affect our competitiveness and cash flow but also damage our reputation - something which may have taken us years to establish and which may be impossible to restore. In our paper we introduce a structure of Business Service Management (BSM) with security approach offering an advanced model of integrated secure BSM model.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.