Earticle

현재 위치 Home

International Journal of Advanced Science and Technology

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJAST) [Science & Engineering Research Support Center, Republic of Korea(IJAST)]
  • pISSN
    2005-4238
  • 간기
    월간
  • 수록기간
    2008 ~ 2016
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
vol.9 (5건)
No
1

Electro-Dermal Activity, Heart Rate, Respiration under Emotional Stimuli in Schizophrenia

Sungwon Park

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology vol.9 2009.08 pp.1-8

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Patients with schizophrenia are known to be impaired in several areas of emotional processing, including psychophysiological reactivity. This study investigates the preliminary autonomic reactions and recognition of schizophrenic patients according to basic emotional conditions. The parameters such as electrodermal activity (Skin conductance response, skin conductance level), heart rat, and respiration were measured by using emotion evoked stimuli. We found out that there were no differences of accuracy for recognition with the target emotion between groups. Also, we found out that in anger (heart rate), fear (electrodermal activity, respiration), and sadness (heart rate, respiration) condition, there was a difference of physiological responses between groups.

2

Classification of Textures Based on Features Extracted from Preprocessing Images on Random Windows

B.V. Ramana Reddy, A. Suresh, M. Radhika Mani, V.Vijaya Kumar

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology vol.9 2009.08 pp.9-18

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Textures are one of the important features in computer vision for many applications. In the literature, most of the attention has been focused on the texture features with minimal consideration of the noise models and window selection. To overcome this, in the present paper the features are constructed on preprocessed methods applied on the texture image by considering different types of windows. These features offer a better classification rate. The experimental results on various Brodatz textures clearly demonstrate the efficiency of the proposed method.

3

Intelligent Feedback System (IFS) in Tele-Learning Environment

Joung-Souk Sung

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology vol.9 2009.08 pp.19-30

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper describes the innovative Learner Intelligent Feedback System (IFS) in terms of a set of three agent: Interface Agent (IFA), Information Agent(IMA), and Intelligence Agent(ILA). The agent can deduce the correct answers to test questions and provide intelligent feedback and hints to the learner. The intelligent feedback system is : Firstly, system presents content in initial learning style. Secondly, learner takes a diagnostic test. Thirdly, system analyzes user performance. Fourth, system identifies concept deficiencies and chooses the best learning model. Finally, system dynamically creates a remedial course tailored to the learner. The learner takes the remedial course, at the end of which is another test. If the learner still does not get the concept, he or she is returned to another dynamically generated course presented in a different learning style. At the same time the tutor agent notifies that one of her students is having trouble. The Tutoring agents are the driving engine of the system. Their main tasks are to generate appropriate learning feedbacks for learners and provide new learning problems and advanced situations. IFS can be used for complete course training, including test from a remote site.

4

Simulation of Path Finding Algorithm – a Bird’s Eye Perspective

R.Anbuselvi, R.S.Bhuvaneswaran

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology vol.9 2009.08 pp.31-38

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Path finding is one of those required elements of the computer network. Any path finding algorithm will work as long as there are no obstacles or distractions along the way. If there is an obstacle, then the character needs to figure out a way to move around and still reach the goal. In this paper, we have simulated the existing path-finding algorithms and state that A* is the most popular choice for path-finding and it is very flexible and can be used in a wide range of contexts.

5

Model of Business Service Management with Security Approach

Feruza Sattarova Y., Sattarov Shavkat Y., Tadjibayev Furkhat A., Tai-hoon Kim

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology vol.9 2009.08 pp.39-50

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper a structure of business service management integrated with security management is offered. Our BSM model with security approach is the hierarchy of data management in any growing business. It creates a logical flow of data from its inception into the organization through the management levels. Thus, allowing for proactive business decisions to be made on a consistent basis. The end result is an increase in both corporate flexibility and profitability. It encompasses the process and use of Customer Data Management, Customer Relationship Management, Enterprise Resource Planning and Business Insurance all supported by a robust Service Desk. Information is an essential resource for all businesses today and is the key to growth and success. However, we need to ensure that the information held on our IT systems is secure. The impact of a security breach may be far greater than we would expect. The loss of sensitive or critical information directly may not only affect our competitiveness and cash flow but also damage our reputation - something which may have taken us years to establish and which may be impossible to restore. In our paper we introduce a structure of Business Service Management (BSM) with security approach offering an advanced model of integrated secure BSM model.

 
페이지 저장