• Title/Summary/Keyword: 사용자 유형

Search Result 1,148, Processing Time 0.023 seconds

Design and implementation of an Intelligent Tutoring System for Mobile English Learning (모바일 영어 학습을 위한 지능형 교육 시스템의 설계 및 구현)

  • Lee, Young-Seok;Cho, Jung-Won;Choi, Byung-Uk
    • The KIPS Transactions:PartA
    • /
    • v.10A no.5
    • /
    • pp.539-550
    • /
    • 2003
  • As the service of mobile internet has been expended, student users are increase. The computers have been widely used in a education field as the teaching tool by improvement of the multimedia contents processing and user interface. The English learning using the computers in the restricted education environment provides motivations and effective learning to learners, but still have some problem such as teaching and evaluating without consideration for differences of individual levels. In order to solve the problems and take the advantages, we propose the intelligent tutoring system for english learning with mobile technology. Overcoming limitations of the mobile environment and using proper treacher's roles,. We have applied the conventional estimation method of the intellectual learner level for students. Also, we have proposed the diagnostic function in order to determine the method of teaching-learing and item disposition that each leaner prefers. Then we have designed and implemented the expert module, providing the feedback for teaching, of the intelligent turoring system for mobile english learning. This system will be able to support the interaction between teachers and students and replace some roles of teacher in the mobile english learning.

A Study on the UCC Copyright which uses the Broadcasting Contents and the ODR(Online Dispute Resolution) through the Online Technical embodiment : Focusing on the CCl as the Conversational law Approach (방송콘텐츠를 이용한 UCC의 저작권 문제와 온라인 기술 구현을 통한 ODR(Online Dispute Resolution)의 가능성에 관한 연구 : Conversational Law 접근으로써 CCL을 중심으로)

  • Kim, Mi-Sun;Yu, Sae-Kyung
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02b
    • /
    • pp.558-564
    • /
    • 2008
  • The study aims to examine the UCC (User Created Contents) Copyright which use the broadcasting contents. UCC are classified by UGC(User Generated Contents), UMC(User Modified Contents), and URC(User Recreated Contents). Especially UMC and URC correspond to a problem of copyright. Following the Copyright Protection Center investigation in 2006, it reported that 83.7% UCC are infringement of copyright. In spite of remarkable the UCC copyright problem, the concrete resolution does not exist. Also it is difficult to apply the offline legal conformity because of online nature of the UCC. The study observes the UCC copyright dispute instances which use the broadcasting contents and investigates a resolution of the UCC copyright. Considering the online media nature, it tries to analyse CCL(Creative Common License) as the ODR(online Dispute Resolution). It is meaningful to search the possibility of UCC copyright problem through the online technical embodiment.

  • PDF

The effect of Social Media Information Attributes on perceived Information usefulness and Customer Attitudes (소셜 미디어 정보속성이 정보유용성과 고객 태도에 미치는 영향 -정교화 가능성 모델(ELM)을 중심으로-)

  • Ryu, Soo-Hyung;Lee, So-young
    • Journal of Digital Convergence
    • /
    • v.18 no.5
    • /
    • pp.233-247
    • /
    • 2020
  • The video content platform, which is a social media, is used as a means of producing various contents with high immersion, ease of use, and low production conditions. However, existing social media-related studies were insufficient to examine differences in existing information attributes despite the differences in platform types. Therefore, this study intends to examine the relationship between existing media and social media information attributes. The research model was analyzed by surveying 213 video content users. As a result of the research model analysis, information playability, information timeliness, and information provider reliability had a significant effect on information usefulness. However, information vividness, information accuracy, information neutrality, and professionalism of information providers did not have a significant effect. Through this study, the difference between video content and existing media or social media was found, and it was found that a reliable information provider should provide pleasant content at the right time. In addition, through the understanding of the information processing process of video content, which is a key player in the growth of social media, we believe that it will be very helpful in producing quality content.

A Study on the Product differentiation Process by the Structuring of Design Factors (디자인 인자의 구조화에 의한 제품 차별화 프로세스 연구)

  • Kim, Hyun
    • Archives of design research
    • /
    • v.13 no.2
    • /
    • pp.73-80
    • /
    • 2000
  • In this study design information was separately defined form general product information and thus factors reflected in product design ion the basis of values and roles were extracted. The following is a classification of 5 different types of design factors divided according to their disposition. ·Innovation factor - element which previously did not exist or element related with explicit reformation ·Open factor - active element which not only improves current performance but also induces new functions through understanding of usage situations and new possibilities. ·Anterior factor - element which prolongs and develops the early development requirements of products through C.I. and P.I. related elements and characteristics of previous models and design strategy. Self-evidence factor - element related with function visualization through product structure which may make possible the consolidation of shape and function. Rigid factor - element, based on the human factors engineering, related with the safety and efficiency of users. This classification was obtained by defining major characteristics of products considering the target consumer and market characteristics. In this classification factor structuring design process which efficiently deducted a differentiated final product by synthesizing factors of higher importance as dominant factors was proposed. With this kind of factor structuring process, product differentiation may be achieved by bestowing individual characteristics to each product by combining design dominant factors associated with the product for a specific purpose from the stages of product concept development. Moreover, this may be used as an approach to actively correspond to the various and specific demands of the comsumer.

  • PDF

Long-term Location Data Management for Distributed Moving Object Databases (분산 이동 객체 데이타베이스를 위한 과거 위치 정보 관리)

  • Lee, Ho;Lee, Joon-Woo;Park, Seung-Yong;Lee, Chung-Woo;Hwang, Jae-Il;Nah, Yun-Mook
    • Journal of Korea Spatial Information System Society
    • /
    • v.8 no.2 s.17
    • /
    • pp.91-107
    • /
    • 2006
  • To handling the extreme situation that must manage positional information of a very large volume, at least millions of moving objects. A cluster-based sealable distributed computing system architecture, called the GALIS which consists of multiple data processors, each dedicated to keeping records relevant to a different geographical zone and a different time zone, was proposed. In this paper, we proposed a valid time management and time-zone shifting scheme, which are essential in realizing the long-term location data subsystem of GALIS, but missed in our previous prototype development. We explain how to manage valid time of moving objects to avoid ambiguity of location information. We also describe time-zone shifting algorithm with three variations, such as Real Time-Time Zone Shifting, Batch-Time Zone Shifting, Table Partitioned Batch-Time Zone Shifting, Through experiments related with query processing time and CPU utilization, we show the efficiency of the proposed time-zone shifting schemes.

  • PDF

Production Techniques for Mobile Motion Pictures base on Smart Phone (스마트폰 시장 확대에 따른 모바일 동영상 편집 기법 연구)

  • Choi, Eun-Young;Choi, Hun
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.5
    • /
    • pp.115-123
    • /
    • 2010
  • Because of development of information technology, moving picture can run various platforms. We should consider and apply users' attitude as well as production technique because convergence between mobile and media technology may be increased full-browsing service using mobile device. Previous research related to production technique in various platforms only focus on video quality and adjustment of screen size. However, besides of technical side, production techniques should be changed such as image production as well as image editing by point of view aesthetic. Mise-en-scene such as camera angle, composition, and lighting is changed due to HD image. Also image production should be changed to a suitable full-browsing service using mobile device. Therefore, we would explore a new suitable production techniques and image editing for smart phone. To propose production techniques for smart phone, we used E-learning production system, which are transition, editing technique for suitable converting system. Such as new attempts are leading to new paradigm and establishing their position by applying characteries such as openness, timeliness to mobile. Also it can be extended individual area and established as expression and play tool.

Defect Detection of Ship Engine using duplicated checking of vibration-data-distinction Method and Classification of fault-wave (이중화된 진동 정보 판별 기법과 고장 파형 분류를 이용한 선박 엔진의 고장 감지)

  • Lee, Yang-Min;Lee, Kwang-Young;Bae, Seung-Hyun;Shin, Il-Sik;Jang, Hwi;Lee, Jae-Kee
    • Journal of Navigation and Port Research
    • /
    • v.33 no.10
    • /
    • pp.671-678
    • /
    • 2009
  • Recently, there have been some researches in the equipment fault detection based on shock and vibration information. Most research of them is based on shock and vibration monitoring to determine the equipment fault or not. Different with engine fault detection based on shock and vibration information we focus on detection of engine for boat and system control. First, it use the duplicated-checking method for shock and vibration information to determine the engine fault or not. If there is a fault happened, we use the integral to determine the error engine shock wave width and detect the fault area. On the other hand, we use the engine trend analysis and standard of safety engine to implement the shock and vibration information database. Our simulation results show that the probability of engine fault determination is 98% and the probability of engine fault detection is 72%

Practical Investigation for Internet Airborne Video Map Focused on Vector Shaped Objects (벡터형 공간객체 중심의 인터넷 원격 동영상 지도 서비스에 대한 실증적 고찰)

  • Um, Jung-Sup;Lee, Bo-Mi
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.6 no.2
    • /
    • pp.46-64
    • /
    • 2003
  • The vector shaped object is generally very long (hundreds or thousands of kilometers) and very narrow (10-100 meters). Image mapping techniques and tools for these objects should be totally different from the traditional area-based targets. Acknowledging these unique characteristics of the vector shaped object, a motion picture mapping system has been developed by combining internet GIS technology with airborne video. In particular, integration between airborne video and digital maps took advantage of each component, and enabled the landscape structure to be visualized, interacted with and deployed all on the Web. The motion picture maps provided a completely new means for disseminating information for area-wide landscape in a visual and interactive manner to the general public while digital map with location information revealed successfully the major parameters that influence an area-wide spatial structure in the study area. The remote video approach breaks down the usual concept of image mapping in a conventional cartography. As a result, the research findings have established the new concept of 'internet airborne video mapping for vector shaped object', proposed as an initial aim of this paper. It would playa crucial role in improving the quality of public information service if the mapping system is operationally introduced into the Government since the highly user-friendly moving picture provides a completely new means for disseminating spatia) information for vector shaped object.

  • PDF

An Efficient Location Cache Scheme for 3-level Database Architecture in PCS Networks (PCS 네트워크에서 3-레벨 데이터베이스 구조를 위한 효과적인 위치 캐시 기법)

  • Han, Youn-Hee;Song, Ui-Sung;Hwang, Chong-Sun;Jeong, Young-Sik
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.3
    • /
    • pp.253-264
    • /
    • 2002
  • Recently, hierarchical architectures of databases for location management have been proposed in order to accommodate the increase in user population in future personal communication systems. In particular, a 3-level hierarchical database architecture is compatible with current cellular mobile systems. In the architecture, a newly developed additional databases, regional location database(RLR), are positioned between HLR and VLRs. We propose an efficient cache scheme, called the Double T-thresholds Location Cache Scheme. The cache scheme extends the existing T-threshold location cache scheme which is competent only under 2-level architecture of location databases currently adopted by IS-41 and GSM. The idea behind our scheme is to use two pieces of cache information, VLR and RLR serving called portables. The two pieces are required in order to exploit root only locality of registration area(RA) but also locality of regional registration area(RRA) which is the wide area covered by RLR. We also use two threshold values in order to determine whether the two pieces are obsolete. In order to model the RRA residence time, the branching Eralng-$\infty$ distribution is introduced. Our minute cost analysis shows that the double T-threshold location cache scheme yields significant reduction of network and database costs for molt patterns of portables.

A Multistage Authentication Strategy for Reliable N-to-N Communication in CGSR based Mobile Ad Hoc Networks (CGSR 기반의 이동 애드 흑 네트워크에서 신뢰성 있는 통신을 위한 노드간 인증 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.659-667
    • /
    • 2005
  • A Mobile Ad Hoc Network(MANET) is a multi hop wireless network with no prepared base stations or centralized administrations, where flocks of peer systems gather and compose a network. Each node operates as a normal end system in public networks. In addition to it, a MANET node is required to work as a router to forward traffic from a source or intermediate node to others. Each node operates as a normal end system in public networks, and further a MANET node work as a router to forward traffic from a source or intermediate node to the next node via routing path. Applications of MANET are extensively wide, such as battle field or any unwired place; however, these are exposed to critical problems related to network management, node's capability, and security because of frequent and dynamic changes in network topology, absence of centralized controls, restricted usage on network resources, and vulnerability oi mobile nodes which results from the special MANET's character, shared wireless media. These problems induce MANET to be weak from security attacks from eavesdropping to DoS. To guarantee secure authentication is the main part of security service In MANET because networks without secure authentication are exposed to exterior attacks. In this paper, a multistage authentication strategy based on CGSR is proposed to guarantee that only genuine and veritable nodes participate in communications. The proposed authentication model is composed of key manager, cluster head and common nodes. The cluster head is elected from secure nodes, and key manager is elected from cluster heads. The cluster head will verify other common nodes within its cluster range in MANET. Especially, ID of each node is used on communication, which allows digital signature and blocks non repudiation. For performance evaluation, attacks against node authentication are analyzed. Based on security parameters, strategies to resolve these attacks are drawn up.