• Title/Summary/Keyword: 사이버대학교

Search Result 1,193, Processing Time 0.027 seconds

Analysis of the Effect of Sincere Learning Attitudes on Academic Achievement in On-line Education (온라인 교육에서 성실한 학습 태도가 학업 성취도에 미치는 영향 분석)

  • Lee, Eunjoo;Jeong, Youngsik
    • Journal of The Korean Association of Information Education
    • /
    • v.23 no.5
    • /
    • pp.481-489
    • /
    • 2019
  • In order to explore the learning attitude of the learners and the effects of conscious learning attitudes on academic achievement in On-line education system of open high school, we analyze the log data of 2,965 first graders who studied English, Math, Integrated Society and Integrated Science during the first semester of 2018. This study examines the learning status according to the learner's background variables, and analyzes the number of lessons per hour, learning progress rate, learning period, learning start month, and formative evaluation results for each class. In addition, to verify the effects of conscious learning attitude on academic achievement, skewness and kurtosis are calculated by using learning frequency values for each class. As a result, in almost all fields, the average number of lessons per class, study duration, progress rate, and grades, women are higher than men. In addition, the older ones are, the higher they are and the Seoul area is higher than the other area. The average learning period is 2~3 months, and the longer the learning period, the higher the formative evaluation score. Lastly, even though the number of learning is lower than that of learners who concentrate on a certain period of time, the formation scores of learners who learn consciously are higher.

A Study on the Actual Use of Mobile Electronic Notification Service (모바일 전자고지서비스의 사용실태에 대한 조사 연구)

  • Kim, Jong-Bae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.5
    • /
    • pp.167-180
    • /
    • 2021
  • Due to the development of IT technology and the spread of infectious diseases, online non-face-to-face services are rapidly expanding. In particular, the information delivery process is also changing from the past postal branch-based to an information delivery system using mobile devices. This change is due to the change from the information delivery using the telephone line to the information delivery system using the Internet. Mobile notification service is a service that sends electronic notices to mobile devices held by users to deliver information and is validated for delivery, which has the advantage of reducing the benefits of unnecessary mail production, exposure to personal information, and misdelivery. However, user identification information must be provided to operators that provide mobile electronic notification services. In this paper, the current state of use of the mobile electronic notice service, which has been in effect since 2019, is investigated and analyzed, and the current mobile electronic notice service is to be safely provided and to take appropriate protection measures for personal information. In providing the mobile electronic notification service to users, it is possible to identify the service standards required by the sending agency, and based on this, prepare the technical standards for the mobile electronic notification service that the sending agency must comply with in advance and use it for the mobile electronic notification service.

Threat Diagnostic Checklists of Security Service in 5G Communication Network Virtualization Environment (5G 통신 네트워크 가상화 환경에서 보안 서비스의 위협 진단 체크리스트)

  • Hong, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.10
    • /
    • pp.144-150
    • /
    • 2021
  • The purpose of this paper is to review the direction of the slicing security policy, which is a major consideration in the context of standardization in 5G communication network security, to derive security vulnerability diagnosis items, and to present about analyzing and presenting the issues of discussion for 5G communication network virtualization. As for the research method, the direction of virtualization security policy of 5G communication network of ENISA (European Union Agency for Cybersecurity), a European core security research institute, and research contents such as virtualization security policy and vulnerability analysis of 5G communication network from related journals were used for analysis. In the research result of this paper, the security structure in virtualization security of 5G communication network is arranged, and security threats and risk management factors are derived. In addition, vulnerability diagnosis items were derived for each security service in the risk management area. The contribution of this study is to summarize the security threat items in 5G communication network virtualization security that is still being discussed, to be able to gain insights of the direction of European 5G communication network cybersecurity, and to derive vulnerabilities diagnosis items to be considered for virtualization security of 5G communication network. In addition, the results of this study can be used as basic data to develop vulnerability diagnosis items for virtualization security of domestic 5G communication networks. In the future, it is necessary to study the detailed diagnosis process for the vulnerability diagnosis items of 5G communication network virtualization security.

Evaluation of Smoke Control Performance of Ventilation System Using by Hot Smoke Test (Hot Smoke Test를 이용한 주차장 환기설비의 제연 성능평가)

  • Joung, Suckhwan
    • Journal of Korean Society of Disaster and Security
    • /
    • v.12 no.2
    • /
    • pp.47-56
    • /
    • 2019
  • Recently, in order to overcome the difficulty of entering a fire source due to the occurrence of a large amount of smoke in the event of a fire in a parking lot, it has used that a method of discharge smoke using air supply, exhaust fans and jet fans installed for ventilation of parking lots. In this study, the variation of flow in the smoke layer was observed using CCTV under two conditions, in which only the air supply fan operates and the manned fan operates together, and the temperature around the plume was compared to Albert eq. to assess its suitability as a parking lot ventilation performance evaluation method. As a result, it was found that the smoke layer could be disturbed if the Jet Fan was operated at the same time, which could lead to the possibility of an initial evacuation disturbance. However, the additional operation of the Jet Fan has been confirmed by the observation CCTV that the emission performance is improved, which is believed to help conduct the suppression operation. The temperature around the plume was measured and compared to Alpert eq, and was analyzed to be about $2^{\circ}C$ lower at the center axis of the plume and $9.0^{\circ}C$ higher at 8 m in the direction of the discharge of smoke. The results of temperature measurements around the plume were lower than the maximum temperature expected in AS 4391 and did not exceed the expected temperature risk caused by the experiment. As with these results, the temperature risk from the progression of hot smoke tests is foreseeable, so it will be available as one of the general evaluation methods for assessing smoke control performance in a parking lot without relevant criteria.

Study on the Type of Selecting Channels through the On-Line about Restaurant Information by Baby Boomer Consumers (베이비부머 소비자의 온라인을 통한 외식정보채널유형 선택에 관한 연구)

  • Choi, Soo Ji
    • 한국노년학
    • /
    • v.36 no.3
    • /
    • pp.711-726
    • /
    • 2016
  • The purpose of this study was to analyze to 1) the differences according to demographic characteristics 2) select the type-specific communities online channels of the baby boomer customers group, who ever search for restaurant information through on-line for the previous three months. The study was based on a total of 280 samples obtained from on-line networking service users in a metropolitan area from April 15 to 30, 2016. The major findings are as follows. The data were analysed using frequency, factor analysis, cluster analysis and ${\chi}^2test$. According to the results of factor analysis, on-line utilizing attributes were separated into three factors: commitment of useful information, activity of leading on-line, and habit. The based on a factor analysis, cluster analysis was adopted to segment baby boomer customers. The identified four clusters showed in using on-line: type of active utilization, habit, seeking information and passive utilization. The clusters had significant differences in gender and monthly income by demographics. All of four clusters selected blog, face book, twitter in turn through the personal on-line channels. Cluster type of active utilization and habit selected restaurant home pages, restaurant blog, restaurant face book, restaurant twitter in turn through the public on-line channels. Cluster type of seeking information and passively utilization selected restaurant home pages, restaurant blog, restaurant twitter, restaurant face book in turn through the public on-line channels. Implications and future research were also discussed.

Comparative Analysis between Super Loop and FreeRTOS Methods for Arduino Multitasking (아두이노 멀티 태스킹을 위한 수퍼루프 방식과 FreeRTOS 방식의 비교 분석)

  • Gong, Dong-Hwan;Shin, Seung-Jung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.133-137
    • /
    • 2018
  • Arduino is a small microcomputer that is used in a variety of industry fields and especially is widely used as an open source hardware IoT device. The multi-tasking method of Arduino is divided into super loop timing and RTOS thread method. The super loop timing method is simple and easy to understand. However, when one task is long, it affects the execution of the next task. In addition, RTOS threading has the advantage of being able to run without being influenced by other work time. However, Arduino, a small microcomputer, has a disadvantage in that, when the number of threads increases, the context switching time of the thread causes additional time not included in the super loop timing method have. In this paper, we use Arduino Uno R3 and FreeRTOS to analyze these different features, and the task for the experiment is to send 8000 digital signals to the built-in LED port. If two tasks of the same size are executed, the super loop method executes 3 ms faster than FreeRTOS multitasking. If multiple tasks are executed simultaneously, superloop type task is sequential execution and difference in execution time between first task and last task is large. FreeRTOS method can be executed concurrently, but execution time delay of about 30 ms occurs in context switching time.

The Nature of Reform in the U.S., UK, Germany National Intelligence Systems and Implications for Reform of the Korean National Intelligence Service (미국·영국·독일 국가정보체계 개혁 양상과 한국 국가정보원 개혁에 대한 시사점)

  • Yoon, Taeyoung
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.167-177
    • /
    • 2018
  • Major countries, such as the U.S., UK and Germany have reformed their national intelligence systems in the face of transnational, asymmetric and comprehensive threats since September 11, 2001 and have strengthened the intelligence capacity involved in countering terrorism and WMD proliferation, right/left extremism threats. The Korean Moon Jae-in government is preparing a reform plan to eliminate illegal political intervention and abuse of power by the National Intelligence Service(NIS) and to rebuild it as an efficient national intelligence agency for national security. In discussing the reform direction of the NIS, it is necessary to discuss in detail whether adopting a separate model of intelligence agencies to restrict domestic intelligence activities of the NIS and concentrate on foreign intelligence activities or establish new domestic intelligence agencies. Second, as for the issue of transferring anti-Communism investigation authority of the NIS to the police, it needs to be carefully considered in terms of balancing the efficiency and professionalism of intelligence agency activity in the context of North Korea's continuous military provocation, covert operations and cyber threats. Third, it should strive to strengthen the control and supervision functions of the administration and the National Assembly to ensure the political neutrality of the NIS in accordance with the democratization era, to guarantee citizens' basic rights and to improve the transparency of budget execution.

  • PDF

A Study on the Restoration of Chimi Excavated the Wangheungsa Temple Site using 3D Scanning and Computer Numerical Control (3차원 스캐닝과 컴퓨터 수치 제어 기술을 이용한 왕흥사지 출토 치미의 복원 연구)

  • Park, Min Jung;Hwang, Hyun Sung;Hong, Shin Yeon
    • Journal of Conservation Science
    • /
    • v.35 no.3
    • /
    • pp.217-225
    • /
    • 2019
  • The chimi(ridge-end tile) of Wangheungsa temple is the oldest in our country. The upper part of the chimi was excavated from the southern side of Wangheungsa temple and the lower part from the northern side. These parts are considered to be portions of the same chimi, because they are similar in shape and are excavated from two sides of the same temple structure. However, the original shape of the chimi cannot be determined owing to substantial deterioration. Hence, in this study, replicas of the deteriorated chimi portions of Wangheungsa temple were fabricated by employing 3D scanning technology and the computer numerical control machining method. While observing the bending phenomenon of the chimi, the proposed model was warped realistically on the basis of the bending direction of the actual chimi. Consequently, the restoration process was modified several times. The results indicated that no gaps can be found between the upper and lower parts, and the corresponding patterns connect naturally. Furthermore, the proposed method is contactless, safe, operable, reproducible, and appropriate for restoration of artifacts. Additionally, the modeling data is semi-permanent. Hence, if modelling data is appropriately applied as per the characteristics of artifacts, it can be utilized in various fields such as virtual exhibitions, hands-on exhibitions, cultural heritage restoration, and production of teaching aids and souvenirs.

The Moderating Effects of Emotional Support, Facilitative Relationship in the Relation between Father and Mother's Emotional Abuse and Difficulties in Emotion Regulation (아동기 부·모의 정서적 학대 경험과 성인기 정서조절곤란의 관계에서 정서적 지지, 촉진적 관계의 조절 효과)

  • Park, Won-Ju
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.7
    • /
    • pp.255-264
    • /
    • 2019
  • This study aimed to examine the moderating effects of emotional support and facilitative relationship in the relation of emotional abuse and difficulties in emotion regulation. This research suggests therapeutic methods for reducing the negative effects of emotional abuse. Data about emotional abuse, difficulties in emotion regulation, emotional support, and relationship inventory were collected by online survey from 336 adults in South Korea. To test moderation effects, multiple regression analyses entering emotional abuse, emotional support(facilitative relationship) and their interaction terms were hierarchically conducted. Emotional abuse increased difficulties in emotion regulation. Moderating effects of emotional support and facilitative relationship were found in the relation between father's emotional abuse and difficulties in emotion regulation. But Moderating effects of emotional support and facilitative relationship were not found in the relation between mother's emotional abuse and difficulties in emotion regulation. The different effects of father's emotional abuse and mother's, the effects of adult's positive relationship, and clinical implications of these findings were discussed.

A Study on the Space Configuration according to the Operation of Residential Welfare Facilities for the Aged (노인주거복지시설의 운영에 따른 공간구성에 관한 연구)

  • Choi, Yun-Jin
    • Journal of Industrial Convergence
    • /
    • v.17 no.1
    • /
    • pp.7-16
    • /
    • 2019
  • Korea, which became an aging society in 2000, has made transition to an aged society more quickly than expected since late 2017 after 17 years. Despite this trend, the awareness towards elderly housing facilities has not yet been raised across in society. The primary reason is that use of elderly housing facilities has not been promoted due to lack of understanding about the construction and management of the facilities. The housing of the elderly should be considered in terms of not only residential space but also the issues of medical care and continuous care. Therefore, the trend of elderly housing is pursuing the Continuing Care Retirement Community. Thus, this study analyzed the policies of existing elderly housing facilities and existing elderly housing through comparison with policies and housing of foreign countries. Based on the results, the the government intends to present characteristics and direction of suitable housing design of senior citizens' housing facilities through maintenance of UNIT, securing convergence through changes in the use of facilities, and realising the cost of operation, and studying social welfare measures to cope with the increasing number of elderly residents.