• Title/Summary/Keyword: 사이버 러닝

Search Result 177, Processing Time 0.024 seconds

A Study on Difficulty Equalization Algorithm for Multiple Choice Problem in Programming Language Learning System (프로그래밍 언어 학습 시스템에서 객관식 문제의 난이도 균등화 알고리즘에 대한 연구)

  • Kim, Eunjung
    • The Journal of Korean Association of Computer Education
    • /
    • v.22 no.3
    • /
    • pp.55-65
    • /
    • 2019
  • In programming language learning system of flip learning methods, the evaluation of cyber lectures generally proceeds from online to multiple choice questions. In this case, the questions are randomly extracted from the question bank and given to individual learners. In order for these evaluation results to be reflected in the grades, the equity of the examination question is more important than anything else. Especially in the programming language subject, the degree of difficulty that learners think can be different depending on the type of problem. In this paper, we classify the types of multiple-choice problems into two categories, and manage the difficulty level by each type. And we propose a question selection algorithm that considers both difficulty level and type of question. Considering the characteristics of the programming language, experimental results show that the proposed algorithm is more efficient and fair than the conventional method.

A Service Model Development Plan for Countering Denial of Service Attacks based on Artificial Intelligence Technology (인공지능 기술기반의 서비스거부공격 대응 위한 서비스 모델 개발 방안)

  • Kim, Dong-Maeong;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.2
    • /
    • pp.587-593
    • /
    • 2021
  • In this thesis, we will break away from the classic DDoS response system for large-scale denial-of-service attacks that develop day by day, and effectively endure intelligent denial-of-service attacks by utilizing artificial intelligence-based technology, one of the core technologies of the 4th revolution. A possible service model development plan was proposed. That is, a method to detect denial of service attacks and minimize damage through machine learning artificial intelligence learning targeting a large amount of data collected from multiple security devices and web servers was proposed. In particular, the development of a model for using artificial intelligence technology is to detect a Western service attack by focusing on the fact that when a service denial attack occurs while repeating a certain traffic change and transmitting data in a stable flow, a different pattern of data flow is shown. Artificial intelligence technology was used. When a denial of service attack occurs, a deviation between the probability-based actual traffic and the predicted value occurs, so it is possible to respond by judging as aggressiveness data. In this paper, a service denial attack detection model was explained by analyzing data based on logs generated from security equipment or servers.

Malware Detection Technology Based on API Call Time Section Characteristics (API 호출 구간 특성 기반 악성코드 탐지 기술)

  • Kim, Dong-Yeob;Choi, Sang-Yong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.4
    • /
    • pp.629-635
    • /
    • 2022
  • Cyber threats are also increasing with recent social changes and the development of ICT technology. Malicious codes used in cyber threats are becoming more advanced and intelligent, such as analysis environment avoidance technology, concealment, and fileless distribution, to make analysis difficult. Machine learning technology is being used to effectively analyze these malicious codes, but a lot of effort is needed to increase the accuracy of classification. In this paper, we propose a malicious code detection technology based on API call interval characteristics to improve the classification performance of machine learning. The proposed technology uses API call characteristics for each section and entropy of binary to separate characteristic factors into sections based on the extraction malicious code and API call order of normal binary. It was verified that malicious code can be well analyzed using the support vector machine (SVM) algorithm for the extracted characteristic factors.

A Study on Terminal Interface Adaptation for u-LMS (u-LMS를 위한 단말기 인터페이스 적응화 연구)

  • Ku, Jin-Hui
    • The Journal of Korean Institute for Practical Engineering Education
    • /
    • v.2 no.1
    • /
    • pp.1-7
    • /
    • 2010
  • Recently, interest in u-learning to pursue effective learning by using ubiquitous environment in teaching and learning activities. In u-learning environment, learners should be able to push necessary information at the right time and the right place. Also calm technology oriented to, and this means that it can recognize learners' terminal information and to provide adaptive interface. In u-learning environment, main learning terminals would be mobile terminals which support mobility. However, learning in the existing PC environment should not be excluded. Thus, by providing adaptive interface according to various learners' terminal in LMS for u-learning, learners are able to learn through consistent and natural learning interface with any computer or any network at any place and at any time. The purpose of this study is to propose the interface adaptation based on terminal information focusing on the layout transformation process in the development environment.

  • PDF

The effect of smart learning based class on students with low academic achievement level: focusing on 3D application and AR of smart application (스마트러닝기반의 수업이 학업성취수준이 낮은 학생들에게 미치는 효과성 분석: 스마트앱의 3D와 AR 활용을 중심으로)

  • Hong, Ye-Yoon;Im, Yeon-Wook
    • Journal of Digital Convergence
    • /
    • v.19 no.1
    • /
    • pp.1-10
    • /
    • 2021
  • The purpose of the study is to investigate the impact and analyze the effect of smart learning based class to on the students with low academic achievement level. The study performed in G University in 2018 among students taking calculus II class. It includes 16 students with low academic achievement level, whose grades were under C in the previous calculus I class. They belonged to special class consisted of very low academic achievement level and had to pass calculus II. 3D and AR were actively used in the class. The result shows that they got visual understanding of space, which revealed through analyzing SNS, mid-term and final examination, lecture evaluation. Also, smart learning based mathematics class utilizing smartphone's application elevated academic achievement level and influenced positively on the interest and attitude toward mathematics regardless of previous academic achievement level.

Machine Learning Based APT Detection Techniques for Industrial Internet of Things (산업용 사물인터넷을 위한 머신러닝 기반 APT 탐지 기법)

  • Joo, Soyoung;Kim, So-Yeon;Kim, So-Hui;Lee, Il-Gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.449-451
    • /
    • 2021
  • Cyber-attacks targeting endpoints have developed sophisticatedly into targeted and intelligent attacks, Advanced Persistent Threat (APT) targeting the Industrial Internet of Things (IIoT) has increased accordingly. Machine learning-based Endpoint Detection and Response (EDR) solutions combine and complement rule-based conventional security tools to effectively defend against APT attacks are gaining attention. However, universal EDR solutions have a high false positive rate, and needs high-level analysts to monitor and analyze a tremendous amount of alerts. Therefore, the process of optimizing machine learning-based EDR solutions that consider the characteristics and vulnerabilities of IIoT environment is essential. In this study, we analyze the flow and impact of IIoT targeted APT cases and compare the method of machine learning-based APT detection EDR solutions.

  • PDF

Deep Learning based User Anomaly Detection Performance Evaluation to prevent Ransomware (랜섬웨어 방지를 위한 딥러닝 기반의 사용자 비정상 행위 탐지 성능 평가)

  • Lee, Ye-Seul;Choi, Hyun-Jae;Shin, Dong-Myung;Lee, Jung-Jae
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.2
    • /
    • pp.43-50
    • /
    • 2019
  • With the development of IT technology, computer-related crimes are rapidly increasing, and in recent years, the damage to ransomware infections is increasing rapidly at home and abroad. Conventional security solutions are not sufficient to prevent ransomware infections, and to prevent threats such as malware and ransomware that are evolving, a combination of deep learning technologies is needed to detect abnormal behavior and abnormal symptoms. In this paper, a method is proposed to detect user abnormal behavior using CNN-LSTM model and various deep learning models. Among the proposed models, CNN-LSTM model detects user abnormal behavior with 99% accuracy.

The Quality Evaluation of the Biology Contents of Cyber Home Learning System for the 7th Grade Students (중학교 1학년 생물영역의 사이버가정학습 콘텐츠 품질 평가)

  • Jeong, Yun-Young;Jeong, Jin-Su;Kim, Sang-Ho
    • Journal of Science Education
    • /
    • v.33 no.1
    • /
    • pp.87-99
    • /
    • 2009
  • The purpose of this study was to evaluate the quality of biology contents of cyber home learning systems which provided by 16 metropolitan and provincial offices of education. The contents were evaluated by the 9 categories: needs assessment, instruction design, learning contents, teaching & learning strategy, interaction, supporting system, evaluation, ethicality and copy right. The result showed that the contents have advantage in detailed learning goal, useful learning environment, learning activities by level, and various learning parts material, but lack in evaluation method tool for personal learning by level and the latest learning material. Based on this results, it is expected that the barrier of the efficient learning contents should be searched for the complement, as well as the development high-quality educational contents and the management of cyber home learning system.

  • PDF

Machine-Learning Anti-Virus Program Based on TensorFlow (텐서플로우 기반의 기계학습 보안 프로그램)

  • Yoon, Seong-kwon;Park, Tae-yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.441-444
    • /
    • 2016
  • Peace on the Korean Peninsula is threatened by physical aggressions and cyber terrors such as nuclear tests, missile launchings, senior government officials' smart phone hackings and DDos attacks to banking systems. Cyber attacks such as vulnerability for the hackings, malware distributions are generally defended by passive defense through the detecting signs of first invasion and attack, data analysis, adding library and updating vaccine programs. In this paper the concept of security program based on Google TensorFlow machine learning ability to perform adding libraries and solving security vulnerabilities by itself is researched and proposed.

  • PDF

A Comparative Study of Actuality of Elementary and Middle School Teachers' Perception on Cyber Home Learning System (사이버 가정학습체제에 대한 초중등 교사의 인식실태 비교연구)

  • Jung, Ju-Young;Kim, Hyang-Sook
    • Journal of The Korean Association of Information Education
    • /
    • v.11 no.3
    • /
    • pp.339-347
    • /
    • 2007
  • Along with developments of information and communication technologies, internet has spread not only all over the society, but also our everyday life deeply. Recently, requirements for e-learning using internet in the educational aspect have a great influence on the changes of school educations. Cyber Home Learning System, in particular, has been implemented throughout the nation for the purpose of reducing private expenditure for education and promoting substantial improvements in quality of public education. However, there have been exposed many problems with respect to quality of operations and managements of the system comparing to its quantitative growth, and so, at this point in time, researcher conducted analysis of actuality of perceptions of both elementary and middle school teachers with a focus on the case of S System in K province. To test this, total 278 participants were sampled from the elementary schools (139 teachers) and the middle schools (139 teachers) located in K province and were asked to complete a survey and the results therefrom were analyzed accordingly. Results from the analyses revealed that elementary school teachers responded more positively than other respondents in the most areas, including supply of a variety of learning contents of S System, quality of contents, and providing for helps insomuch as to complement school works, etcetera. In addition, researcher has found out that, to make the system become all the more efficient, it shall be required to establish a strategy in order to induce students' interest in the system, as well as to construct infrastructure for facilitating the use of computer. And that there are also needs for continuous supports from both the school and the education authority concerned, and for method of flexible operation of curriculum.

  • PDF