• Title/Summary/Keyword: 사이버 러닝

Search Result 178, Processing Time 0.021 seconds

e-Learning과 ASP를 활용한 기업정보시스템 학습모델 구현방안 및 사례연구

  • 이학주;이연우;오병기
    • Proceedings of the CALSEC Conference
    • /
    • 2003.09a
    • /
    • pp.336-341
    • /
    • 2003
  • 1.연구배경 사회환경이 변화하고 정보통신기술 인프라가 성장함에 따라, 전통적 교수학습 방법에서 e-러닝, 사이버, 교육, 온라인 교육 등으로 불리는 디지털 기반 교육으로 패러다임의 전환이 이루어지고 있으며, 우리나라의 경우 초고속 인터넷망이 잘 구축되어 교육훈련 목적의 콘텐츠 및 학습과정을 효과적으로 전달할 토대를 갖추고 있다.(중략)

  • PDF

Development of a Blended Learning Model using Differentiated Learning Pattern (수준별 학습 패턴을 적용한 블랜디드 러닝 모형의 개발)

  • Kim, Yong-Beom
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.3
    • /
    • pp.463-471
    • /
    • 2010
  • The purpose of this study is to articulate learning model based on achievement level in blended learning environment. In order to investigate the variables and mechanisms in the blended learning environment, we started by attempt to develop two questionnaires using the components of web-based instruction and self-regulated learning. And its results were implemented to represent the topology and directed merging path within components. 154 students at a high school were required to take each web course respectively for two weeks. And questionnaires data, achievement levels data were collected and analyzed. Various statistical analysis methods such as correlation analysis, classical multidimensional scaling, multiple regression analysis, were applied to the data. As an result, the topology and directed path within factors of blended learning process were derived and revised as a final model.

Teaching Plans to Resolve Internet Addiction using e-Learning Project-Based Learning (이러닝 프로젝트 학습을 통한 인터넷 중독 해소 지도 방안)

  • Kim, Hyun-Bae;Yu, Seon-Bong
    • 한국정보교육학회:학술대회논문집
    • /
    • 2010.08a
    • /
    • pp.111-118
    • /
    • 2010
  • There are various studies about Internet addiction in psychological or social point of view. In this study, teaching plans are introduced using e-learning project-based learning for elementary school students. These teaching plans are applied to the Cyber home study system.

  • PDF

A Study on the Influencing Factors of Learners' Satisfaction in Cyber Home Study System 2.0 (사이버가정학습 2.0에서 학습자 만족도에 대한 영향 요인 분석)

  • Park, JongHwa;Suh, Soonshik
    • Journal of The Korean Association of Information Education
    • /
    • v.16 no.4
    • /
    • pp.429-438
    • /
    • 2012
  • This study was conducted to identify the factors which influenced the learners' satisfaction in Cyber Home Learning System 2.0 and to propose the suggestions for design and implementation. 870 elementary school students and 153 middle school students were surveyed and factors which influenced learners' perceptions and satisfactions were analyzed. According to the results, four common factors on the perceptions about Cyber Home Learning System 2.0 were excluded according to the levels of schools. Based on the factor analysis results, multiple regression analysis was conducted to find out the influences on Cyber Home Learning System 2.0, for elementary school students, instruction specialty, usefulness of the contents, accessibility of system, and learning mood affected satisfactions significantly in the order. For middle school students, usefulness of the contents and the learning mood affected satisfactions significantly in the order.

  • PDF

Test development and verifying the validity and reliability for measuring a effectiveness of e-learning course in cyber university (사이버대학에서의 강좌평가를 위한 측정도구 개발 및 양호도 검증)

  • Joo, Young-Ju;Kim, Na-Young;Cho, Hyun-Kook
    • Journal of The Korean Association of Information Education
    • /
    • v.12 no.1
    • /
    • pp.109-120
    • /
    • 2008
  • The purpose of this study is to develop a test and verifying the validity and reliability for measuring a effectiveness of e-earning course in cyber university. Twenty-five items were developed based on literature review and were examined by experts in the field. For item analysis, EFA(Exploratory Factor Analysis) was performed with 768 students in first study. In order to validate the test, CFA(Confirmatory Factor Analysis) was conducted with 791 students in second study. The result of the study yielded five factors with 25 items: 1) contents and design, 2) instructor, 3) system, 4) evaluation, and 5) overall course satisfaction. And this research reports the reliability and validity of new test.

  • PDF

A Teaching Method about e-PBL Based Information Communication Education using Cyber Home Study System (사이버가정학습을 활용한 e-PBL 기반 정보통신교육 지도 방안)

  • Kim, Hyun-Bae;Kang, Jeong-Woon
    • Journal of The Korean Association of Information Education
    • /
    • v.13 no.3
    • /
    • pp.291-302
    • /
    • 2009
  • The Educational situation of studying the effect of maximizing through Student's Self-directed demand varying educational environment on a Learner-Centered understanding of existing ICT deficiencies. But schools recognize computer skill learning as all of computer education contents. This study is established in an 'e-PBL environment' in use with 'Ulsan Cyber Home Study' on a learner-centered and design teaching method for an effective computer course. This study presents effective learner-centered teaching methods. It does this using the web environment 'Ulsan Cyber Home Study' and reconstructing each unit of the ICT textbook 'Our Living and Information'.

  • PDF

Web Attack Classification via WAF Log Analysis: AutoML, CNN, RNN, ALBERT (웹 방화벽 로그 분석을 통한 공격 분류: AutoML, CNN, RNN, ALBERT)

  • Youngbok Jo;Jaewoo Park;Mee Lan Han
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.587-596
    • /
    • 2024
  • Cyber Attack and Cyber Threat are getting confused and evolved. Therefore, using AI(Artificial Intelligence), which is the most important technology in Fourth Industry Revolution, to build a Cyber Threat Detection System is getting important. Especially, Government's SOC(Security Operation Center) is highly interested in using AI to build SOAR(Security Orchestration, Automation and Response) Solution to predict and build CTI(Cyber Threat Intelligence). In this thesis, We introduce the Cyber Threat Detection System by analyzing Network Traffic and Web Application Firewall(WAF) Log data. Additionally, we apply the well-known TF-IDF(Term Frequency-Inverse Document Frequency) method and AutoML technology to classify Web traffic attack type.

Study on the Compared between u-Learning and e-Learning based SCORM (SCORM 기반 u-Learning과 e-Learning 비교연구)

  • Choi, Sung;Ryu, Gab-Sang
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2006.06a
    • /
    • pp.495-505
    • /
    • 2006
  • IT기술기반 교육시스템은 인터넷 등장 이전에도 가능성을 인정받아 지속적으로 개발되어 온 분야이며, 교육공학과의 연계로 지식 전날의 이론체계로 각광을 받고 있다. 사이버교유도 인터넷이전부터 다양한 통신방법을 응용하여 개발되었고, 최근 인터넷을 통하여 사이버 교육시스템은 완벽한 기술기반을 갖추게 되였다. 그러나 IT기술의 급격한 변화로 사이버교육시스템은 계속하여 신기술 변화에 적용해야만 한다. 현재 정보통신기술의 변화는 방송 통신망의 융합, 브로드 밴드 네트워킹, 스마트 디바이스의 다양화, 멀티미디어 기술의 고도화로 요약된다. 이 기술의 종합한 작용으로 유비쿼터스 사회의 기반으로 진화되고 있다. 그래서 e-Learning 분야도 기존 인터넷기반 시스템과는 달리 차세대 온라인교육시스템으로 친화되고 있다. IT융합가술 기반의 온라인 교육시스템은 각종 국제표준단체에서 표준안이 제시되고 있다. e-Learning 시스템이란 선기술 기반을 반영한 표준기술을 사용하는 온라인교육시스템을 포괄하는 개념이다. 본 연구에서는 e-Learning 시스템과 유비쿼터스 기술을 반영한 e-Learning을 비교하였다. 그리고 u-Learning 시스템의 기술정립과 EOD(Education On Demand) 시스템에 대하여 연구하였다. 1. u-Learning 정의 정보산업분야를 비롯한 문화, 교육 등 모든 분야에서 유비퀴터스라는 수식어가 붙어 다니고 있다. e- Learning 교육 업계에 따르면 10년 후에는 유비쿼터스는 대중화가 될 것이며, 부가가치 규모는 100조 원에 이를 것으로 추정된다. 그래서 교육산업도 주변 환경이 아날로그 방식에서 IT 기반에 의한 디지털 환경으로 변화되고 있다. 또한 e러닝, T러닝, m러닝, u러닝 등의 용어가 생성되고 있다.키지에어컨에서 사용되고 있는 밀폐형 압축기에 대해서 그림 2에서 나타내고 있는 냉방능력 10tons(120,000Btu/h) 이하를 중심으로 상기의 최근 기술 동향을 간략하게 소개하고자 한다.질표준의 지표성분으로 간주되는 진세노사이드의 절대함량과 그 성분조성 차이에 따른 임상효과의 차별성이 있는지에 대한 검토와, 특히 최근 실험적으로 밝혀지고 있는 사포닌 성분의 장내 세균에 의한 생물전환체의 인체 실험을 통한 효과 검정이 필요하다. 나아가서는 적정 복용량의 설정과 이와 관련되는 생체내 동태 및 생체이용율(bioavilability)에 관한 정보가 거의 없으므로 이것도 금후 검토해야 할 과제로 사료된다. 인삼은 전통약물로서 오랜 역사성과 그동안의 연구결과에 의한 과학성을 가지고 있으므로 건강유지와 병의 예방 및 회복촉진을 위한 보조요법제 또는 기능성 식품으로써의 유용성이 있는 것으로 판단된다. 앞으로 인삼의 활용성 증대를 위해서는 보다 과학적인 임상평가에 의한 안전성 및 유효성 입증과 제품의 엄격한 품질관리의 필요성이 더욱 강조되어야 할 것이다.xyl radical 생성 억제 효과를 보여 주었다. 본 실험을 통하여 BHT 를 제외하고 전반적으로 세포 수준에서의 oxidative stress 에 대한 억제 효과를 확인해 볼 수 있었으며 특히 수용성 항산화제들에서 두드러진 효과를 보여 주었다. 제공하여 내수기반 확충에도 노력해야 할 것 이다.있었다., 인삼이 성장될 때 부분적인 영양상태의 불충분이나 기후 등에 따른 영향을 받을 수 있기 때문에 앞으로 이에 대한 많은 연구가 이루어져야할 것으로 판단된다.태에도 불구하고 [-wh]의미의 겹의문사는 병렬적 관계의 합성어가 아니라 내부구조를 지니지 않은 단순한 단어(minimal $X^{0}$<

  • PDF

A Study on Information Literacy Evaluation Standard for Cyber Teacher (사이버 가정교사의 정보 활용능력 평가기준에 관한 연구)

  • Kim, Chul;Kim, Jeong-Rang;Park, Sun-Ju;Ma, Dai-Sung;Cheong, Eun-Ah
    • Journal of The Korean Association of Information Education
    • /
    • v.13 no.3
    • /
    • pp.383-391
    • /
    • 2009
  • The goal of cyber teaching is to reduce the cost of private lessons, dissipate the educational disparity amongst regions, make classes apt to the given level of every group of students, make up for systematic defects of the public education, and ultimately strengthen its role. This study intends to analyze the capabilities of cyber teachers and clarify their qualifications, as the whole new e-Learning system is about to take root. In this study, the activities of cyber teachers are analyzed and some standards of applicability of cyber teachers, or the so-called ISSCT, are presented. Firstly, the activities are divided into teaching, counselling, process management, development of professionality. Based upon these four activities, nine tasks have been formed and the structure of 22 sub-tasks has been completed. This is the way the standards of applicability of cyber teachers are established in consideration with their activities. Secondly, the standards of information capability of cyber teachers have 53 elements in total, and the aforementioned ISSCT are presented in relation to the ISST, based upon the standards of information capability of cyber teachers.

  • PDF

Development of Integrated Security Control Service Model based on Artificial Intelligence Technology (인공지능 기술기반의 통합보안관제 서비스모델 개발방안)

  • Oh, Young-Tack;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.1
    • /
    • pp.108-116
    • /
    • 2019
  • In this paper, we propose a method to apply artificial intelligence technology efficiently to integrated security control technology. In other words, by applying machine learning learning to artificial intelligence based on big data collected in integrated security control system, cyber attacks are detected and appropriately responded. As technology develops, many large capacity Is limited to analyzing individual logs. The analysis method should also be applied to the integrated security control more quickly because it needs to correlate the logs of various heterogeneous security devices rather than one log. We have newly proposed an integrated security service model based on artificial intelligence, which analyzes and responds to these behaviors gradually evolves and matures through effective learning methods. We sought a solution to the key problems expected in the proposed model. And we developed a learning method based on normal behavior based learning model to strengthen the response ability against unidentified abnormal behavior threat. In addition, future research directions for security management that can efficiently support analysis and correspondence of security personnel through proposed security service model are suggested.