• Title/Summary/Keyword: 접속형태

Search Result 488, Processing Time 0.022 seconds

On the Redesign Effect of Cyber Lecture reflected the Requirement of the Students (학습자 요구를 반영한 사이버 강좌의 재설계 효과)

  • Jeong Sang-Mok;Hwang Sung-Wuk;Song Ki-Sang
    • Journal of the Korea Computer Industry Society
    • /
    • v.7 no.1
    • /
    • pp.23-32
    • /
    • 2006
  • The cyber lecture, which uses the computer system and its networking, has the benefit of learning anytime and anywhere and quick feedback with positive learning system. Now the research on the cyber lecture is actively performed. But most of researches focus on the problems of operational status of cyber colleges, example study and activation study. So there aren't many researches that reflect the requirements of students who are the main force of the learning system. This research asked 145 students from 20 colleges about the cyber lectures and analyzed their requirements. Then it applied then to the cyber lectures and studied its effect. <중략> It removed the factors of these complaints and established a way of improvement to apply it to a new cyber lecture. Then it found the total average for the learning achievement improved by 17.3. It showed high learning achievement. The result of the achievement shows that the teaching design is necessary with the viewpoint of the students as well as the viewpoint of the teachers.

  • PDF

Design and Implementation of National Supercomputing Service Framework (국가 슈퍼컴퓨팅 서비스 프레임워크의 설계 및 구현)

  • Yu, Jung-Lok;Byun, Hee-Jung;Kim, Han-Gi
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.12
    • /
    • pp.663-674
    • /
    • 2016
  • Traditional supercomputing services suffer from limited accessibility and low utilization in that users(researchers) may perform computational executions only using terminal-based command line interfaces. To address this problem, in this paper, we provide the design and implementation details of National supercomputing service framework. The proposed framework supports all the fundamental primitive functions such as user management/authentication, heterogeneous computing resource management, HPC (High Performance Computing) job management, etc. so that it enables various 3rd-party applications to be newly built on top of the proposed framework. Our framework also provides Web-based RESTful OpenAPIs and the abstraction interfaces of job schedulers (as well as bundle scheduler plug-ins, for example, LoadLeveler, Open Grid Scheduler, TORQUE) in order to easily integrate the broad spectrum of heterogeneous computing clusters. To show and validate the effectiveness of the proposed framework, we describe the best practice scenario of high energy physics Lattice-QCD as an example application.

An Email Vaccine Cloud System for Detecting Malcode-Bearing Documents (악성코드 은닉 문서파일 탐지를 위한 이메일 백신 클라우드 시스템)

  • Park, Choon-Sik
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.5
    • /
    • pp.754-762
    • /
    • 2010
  • Nowadays, email-based targeted attacks using malcode-bearing documents have been steadily increased. To improve the success rate of the attack and avoid anti-viruses, attackers mainly employ zero-day exploits and relevant social engineering techniques. In this paper, we propose an architecture of the email vaccine cloud system to prevent targeted attacks using malcode-bearing documents. The system extracts attached document files from email messages, performs behavior analysis as well as signature-based detection in the virtual machine environment, and completely removes malicious documents from the messages. In the process of behavior analysis, the documents are regarded as malicious ones in cases of creating executable files, launching new processes, accessing critical registry entries, connecting to the Internet. The email vaccine cloud system will help prevent various cyber terrors such as information leakages by preventing email based targeted attacks.

Legged Robot Trajectory Generation using Evolved Fuzzy Machine for IoT Environments (IoT 환경을 위한 진화된 퍼지머신을 이용한 로봇의 궤적생성)

  • Kim, Dong Won
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.3
    • /
    • pp.59-65
    • /
    • 2020
  • The Internet of Things (IoT) era, in which all items used in daily life are equipped with a network connection function, and they are closely linked to increase the convenience of life and work, has opened wide. Robots also need to develop according to the IoT environment. A use of new type of evolved fuzzy machine (EFM) for generating legged robot trajectory in IoT enviornmentms is discussed in this paper. Fuzzy system has been widely used for describing nonlinear systems. In fuzzy system, determination of antecedent and consequent structures of fuzzy model has been one of the most important problems. EFM is described which carries out evolving antecedent and consequent structure of fuzzy system for legged robot. To generate the robot trajectory, parameters of each structure in the fuzzy system are tuned automatically by the EFM. The results demonstrate the performance of the proposed approach for the legged robot.

A Study on the Performance Analysis of Statistical Multiplexer by the Queueing Model (Queueing 모델에 의한 통계적 다중화기의 성능 분석에 관한 연구)

  • 이주식;김태준;김근배;이종현;임해진;박병철
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.1
    • /
    • pp.1-10
    • /
    • 1992
  • In the already presented paper, the performance analysis of SMUX was need a lot of time bacause of recussive method, So this paper proposed the new mathematical method for the SMUX's performance. And it is constructed and analyzed the queueing model for SMUX based on the Go-back N retransmission ARQ model. It is assumed that it has the infinite buffer and a single server. It is analzied the parameters that have influence on the byffer and a single server. It is analzied the parameters that have influence on the buffer behaviour of statistical multiplexer overflow probabilities. maximum buffer size. mean wating time and mean buffer size, and these relationship are represented the graphs and datas which provided a guide to the buffer design problem. As these results. it is efficient when the SMUX is apphed that the traffic density is below 0.5 and transmission error probabilities is below 10­$^3$. So this paper can be applied to the basic and theoretical background prior to the implementation of SMUX.

  • PDF

An Efficient Dynamic Bandwidth Allocation Algorithm for VoDSL Services (VoDSL 서비스를 위한 효율적인 동적 대역폭 할당 알고리즘)

  • Kim, Hoon;Park, Jong-Dae;Nam, Sang-Sig;Park, Kwang-Chae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.1C
    • /
    • pp.48-58
    • /
    • 2002
  • As internet traffic increases, the problem that it should be efficiently accepted in to the existing voice network in the pending problem importantly to the existing communication corporations. The feature of next generation exchange network is made up of the form of integration network that connect data traffic(internet service. Etc) with the existing voice network and it can be showed with very diverse aspects according to the constitution time of network or the characteristics of business. The progress strategy that develop the existing circuit based communication network into packet-based communication network can be divided into two in a large scale according to the application position These are VoDSL application method(Technology that packetize access network) and softswitch technology application method(after packetizing relay network, packetizing that into the access network). In this paper, we will deduce the desirable technology that can construct packet-based next generation exchange networks in the structure of the existing communication network environment. We will perform the research on a device to offer the necessary core technique VoSDL service with realistic resolutions primarily.

A Study on the Optimal Design of Planar Flyback Transformers suitable for Small-size and Low-profile (소형화 및 슬림형에 적합한 평면 플라이백 변압기의 최적 설계에 관한 연구)

  • Na, Hae-Joong;Kim, Jong-Hae
    • Journal of IKEEE
    • /
    • v.24 no.3
    • /
    • pp.828-837
    • /
    • 2020
  • This paper presents the optimal design of planar flyback transformer suitable for small-size and low-profile of AC to DC adapter for 10W tablet. This paper also proposes the injection winding transformer of Hybrid and Drum types capable of the winding method of automatic type and the reduction of transformer size and leakage inductance(Lk) compared to the conventional mass-production flyback transformer with the winding method of manual type. In particular, the injection winding transformer of Drum type proposed in this paper is constructed in a horizontal laying of its transformer to solve the connection problem of copper plate injection winding on the secondary side of the one of Hybrid type. The primary and secondary windings of the injection winding transformer of Hybrid and Drum types used the conventional winding and the copper plate injection winding, respectively. For the injection winding transformer of Hybrid and Drum types proposed in this paper, the optimal design of planar flyback transformer suitable for small-size and low-profile was carried out using Maxwell 2D and 3D tool.

A Study on EAP-AKA Authentication Architecture for WiBro Wireless Network (EAP-AKA를 적용한 WiBro 무선 네트워크의 인증구조 연구)

  • Lim Sun-Hee;Yi Ok-Yeon;Jun Sung-Ik;Han Jin-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.4C
    • /
    • pp.441-450
    • /
    • 2006
  • WiBro(Portable Internet Service) is service being capable to provide a high data rate wireless internet access with Personal Subscriber Station under the stationary or mobile environment, anytime and any where. It will fill the gap between very high data rate wireless local area networks and very high mobility cellular systems. The security is an important point of WiBro providing high data and mobile wireless services. This paper proposes user authentication mechanism of WiBro wireless networks applied EAP-AKA authentication protocol. As a result of Wireless authentication based on EAP-AKA, this mechanism is capable to be used in WiBro-WLAN-3GPP interworking scenario as well as the WiBro authentication mechanism.

A Study on the Push-based Distance Education System and Leveling Estimation Algorithm (Push 기반 원격교육 시스템과 수준별 문항평가 알고리즘에 관한 연구)

  • 김원영;김치수;김진수
    • Journal of Internet Computing and Services
    • /
    • v.2 no.3
    • /
    • pp.19-25
    • /
    • 2001
  • An educational system using computers was first conceptualized by Dr. Donald Bitzer in the University of Illinois in the late 1950s. Since the PLATO system was developed in 1961, multilateral research were made for the last 30 years. Especially, the development of Internet and Information Technology has contributed to the advancement of the distance education system. This system has greatly changed the existing educational paradigm, As the result, new education system is being realized, This study suggests a distance education system based on ‘push’ technique, which is a means of active information transmission, In this system, the ‘push’ technique is combined with the existing distance education system. Through the combination, learning contents can be provided for learners without connecting the DB on the Internet. In addition, the process of getting new information is real-timed operation. Also, the treatment of item; and the algorithm of level-based item evaluation are devised in consideration of various levels of learners, so that evaluation of items appropriate to the levels of learners can be accomplished.

  • PDF

Channel estimation of OFDM System using Matching Pursuit method (Matching Pursuit 방식을 이용한 OFDM 시스템의 채널 추정)

  • Choi Jae Hwan;Lim Chae Hyun;Han Dong Seog;Yoon Dae Jung
    • Journal of Broadcast Engineering
    • /
    • v.10 no.2
    • /
    • pp.166-173
    • /
    • 2005
  • In this paper, we propose a mobile channel estimation algorithm using matching pursuit algorithm for orthogonal frequency division multiplexing (OFDM) systems. Least square (LS) algorithm, which is used as a conventional channel estimation algorithm for OFDM systems, has error probability of channel estimation affected by effects of noise. By estimating the channel of sparse type, the proposed algorithm reduces effects of noise during time intervals that multi-path signal doesn't exist. The proposed algorithm estimates a mobile receivingchannel using pilot information transmitted consequently. We compare performance of the proposed algorithm with the LS algorithm by measuring symbol error rate with 64QAM under a mobile multi-path fading channel model.