• Title/Summary/Keyword: 테스트 도구

Search Result 394, Processing Time 0.024 seconds

Implementation of Smart Learning Model for Improving Digital Communication Competencies of Middle Aged (중장년층의 디지털 커뮤니케이션 역량 강화를 위한 스마트러닝 모델 적용)

  • Lee, Jeong Eun;Jin, Sun MI
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.4
    • /
    • pp.522-533
    • /
    • 2014
  • The capability of the digital communication would need to be strengthened for leveraging collaborative knowledge building and problem solving skills of the middle aged people. It was developed and implemented a smart learning model by utilizing the formative intervention based on the logic of change laboratory to target learners of 'K organization', As a results, smart learning model was composited several activities and supporting systems such as learning instructions of Smart Pad, communication games and SNS, using self-diagnosis and making posters and role-playing video by the internet applications. This research is significant that it finds efficient method to fit design of smart learning and the needs of target learners by using them as testbed which is mixed with different background and digital communication experiences.

A Study on Design of a Serious Game of 'Law and Order' for Both Parents and Children (부모와 자녀가 함께 하는 법질서 기능성 게임설계 연구)

  • Kim, Byoung-Wook;Kim, KyungSik;Kang, JoonMo;Park, HyungJoon
    • Journal of Korea Game Society
    • /
    • v.15 no.6
    • /
    • pp.29-40
    • /
    • 2015
  • Education of 'Law and Order' is necessary in our recent society. However it is so difficult subject for students in the elementary schools to be learned efficiently. In this research, we have studied how to utilize the game as an educational contents with good effects of the game. And we have designed a game in which children could experience various situations where they had to make decisions based on proper law and order. Parents were also encouraged to participate and play along the game with role balances as mentors to their children. The effectiveness was tested with experience of the developed prototype game and questions. Through the study we expect and hope to use games as effective learning tools for children in the future.

Evolution of Behavioral Logic of Artificial Individuals Using Cell-level Evolution Framework (셀 수준의 진화 프레임워크를 통한 인공개체의 행동로직 진화)

  • Jung, Bo-Sun;Jung, Sung Hoon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.25 no.1
    • /
    • pp.22-28
    • /
    • 2015
  • In this paper, we studied the evolution of behavioral logic of artificial individuals using cell-level evolution framework. We first implemented cell-level evolution framework and then investigated the evolution of behavioral logic that artificial individuals ate foods on the framework. A logic frame for behavioral decisions of artificial individuals was devised and applied to the framework. From extensive tests, we found that most artificial individuals could evolve the behavioral logic that they could eat food in a short generation. It was also confirmed that most behavioral logics showed nearly same behaviors of artificial individuals in most tests. Our method has the differences from existing algorithms using evolutionary algorithms and evolvable hardwares in that it is a basically different approach. These results showed that our framework could be a good tool for investigating the evolution of artificial individuals in a cell-level.

PowerShell-based Malware Detection Method Using Command Execution Monitoring and Deep Learning (명령 실행 모니터링과 딥 러닝을 이용한 파워셸 기반 악성코드 탐지 방법)

  • Lee, Seung-Hyeon;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1197-1207
    • /
    • 2018
  • PowerShell is command line shell and scripting language, built on the .NET framework, and it has several advantages as an attack tool, including built-in support for Windows, easy code concealment and persistence, and various pen-test frameworks. Accordingly, malwares using PowerShell are increasing rapidly, however, there is a limit to cope with the conventional malware detection technique. In this paper, we propose an improved monitoring method to observe commands executed in the PowerShell and a deep learning based malware classification model that extract features from commands using Convolutional Neural Network(CNN) and send them to Recurrent Neural Network(RNN) according to the order of execution. As a result of testing the proposed model with 5-fold cross validation using 1,916 PowerShell-based malwares collected at malware sharing site and 38,148 benign scripts disclosed by an obfuscation detection study, it shows that the model effectively detects malwares with about 97% True Positive Rate(TPR) and 1% False Positive Rate(FPR).

Research and Development of Document Recognition System for Utilizing Image Data (이미지데이터 활용을 위한 문서인식시스템 연구 및 개발)

  • Kwag, Hee-Kue
    • The KIPS Transactions:PartB
    • /
    • v.17B no.2
    • /
    • pp.125-138
    • /
    • 2010
  • The purpose of this research is to enhance document recognition system which is essential for developing full-text retrieval system of the document image data stored in the digital library of a public institution. To achieve this purpose, the main tasks of this research are: 1) analyzing the document image data and then developing its image preprocessing technology and document structure analysis one, 2) building its specialized knowledge base consisting of document layout and property, character model and word dictionary, respectively. In addition, developing the management tool of this knowledge base, the document recognition system is able to handle the various types of the document image data. Currently, we developed the prototype system of document recognition which is combined with the specialized knowledge base and the library of document structure analysis, respectively, adapted for the document image data housed in National Archives of Korea. With the results of this research, we plan to build up the test-bed and estimate the performance of document recognition system to maximize the utilization of full-text retrieval system.

Revitalization for a Cyber Home Learning System -Focused on Jeju e-study 2.0- (사이버가정학습 활성화 방안 -제주 e-study 2.0을 중심으로-)

  • Kim, Eun-Gil;Kang, Nam-Cheol;Kim, Jong-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.8
    • /
    • pp.451-460
    • /
    • 2010
  • The purpose of this paper is to present the effective operation method of cyber home learning system 2.0. Cyber home learning system 2.0 which plays an important role to produce and share data of internet users establishing user-centered internet environment is recently introduced as web 2.0 is beginning to appear. This research is based on the case of the operation on cyber home learning system, research literature of web 2.0 as well as expert consulting and performance test. After doing this research, cyber home learning system 2.0 can bring enormous educational effect when it has online education using web-based discussion tool and long distance consulting linking with off line school education. Redundant system configuration, the distributed processing also may be provided by the service was smooth. Moreover, it demands monitoring team consisting of student, parents and teacher in order to provide developmental service.

Continuous Integration for Efficient IoT-Cloud Service Realization by Employing Application Performance Monitoring (효율적인 IoT-Cloud 서비스 실증을 위한 응용 성능 모니터링을 활용한 지속적인 통합)

  • Bae, Jeongju;Kim, Chorwon;Kim, JongWon
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.2
    • /
    • pp.85-96
    • /
    • 2017
  • IoT-Cloud service, integration of Internet of Things (IoT) and Cloud, is becoming a critical model for realizing creative and futuristic application services. Since IoT machines have little computing capacity, it is effective to attaching public Cloud resources for realizing IoT-Cloud service. Furthermore, utilizing containers and adopting a microservice architecture for developing IoT-Cloud service are useful for effective realization. The quality of microservice based IoT-Cloud service is affected by service function chaining which inter-connects each functions. For example, an issue with some of the functions or a bottleneck of inter-connection can degrade the service quality. To ensure functionality of the entire service, various test procedures considering various service environments are required to improve the service continuously. Hence in this paper, we introduce experimental realization of continuous integration based on DevOps and employ application performance monitoring for Node.js based IoT-Cloud service. Then we discuss its effectiveness.

Design and Implementation of A Weakness Analyzer for Mobile Applications (모바일 애플리케이션을 위한 취약점 분석기의 설계 및 구현)

  • Mun, Il-Yong;Oh, Se-Man
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.10
    • /
    • pp.1335-1347
    • /
    • 2011
  • The dissemination and use of mobile applications have been rapidly expanding these days. And in such a situation, the security of mobile applications has emerged as a new issue. Although the safety of general software such as desktop and enterprise software is systematically achieved from the development phase to the verification phase through secure coding, there have been not sufficient studies on the safety of mobile applications yet. This paper deals with deriving weakness enumeration specialized in mobile applications and implementing a tool that can automatically analyze the derived weakness. Deriving the weakness enumeration can be achieved based on CWE(Common Weakness Enumeration) and CERT(Computer Emergency Response Team) relating to the event-driven method that is generally used in developing mobile applications. The analysis tool uses the dynamic tests to check whether there are specified vulnerabilities in the source code of mobile applications. Moreover, the derived vulnerability could be used as a guidebook for programmers to develop mobile applications.

Study on Educational Utilization Methods of Big Data (빅데이터의 교육적 활용 방안 연구)

  • Lee, Youngseok;Cho, Jungwon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.12
    • /
    • pp.716-722
    • /
    • 2016
  • In the recent rapidly changing IT environment, the amount of smart digital data is growing exponentially. As a result, in many areas, utilizing big data research and development services and related technologies is becoming more popular. In SMART learning, big data is used by students, teachers, parents, etc., from a perspective of the potential for many. In this paper, we describe big data and can utilize it to identify scenarios. Big data, obtained through customized learning services that can take advantage of the scheme, is proposed. To analyze educational big data processing technology for this purpose, we designed a system for big data processing. Education services offer the measures necessary to take advantage of educational big data. These measures were implemented on a test platform that operates in a cloud-based operations section for a pilot training program that can be applied properly. Teachers try using it directly, and in the interest of business and education, a survey was conducted based on enjoyment, the tools, and users' feelings (e.g., tense, worried, confident). We analyzed the results to lay the groundwork for educational use of big data.

The Authentication Model which Utilized Tokenless OTP (Tokenless OTP를 활용한 인증 모델)

  • Kim, Ki-Hwan;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.205-214
    • /
    • 2006
  • Is need Remote Access through internet for business of Ubiquitous Computing age, and apply OTP for confidentiality about inputed ID and Password, network security of integrity. Current OTP must be possessing hardware or Token, and there is limitation in security. Install a Snooping tool to OTP network in this treatise, and because using Cain, enforce ARP Cache Poisoning attack and confirm limitation by Snooping about user password. Wish to propose new system that can apply Tokenless OTP by new security way, and secure confidentiality and integrity. Do test for access control inflecting Tokenless OTP at Remote Access from outside. and could worm and do interface control with certification system in hundred. Even if encounter hacking at certification process, thing that connection is impossible without pin number that only user knows confirmed. Because becoming defense about outward flow and misuse and hacking of password when apply this result Tokenless OTP, solidify security, and evaluated by security system that heighten safety.

  • PDF