• 제목/요약/키워드: Computer Applications

검색결과 5,296건 처리시간 0.032초

IPTV(Internet Protocol Television)의 교육적 활용 방안 연구 (A Study on the Educational Applications of IPTV)

  • 백선련;이태욱
    • 정보교육학회논문지
    • /
    • 제12권1호
    • /
    • pp.65-75
    • /
    • 2008
  • 방송통신융합 환경의 도래로 IPTV가 상용화되고 있다. IPTV는 초고속 인터넷을 통해 정보 서비스, 동영상 콘텐츠 및 방송 등을 TV로 제공하는 서비스를 지칭한다. 본 연구에서는 현존하는 교육의 한계를 극복하기 위해 IPTV를 교육적으로 활용하는 방안을 제안하고자 하였다. 이를 위해 IPTV의 개념 및 특성을 알아보고 IPTV에서 제공되는 콘텐츠를 분석하여 교육적 시사점을 도출하였다. 또한 IPTV의 교육적 활용 시나리오를 제시하고 그것의 교육적 활용 가능성에 대한 고찰과 IPTV를 활용한 교수-학습 유형 및 각 교과별 활용 방안을 제안하였다. 마지막으로, IPTV의 교육 현장 도입을 위해 고려되어야할 사항을 법적 기술적 문제와 교육적 문제로 나누어 살펴보았다.

  • PDF

Balanced MVC Architecture for High Efficiency Mobile Applications

  • La, Hyun-Jung;Kim, Soo-Dong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권5호
    • /
    • pp.1421-1444
    • /
    • 2012
  • Mobile devices such as Android devices are emerging as a convenient client computing device with mobility and context-sensing capability. However, the computing power and hardware resource of the devices are limited due to their small form-factor. Consequently, large-scaled applications could not be deployed on these devices. Nonetheless, if the large-scaled applications are deployed and executed on the devices, high performance of the applications cannot be guaranteed. To remedy the limitation in terms of performance, it is inevitable to let some heavy-weight functionality executed on the server side and let a client application invoke the functionality in the server. To realize this kind of mobile applications, we adopt well-defined architecture design principles; being thin-client, being layered with Model-View-Controller (MVC), and being balanced between client side and server side. By adopting the principles, we propose a unique, ideal and practical architecture for mobile applications, called balanced MVC architecture. By considering the principles, key design considerations of realizing balanced MVC architecture lie in functionality partitioning. Hence, we define key criteria of determining the degree of performance. And, we define a method to design a balanced MVC architecture which embodies functionality partitioning for high performance, and a simulation-based evaluation method of balanced MVC architectures.

Security Framework for RFID-based Applications in Smart Home Environment

  • Konidala, Divyan M.;Kim, Dae-Young;Yeun, Chan-Yeob;Lee, Byoung-Cheon
    • Journal of Information Processing Systems
    • /
    • 제7권1호
    • /
    • pp.111-120
    • /
    • 2011
  • The concept of Smart-Homes is becoming more and more popular. It is anticipated that Radio Frequency IDentification (RFID) technology will play a major role in such environments. We can find many previously proposed schemes that focus solely on: authentication between the RFID tags and readers, and user privacy protection from malicious readers. There has also been much talk of a very popular RFID application: a refrigerator/bookshelf that can scan and list out the details of its items on its display screen. Realizing such an application is not as straight forward as it seems to be, especially in securely deploying such RFID-based applications in a smart home environment. Therefore this paper describes some of the RFID-based applications that are applicable to smart home environments. We then identify their related privacy and security threats and security requirements and also propose a secure approach, where RFID-tagged consumer items, RFID-reader enabled appliances (e.g., refrigerators), and RFID-based applications would securely interact among one another. At the moment our approach is just a conceptual idea, but it sheds light on very important security issues related to RFID-based applications that are beneficial for consumers.

Intelligent Android Malware Detection Using Radial Basis Function Networks and Permission Features

  • Abdulrahman, Ammar;Hashem, Khalid;Adnan, Gaze;Ali, Waleed
    • International Journal of Computer Science & Network Security
    • /
    • 제21권6호
    • /
    • pp.286-293
    • /
    • 2021
  • Recently, the quick development rate of apps in the Android platform has led to an accelerated increment in creating malware applications by cyber attackers. Numerous Android malware detection tools have utilized conventional signature-based approaches to detect malware apps. However, these conventional strategies can't identify the latest apps on whether applications are malware or not. Many new malware apps are periodically discovered but not all malware Apps can be accurately detected. Hence, there is a need to propose intelligent approaches that are able to detect the newly developed Android malware applications. In this study, Radial Basis Function (RBF) networks are trained using known Android applications and then used to detect the latest and new Android malware applications. Initially, the optimal permission features of Android apps are selected using Information Gain Ratio (IGR). Appropriately, the features selected by IGR are utilized to train the RBF networks in order to detect effectively the new Android malware apps. The empirical results showed that RBF achieved the best detection accuracy (97.20%) among other common machine learning techniques. Furthermore, RBF accomplished the best detection results in most of the other measures.

중소기업 정보화 수준 격차 해소방안에 관한 국가 간 비교연구 (How can we narrow the digital divide among SMEs in APEC member economies?)

  • 권순동;양희동;손용엽;이성봉;서진영;조택희
    • Journal of Information Technology Applications and Management
    • /
    • 제12권2호
    • /
    • pp.79-106
    • /
    • 2005
  • This study, by adopting case study methodology, is focused on examining the present state and analyzing the cause of the digital divide, and suggesting policies for bridging the divide, specifically in view of SMEs. We have taken cases of manufacturing companies, visiting and interviewing 18 SMEs in 10 APEC member economies which show sharp difference in usage of ICT. In order to analyze the digital gap among SMEs, we used 5 variables that are composed of computer hardware, computer software, Internet, readiness of ICT, and performance of ICT adoption, while categorizing the cases into low and high tier based on the national ICT index. From a computer hardware perspective, the high tier (0.66) has almost double the number of PC’s per employee, compared with the low tiers (0.34). This gap can be explained by financial availability of low income and high tariff in the developing economies. In the computer software perspective, the SMEs in the low tier had some restrictive use of computer applications such as financial and accounting management and document management, while those in the high tier enjoyed more diversity in the use of applications such as inventory management, sales management, financial and accounting management, procurement management, CRM, and ERP. In view of the readiness of ICT, the difference in ICT infrastructure and financial status between the low and high tier was far wider than any other variables. As a result of ICT adoption, SMEs benefited in view of learning and growth, internal business processes, customer service, and financial affairs. To effectively bridge the digital divide between the low and high tier, actions such as setting up a secondary market of used computers among cooperating developed and developing countries, developing and diffusing good business applications, and building speedy, low-cost telecommunication infrastructures should be taken.

  • PDF

창의적 사고력 신장을 위한 초등 프로그래밍 교육과정과 교재 개발 - C언어를 중심으로 - (Development of the elementary programing curriculum and textbook for improvement of creative thinking ability - centered on c -)

  • 조성우;문외식
    • 한국정보교육학회:학술대회논문집
    • /
    • 한국정보교육학회 2010년도 하계학술대회
    • /
    • pp.51-57
    • /
    • 2010
  • 현재의 컴퓨터교육은 지나치게 응용소프트웨어 활용 중심으로 되어 있다. 즉, 응용소프트웨어의 기능이나 단순한 조작법을 익히는데 많은 내용이 할당되어 있으며, 학생들의 사고의 과정은 생략한 채 응용 프로그램을 단순히 따라하거나, 기능 위주의 교육이 대부분이다. 따라서, 변화가 요구되는 환경에 부응하는 창의성과 문제 해결력을 신장시키는데 매우 미흡한 실정이다. 본 연구에서는 초등학교 5, 6학년 수준에서 프로그램 언어를 통해 컴퓨터 자체를 학습 할 수 있고, 창의성과 문제 해결력을 신장 시킬 수 있도록 하는 프로그래밍 교육과정과 교재에 관하여 연구하였으며 이를 직접 적용하고 평가한 결과 매우 효과적으로 분석되었다.

  • PDF

Design and Implementation of a USN Middleware for Context-Aware and Sensor Stream Mining

  • Jin, Cheng-Hao;Lee, Yang-Koo;Lee, Seong-Ho;Yun, Un-il;Ryu, Keun-Ho
    • Spatial Information Research
    • /
    • 제19권1호
    • /
    • pp.127-133
    • /
    • 2011
  • Recently, with the advances in sensor techniques and net work computing, Ubiquitous Sensor Network (USN) has been received a lot of attentions from various communities. The sensor nodes distributed in the sensor network tend to continuously generate a large amount of data, which is called stream data. Sensor stream data arrives in an online manner so that it is characterized as high-speed, real-time and unbounded and it requires fast data processing to get the up-to-date results. The data stream has many application domains such as traffic analysis, physical distribution, U-healthcare and so on. Therefore, there is an overwhelming need of a USN middleware for processing such online stream data to provide corresponding services to diverse applications. In this paper, we propose a novel USN middleware which can provide users both context-aware service and meaningful sequential patterns. Our proposed USN middleware is mainly focused on location based applications which use stream location data. We also show the implementation of our proposed USN middleware. By using the proposed USN middleware, we can save the developing cost of providing context aware services and stream sequential patterns mainly in location based applications.

Master Data Management API for Assembled ERP Tools

  • Park, Jin-Kyung;Gim, Mi-Su
    • 한국컴퓨터정보학회논문지
    • /
    • 제21권11호
    • /
    • pp.93-101
    • /
    • 2016
  • In this paper, we propose a new model, assembled ERP, to analyze the reason why the small and medium sized companies have a low ERP implementation rate and to solve this. As a result of our analysis, the high initial costs and time required for implementing ERP keep such companies from implementing it as they have relatively limited resources. The assembled ERP model, however, reduces the scale of ERP by developing the ERP for the unique business of each and connecting a few 3rd-Party applications as a module to make ERP for common work. Also it enables easier data utilization by drawing up an API list that connects the 3rd-Party applications to the developed ERP when the user lacks knowledge in the master data of the 3rd-Party applications. Therefore it lets the small and medium sized companies introduce the ERP more easily by reducing the costs for ERP implementation and user training.