• Title/Summary/Keyword: Computer based learning system

검색결과 1,664건 처리시간 0.026초

Latest Information Technologies in the UK Adults Education System

  • Tverezovska, Nina;Bilyk, Ruslana;Rozman, Iryna;Semerenko, Zhanna;Orlova, Nataliya;Vytrykhovska, Oksana;Oros, Ildiko
    • International Journal of Computer Science & Network Security
    • /
    • 제22권8호
    • /
    • pp.25-34
    • /
    • 2022
  • Today, further education of adults in the UK is one of the developing areas of continuing education. The Open University with distance learning, in the process of which innovative forms and methods based on computer and telecommunication technologies are used, is particularly successful in the organization of additional education of the adult population. The advantages of distance learning, multimedia - the latest information technologies, which provide the combination of graphic images, video, sound with the help of modern computer tools, are noted. The basic principles and forms underlying the technologies and forms of work with the elderly are defined. The international experience of implementing "Universities of the Third Age" is summarized. The most widespread approach in adult education in Great Britain is informational. The use of computer technologies motivates a new paradigm in educational methods and strategies, which requires new approaches, forms of learning, and innovative ways of delivering educational materials to adult learners. Information technologies have gained great popularity in such activities as distance learning, online learning, assistance in the education management system, development of programs and virtual textbooks in various subjects, online search for information for the educational process, computer testing of students' knowledge, creation of electronic libraries, formation of a single scientific electronic environment, publication of virtual magazines and newspapers on pedagogical topics, teleconferences, expansion of international cooperation in the field of Internet education. The information technology of synchronous distance learning "online" has gained considerable popularity in the educational process today. A promising direction is the use of multimedia technologies in educational activities to create a design of a virtual computer environment by decoding audiovisual information.

심층학습 기반 표정인식을 통한 학습 평가 보조 방법 연구 (Method of an Assistance for Evaluation of Learning using Expression Recognition based on Deep Learning)

  • 이호정;이덕우
    • 공학교육연구
    • /
    • 제23권2호
    • /
    • pp.24-30
    • /
    • 2020
  • This paper proposes the approaches to the evaluation of learning using concepts of artificial intelligence. Among various techniques, deep learning algorithm is employed to achieve quantitative results of evaluation. In particular, this paper focuses on the process-based evaluation instead of the result-based one using face expression. The expression is simply acquired by digital camera that records face expression when students solve sample test problems. Face expressions are trained using convolutional neural network (CNN) model followed by classification of expression data into three categories, i.e., easy, neutral, difficult. To substantiate the proposed approach, the simulation results show promising results, and this work is expected to open opportunities for intelligent evaluation system in the future.

Proposing a New Approach for Detecting Malware Based on the Event Analysis Technique

  • Vu Ngoc Son
    • International Journal of Computer Science & Network Security
    • /
    • 제23권12호
    • /
    • pp.107-114
    • /
    • 2023
  • The attack technique by the malware distribution form is a dangerous, difficult to detect and prevent attack method. Current malware detection studies and proposals are often based on two main methods: using sign sets and analyzing abnormal behaviors using machine learning or deep learning techniques. This paper will propose a method to detect malware on Endpoints based on Event IDs using deep learning. Event IDs are behaviors of malware tracked and collected on Endpoints' operating system kernel. The malware detection proposal based on Event IDs is a new research approach that has not been studied and proposed much. To achieve this purpose, this paper proposes to combine different data mining methods and deep learning algorithms. The data mining process is presented in detail in section 2 of the paper.

웹 기반 학습평가 자동화 시스템의 설계 및 구현 (Design and Implementation of Web-based Automatic Study Evaluation System)

  • 정용기;최은만
    • 정보처리학회논문지D
    • /
    • 제9D권2호
    • /
    • pp.289-296
    • /
    • 2002
  • 인터넷에서 가장 활발하게 사용되고 있는 웹은 교육 시스템의 변화를 가져오고 있다. 학습자들은 정적 형태의 웹 페이지로부터 양방향통신과 멀티미디어를 가미한 웹 어플리케이션과 웹 미디어를 사용한 학습교보재를 선호하고 있으며, 학습효과가 점차 증대되고 있다. 본 논문에서는 사용자의 변화 요인을 점검하여 학습의 진행에 효율적으로 참여할 수 있는 학습체계와 이에 따르는 자동화 평가시스템을 제시한다. 일반 평가 시스템은 정규적인 형태의 방법을 이용하므로서 학습자의 관심 또 다른 교수자 등 운영 및 관리자의 교육 목표에 의해서 운영되므로 컴퓨터를 활용한 교수방법이 적절치 못한 일이 발생할 수 있다. 웹을 이용한 프로젝트 교육 시스템은 사용자, 관리자 및 운영자 사이의 상호 참여를 통하여 수행하게 될 직무를 이해하고 지식 및 적용 능력의 점증적인 발전을 도모하게 된다. 본 논문에서는 자동화 평가 시스템을 제작하여 교수자와 웹 운영 관리자가 교육의 주관자 입장에서 교육을 진행하고, 학습자는 사용자 중심의 비교 학습 및 패턴 설계의 장점을 극대화시켜 인터넷/인트라넷상에서 실행되는 프로젝트 교육의 평가 방법과 이에 따르는 설계와 구현 방법에 관해 논한다.

스마트 팩토리를 위한 자율주행 시뮬레이터 기반 지능형 AGV 머신러닝 시스템 (Intelligent AGV Machine-Learning System based on Self-Driving Simulator for Smart Factory)

  • 이세훈;김기철;문환복;김도균
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2017년도 제56차 하계학술대회논문집 25권2호
    • /
    • pp.17-18
    • /
    • 2017
  • 본 논문은 스마트 팩토리의 중요 요소인 무인반송차(AGV)를 자율 주행시키기 위해 오픈 소스 자율 주행차 시뮬레이터인 udacity를 이용해 머신 러닝시키는 시스템을 개발하였다. 공장의 운행 루트를 자율주행 시뮬레이터의 전경으로 가공하고, 3개의 카메라를 부착시킨 AGV를 운행시키면서 머신 러닝시킨다. AGV를 주행하여 얻어진 여러 학습 데이터를 통해 도출된 결과들을 각각 비교하여 우수한 모델을 선정하고 운행시킨 결과 AGV가 정해진 운행 루트를 정확하게 주행하는 것을 확인하였다. 이를 통해, 가상 운행 환경에서 저비용으로 AGV 운행 학습이 가능하다는 것을 보였다.

  • PDF

머신러닝 기반의 대규모 이미지 파일에서 개인 정보 분류 시스템 (Machine Learning based Personal Information Classification System in Large Image Files)

  • 김기태;윤상혁;서보인;이세훈
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2020년도 제62차 하계학술대회논문집 28권2호
    • /
    • pp.293-294
    • /
    • 2020
  • 본 논문에서는 현재 이슈가 되고 있는 개인 정보 보안에 대해서 Keras 라이브러리를 사용하여 개인 정보 관련 데이터를 학습한 후, 한글 인식률 증가된 Tesseract-OCR 활용하여 사람들이 가지고 있는 데이터의 개인 정보 유무를 판단하여 분류한다.

  • PDF

딥 러닝 기반의 영상처리 기법을 이용한 겹침 돼지 분리 (Separation of Occluding Pigs using Deep Learning-based Image Processing Techniques)

  • 이한해솔;사재원;신현준;정용화;박대희;김학재
    • 한국멀티미디어학회논문지
    • /
    • 제22권2호
    • /
    • pp.136-145
    • /
    • 2019
  • The crowded environment of a domestic pig farm is highly vulnerable to the spread of infectious diseases such as foot-and-mouth disease, and studies have been conducted to automatically analyze behavior of pigs in a crowded pig farm through a video surveillance system using a camera. Although it is required to correctly separate occluding pigs for tracking each individual pigs, extracting the boundaries of the occluding pigs fast and accurately is a challenging issue due to the complicated occlusion patterns such as X shape and T shape. In this study, we propose a fast and accurate method to separate occluding pigs not only by exploiting the characteristics (i.e., one of the fast deep learning-based object detectors) of You Only Look Once, YOLO, but also by overcoming the limitation (i.e., the bounding box-based object detector) of YOLO with the test-time data augmentation of rotation. Experimental results with two-pigs occlusion patterns show that the proposed method can provide better accuracy and processing speed than one of the state-of-the-art widely used deep learning-based segmentation techniques such as Mask R-CNN (i.e., the performance improvement over Mask R-CNN was about 11 times, in terms of the accuracy/processing speed performance metrics).

변형된 돌연변이를 가진 대화형 유전자 알고리즘을 이용한 학습 콘텐츠의 설계 및 구현 (Design and Implementation of Learning Contents Using Interactive Genetic Algorithms with Modified Mutation)

  • 김정숙
    • 한국컴퓨터정보학회논문지
    • /
    • 제10권6호
    • /
    • pp.85-92
    • /
    • 2005
  • 본 논문에서는 변형된 돌연변이 연산자를 적용한 대화형 유전자 알고리즘을 사용해서 웹-기반 학습 콘텐츠를 개발하였다. 대화형 유전자 알고리즘은 주로 상호 교환(reciprocal exchange) 돌연변이를 사용한다. 그러나 본 논문에서는 학습자의 학습 효과를 높이기 위해 돌연변이 연산자를 변형하였다. 그리고, 대화형 유전자 알고리즘을 이용한 웹 기반 학습 콘텐츠는 동적인 학습 내용과 실시간 테스트 시스템을 제공한다. 특히 학습자가 자신의 특성과 흥미에 따라 대화형 유전자 알고리즘을 수행하면서 효율적인 학습 환경과 콘텐츠 배열 순서를 선택할 수 있다.

  • PDF

An improvement of LEM2 algorithm

  • The, Anh-Pham;Lee, Young-Koo;Lee, Sung-Young
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2011년도 한국컴퓨터종합학술대회논문집 Vol.38 No.1(A)
    • /
    • pp.302-304
    • /
    • 2011
  • Rule based machine learning techniques are very important in our real world now. We can list out some important application which we can apply rule based machine learning algorithm such as medical data mining, business transaction mining. The different between rules based machine learning and model based machine learning is that model based machine learning out put some models, which often are very difficult to understand by expert or human. But rule based techniques output are the rule sets which is in IF THEN format. For example IF blood pressure=90 and kidney problem=yes then take this drug. By this way, medical doctor can easy modify and update some usable rule. This is the scenario in medical decision support system. Currently, Rough set is one of the most famous theory which can be used for produce the rule. LEM2 is the algorithm use this theory and can produce the small set of rule on the database. In this paper, we present an improvement of LEM2 algorithm which incorporates the variable precision techniques.

LSTM Android Malicious Behavior Analysis Based on Feature Weighting

  • Yang, Qing;Wang, Xiaoliang;Zheng, Jing;Ge, Wenqi;Bai, Ming;Jiang, Frank
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권6호
    • /
    • pp.2188-2203
    • /
    • 2021
  • With the rapid development of mobile Internet, smart phones have been widely popularized, among which Android platform dominates. Due to it is open source, malware on the Android platform is rampant. In order to improve the efficiency of malware detection, this paper proposes deep learning Android malicious detection system based on behavior features. First of all, the detection system adopts the static analysis method to extract different types of behavior features from Android applications, and extract sensitive behavior features through Term frequency-inverse Document Frequency algorithm for each extracted behavior feature to construct detection features through unified abstract expression. Secondly, Long Short-Term Memory neural network model is established to select and learn from the extracted attributes and the learned attributes are used to detect Android malicious applications, Analysis and further optimization of the application behavior parameters, so as to build a deep learning Android malicious detection method based on feature analysis. We use different types of features to evaluate our method and compare it with various machine learning-based methods. Study shows that it outperforms most existing machine learning based approaches and detects 95.31% of the malware.