• Title/Summary/Keyword: Computing education

Search Result 882, Processing Time 0.025 seconds

MIS Curriculum : The Current State of the Art and a Proposed Future Model (MIS 커리큘럼 현황 및 발전모델)

  • Lee, Kuk-Hie;Kim, Sung-Kun;Lee, Jo-Hn;Kim, Yong-Jae;Lee, Ho-Joon
    • Information Systems Review
    • /
    • v.9 no.3
    • /
    • pp.1-32
    • /
    • 2007
  • Recently, Korean universities have experienced steady decline in enrollments in MIS majors, which raises a serious concern to both academia and business leaders as well. With roles of MIS in corporate worlds are expanding and demands for newer breeds of MIS graduates ever growing, this trend, also observed in the US, poses a puzzling yet interesting research agenda. To come to grips with the problem and to suggest a robust curricula model for the future, this paper approaches the problem from various angles. The model first examines perceptions on MIS of Korean students; it then delineates existing curricula models to identify core MIS courses. The compilation is then juxtaposed by MIS course information from major US and Korean colleges, leading to categorizing major MIS subfields. The paper then tries to identify as-is and desired status of MIS curriculum, based on inquiry results from both academia and IS practitioners. Together with career tracks concretely described in this paper, the model would serve to fill the perception gaps in and to meet the future goals for MIS education in Korea.

Recent Technique Analysis, Infant Commodity Pattern Analysis Scenario and Performance Analysis of Incremental Weighted Maximal Representative Pattern Mining (점진적 가중화 맥시멀 대표 패턴 마이닝의 최신 기법 분석, 유아들의 물품 패턴 분석 시나리오 및 성능 분석)

  • Yun, Unil;Yun, Eunmi
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.39-48
    • /
    • 2020
  • Data mining techniques have been suggested to find efficiently meaningful and useful information. Especially, in the big data environments, as data becomes accumulated in several applications, related pattern mining methods have been proposed. Recently, instead of analyzing not only static data stored already in files or databases, mining dynamic data incrementally generated in a real time is considered as more interesting research areas because these dynamic data can be only one time read. With this reason, researches of how these dynamic data are mined efficiently have been studied. Moreover, approaches of mining representative patterns such as maximal pattern mining have been proposed since a huge number of result patterns as mining results are generated. As another issue, to discover more meaningful patterns in real world, weights of items in weighted pattern mining have been used, In real situation, profits, costs, and so on of items can be utilized as weights. In this paper, we analyzed weighted maximal pattern mining approaches for data generated incrementally. Maximal representative pattern mining techniques, and incremental pattern mining methods. And then, the application scenarios for analyzing the required commodity patterns in infants are presented by applying weighting representative pattern mining. Furthermore, the performance of state-of-the-art algorithms have been evaluated. As a result, we show that incremental weighted maximal pattern mining technique has better performance than incremental weighted pattern mining and weighted maximal pattern mining.

Combined Image Retrieval System using Clustering and Condensation Method (클러스터링과 차원축약 기법을 통합한 영상 검색 시스템)

  • Lee Se-Han;Cho Jungwon;Choi Byung-Uk
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.1 s.307
    • /
    • pp.53-66
    • /
    • 2006
  • This paper proposes the combined image retrieval system that gives the same relevance as exhaustive search method while its performance can be considerably improved. This system is combined with two different retrieval methods and each gives the same results that full exhaustive search method does. Both of them are two-stage method. One uses condensation of feature vectors, and the other uses binary-tree clustering. These two methods extract the candidate images that always include correct answers at the first stage, and then filter out the incorrect images at the second stage. Inasmuch as these methods use equal algorithm, they can get the same result as full exhaustive search. The first method condenses the dimension of feature vectors, and it uses these condensed feature vectors to compute similarity of query and images in database. It can be found that there is an optimal condensation ratio which minimizes the overall retrieval time. The optimal ratio is applied to first stage of this method. Binary-tree clustering method, searching with recursive 2-means clustering, classifies each cluster dynamically with the same radius. For preserving relevance, its range of query has to be compensated at first stage. After candidate clusters were selected, final results are retrieved by computing similarities again at second stage. The proposed method is combined with above two methods. Because they are not dependent on each other, combined retrieval system can make a remarkable progress in performance.

Analysis of Class Satisfaction and Perceived Learning Achievement to the Interaction Type on e-Learning in University (대학 이러닝에서 상호작용 유형에 따른 수업만족도 및 인지된 학업성취도 분석)

  • Jeon, Young-mee;Cho, Jin-suk
    • Journal of Internet Computing and Services
    • /
    • v.18 no.1
    • /
    • pp.131-141
    • /
    • 2017
  • This paper analyzed class satisfaction and perceived learning achievement to the interaction type on e-learning in university. To achieve the study's objective, one course with and another course without learner-instructor interactions were selected. A total of184 student-respondents completed the questionnaire. Accordingly, more learner-content and learning-system interactions were noted in the course with learner-instructor interactions. Moreover, a correlation was observed between interaction, class satisfaction, and learning achievement. Learner-instructor interactions indicated the highest effect on both educational satisfaction and perceived learning achievement, followed by learner-system interactions on class satisfaction, and by learner-instructor interactions on learning achievement. Recommendations were then formulated based on the foregoing findings. First, workshops or training focusing on content development and on how to present the course should be provided to the instructors. Second, learner-instructor interactions should be activated in the course through various means. In this study, although learner-learner interactions was not given focus, future studied should delve into how learner-learner interaction should be activated and considered.

User Access Patterns Discovery based on Apriori Algorithm under Web Logs (웹 로그에서의 Apriori 알고리즘 기반 사용자 액세스 패턴 발견)

  • Ran, Cong-Lin;Joung, Suck-Tae
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.6
    • /
    • pp.681-689
    • /
    • 2019
  • Web usage pattern discovery is an advanced means by using web log data, and it's also a specific application of data mining technology in Web log data mining. In education Data Mining (DM) is the application of Data Mining techniques to educational data (such as Web logs of University, e-learning, adaptive hypermedia and intelligent tutoring systems, etc.), and so, its objective is to analyze these types of data in order to resolve educational research issues. In this paper, the Web log data of a university are used as the research object of data mining. With using the database OLAP technology the Web log data are preprocessed into the data format that can be used for data mining, and the processing results are stored into the MSSQL. At the same time the basic data statistics and analysis are completed based on the processed Web log records. In addition, we introduced the Apriori Algorithm of Web usage pattern mining and its implementation process, developed the Apriori Algorithm program in Python development environment, then gave the performance of the Apriori Algorithm and realized the mining of Web user access pattern. The results have important theoretical significance for the application of the patterns in the development of teaching systems. The next research is to explore the improvement of the Apriori Algorithm in the distributed computing environment.

Perception of Students with disabilities and their WBI personnel about Web accessibility and its effective instructional design strategies (장애 학습자와 웹 기반 교수자의 웹 접근성에 대한 인식도와 이를 위한 효과적인 교수설계전략)

  • Roh, Seak-Zoon
    • Journal of Internet Computing and Services
    • /
    • v.8 no.2
    • /
    • pp.117-135
    • /
    • 2007
  • There are two purposes of this study; 1) to identify the perception about Web accessibility of students with disabilities and their Web-based Instructional personnel (WBI personnel) in higher education, and 2) to find out effective WBI design strategies actually used by WBI personnel to design and develop accessible Web-Based instruction for students with disabilites. Sixteen students with disabilites and their WBI personnel at a mid-western university in US were recruited for individual interviews. The results showed that WBI personnel did not know about Web accessibility and were not well prepared to make their WBI accessible. They have to provide the equality and quality of life to students with disabilites by making their instruction accessible. They felt that they could not guarantee whether their WBI was accessible even after meeting current standards and guidelines. WBI personnel also suggested that they had to provide students with disabilites with various methods and use appropriate instructional design strategies in order to address their needs. Finally, some effective instructional design used by WBI personnel in order to make WBI accessible were listed.

  • PDF

CNN-based Shadow Detection Method using Height map in 3D Virtual City Model (3차원 가상도시 모델에서 높이맵을 이용한 CNN 기반의 그림자 탐지방법)

  • Yoon, Hee Jin;Kim, Ju Wan;Jang, In Sung;Lee, Byung-Dai;Kim, Nam-Gi
    • Journal of Internet Computing and Services
    • /
    • v.20 no.6
    • /
    • pp.55-63
    • /
    • 2019
  • Recently, the use of real-world image data has been increasing to express realistic virtual environments in various application fields such as education, manufacturing, and construction. In particular, with increasing interest in digital twins like smart cities, realistic 3D urban models are being built using real-world images, such as aerial images. However, the captured aerial image includes shadows from the sun, and the 3D city model including the shadows has a problem of distorting and expressing information to the user. Many studies have been conducted to remove the shadow, but it is recognized as a challenging problem that is still difficult to solve. In this paper, we construct a virtual environment dataset including the height map of buildings using 3D spatial information provided by VWorld, and We propose a new shadow detection method using height map and deep learning. According to the experimental results, We can observed that the shadow detection error rate is reduced when using the height map.

A Proposal for Mobile Gallery Auction Method Using NFC-based FIDO and 2 Factor Technology and Permission-type Distributed Director Block-chain (NFC 기반 FIDO(Fast IDentity Online) 및 2 Factor 기술과 허가형 분산원장 블록체인을 이용한 모바일 갤러리 경매 방안 제안)

  • Noh, Sun-Kuk
    • Journal of Internet Computing and Services
    • /
    • v.20 no.6
    • /
    • pp.129-135
    • /
    • 2019
  • Recently, studies have been conducted to improve the m-commerce process in the NFC-based mobile environment and the increase of the number of smart phones built in NFC. Since authentication is important in mobile electronic payment, FIDO(Fast IDentity Online) and 2 Factor electronic payment system are applied. In addition, block-chains using distributed raw materials have emerged as a representative technology of the fourth industry. In this study, for the mobile gallery auction of the traders using NFC embedded terminal (smartphone) in a small gallery auction in which an unspecified minority participates, password-based authentication and biometric authentication technology (fingerprint) were applied to record transaction details and ownership transfer of the auction participants in electronic payment. And, for the cost reduction and data integrity related to gallery auction, the private distributed director block chain was constructed and used. In addition, domestic and foreign cases applying block chain in the auction field were investigated and compared. In the future, the study will also study the implementation of block chain networks and smart contract and the integration of block chain and artificial intelligence to apply the proposed method.

A Study on the Basic Design Education Using WWW (WWW를 활용한 기초디자인교육에 관한 연구)

  • 김소영;임창영
    • Archives of design research
    • /
    • v.11 no.1
    • /
    • pp.161-172
    • /
    • 1998
  • The evolution of computing environments caused various dharges in our society. The change cj instruction media is one of these effects. WWW using network techndogy is regarded as a pov.powerful tool for rerrote instruction. The methods of utilizing network technologies in design instrudion and design process rould be diversified comparing with those of other general instruction. Computer graphics has been regarded as a very use!u design tool for its accuracy and rapidty. Network can help us to do creative work using cornplter graphics. The merits of this technology are sharing resources and rraking it easy to roIlaborate. Recent cxxnputer graphics instruction has some defects in oontents and methods. The oontents have a weak relationship with other industrial design subjects. From above, the purpose of this thesis is to use computer graphics and netv.urk technology for supporting basic design instruction. Virtual gallery using WWW can be a cyberspare v.tlere the evaluation of results and the exchange of information take plare. This tool makes it easier to oomrunicate and oollaborate with dassmates. A casestudy-Composition with basic objectswas exea.rted by individual for distributed asynchronous rmde. The results of this thesis are summarized for four factors. Rrst, it was easy to transform idea. Serond, student-oriented working was performed. Third, interaction among students was activated. Fourth, not only final results, but also midterm results was oonsidered for evaluation. These methods also have problems as rerent instruction methods, but it rould be used as a instruction tool to compensate for existing instruction methods.

  • PDF

Frame security method in physical layer using OFB over Gigabit Ethernet Network (기가비트 이더넷 망에서 OFB 방식을 이용한 물리 계층 프레임 보안 기법)

  • Im, Sung-yeal
    • Journal of Internet Computing and Services
    • /
    • v.22 no.5
    • /
    • pp.17-26
    • /
    • 2021
  • This paper is about a physical layer frame security technique using OFB-style encryption/decryption with AES algorithms on Gigabit Ethernet network. We propose a data security technique at the physical layer that performs OFB-style encryption/decryption with AES algorithm with strong security strength when sending and receiving data over Gigabit Ethernet network. Generally, when operating Gigabit Ethernet network, there is no security features, but data security is required, additional devices that apply this technique can be installed to perform security functions. In the case of data transmission over Gigabit Ethernet network, the Ethernet frames conform to IEEE 802.3 specification, which includes several fields to ensure proper reception of data at the receiving node in addition to the data field. When encrypting, only the data field should be encrypted and transmitted in real time. In this paper, we show that only the data field of the IEEE802.3 frame is encrypted and transmitted on the sending node, and only the data field is decrypted to show the plain text on the receiving node, which shows that the encryption/decryption is carried out correctly. Therefore, additional installation of devices that apply this technique can increase the reliability of the system when security for data is required in Ethernet network operating without security features.