• Title/Summary/Keyword: Cyber class

Search Result 149, Processing Time 0.037 seconds

A Heuristic Approach for Establishing On-line Real-time Exam Timetables in Cyber Universities (중복시험을 배제할 수 있는 사이버대학의 온라인 실시간 시험 시간표 작성 방안)

  • Park, Chan-Kwon;Kim, Hyoung-Do;Yum, Ji-Hwan
    • Journal of Information Technology Applications and Management
    • /
    • v.14 no.3
    • /
    • pp.227-236
    • /
    • 2007
  • Students in cyber universities can take every course because there are no physical constraints such as class rooms. On the other hand. cyber universities should take a heavy burden to schedule real-time exams in a designated time period. Any two courses a student takes must not be simultaneously allocated to a time slot in such a schedule. It is well known that the complexity of this kind of scheduling problem increases exponentially as the number of courses does. This research provides a heuristic method to make on-line real-time exam timetables with minimal exam time span. It considers the constraint of not allocating courses a student takes to simultaneous exam time and prioritizes courses by the number of students.

  • PDF

A Study to Improve Full - Cyber Lectures: with Focus on Instructors' Proposal (완전사이버 강의의 개선을 위한 방안: 교수자 제안을 중심으로)

  • Lee, Seung-Won
    • Journal of Digital Convergence
    • /
    • v.11 no.4
    • /
    • pp.409-414
    • /
    • 2013
  • The purpose of this study is to verify the effects of partial-cyber and full-cyber lectures and explore directions for improvement. This study compared the mean scores of course evaluation for traditional face-to-face lectures, partial-cyber lectures of blended instruction, and full-cyber lectures. Also, this study interviewed instructors of full-cyber lectures to investigate the ways to enhance the lecture quality. The findings suggest that the course evaluation scores for full-cyber university were consistently lower than those for other types of lectures for four semesters between the years of 2011 and 2012. Results also showed that mean scores of partial-cyber lectures were the same as those of face-to-face lectures. After all, class satisfaction in full-cyber courses that learning occurs in cyber space was the lowest. Instructors who taught full-cyber lectures proposed that enrollment should not be within 60 students and professional assistance should be provided for lectures exceeding 60 students. Finally, they suggested content updates through a collaborative system with professionals, instructors' efforts to enhance interaction in both online and offline contexts, and learning quantity rationalization.

Efficiency of Management Education in Cyber Space (사이버 교육에 있어서의 효율성에 관한 연구)

  • Jihwan Yum;Beumjun Ahn
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.5 no.2
    • /
    • pp.166-173
    • /
    • 2004
  • The new way of doing education in cyber space is not limited by time or locations. The students do not need to attend classroom physically on time. Networked computers allow students to study their subjects at any time and any where. This study tries to probe the relationships among demographic variables and instructional variables with students satisfaction in the management education. Pervious studies found out that the critical success factors of cyber educations are based on the demographic and instructional variables. The results of the study demonstrate that demographic variables are not significantly related with students satisfaction. Rather instructional variables such as personal interactions with professors, job related contents and careful reduction of difficulties countered during the class proceeding are more significantly related with learning satisfaction. The result shows the newly emerged internet based education system requires in-depth collaborations and coordination among professors, system engineers, education instrument designers, and students.

  • PDF

Study on the Raise and Diffusion of Understanding of the e-Learning in Universities (대학 e-러닝의 인식 제고 및 확산에 관한 연구)

  • Park, Sung-Du
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.4
    • /
    • pp.1067-1073
    • /
    • 2008
  • This study grasped the problem by examining the consciousness of professors about the e-Learning and reached a conclusion as follows. The understanding of the e-Learning in university should be reconsidered and diffused. To activate the e-Learning in university, the education system corresponding to course of the coming education should be introduced by hold the seminar and workshop periodically and establish vision and middle-short range policy for the e-Learning. Also, university should manage by characterizing a web-based class with the major for a learner hoping to take a cyber education course and propel contents development and interchange with a foreign university by concluding a convention for taking lectures having competitive power of an advanced country to make a worldwide university.

An Implementation Scheme for the Detection System of RFID Defective Tags Using LabVIEW OOP

  • Jung, Deok-Gil;Jung, Min-Po;Cho, Hyuk-Gyu;Lho, Young-Uhg
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.1
    • /
    • pp.21-26
    • /
    • 2011
  • In this paper, we suggest the object-oriented methodology for the design and implementation scheme for the program development in the application of control and instrumentation such as the detection system of RFID defective tags which needs the embedded programming. We apply the design methodology of UML in the system design phase, and suggest the implementation scheme of LabVIEW programs using LVOOP(LabVIEW Object Oriented Programming)in which make it possible to write the object-oriented programming. We design the class diagram and the sequence diagram using UML, and write the classes of LVOOP from the designed class diagram and the main VI from the sequence diagram, respectively. We show that it is possible to develop the embedded programs such as the RFID application through the implementation example of the detection system of RFID defective tags in this paper. And, we obtain the advantages based on the object-oriented design and implementation using the LVOOP approach such as the development of LabVIEW programs by adding the classes and the concept of object of the object-oriented language to LabVIEW.

The Development and Application Of Cyber Counseling System for the Gifted Class (영재 학급을 위한 사이버 상담 시스템 개발 및 적용)

  • Chung, Hyun-Nam;Kim, Dong-Hyu;Goh, Byung-Oh
    • Journal of The Korean Association of Information Education
    • /
    • v.8 no.2
    • /
    • pp.177-187
    • /
    • 2004
  • It soaks but from 2003 the gifted child whom it is propelling as the enterprise of real national dimension oneself will know and it will do well the case which with the thought which goes wrong it lets to let alone is many but about lower social unsuitable Eung and melancholia, nervous characteristic anorexia cung with the back the same multi branch problem point occurs with emotional vulnerability of the gifted person. From the gifted people it grasps the emotional vulnerability which occurs from the dissertation which it sees consequently and the gifted person cyber counseling system which does the hazard web which solves a problem point in base plan and it embodies. One side, it applied the gifted child and the parents who are participating to an Dae-jeon 6th area joint the gifted person class in the gifted person cyber counseling system which it develops the result and it analyzed. Emotional vulnerability of the analysis result the gifted child considerable portion there is a possibility the fact that it overcomes, if facing each other it will be able to complement the portion which is insufficient from consultation.

  • PDF

A study of Big-data analysis for relationship between students (학생들의 관계성 파악을 위한 빅-데이터 분석에 관한 연구)

  • Hwang, Deuk-Young;Kim, Jin-Mook
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.113-119
    • /
    • 2015
  • Recent, cyber violence is increasing in a school and the severity of the problems encountered day by day. In particular, the severity of the cyber force using the smart phone is recognized as a very high and great problems socially. Cyberbullying have long damage degree and a wide range time duration against of existed physical cyber violence. Then student's affects is very seriously. Therefore, we analyzes the relationship and languages in the classroom for students to use to identify signs of cyber violence that may occur between friends in the class. And we support this information to identified parent, classroom teachers and school sheriff for prevent cyberbullying accidents in the school. For this research, we will design and implement a messenger in the cyber classroom. It have many components that are Big-data vocabulary, analyzer, and communication interface. Our proposed messenger can analyze lingual sign and friendship between students using Big-data analysis method such as text mining. It can analysis relationship by per-student, per-classroom.

Reusability in Component-based LMS Development (컴포넌트 기반 LMS 개발에서의 재사용성)

  • 임승린
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.4
    • /
    • pp.59-65
    • /
    • 2002
  • In these days, educational environment has been changing as Slowing of internet. This is why we have to consider a Web-based cyber education. The LMS is functionally constituted with Class-part and Management-part. Class-part take part in planning of lecture, loading the presentation material and class service. In this system, UML is used to support a specification of Component-based LMS. Through this study, we will show the effectiveness of CBD(Component Based Development) in during LMS development.

  • PDF

The Visual Guide to over 800 species of the Cyber Sea-Shell Museum on the Web using an Animation Technology

  • Lim, Eun-Im;Hong, Sung-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.10b
    • /
    • pp.1345-1348
    • /
    • 2000
  • Computers and communication technologies have been brought tremendous change to various aspects of an ever-fast changing world at present. Particularly, the use of internet and cyberspace is widespread in every comer of our life. We developed a cyber shell museum using an animation technology. It was developed for educational purposes, and accessible through the world wide web of internet. Cyber shell museum is consisted of five compartment including rare shells, marvelous shells, shell of the world, the shell of Korea and its story of shells. The database contains the pictures and related information of the shell and it implies not only animation display but also text information. The files of database were classified depending on the species, genus, family, order, and class and division of the shell. Picture of shells is displayed and user may reach the image and virtual view information by clicking through the object displayed. This provides multiple techniques to user may manipulate, visualize and interact with image on the web. And every such transformation as translation, rotation, and scaling can be applied in the picture interactively for the convenient and effective viewing.

  • PDF

Analysis of Login and Learning Hour in Cyber Classes of Undergraduate Students (학부 사이버강의 수강생들의 로그인과 학습 시간 분석)

  • Moon, Bong-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.5
    • /
    • pp.171-177
    • /
    • 2007
  • The cyber classes of an e-Learning system have been considered as one of the important form of education. However, there is no or little study of effectiveness and function for the students' position. In this study, I analyzed log files in the e-learning system, and classified login and teaming hour patterns of students, who were enrolled in the undergraduate courses of the university, into hourly pattern in a daily pattern in a week, weekly pattern in a semester. I proposed general ideas to improve effectiveness and function of current e-learning. Over 50% of logins were for less than 30minutes learning and there is wasteful use of e-learning system resources.

  • PDF