• Title/Summary/Keyword: Training based on internet

Search Result 442, Processing Time 0.021 seconds

RTE System based on CBT for Effective Office SW Education (효과적인 오피스 SW 교육을 위한 CBT 기반의 RTE(Real Training Environment)시스템)

  • Kim, Seongyeol;Hong, Byeongdu
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.3
    • /
    • pp.375-387
    • /
    • 2013
  • Advanced internet service and smart equipment have caused an environment supporting various online learning anytime and anywhere, which requires learning contents optimized on a new media. Among various on/off line education related to IT, most part if it is office SW. Many oh them cannot make a good education for effective training in practical because many instructors are tend to focus on teaching simple function and use examples of formality repeatedly. In this paper we propose a new office SW education system that make use of LET(Live EduTainer) based on RTE(Real Training Environment) which maximize the effect of learning and it is integrated with GBL(Game Based Learning) which gives rise to interesting in a knowledge as well as simple teaching so that learners are absorbed on it. We'll elaborate a method for teaching and learning required in this system, design and configuration of the system.

Extracting the Point of Impact from Simulated Shooting Target based on Image Processing (영상처리 기반 모의 사격 표적지 탄착점 추출)

  • Lee, Tae-Guk;Lim, Chang-Gyoon;Kim, Kang-Chul;Kim, Young-Min
    • Journal of Internet Computing and Services
    • /
    • v.11 no.1
    • /
    • pp.117-128
    • /
    • 2010
  • There are many researches related to a simulated shooting training system for replacing the real military and police shooting training. In this paper, we propose the point of impact from a simulated shooting target based on image processing instead of using a sensor based approach. The point of impact is extracted by analyzing the image extracted from the camera on the muzzle of a gun. The final shooting result is calculated by mapping the target and the coordinates of the point of impact. The recognition system is divided into recognizing the projection zone, extracting the point of impact on the projection zone, and calculating the shooting result from the point of impact. We find the vertices of the projection zone after converting the captured image to the binary image and extract the point of impact in it. We present the extracting process step by step and provide experiments to validate the results. The experiments show that exact vertices of the projection area and the point of impact are found and a conversion result for the final result is shown on the interface.

Individual Channel Estimation Based on Blind Interference Cancellation for Two-Way MIMO Relay Networks

  • He, Xianwen;Dou, Gaoqi;Gao, Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.8
    • /
    • pp.3589-3605
    • /
    • 2018
  • In this paper, we investigate an individual channel estimation problem for multiple-input multiple-output (MIMO) two-way amplify-and-forward (AF) relay networks. To avoid self-interference during the estimation of the individual MIMO channels, a novel blind interference cancellation (BIC) approach is proposed based on an orthogonal preceding framework, where a pair of orthogonal precoding matrices is utilized at the source nodes. By designing an optimal decoding scheme, we propose to decompose the bidirectional transmission into a pair of unidirectional transmissions. Unlike most existing approaches, we make the practical assumption that the nonreciprocal MIMO channel and the mutual interference of multiple antennas are both taken into consideration. Under the precoding framework, we employ an orthogonal superimposed training strategy to obtain the individual MIMO channels. However, the AF strategy causes the noise at the terminal to be the sum of the local noise and the relay-propagated noise. To remove the relay-propagated noise during the estimation of the second-hop channel, a partial noise-nulling method is designed. We also derive a closed-form expression for the total mean square error (MSE) of the MIMO channel from which we compute the optimal power allocation. The simulation results demonstrate that the analytical and simulated curves match fully.

Self-Supervised Long-Short Term Memory Network for Solving Complex Job Shop Scheduling Problem

  • Shao, Xiaorui;Kim, Chang Soo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2993-3010
    • /
    • 2021
  • The job shop scheduling problem (JSSP) plays a critical role in smart manufacturing, an effective JSSP scheduler could save time cost and increase productivity. Conventional methods are very time-consumption and cannot deal with complicated JSSP instances as it uses one optimal algorithm to solve JSSP. This paper proposes an effective scheduler based on deep learning technology named self-supervised long-short term memory (SS-LSTM) to handle complex JSSP accurately. First, using the optimal method to generate sufficient training samples in small-scale JSSP. SS-LSTM is then applied to extract rich feature representations from generated training samples and decide the next action. In the proposed SS-LSTM, two channels are employed to reflect the full production statues. Specifically, the detailed-level channel records 18 detailed product information while the system-level channel reflects the type of whole system states identified by the k-means algorithm. Moreover, adopting a self-supervised mechanism with LSTM autoencoder to keep high feature extraction capacity simultaneously ensuring the reliable feature representative ability. The authors implemented, trained, and compared the proposed method with the other leading learning-based methods on some complicated JSSP instances. The experimental results have confirmed the effectiveness and priority of the proposed method for solving complex JSSP instances in terms of make-span.

A Classification Algorithm Based on Data Clustering and Data Reduction for Intrusion Detection System over Big Data

  • Wang, Qiuhua;Ouyang, Xiaoqin;Zhan, Jiacheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3714-3732
    • /
    • 2019
  • With the rapid development of network, Intrusion Detection System(IDS) plays a more and more important role in network applications. Many data mining algorithms are used to build IDS. However, due to the advent of big data era, massive data are generated. When dealing with large-scale data sets, most data mining algorithms suffer from a high computational burden which makes IDS much less efficient. To build an efficient IDS over big data, we propose a classification algorithm based on data clustering and data reduction. In the training stage, the training data are divided into clusters with similar size by Mini Batch K-Means algorithm, meanwhile, the center of each cluster is used as its index. Then, we select representative instances for each cluster to perform the task of data reduction and use the clusters that consist of representative instances to build a K-Nearest Neighbor(KNN) detection model. In the detection stage, we sort clusters according to the distances between the test sample and cluster indexes, and obtain k nearest clusters where we find k nearest neighbors. Experimental results show that searching neighbors by cluster indexes reduces the computational complexity significantly, and classification with reduced data of representative instances not only improves the efficiency, but also maintains high accuracy.

MalEXLNet:A semantic analysis and detection method of malware API sequence based on EXLNet model

  • Xuedong Mao;Yuntao Zhao;Yongxin Feng;Yutao Hu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.10
    • /
    • pp.3060-3083
    • /
    • 2024
  • With the continuous advancements in malicious code polymorphism and obfuscation techniques, the performance of traditional machine learning-based detection methods for malware variant detection has gradually declined. Additionally, conventional pre-trained models could adequately capture the contextual semantic information of malicious code and appropriately represent polysemous words. To enhance the efficiency of malware variant detection, this paper proposes the MalEXLNet intelligent semantic analysis and detection architecture for malware. This architecture leverages malware API call sequences and employs an improved pre-training model for semantic vector representation, effectively utilizing the semantic information of API call sequences. It constructs a hybrid deep learning model, CBAM+AttentionBiLSTM,CBAM+AttentionBiLSTM, for training and classification prediction. Furthermore, incorporating the KMeansSMOTE algorithm achieves balanced processing of small sample data, ensuring the model maintains robust performance in detecting malicious variants from rare malware families. Comparative experiments on generalized datasets, Ember and Catak, the results show that the proposed MalEXLNet architecture achieves excellent performance in malware classification and detection tasks, with accuracies of 98.85% and 94.46% in the two datasets, and macro-averaged and micro-averaged metrics exceeding 98% and 92%, respectively.

A Study on the Determinants of Service Quality of Worker in the Youth Training Tacility (청소년수련시설 종사자의 서비스 질 결정요인에 관한 연구)

  • Youn, Ki-Hyok;Lee, Jin-Yoel
    • Journal of Internet of Things and Convergence
    • /
    • v.5 no.1
    • /
    • pp.1-6
    • /
    • 2019
  • This study was intended to verify the impact on the quality of service for employees of youth training facilities. The purpose of this study is to provide basic data for improving service quality by analyzing the factors influencing service quality of youth training facility workers. Data were collected from 110 youth training facilities in Busan. The results showed that social support, emotional labor and self-efficacy had a static effect on the quality of service. Based on the results of this study, the following suggestions were made. First, in order to enhance social support, it is necessary to strengthen regular networking with other agency workers, interview with middle managers, and counseling. Second, to raise emotional labor, it is necessary to imprint a sense of mission as a youth leader. Psychological and emotional programs should also be developed and implemented. Third, in order to increase the self-efficacy, it is necessary to strengthen the administrative super vision and strengthen related education such as image making.

Adaptive Hypermedia for eLearning: An Implementation Framework

  • Dutta, Diptendu;Majumdar, Shyamal;Majumdar, Chandan
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.4
    • /
    • pp.676-684
    • /
    • 2003
  • eLearning can be defined as an approach to teaching and teaming that utilises Internet technologies to communicate and collaborate in an educational context. This includes technology that supplements traditional classroom training with web-based components and learning environments where the educational process is experienced online. The use of hypertext as an educational tool has a very rich history. The advent of the internet and one of its major application, the world wide web (WWW), has given a tremendous boost to the theory and practice of hypermedia systems for educational purposes. However, the web suffers from an inability to satisfy the heterogeneous needs of a large number of users. For example, web-based courses present the same static teaming material to students with widely differing knowledge of the subject. Adaptive hypermedia techniques can be used to improve the adaptability of eLearning. In this paper we report an approach to the design a unified implementation framework suitable for web-based eLearning that accommodates the three main dimensions of hypermedia adaptation: content, navigation, and presentation. The framework externalises the adaptation strategies using XML notation. The separation of the adaptation strategies from the source code of the eLearning software enables a system using the framework to quickly implement a variety of adaptation strategies. This work is a part of our more general ongoing work on the design of a framework for adaptive content delivery. parts of the framework discussed in this paper have been imulemented in a commercial eLearning engine.

  • PDF

Learner-Generated Digital Listening Materials Using Text-to-Speech for Self-Directed Listening Practice

  • Moon, Dosik
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.4
    • /
    • pp.148-155
    • /
    • 2020
  • This study investigated learners' perceptions of using self-generated listening materials based on Text to Speech. After taking an online training session to learn how to make listening materials for extensive listening practice outside the classroom, the learners were engaged in practice with self-generated listening materials for 10 weeks in a self-directed way. The results show that a majority of the learners found the TTS-based listening materials helpful to reduce anxiety toward listening and enhance self-confidence and motivation, with a positive effect on improving their listening ability. The learners' general satisfaction can be attributed to some beneficial features of TTS-based listening material, including freedom to choose what they want to learn, convenient accessibility to the material, availability of various native speakers' voices, and novelty of digital tools. This suggests that TTS-based digital listening materials can be a useful educational tool to support learners' self-directed listening practice outside the classroom in EFL settings.

Association Analysis on The Completion Rate of Security education and Cyber Terror Response According to Personal and Job characteristics (인적 및 직무특성과 보안교육 이수율 및 사이버테러 대응과의 연관성 분석)

  • Shin, Hyun Jo;Lee, Kyung Bok;Park, Tae Hyoung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.4
    • /
    • pp.97-107
    • /
    • 2014
  • The development of ICT has led positive aspects such as popularization of Internet. It, on the other hand, is causing a negative aspect, Cyber Terror. Although the causes for recent and continuous increase of cyber security incidents are various such as lack of technical and institutional security measure, the main cause which threatens the cyber security is the users' lack of awareness and attitude. The purpose of this study is the positive analysis of how the personal and job characteristics influence the cyber security training participation rate and the response ability to cyber terror response training with a sample case of K-corporation employees. In this paper, the relationship among career, gender, department, whether he/she is a cyber security specialist, whether he/she is a regular employee), "ratio of cyber security training courses during recent three years", "ratio that he/she has opened the malicious email in cyber terror response training during recent three years", "response index of virus active-x installation (higher index means poorer response)" is closely examined. Moreover, based on the examination result, the practical and political implications regarding K-corporation's cyber security courses and cyber terror response training are studied.