• Title/Summary/Keyword: Web Service System

Search Result 1,895, Processing Time 0.033 seconds

A Critical Review on the Inherent Problems of MOOC (MOOC(Massive Open Online Course)의 근원적인 문제점들에 대한 비판적 고찰)

  • Yang, Dan-Hee
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.6
    • /
    • pp.293-299
    • /
    • 2015
  • MOOC (Massive Open Online Course) is an online course aimed at limited participation and open access via the web. There is even the prospect that MOOC may break down the existing university system and open a new horizon of education. However, MOOC is going differently from the first prospect that it would threat the existing higher education institutions. So this study wishes to provide a starting point of discussion that we can produce and utilize MOOC to fit our situation of higher education by revealing the inherent problems of MOOC. MOOC is a basically online education, so that it cannot help inheriting the essential weakness of the existing one: the interaction, supervision and evaluation. The newly added concept 'massive' raises the problem of class size which is the most sensitive part in the field of education. The concept 'open' reverses a customized education because MOOC is a kind of video clips of a lecture for unspecific massive learners. As a conclusion, we predicts that MOOC will be positioned as a higher education service for very prominent learners in self-led learning ability and people who cannot access even traditional online higher education institutions. Also MOOC is highly likely to be used as a means of Flipped Learning in universities. Therefore, considering these points in the future, we need to develop MOOC to suit these targets.

3G+ CDMA Wireless Network Technology Evolution: Application service QoS Performance Study (3G+ CDMA망에서의 기술 진화: 응용 서비스 QoS 성능 연구)

  • 김재현
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.10
    • /
    • pp.1-9
    • /
    • 2004
  • User-Perceived application-level performance is a key to the adoption and success of CDMA 2000. To predict this performance in advance, a detailed end-to-end simulation model of a CDMA network was built to include application traffic characteristics, network architecture, network element details, and protocol features. We assess the user application performance when a Radio Access Network (RAN) and a Core Network (CN) adopt different transport architectures such as ATM and If. For voice Performance, we found that the vocoder bypass scenario shows 8% performance improvement over the others. For data packet performance, we found that HTTP v.1.1 shows better performance than that of HTTP v.1.0 due to the pipelining and TCP persistent connection. We also found that If transport technology is better solution for higher FER environment since the IP packet overhead is smaller than that of ATM for web browsing data traffic, while it shows opposite effect to small size voice packet in RAN architecture. Though simulation results we showed that the 3G-lX EV system gives much better packet delay performance than 3G-lX RTT, the main conclusion is that end-to-end application-level performance is affected by various elements and layers of the network and thus it must be considered in all phases of the technology evolution process.

Building Hierarchical Knowledge Base of Research Interests and Learning Topics for Social Computing Support (소셜 컴퓨팅을 위한 연구·학습 주제의 계층적 지식기반 구축)

  • Kim, Seonho;Kim, Kang-Hoe;Yeo, Woondong
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.12
    • /
    • pp.489-498
    • /
    • 2012
  • This paper consists of two parts: In the first part, we describe our work to build hierarchical knowledge base of digital library patron's research interests and learning topics in various scholarly areas through analyzing well classified Electronic Theses and Dissertations (ETDs) of NDLTD Union catalog. Journal articles from ACM Transactions and conference web sites of computing areas also are added in the analysis to specialize computing fields. This hierarchical knowledge base would be a useful tool for many social computing and information service applications, such as personalization, recommender system, text mining, technology opportunity mining, information visualization, and so on. In the second part, we compare four grouping algorithms to select best one for our data mining researches by testing each one with the hierarchical knowledge base we described in the first part. From these two studies, we intent to show traditional verification methods for social community miming researches, based on interviewing and answering questionnaires, which are expensive, slow, and privacy threatening, can be replaced with systematic, consistent, fast, and privacy protecting methods by using our suggested hierarchical knowledge base.

Recommendation of Best Empirical Route Based on Classification of Large Trajectory Data (대용량 경로데이터 분류에 기반한 경험적 최선 경로 추천)

  • Lee, Kye Hyung;Jo, Yung Hoon;Lee, Tea Ho;Park, Heemin
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.2
    • /
    • pp.101-108
    • /
    • 2015
  • This paper presents the implementation of a system that recommends empirical best routes based on classification of large trajectory data. As many location-based services are used, we expect the amount of location and trajectory data to become big data. Then, we believe we can extract the best empirical routes from the large trajectory repositories. Large trajectory data is clustered into similar route groups using Hadoop MapReduce framework. Clustered route groups are stored and managed by a DBMS, and thus it supports rapid response to the end-users' request. We aim to find the best routes based on collected real data, not the ideal shortest path on maps. We have implemented 1) an Android application that collects trajectories from users, 2) Apache Hadoop MapReduce program that can cluster large trajectory data, 3) a service application to query start-destination from a web server and to display the recommended routes on mobile phones. We validated our approach using real data we collected for five days and have compared the results with commercial navigation systems. Experimental results show that the empirical best route is better than routes recommended by commercial navigation systems.

A Study of Prevention Model the Spread of Phishing Attack for Protection the Medical Information (의료정보 보호를 위한 피싱공격 확산방지모델 연구)

  • Choi, Kyong-Ho;Chung, Kyung-Yong;Shin, Dong-Kun
    • Journal of Digital Convergence
    • /
    • v.11 no.3
    • /
    • pp.273-277
    • /
    • 2013
  • Phishing attacks have been implemented in smarter, more advanced ways with the passage of time. Hackers use intelligent phishing attacks to take over computers and to penetrate internal networks in major organizations. So, in this paper, a model for a prevention of phishing attack spread is conceptual designed in order to protect internal users and sensitive or important information from sophisticated phishing attacks. Internal users simultaneously utilize both external web and organizational mail services. And hackers can take the both side equally as a vector. Thus, packets in each service must be monitored and stored to recognize threatening elements from both sides. The model designed in this paper extends the mail server based security structure used in conventional studies for the protection of Internet mail services accessed by intranet users. This model can build a list of phishing sites as the system checks e-mails compared to that of the method that directly intercepts accesses to phishing sites using a proxy server, so it represents no standby time for request and response processes.

A MDA-based Approach to Developing UI Architecture for Mobile Telephony Software (MDA기반 이동 단말 시스템 소프트웨어 개발 기법)

  • Lee Joon-Sang;Chae Heung-Seok
    • The KIPS Transactions:PartD
    • /
    • v.13D no.3 s.106
    • /
    • pp.383-390
    • /
    • 2006
  • Product-line engineering is a dreaming goal in software engineering research. Unfortunately, the current underlying technologies do not seem to be still not much matured enough to make it viable in the industry. Based on our experiences in working on mobile telephony systems over 3 years, now we are in the course of developing an approach to product-line engineering for mobile telephony system software. In this paper, the experiences are shared together with our research motivation and idea. Consequently, we propose an approach to building and maintaining telephony application logics from the perspective of scenes. As a Domain-Specific Language(DSL), Menu Navigation Viewpoint(MNV) DSL is designed to deal with the problem domain of telephony applications. The functional requirements on how a set of telephony application logics are configured can be so various depending on manufacturer, product concept, service carrier, and so on. However, there is a commonality that all of the currently used telephony application logics can be generally described from the point of user's view, with a set of functional features that can be combinatorially synthesized from typical telephony services(i.e. voice/video telephony, CBS/SMS/MMS, address book, data connection, camera/multimedia, web browsing, etc.), and their possible connectivity. MNV DSL description acts as a backbone software architecture based on which the other types of telephony application logics are placed and aligned to work together globally.

An Algorithm to Detect P2P Heavy Traffic based on Flow Transport Characteristics (플로우 전달 특성 기반의 P2P 헤비 트래픽 검출 알고리즘)

  • Choi, Byeong-Geol;Lee, Si-Young;Seo, Yeong-Il;Yu, Zhibin;Jun, Jae-Hyun;Kim, Sung-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.5
    • /
    • pp.317-326
    • /
    • 2010
  • Nowadays, transmission bandwidth for network traffic is increasing and the type is varied such as peer-to-peer (PZP), real-time video, and so on, because distributed computing environment is spread and various network-based applications are developed. However, as PZP traffic occupies much volume among Internet backbone traffics, transmission bandwidth and quality of service(QoS) of other network applications such as web, ftp, and real-time video cannot be guaranteed. In previous research, the port-based technique which checks well-known port number and the Deep Packet Inspection(DPI) technique which checks the payload of packets were suggested for solving the problem of the P2P traffics, however there were difficulties to apply those methods to detection of P2P traffics because P2P applications are not used well-known port number and payload of packets may be encrypted. A proposed algorithm for identifying P2P heavy traffics based on flow transport parameters and behavioral characteristics can solve the problem of the port-based technique and the DPI technique. The focus of this paper is to identify P2P heavy traffic flows rather than all P2P traffics. P2P traffics are consist of two steps i)searching the opposite peer which have some contents ii) downloading the contents from one or more peers. We define P2P flow patterns on these P2P applications' features and then implement the system to classify P2P heavy traffics.

A Study on the Improvement Method for Efficient Service of E-GEN AED using Time and Spatial Data (시·공간 데이터를 활용한 E-GEN AED의 효율적 서비스를 위한 개선방안)

  • Beak, Seong Ryul;Kim, Jun Hyun
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.37 no.4
    • /
    • pp.253-265
    • /
    • 2019
  • In this study were analyzed the errors on the registration of details information, location of E-GEN (Emergency medical-GEN) AED (Automated External Defibrillator) installation site and the adequacy of spatial arrangement, which suggests an improvement methods of constructing an app or web based on time and space data for efficient operation of considering accessibility and usability. As a result of this study, first, it was not equal to each other for locations of each installation point of AED, that confirmed some area were dense or requiring additional installation. Second, it confirmed the inaccuracies in inputting and registering information about the installed location, such as the actual installation location information and the attribute information of the AED. Third, the main access node and the main address node were connected to a straight line that was found not be connected to the back door, the straight line, the stairs. Also, the opening times of AED installation sites varied according to the week and the season, the entrance was managed by the apartment management office in a separate place, it needs to be established on this information. In conclusion, it proposed a method to improve spatial equity and accessibility, a method to provide accurate distance and time according to actual movement routes in case of emergency, and a possibility of using each facility considering day and time.

Digital Twin-based Cadastral Resurvey Performance Sharing Platform Design and Implementation (디지털트윈 기반의 지적재조사 성과공유 플랫폼 설계 및 구현)

  • Kim, IL
    • Journal of Cadastre & Land InformatiX
    • /
    • v.53 no.1
    • /
    • pp.37-46
    • /
    • 2023
  • As real estate values rise, interest in cadastral resurvey is increasing. Accordingly, a cadastral resurvey project is actively underway for drone operation through securing work efficiency and improving accuracy. The need for utilization and management of cadastral resurvey results (drone images) is being raised, and through this study, a 3D spatial information platform was developed to solve the existing drone image management and utilization limitations and to provide drone image-based 3D cadastral information. It is proposed to build and use. The study area was selected as a district that completed the latest cadastral resurvey project in which the study was organized in February 2023. Afterwards, a web-based 3D platform was applied to the study to solve the user's spatial limitations, and the platform was designed and implemented based on drone images, spatial information, and attribute information. Major functions such as visualization of cadastral resurvey results based on 3D information and comparison of performance between previous cadastral maps and final cadastral maps were implemented. Through the open platform established in this study, anyone can easily utilize the cadastral resurvey results, and it is expected to utilize and share systematic cadastral resurvey results based on 3-dimensional information that reflects the actual business district. In addition, a continuous management plan was proposed by integrating the distributed results into one platform. It is expected that the usability of the 3D platform will be further improved if a platform is established for the whole country in the future and a service linked to the cadastral resurvey administrative system is established.

Utilizing the Application of High-Intensity Yttrium Aluminum Garnet (YAG) Lasers Focused on Acupoint Irradiation (경혈 조사를 중심으로 본 고출력 Yttrium Aluminum Garnet (YAG) 레이저의 활용)

  • Maeum Lee;Yoomin Choi;Subin Ahn;Gihyang Lee;Eunhee Lee;Myungjin Yim;Hyung-Sik Seo;Eui-hyoung Hwang;Insoo Jang
    • Korean Journal of Acupuncture
    • /
    • v.40 no.4
    • /
    • pp.141-148
    • /
    • 2023
  • Objectives : The purpose of this study is to investigate on the application of the yttrium aluminum garnet (YAG) lasers for acupoints irradiation. Methods : We conducted a systematic search for peer-reviewed studies published from inception to November 2023, in the following electronic databases: PubMed, Scopus, and Web of Science in English, Science ON, Oriental Medicine Advanced Searching Integrated System (OASIS) and Research Information Sharing Service (RISS) in Korean, and China National Knowledge Infrastructure (CNKI) and Wanfang in Chinese, and Japan Science Technology Information Aggregator, Electronic (J-STAGE) and Citation Information by NII (CiNii) in Japanese. Inclusion criteria were original articles including clinical and experimental studies related with YAG lasers for acupoints including Ashi or meridian sinews. Results : Among the 8 selected studies, there were 7 studies on human subjects and 1 study on animals, 7 studies on Nd:YAG (1,064 nm) laser, and 1 study on Er:YAG (2,940 nm) laser. A total of 16 acupoints were used, 15 of which were in the face and 1 of which was located in the foot. In addition, there were two studies using Ashi. 4 studies looked at the effect of pain relief, 2 studies looked at safety, 1 study looked at changes in blood flow, and 1 study looked at the effect of skin care. There were no reported adverse events, and the YAG laser was confirmed to be safe and effective in pain relief, beautifying the skin, and increasing blood flow. Conclusions : We suggest that high intensity YAG lasers can be applied to laser acupuncture or laser moxibustion. YAG lasers are considered to be worth using for various clinical indications of Korean medicine because of photobiomodulation effects, analgesic action, and deep penetration depth. Further scientific research and clinical evidences should be warranted.