• Title/Summary/Keyword: access to education

Search Result 1,056, Processing Time 0.037 seconds

Digital Divide in Internet Access and Internet Usage in Korea (인터넷 접근과 활용에서의 디지털 격차)

  • Ju, Young-Wan;Kim, Yoo-Jung;Cho, Chang-Hyung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.12
    • /
    • pp.5601-5613
    • /
    • 2011
  • The purpose of this paper is to better understand the socio-economic differentials of Internet access and use. Data from '2008 Korean Internet usage behavior' were used to conduct logistic regression analysis. The findings show that there are significant socio-economic(age, gender, educational attainment, employment situation, and Internet access type) disparity in Internet access(Internet access at home, broadband Internet access). Also socio-economic variables enter in as statistically significant in most specifications for Internet use intensity (Intensive internet use, frequent internet use, less frequent internet use). The gender, household income and education attainment explanations for large differential in Internet use intensity are generally very similar. It is shown that age, education attainment and household income level cause a large digital divide on Internet service use(information use, communication and community use, e-commerce use, Internet banking use).

Multi-access Monitoring System for Biological Signal Collection (생체신호수집을 위한 다중접속 모니터링 시스템)

  • Kim, Tae-Woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.1
    • /
    • pp.145-148
    • /
    • 2020
  • Wearable computing is growing rapidly as research on body area communication network using wireless sensor network technology is actively conducted. In particular, there is an increasing interest in smart clothing measuring unrestrained and insensitive bio signals, and research is being actively conducted. However, research on smart clothing is mainly based on 1: 1 wireless communication. In this paper, we propose a multi-access monitoring system that can measure bio-signals by multiple users wearing smart clothing. The proposed system consists of wireless access device, multiple access control server and monitoring system. It also provides a service that allows multiple users to monitor and measure bio signals at the same time.

Study on Vocational Education in Schools to Promote the School-to-Work Transition : A Comparative Analysis of in Korean and the U.S. Systems (청소년의 원활한 고용진입을 위한 학교세팅에서의 직업교육 강화 방안 연구 : 한국과 미국 비교)

  • Chung, Young-Soon;Song, Youn-Kyoung
    • Korean Journal of Social Welfare
    • /
    • v.45
    • /
    • pp.341-373
    • /
    • 2001
  • This study seeks to identify the reform of vocational education plans so as to bring about a seamless transition from school to work. It puts forward a number of suggestions based upon an analysis of vocational education policies in Korean and U.S. schools, concerning the government's role, partnerships between education and industry, the educational system, curriculum and work-based learning. First, not only government initiatives but also close partnerships between education and industry are essential to help vocational education in school the transition to employment. Education and industry should work closely together to standardize certificate related skills and to have these skills reflected in the curriculum. Also the government should strive to provide guidelines for work-based learning and formulate standards for supervision and evaluation. Second, to facilitate the school to work transition, comprehensive schools should be promoted so that students have access to a greater ranger of vocational education. At the same time, an assessment system that certifies a mastering of the basic skills of those who undergo the education should be introduced, and it should be related to earn these certificates. Third, standardized vocational skills should be included in the curriculum so that students can acquire skills that are useful for industry. All the students in vocational and general high schools should have access both to general education, the foundation for lifelong learning and for employ ability, and to basic occupational skills which empower students in dealing with rapid changes of technology. Also a range of specialized vocational curricula should be offered so that students can opt for more specialized occupations; and they can select careers appropriate to their capability. Fourth, so that all students to have the opportunity to take part in work-based education, which is closely related to employment, various work-based learning programs should be offered to meet the needs of students and their educational conditions. Companies should for their part train students thoroughly in accordance with the standards of work-based education. In addition, supervisors should be stationed both in schools and companies in order to administer the students' work-based learning.

  • PDF

A Strategy to Strengthen Security for Remote Access of Smart Cars (스마트 자동차 원격접속 보안성 강화 방안)

  • Kim, Choungbae;Lee, Youngjun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.447-448
    • /
    • 2020
  • 본 논문에서는 스마트 자동차를 외부에서 제어할 수 있는 원격접속의 보안성을 강화할 수 있는 방안을 제안한다. 다양한 자동차 제조사들이 물리적인 자동차 구동에서 나아가 정보통신기술을 접목하여 운전자에게 다양한 편의성을 제공하고 있다. 정보통신기술을 이용해 자동차의 기능이 증가하는 만큼 정보시스템의 취약성을 이용해 외부의 비인가자에 의한 침입이 이루어질 수 있는 취약성 또한 증대하며, 자동차의 경우 이러한 위협이 주행 중 발생 시 운전자의 생명까지 위협할 수 있는 매우 위험한 상황이 발생할 수 있다. 이에 외부로부터 비인가자의 접근을 차단할 수 있는 방안을 기존 정보통신시스템 보안 기법을 접목하여 스마트 자동차의 안전한 운행이 가능할 수 있도록 한다. 본 논문에서는 기존 정보통신시스템에서 활용 중인 보안 방안을 통하여 제안하는 스마트 자동차 원격접근 제어 정책이 기존의 스마트 자동차 정보보안 정책에 비해 보안성 향상 면에서 더 우수함을 보인다.

  • PDF

Multiuser chirp modulation for underwater acoustic channel based on VTRM

  • Yuan, Fei;Wei, Qian;Cheng, En
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.9 no.3
    • /
    • pp.256-265
    • /
    • 2017
  • In this paper, an ascheme is proposed for multiuser underwater acoustic communication by using the multi-chirp rate signals. It differs from the well known TDMA (Time Division Multiple Access), FDMA (Frequency Division Multiple Access) or CDMA (Code Division Multiple Access), by assigning each users with different chirp-rate carriers instead of the time, frequency or PN code. Multi-chirp rate signals can be separated from each other by FrFT (Fractional Fourier Transform), which can be regarded as the chirp-based decomposing, and superior to the match filter in the underwater acoustic channel. VTRM (Virtual Time Reverse Mirror) is applied into the system to alleviate the ISI caused by the multipatch and make the equalization more simple. Results of computer simulations and pool experiments prove that the proposed multiuser underwater acoustic communication based on the multi-chirp rate exhibit well performance. Outfield experments carrie out in Xiamen Port show that using about 10 kHz bandwidth, four users could communicate at the same time with 425 bps with low BER and can match the UAC application.

Multi-Channel MAC Protocol Using Statistical Channel Utilization for Cognitive Networks

  • Xiang, Gao;Zhu, Wen-Min;Park, Hyung-Kun
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.3
    • /
    • pp.273-276
    • /
    • 2010
  • Opportunistic spectrum access (OSA) allows unlicensed users to share licensed spectrum in space and time with no or little interference to primary users, with bring new research challenges in MAC design. We propose a cognitive MAC protocol using statistical channel information and selecting appropriate idle channel for transmission. The protocol based on the CSMA/CA, exploits statistics of spectrum usage for decision making on channel access. Idle channel availability, spectrum hole sufficiency and available channel condition will be included in algorithm statistical information. The model include the control channel and data channel, the transmitter negotiates with receiver on transmission parameters through control channel, statistical decision results (successful rate of transmission) from exchanged transmission parameters of control channel should pass the threshold and decide the data transmission with spectrum hole on data channel. The proposed protocol's simulation will show that proposed protocol does improve the throughput performance via traditional opportunistic spectrum access MAC protocol.

Digital Barrier-Free and Psychosocial Support for Students with Disabilities in Distance Learning Environments

  • Kravchenko, Oksana;Koliada, Natalia;Berezivska, Larysa;Dikhtyarenko, Svitlana;Baida, Svitlana;Danylevych, Larysa
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.15-24
    • /
    • 2022
  • The article clarifies the conditions for information, digital and educational accessibility for higher education seekers with disabilities in terms of distance learning caused by quarantine restrictions. It is established that such conditions are regulated by international and Ukrainian legal documents (The Standard Rules on the Equalization of Opportunities for Persons with Disabilities, Convention on the Rights of Persons with Disabilities, Sustainable Development Goals, Law of Ukraine "On Education", Law of Ukraine "On Higher Education", Strategy for the Development of Higher Education in Ukraine 2021-2031, Development Strategy areas of innovation for the period up to 2030, Development strategy of the sphere of innovation activity for the period up to 2030). As a part of information barrierlessness, Higher Education Institutions (HEI) should provide access to information in various formats and using technologies, in particular Braille script, large-type printing, audio description (audio descriptive commenting), sign language interpretation, subtitling, a format suitable for reading by screen access programs, formats of simple speech, easy-to-read formats, means of alternative communication. The experience of Pavlo Tychyna Uman State Pedagogical University is described. In particular, special attention is paid to the study of sign language: in view of this, the initiative group implemented the project "Learning to hear and overcome social isolation together" with the financial support of the British Council in Ukraine. Within the framework of digital accessibility, the official website of the Faculty of Social and Psychological Education has been adapted for the visually impaired in accordance with WCAG 2.0 World Standards. In 2021, Pavlo Tychyna Uman State Pedagogical University implemented the project "Cultural, Recreational and Tourist Cherkasy Region: Inclusive Social 3D Map" funded by the Ukrainian Cultural Foundation; a site with available content for online travel in the region to provide barrier-free access to the historical and cultural heritage of Cherkasy region was created. Educational accessibility is achieved by increasing the number of people with special educational needs, receiving education in inclusive groups; activities of the Center for Social and Educational Integration and Inclusive Rehabilitation Social Tourism "Bez barieriv" ("Without barriers"); implementation of a research topic for financing the Ministry of Education and Science of Ukraine: "Social and psychological rehabilitation of children and youth with special educational needs by means of inclusive tourism"; implementation of the project "Social inclusion of distance educational process"; development of information campaigns to popularize the ideas of accessibility, the need for its implementation, ongoing training programs and competitions, etc.

Digitalization and Diversification of Modern Educational Space (Ukrainian case)

  • Oksana, Bohomaz;Inna, Koreneva;Valentyn, Lihus;Yanina, Kambalova;Shevchuk, Victoria;Hanna, Tolchieva
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.11-18
    • /
    • 2022
  • Linking Ukraine's education system with the trends of global digitalization is mandatory to ensure the sustainable, long-term development of the country, as well as to increase the sustainability of the education system and the economy as a whole during the crisis period. Now the main problems of the education system in Ukraine are manifested in a complex context caused by Russian armed aggression. In the context of war, problems include differences in adaptation to online learning among educational institutions, limited access to education for vulnerable groups in the zone of active hostilities, the lack of digital educational resources suitable for online learning, and the lack of basic digital skills and competencies among students and teachers necessary to properly conduct online classes. Some of the problems of online learning were solved in the pandemic, but in the context of war Ukrainian society needs a new vision of education and continuous efforts of all social structures in the public and private environment. In the context of war, concerted action is needed to keep education on track and restore it in active zones, adapting to the needs of a dynamic society and an increasingly digitized economy. Among the urgent needs of the education system are a change in the teaching-learning paradigm, which is based on content presentation, memorization, and reproduction, and the adoption of a new, hybrid educational model that will encourage the development of necessary skills and abilities for students and learners in a digitized society and enable citizens close to war zones to learn.

BDSS: Blockchain-based Data Sharing Scheme With Fine-grained Access Control And Permission Revocation In Medical Environment

  • Zhang, Lejun;Zou, Yanfei;Yousuf, Muhammad Hassam;Wang, Weizheng;Jin, Zilong;Su, Yansen;Kim, Seokhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1634-1652
    • /
    • 2022
  • Due to the increasing need for data sharing in the age of big data, how to achieve data access control and implement user permission revocation in the blockchain environment becomes an urgent problem. To solve the above problems, we propose a novel blockchain-based data sharing scheme (BDSS) with fine-grained access control and permission revocation in this paper, which regards the medical environment as the application scenario. In this scheme, we separate the public part and private part of the electronic medical record (EMR). Then, we use symmetric searchable encryption (SSE) technology to encrypt these two parts separately, and use attribute-based encryption (ABE) technology to encrypt symmetric keys which used in SSE technology separately. This guarantees better fine-grained access control and makes patients to share data at ease. In addition, we design a mechanism for EMR permission grant and revocation so that hospital can verify attribute set to determine whether to grant and revoke access permission through blockchain, so it is no longer necessary for ciphertext re-encryption and key update. Finally, security analysis, security proof and performance evaluation demonstrate that the proposed scheme is safe and effective in practical applications.

An Improvement of Security for the National Assembly (국회시설보안 향상방안)

  • Chung, Taehwang
    • Journal of the Society of Disaster Information
    • /
    • v.9 no.3
    • /
    • pp.290-299
    • /
    • 2013
  • This study is to present an improvement of security for the National Assembly by survey of persons who use the National Assembly facilities. Most of respondent said that their security consciousness level is above average, and they know National Assembly building is National Major Facility First class but they did not know well what the Major Facility First class is. Many of respondents thought security design of National Assembly building is inadequate, so reinforcement of access control management is necessary. For reinforcement of access control management, security gate and preparing of some obstacles are required. They said that they could put up with inconveniences incurred as a result of reinforcement of access control management, that could be affected positively for the reinforcement. The recognition on the necessity of security education is high, but there is no proper security education program. For practical security education, contents and different method followed by different facilities user should be considered.