• Title/Summary/Keyword: computer science education

Search Result 2,751, Processing Time 0.034 seconds

A Comparison on the Trend of Preference about Classroom for Special Purposes Related with School Relocation in Elementary School - Concentrated on the relocation-needed elementary schools in Kwangju city - (교사재배치(校舍再配置)를 위한 초등학교(初等學校) 특별교실(特別敎室) 선호경향(選好傾向) 비교(比較) - 광주광역시(光州廣域市) 교사재배치(校舍再配置) 대상(對象) 초등학교(初等學校)를 중심(中心)으로 -)

  • Jeong, Joo-Seong;Choi, Byung-Kwan;Park, Young-Sook;Rieu, Ho-Seoup
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.9 no.2
    • /
    • pp.15-24
    • /
    • 2002
  • This study is performed to understand a trend of preference about classroom for special purposes related with elementary school relocation. It is anayzed based on the questionnaire of teachers at work in the two schools having similar educational environment. The results showed that it is desirable to locate rooms for science or practice in low story and music room in the lowermost or uppermost story. Rooms for art, linguistic education and computer had not limited any place. It is shown that the scale of each preparation room is significantly different with each grade and more large scale is needed in higher grade. These results reflect that the present arrangement of classrooms for special purposes is not adequate and require more reasonable arrangement with the grade in the architectural plans for relocation-needed elementary schools.

A SECURITY ARCHITECTURE FOR THE INTERNET OF THINGS

  • Behrens, Reinhard;Ahmed, Ali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.6092-6115
    • /
    • 2017
  • This paper demonstrates a case for an end-to-end pure Application Security Layer for reliable and confidential communications within an Internet of Things (IoT) constrained environment. To provide a secure key exchange and to setup a secure data connection, Transport Layer Security (TLS) is used, which provides native protection against replay attacks. TLS along with digital signature can be used to achieve non-repudiation within app-to-app communications. This paper studies the use of TLS over the JavaScript Object Notation (JSON) via a The Constrained Application Protocol (CoAP) RESTful service to verify the hypothesis that in this way one can provide end-to-end communication flexibility and potentially retain identity information for repudiation. As a proof of concept, a prototype has been developed to simulate an IoT software client with the capability of hosting a CoAP RESTful service. The prototype studies data requests via a network client establishing a TLS over JSON session using a hosted CoAP RESTful service. To prove reputability and integrity of TLS JSON messages, JSON messages was intercepted and verified against simulated MITM attacks. The experimental results confirm that TLS over JSON works as hypothesised.

An analysis of effectiveness and safety about matrix-based RFID authentication protocol (행렬기반 RFID 인증 프로토콜의 효율성 및 안정성 분석)

  • Shin, Hyo-Young;Hwang, Chi-Gon;Jung, Kye-Dong
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.249-255
    • /
    • 2014
  • RFID system is used in several fields such as traffic and access control. The study about RFID security is actively progressed as security threat has been increased. This paper suggests matrix-based authentication protocol. And we analyze the safety of authentication protocol and compares the effectiveness of the protocol with other authentication protocols. The suggested authentication protocol secures from wiretapping attack, replay attack, and spoofing attack, and reduces overload of back-end database so that has efficient performance.

RPIDA: Recoverable Privacy-preserving Integrity-assured Data Aggregation Scheme for Wireless Sensor Networks

  • Yang, Lijun;Ding, Chao;Wu, Meng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.5189-5208
    • /
    • 2015
  • To address the contradiction between data aggregation and data security in wireless sensor networks, a Recoverable Privacy-preserving Integrity-assured Data Aggregation (RPIDA) scheme is proposed based on privacy homomorphism and aggregate message authentication code. The proposed scheme provides both end-to-end privacy and data integrity for data aggregation in WSNs. In our scheme, the base station can recover each sensing data collected by all sensors even if these data have been aggregated by aggregators, thus can verify the integrity of all sensing data. Besides, with these individual sensing data, base station is able to perform any further operations on them, which means RPIDA is not limited in types of aggregation functions. The security analysis indicates that our proposal is resilient against typical security attacks; besides, it can detect and locate the malicious nodes in a certain range. The performance analysis shows that the proposed scheme has remarkable advantage over other asymmetric schemes in terms of computation and communication overhead. In order to evaluate the performance and the feasibility of our proposal, the prototype implementation is presented based on the TinyOS platform. The experiment results demonstrate that RPIDA is feasible and efficient for resource-constrained sensor nodes.

A Study on Health Concern, Self-rated Health, Health Status, and Health Promotion Behavior of Elderly Women in Urban Area (도시지역 여성노인의 건강관심도, 주관적 건강평가, 건강상태 및 건강증진행위와의 관계연구)

  • 신경림;김정선
    • Journal of Korean Academy of Nursing
    • /
    • v.34 no.5
    • /
    • pp.869-880
    • /
    • 2004
  • Purpose: This study was conducted to examine the relationship among health concern, self-rated health, health status, and health promotion behavior of elderly women in urban areas. Method: The subjects of this study consisted of 271 Korean elderly women over 65years. The data was collected through personal interviews using questionnaires from March to May of 2003. The data was analyzed by the SPSS(ver.10.0) computer program, and it included descriptive statistics, t-test, one way ANOVA, and the pearson correlation coefficient. Result: There was a significant positive correlation between self-rated health and health status. Health promotion behavior related to all health concerns, self-rated health, and health status. Conclusion: This study showed that strategies of elderly care intervention to put in practice health promoting behavior is needed to improve quality of life in elderly women. In addition, health education appropriate for health maintenance and health promotion must be done fordaily living to maintain well-being for the rest of their lives.

A Study on Depression, Stress, and Social Support in Adult Women (성인여성의 우울과 스트레스, 사회적 지지에 관한 연구)

  • 김정선;신경림
    • Journal of Korean Academy of Nursing
    • /
    • v.34 no.2
    • /
    • pp.352-361
    • /
    • 2004
  • Purpose: This study was conducted to examine the relationship among Depression, Stress, and Social support in Korean Adult Women. Method: The subjects of this study consisted of 2,503 Korean Adult Women from 20 to 64years. The data was collected through personal interviews from March to May of 2001 using questionnaires. The data was analyzed by the SPSS(ver. 10.0) computer program, and it included descriptive statistics, t-test, one way ANOVA, the pearson correlation coefficient, and Stepwise multiple regression. Result: The level of depression, stress, and social support were 16.22 for depression, 27.43 for stress, and 87.48 for social support. There was a significant difference in social support according to residence area, age, level of education, marital status, type of family, religion, income, and job. There was a significant positive correlation between stress and depression, a significant negative correlation between stress and social support, and social support and depression. Stress and social support were significant predictors (29.6%) of depression. Conclusion: This study showed that thorough nursing assessment of variables related to social support is needed for development of nursing intervention strategies. Further studies need to be conducted for group comparisons according to the life cycle of Korean women.

Low-Complexity Multi-Size Circular Shifter for QC-LDPC Decoder Based on Two Serial Barrel-Rotators (두 개의 직렬 Barrel-Rotator를 이용한 QC-LDPC 복호기용 저면적 Multi-Size Circular Shifter)

  • Kang, Hyeong-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.8
    • /
    • pp.1839-1844
    • /
    • 2015
  • The low-density parity-check(LDPC) code has been adopted in many communication standards due to its error correcting performance, and the quasi-cyclic LDPC(QC-LDPC) is widely used because of implementation easiness. In the QC-LDPC decoder, a cyclic-shifter is required to rotate data in various sizes. This kind of cyclic-shifters are called multi-size circular shifter(MSCS), and this paper proposes a low-complexity structure for MSCS. In the conventional serially-placed two barrel-rotators, the unnecessary multiplexers are revealed and removed, leading to low-complexity. The experimental results show that the area is reduced by about 12%.

Choquet integrals and interval-valued necessity measures (쇼케이 적분과 구간치 필요측도)

  • Jang, Lee-Chae;Kim, Tae-Kyun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.4
    • /
    • pp.499-503
    • /
    • 2009
  • Y. R$\acute{e}$ball$\acute{e}$ [11] discussed the representation of necessity measure through the Choquet integral criterian. He also consider a decision maker who ranks necessity measures related with Choquet integral representation. In this paper, we consider a decision maker have an "ambiguity"(say, interval-valued) necessity measure according to their Choquet's expected utility. Furthermore, we prove two theorems which are weak Choquet integral representation of preferences with a monotone set function for interval-valued necessity measures and strong Choquet integral representation of preferences with an interval-valued utility function for necessity measures.

Standard Model for Live Actor and Entity Representation in Mixed and Augmented Reality (혼합증강현실에서 라이브 행동자와 실체 표현을 위한 표준 모델)

  • Yooa, Kwan-Hee
    • Journal of Broadcast Engineering
    • /
    • v.21 no.2
    • /
    • pp.192-199
    • /
    • 2016
  • Mixed and augmented reality technique deals with mixing content between real world and virtual world containing augmented reality and augmented virtuality excluding of pure real and pure virtual world. In mixed and augmented reality, if a live actor and entity moving in real world can be embedded more naturally in 3D virtual world, various advanced applications such 3D tele-presence, 3D virtual experience education and etc can be serviced. Therefore, in this paper, we propose a standard model which is supporting to embed the live actor and entity into 3D virtual space, and to interact with each other. And also the natural embedding and interaction of live actor and entity can be performed based on the proposed model.

A Modularized Approach to the Development of the Creativity Learning Program

  • Won, Kyung-Ah
    • Archives of design research
    • /
    • v.20 no.2 s.70
    • /
    • pp.103-116
    • /
    • 2007
  • Art education in design has repeatedly stressed the importance of developing creativity. In the digital period, however, which shows rapid change in both forms and contents, it needs to be equipped with more flexible and systematic ways of approaching to the creativity development, especially involved with cultural diversity of the digital world. This paper primarily proposes a maximally efficient, productive creativity learning program in which the integration of expressive media and communication generates a comprehensive network of communicative information in the development of digital technologies, which, consequently, brings forth valuable cultural contents of art. The amalgamation of Won (2006)'s Prism Effect, with distinctive three devices, and the facilitator factors, with two different facilitators such as self-controlled and controlled plays, would function as a catalyst for cultural diversity in the digital forms and contents of art. And this will, consequently, result in producing a number of practices that can be classified and assorted for a later performance. This paper thus suggests a roadmap of how to develop the creativity learning program in which two categories of facilitators based on three thinking devices function to classify four activities. In addition, selected activities are shaped as a creativity learning program by generating learning practices with the formalizing instructional strategy that fit into a specialized educational environment and learners. The samples of loaming practice design show guidelines for practice and the results of learning activity. Therefore, the eventual goal of this paper would be to establish a creativity learning program that constitutes a highly systematized and modularized database to maximize the efficiency and productivity of the creativity development.

  • PDF