• Title/Summary/Keyword: cyber learning system

Search Result 273, Processing Time 0.026 seconds

Blockchain Based Data-Preserving AI Learning Environment Model for Cyber Security System (AI 사이버보안 체계를 위한 블록체인 기반의 Data-Preserving AI 학습환경 모델)

  • Kim, Inkyung;Park, Namje
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.12
    • /
    • pp.125-134
    • /
    • 2019
  • As the limitations of the passive recognition domain, which is not guaranteed transparency of the operation process, AI technology has a vulnerability that depends on the data. Human error is inherent because raw data for artificial intelligence learning must be processed and inspected manually to secure data quality for the advancement of AI learning. In this study, we examine the necessity of learning data management before machine learning by analyzing inaccurate cases of AI learning data and cyber security attack method through the approach from cyber security perspective. In order to verify the learning data integrity, this paper presents the direction of data-preserving artificial intelligence system, a blockchain-based learning data environment model. The proposed method is expected to prevent the threats such as cyber attack and data corruption in providing and using data in the open network for data processing and raw data collection.

An Empirical Study of Factors Influencing the Learning Effect of Cyber Universities (가상대학의 학습효과에 영향을 미치는 요인에 대한 실증적 연구)

  • 허미화;염창선
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.24 no.63
    • /
    • pp.79-87
    • /
    • 2001
  • To make cyber universities competitive, the level of the learning effect for students should be improved. The objective of this study is to analyse the factors influencing the learning effect of cyber universities. For this purpose, questionnaire survey has been used. For the statistical analysis, multivariate linear regression were utilized using the SAS program. According to the results in this study, the variables that influence toward the learning effect are the experience of computer, the systematic and comprehensive lecture note, and the quickly responses to questions. These variables can be utilized in improving the educational service quality of cyber universities.

  • PDF

Design and Implementation of the Chatting Service at the Cyber Universities (사이버 대학의 채팅서비스 설계 및 구현)

  • Lee, Min Jung;Lim, Hyo Yeon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.07a
    • /
    • pp.197-198
    • /
    • 2017
  • 최근 IT기술의 발전, 대학 교육의 글로벌화 등의 추세는 대학의 이러닝(e-learning) 형태의 교육을 촉진하고 있다. 국내향후 연구에서는 17개의 사이버대학은 이러닝 형태의 교육을 제공하고 있는데, 최근 재학생 수가 크게 증가하고 있다. 이에 사이버대학들은 우수한 강의 제공을 위해 학생-교수간의 다양한 상호작용에 대해서 연구하고 있다. 본 연구는 사이버대학의 LMS(Learning Management System)에 온라인 채팅 서비스를 최초로 도입하여, 시스템을 구축하였다. 본 연구에서는 온라인 채팅과 학습만족과의 관계에 대해서 검증하고, 강의질 개선을 위한 전략을 도출하고자 한다.

  • PDF

Efficient Cyber Lecture System using SCC (강의객체를 이용한 효율적인 가상강의 시스템)

  • 강정배;김선경
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.9 no.1
    • /
    • pp.49-55
    • /
    • 2004
  • E-Learning standard SCORM has been prepared in the United States to establish the efficient operation and development of e-Learning. The learning object of the current SCORM focuses on easy development and reusability in the professor's side. In this study instead, we present a SCC (Sharable Content Collection) scheme which can provide various studying opportunities to the learners. Constructing an efficient SCC requires improving the SCO (Sharable Content Object), a key ingredient of SCORM, and analyzing the cyber lecture into components. In this way we suggest a method to improve the existing learning objects and present an e-Learning model based on SCC.

  • PDF

A Study of Reinforcement Learning-based Cyber Attack Prediction using Network Attack Simulator (NASim) (네트워크 공격 시뮬레이터를 이용한 강화학습 기반 사이버 공격 예측 연구)

  • Bum-Sok Kim;Jung-Hyun Kim;Min-Suk Kim
    • Journal of the Semiconductor & Display Technology
    • /
    • v.22 no.3
    • /
    • pp.112-118
    • /
    • 2023
  • As technology advances, the need for enhanced preparedness against cyber-attacks becomes an increasingly critical problem. Therefore, it is imperative to consider various circumstances and to prepare for cyber-attack strategic technology. This paper proposes a method to solve network security problems by applying reinforcement learning to cyber-security. In general, traditional static cyber-security methods have difficulty effectively responding to modern dynamic attack patterns. To address this, we implement cyber-attack scenarios such as 'Tiny Alpha' and 'Small Alpha' and evaluate the performance of various reinforcement learning methods using Network Attack Simulator, which is a cyber-attack simulation environment based on the gymnasium (formerly Open AI gym) interface. In addition, we experimented with different RL algorithms such as value-based methods (Q-Learning, Deep-Q-Network, and Double Deep-Q-Network) and policy-based methods (Actor-Critic). As a result, we observed that value-based methods with discrete action spaces consistently outperformed policy-based methods with continuous action spaces, demonstrating a performance difference ranging from a minimum of 20.9% to a maximum of 53.2%. This result shows that the scheme not only suggests opportunities for enhancing cybersecurity strategies, but also indicates potential applications in cyber-security education and system validation across a large number of domains such as military, government, and corporate sectors.

  • PDF

e-Learning System Design and Implementation for Small Sized Cyber Lecturing (소형 사이버강좌를 위한 e-Learning시스템 설계 및 구현 사례)

  • Seo, Chang-Gab;Park, Sung-Kyou
    • Information Systems Review
    • /
    • v.6 no.2
    • /
    • pp.161-179
    • /
    • 2004
  • The purpose of this study is to suggest practical experience to develop small sized e-Learning system. The system is designed to help lecturers can arrange interface, organize contents, submit examinations and assess learner's score with no professional computing skills. The system has three advantages. First, it reduced implementation period through the use of GUI. Second, it is ordered to be personalized to construct format of the whole interface. Third, it has operational convenience which can be implemented on PC based system. These personalized features are enabling Learning on Demand. Also, there is comparatively low cost and high effectiveness on e-Learning implementation which facilitating quick adoption of e-Learning in its lectures.

The Development and Using Method of Cyber Learning Using Conceptual Models of Knowledge Creation (지식창출 개념적 모델을 이용한 가상학습 시스템의 개발 및 활용 방안)

  • Kim, Jeong-Rang;Ki, Yong-Ju
    • Journal of The Korean Association of Information Education
    • /
    • v.6 no.1
    • /
    • pp.98-109
    • /
    • 2002
  • In this knowledge-based society, a man of ability should be able to be possessed of abilities to create new knowledge while selecting, acquiring and processing knowledge and information in line with his own purpose and communicating it to other people and sharing it with them. With the aid of the emergence of web, cyber learning in the form of web-based instruction is brought to the fore. Yet, the established way of cyber learning is based on the system where learners should proceed with this study on his own instead of relying on the interaction between teachers and learners. The established way of cyber learning leaves something to be desired in terms of the application of the way to class, being almost bereft of a system capable of recreating knowledge as the result of study. Accordingly, this study is designed to develop a cyber learning system using models with the concepts of knowledge construction. The system enabled students to cultivate abilities to analyze materials and to improve creativity, producing the following system; applying it to the teaching-learning process of social studies: the system capable of being applied to a series of process from the stage of grasping problems to the stage of learning completion; the system enabling teachers and students as well to produce study results; the system enabling students to recreate knowledge in the form of homepages from constructed learning resources instead of producing fragmental knowledge.

  • PDF

Study for Prediction System of Learning Achievements of Cyber University Students using Deep Learning based on Autoencoder (오토인코더에 기반한 딥러닝을 이용한 사이버대학교 학생의 학업 성취도 예측 분석 시스템 연구)

  • Lee, Hyun-Jin
    • Journal of Digital Contents Society
    • /
    • v.19 no.6
    • /
    • pp.1115-1121
    • /
    • 2018
  • In this paper, we have studied a data analysis method by deep learning to predict learning achievements based on accumulated data in cyber university learning management system. By predicting learner's academic achievement, it can be used as a tool to enhance learner's learning and improve the quality of education. In order to improve the accuracy of prediction of learning achievements, the autoencoder based attendance prediction method is developed to improve the prediction performance and deep learning algorithm with ongoing evaluation metrics and predicted attendance are used to predict the final score. In order to verify the prediction results of the proposed method, the final grade was predicted by using the evaluation factor attendance data of the learning process. The experimental result showed that we can predict the learning achievements in the middle of semester.

Advanced insider threat detection model to apply periodic work atmosphere

  • Oh, Junhyoung;Kim, Tae Ho;Lee, Kyung Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1722-1737
    • /
    • 2019
  • We developed an insider threat detection model to be used by organizations that repeat tasks at regular intervals. The model identifies the best combination of different feature selection algorithms, unsupervised learning algorithms, and standard scores. We derive a model specifically optimized for the organization by evaluating each combination in terms of accuracy, AUC (Area Under the Curve), and TPR (True Positive Rate). In order to validate this model, a four-year log was applied to the system handling sensitive information from public institutions. In the research target system, the user log was analyzed monthly based on the fact that the business process is processed at a cycle of one year, and the roles are determined for each person in charge. In order to classify the behavior of a user as abnormal, the standard scores of each organization were calculated and classified as abnormal when they exceeded certain thresholds. Using this method, we proposed an optimized model for the organization and verified it.

Participant Characteristic and Educational Effects for Cyber Agricultural Technology Training Courses (사이버농업기술교육 참가자의 특성과 교육효과)

  • Kang, Dae-Koo
    • Journal of Agricultural Extension & Community Development
    • /
    • v.21 no.1
    • /
    • pp.35-82
    • /
    • 2014
  • It was main objectives to find the learners characteristics and educational effects of cyber agricultural technology courses in RDA. For the research, it was followed by literature reviews and internet based survey methods. In internet based survey, two staged stratified sampling method was adopted from cyber training members database in RDA along with some key word as open course or certificate course, and enrollment years. Instrument was composed through literature reviews about cyber education effects and educational effect factors. And learner characteristics items were added in survey documents. It was sent to sampled persons by e-mail and 316 data was returned via google survey systems. Through the data cleaning, 303 data were analysed by chi-square, t-test and F-test. It's significance level was .05. The results of the research were as followed; First, the respondent was composed of mainly man(77.9%), and monthly income group was mainly 2,000,000 or 3,000,000 won(24%), bachelor degree(48%), fifty or forty age group was shared to 75%, and their job was changed after learning(12.2%). So major respondents' job was not changed. Their major was not mainly agriculture. Learners' learning style were composed of two or more types as concrete-sequential, mixing, abstract-random, so e-learning course should be developed for the students' type. Second, it was attended at 3.2 days a week, 53.53 minutes a class, totally 172.63 minutes a week. They were very eager or generally eager to study, and attended two or more subjects. The cyber education motives was for farming knowledge, personal competency development, job performance enlarging. They selected subjects along with their interest. A subject person couldn't choose more subjects for little time, others, non interesting subject, but more subject persons were for job performance benefits and previous subjects effectiveness. Most learner was finished their subject, but a fourth was not finished for busy (26.7%). And their entrying behavior was not enough to learn e-course and computer or internet using ability was middle level as software using. And they thought RDA cyber course was comfort in non time or space limit, knowledge acquisition, and personal competency development. Cyber learning group was composed of open course only (12.5%), certificate only(25.7%), both(36.3%). Third, satisfaction and academic achievement of e-learning learners were good, and educational service offering for doing job in learning application category was good, but effect of cyber education was not good, especially, agricultural income increasing was not good because major learner group was not farmer, so they couldn't apply their knowledge to farming. And content structure and design, content comprehension, content amount were good. The more learning subject group responded to good in effects, and both open course and certificate course group satisfied more than open course only group. Based on the results, recommendation was offered as cyber course specialization before main course in RDA training system, support staff and faculty enlargement, building blended learning system with local RDA office, introducing cyber tutor system.