• Title/Summary/Keyword: education of internet and computer

Search Result 881, Processing Time 0.032 seconds

Design and Implementation of Web-based Automatic Study Evaluation System (웹 기반 학습평가 자동화 시스템의 설계 및 구현)

  • Jeong, Yong-Gi;Choe, Eun-Man
    • The KIPS Transactions:PartD
    • /
    • v.9D no.2
    • /
    • pp.289-296
    • /
    • 2002
  • The web, which is most actively used in the internet environment, is changing educational system. Students usually prefer the interactive and multimedia learning aids based on web applications and web media to static web pages. The former is known to enhance the effectiveness of learning. This paper proposes a study system which involves effective adaptation to the various changing factors of learners' progress and the corresponding automated evaluation system. Conventional evaluation utilizes normalized method, where the learning objectives generally set by the instructors or educational operators/administrators are usually pursued rather than the interest of the individual learners, which is not ideal for the computer-based learning. Web-based project-oriented learning system provokes the mutual participations among the users, operators, and administrators in understanding the jobs to be performed and the effort to enhance the progressive developments of knowledge and application capabilities. In this Paper, an automated evaluation system is implemented, where the instructors and web-operators/administrators work as hosts for education. The learners take advantage of user-oriented comparative learning and pattern design. The design and implementation of the project-oriented evaluation methods performed in the internet/intranet environments are discussed.

A Study of the Influence on Purchasing Process and Customer Satisfaction in Internet Shopping Mall by Electronic Commerce Education (전자상거래 교육이 인터넷 쇼핑몰의 구매과정과 고객만족에 미치는 영향)

  • 조동훈
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.7
    • /
    • pp.875-884
    • /
    • 2001
  • This study was attempted to find out the result of the comparison between participant group and absentee group of electronic commerce lecture in internet shopping mall. To find out difference among the burden for ordering, convenience for ordering, uneasiness for goods and service and satisfaction for goods and service, experimental approach was adopted. The finding were that burden for ordering, convenience for ordering and uneasiness for goods makes no difference, but satisfaction for goods and service make a difference. The result of the analysis in the research shows as following. First, they showed no difference between participant group and absentee group on the feeling burden during the ordering process. Second, they showed no difference between the two groups on the feeling of convenience during the ordering process. Third, they showed no difference between the two groups on the feeling of unstable for goods and service. Fourth, they showed no difference between the two groups on the feeling of convenience for goods and service.

  • PDF

Monitoring system for packet analysis on Wi-Fi environment (Wi-Fi 환경에서 패킷 분석을 위한 모니터링 시스템)

  • Seo, Hee-Suk;Kim, Hee-Wan;Ahn, Woo-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.12
    • /
    • pp.227-234
    • /
    • 2011
  • Many technologies for wireless internet are increasing as more and more laptop computers, net books, smart phone and other terminals, which provide wireless network, are created. IEEE 802.11 is computer wireless network technology that used in small area, called wireless LAN or Wi-Fi. IEEE 802.11 is a set of standards for implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6 and 5 GHz frequency bands. They are created and maintained by the IEEE LAN/MAN Standards Committee (IEEE 802). AP (Access Point) is installed at cafes and public places providing wireless environment. It is more convenient to use wireless internet, however, It can be seen easily around us and possible to communicate with AP. IEEE 802.11 has many vulnerability, such as packet manipulation and information disclosure, so we should pay more attention when using IEEE 802.11. Therefore this paper developing monitoring system which can find out AP and Stations that connect with it, and capturing AP's information to find out vulnerability. This paper suggests monitoring system which traffic analysis in wireless environment.

Curriculum Design for Overseas Employment (focused on Japanese IT courses) (해외 취업을 위한 교육과정 설계(일본 IT과정을 중심으로))

  • Kwon, Yoon Kyung;Lee, MyounJae
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.1
    • /
    • pp.31-36
    • /
    • 2022
  • As the society progresses to a knowledge economy, global demand is rapidly increasing in many fields of society. In line with this, interest in globalization is also increasing in universities. Accordingly, students who have graduated from universities are making efforts to find employment in Korea, but the barriers to entry for employment are high due to the high specifications and qualifications of domestic companies, so the government, local governments, and universities are putting a lot of effort into global overseas employment. This study is a training course design for the K-MOVE project aimed at employment in Japanese IT companies. To design this curriculum, we conduct a demand survey of recruiting companies and students, and draw a curriculum based on the results. Then, the effective link between regular subjects and K-MOVE education will be described. This study can be a useful resource for education experts planning overseas employment in the Japanese IT field.

Reversible Data Hiding in Permutation-based Encrypted Images with Strong Privacy

  • Shiu, Chih-Wei;Chen, Yu-Chi;Hong, Wien
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.1020-1042
    • /
    • 2019
  • Reversible data hiding in encrypted images (RDHEI) provides some real-time cloud applications; i.e. the cloud, acting as a data-hider, automatically embeds timestamp in the encrypted image uploaded by a content owner. Many existing methods of RDHEI only satisfy user privacy in which the data-hider does not know the original image, but leaks owner privacy in which the receiver can obtains the original image by decryption and extraction. In the literature, the method of Zhang et al. is the one providing weak content-owner privacy in which the content-owner and data-hider have to share a data-hiding key. In this paper, we take care of the stronger notion, called strong content-owner privacy, and achieve it by presenting a new reversible data hiding in encrypted images. In the proposed method, image decryption and message extraction are separately controlled by different types of keys, and thus such functionalities are decoupled to solve the privacy problem. At the technique level, the original image is segmented along a Hilbert filling curve. To keep image privacy, segments are transformed into an encrypted image by using random permutation. The encrypted image does not reveal significant information about the original one. Data embedment can be realized by using pixel histogram-style hiding, since this property, can be preserved before or after encryption. The proposed method is a modular method to compile some specific reversible data hiding to those in encrypted image with content owner privacy. Finally, our experimental results show that the image quality is 50.85dB when the averaged payload is 0.12bpp.

A Study on National ICT Competency Model (국가정보화역량모델에 대한 연구)

  • Kim, Jee-Hyun;Cho, Young-Im
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.275-281
    • /
    • 2015
  • Korea's e-government is the world best system and the open government data field is also ranking number 1 by UN evaluation. Therefore Korea's ICT level is ranking number 1 in the world especially in ICT (Information Communication Technology). However, in terms of national ICT capabilities, national ICT competency education is tend to perform by the simple list of courses rather than detail definition of the specific skills or training. In this paper, we define the national ICT capabilities through research and analysis of the national ICT competency model and define the relevant curriculum. This is very important to develop national ICT competency as well as ICT technologies because other countries will develop their information by learning from Korea's ICT and e-government as a model. Therefore, we firstly study about the national ICT competency model and will be drawn from the courses required for national ICT competency model.

A study on the developing and implementation of the Cyber University (가상대학 구현에 관한 연구)

  • Choi, Sung;Yoo, Gab-Sang
    • Proceedings of the Technology Innovation Conference
    • /
    • 1998.06a
    • /
    • pp.116-127
    • /
    • 1998
  • The Necessity of Cyber University. Within the rapidly changing environment of global economics, the environment of higher education in the universities, also, has been, encountering various changes. Popularization on higher education related to 1lifetime education system, putting emphasis on the productivity of education services and the acquisition of competitiveness through the market of open education, the breakdown of the ivory tower and the Multiversitization of universities, importance of obtaining information in the universities, and cooperation between domestic and oversea universities, industry and educational system must be acquired. Therefore, in order to adequately cope wi th these kinds of rapid changes in the education environment, operating Cyber University by utilizing various information technologies and its fixations such as Internet, E-mail, CD-ROMs, Interact ive Video Networks (Video Conferencing, Video on Demand), TV, Cable etc., which has no time or location limitation, is needed. Using informal ion and telecommunication technologies, especially the Internet is expected to Or ing about many changes in the social, economics and educational area. Among the many changes scholars have predicted, the development and fixations of Distant Learning or Cyber University was the most dominant factor. In the case of U. S. A., Cyber University has already been established and in under operation by the Federate Governments of 13 states. Any other universities (around 500 universities has been opened until1 now), with the help of the government and private citizens have been able to partly operate the Cyber University and is planning on enlarging step-by-step in the future. It could be seen not only as U. S. A. trying to elevate its higher education through their leading information technologies, but also could be seen as their objective in putting efforts on subordinating the culture of the education worldwide. UTRA University in U. S. A., for example, is already exporting its class lectures to China, and Indonesia regions. Influenced by the Cyber University current in the U.S., the Universities in Korea is willing .to arrange various forms of Cyber Universities. In line with this, at JUNAM National University, internet based Cyber University, which has set about its work on July of 1997, is in the state of operating about 100 Cyber Universities. Also, in the case of Hanam University, the Distant Learning classes are at its final stage of being established; this is a link in the rapid speed project of setting an example by the Korean Government. In addition, the department of education has selected 5 universities, including Seoul Cyber Design University for experimentation and is in the stage of strategic operation. Over 100 universities in Korea are speeding up its preparation for operating Cyber University. This form of Distant Learning goes beyond the walls of universities and is in the trend of being diffused in business areas or in various training programs of financial organizations and more. Here, in the hope that this material would some what be of help to other Universities which are preparing for Cyber University, I would 1ike to introduce some general concepts of the components forming Cyber University and Open Education System which has been established by JUNAM University. System of Cyber University could be seen as a general solution offered by tile computer technologies for the management on the students, Lectures On Demand, real hour based and satellite classes, media product ion lab for the production of the multimedia Contents, electronic library, the Groupware enabling exchange of information between students and professors. Arranging general concepts of components in the aspect of Cyber University and Open Education, it would be expressed in the form of the establishment of Cyber University and the service of Open Education as can be seen in the diagram below.

  • PDF

A Study on Ontology Based Knowledge Representation Method with the Alzheimer Disease Related Articles (알츠하이머 관련 논문을 대상으로 하는 온톨로지 기반 지식 표현 방법 연구)

  • Lee, Jaeho;Kim, Younhee;Shin, Hyunkyung;Song, Kibong
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.125-135
    • /
    • 2014
  • In the medical field, for the purpose of diagnosis and treatment of diseases, building knowledge base has received a lot of attention. The most important thing to build a knowledge base is representing the knowledge accurately. In this paper we suggest a knowledge representation method using Ontology technique with the datasets obtained from the domestic papers on Alzheimer disease that has received a lot of attention recently in the medical field. The suggested Ontology for Alzheimer disease defines all the possible classes: lexical information from journals such as 'author' and 'publisher' research subjects extracted from 'title', 'abstract', 'keywords', and 'results'. It also included various semantic relationships between classes through the Ontology properties. Inference can be supported since our Ontology adopts hierarchical tree structure for the classes and transitional characteristics of the properties. Therefore, semantic representation based query is allowed as well as simple keyword query, which enables inference based knowledge query using an Ontology query language 'SPARQL'.

Attendance Appraisal for Learner Participation Degree Based Virtual Lecture (학습자 참여도 정보기반 가상강좌 출석평가 모델)

  • Kim, Hyun-Ju
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.4
    • /
    • pp.119-129
    • /
    • 2009
  • In The increasing use of computers and high-speed Internet network has greatly influenced education, causing a veering away from the typical and traditional way of delivering instruction. Specifically, the various kinds of Web-based multimedia technology, the interactive activities on the Internet, and satellite broadcasting technology are accelerating the emergence of a virtual-lectures-based educational model, which transcends time and space. Such virtual lectures make it possible for the entire teaching-learning process to be done in a virtual learning environment, thus giving rise to problem regarding learning guidance, feedback, and appraisal. In this paper, we propose a system for attendance appraisal for learner participation degree based virtual lecture, an appraisal element in virtual learning environments. This appraisal model can set the elements of virtual learning environments in such a way as to reflect in the attendance appraisal of the opened virtual learning environment information regarding the learner's participation in class. In addition, this model motivates the learners to actively participate in the virtual learning environment and to support instructors by accomplishing the activities that are needed for attendance appraisal.

The Effect of an Integrated Rating Prediction Method on Performance Improvement of Collaborative Filtering (통합 평가치 예측 방안의 협력 필터링 성능 개선 효과)

  • Lee, Soojung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.5
    • /
    • pp.221-226
    • /
    • 2021
  • Collaborative filtering based recommender systems recommend user-preferrable items based on rating history and are essential function for the current various commercial purposes. In order to determine items to recommend, prediction of preference score for unrated items is estimated based on similar rating history. Previous studies usually employ two methods individually, i.e., similar user based or similar item based ones. These methods have drawbacks of degrading prediction accuracy in case of sparse user ratings data or when having difficulty with finding similar users or items. This study suggests a new rating prediction method by integrating the two previous methods. The proposed method has the advantage of consulting more similar ratings, thus improving the recommendation quality. The experimental results reveal that our method significantly improve the performance of previous methods, in terms of prediction accuracy, relevance level of recommended items, and that of recommended item ranks with a sparse dataset. With a rather dense dataset, it outperforms the previous methods in terms of prediction accuracy and shows comparable results in other metrics.