In this paper, we investigate a problem with an e-learning system for e-business environments and introduce the solving method of the problem. To be more accurate, existing Web-hosted and ASP (Application Service Provider)-oriented service model is difficult to cooperate and integrate among the different kinds of systems. So we have produced sharable and reusable learning object, they have extracted a principle from pedagogical designs for units of reuse. We call LIO (Learning Item Object). This modeling makes use of a constructing for XML Web Services. So to speak, units of reuse from pedagogical designs are test tutorial, resource, case example, simulation, problem, test, discovery and discussion and then map introduction, fact, try, quiz, test, link-more, tell-more LIO learning object. These typed LIOs are stored in metadata along with the information for a content location. Each one of LIOs is designed with components and exposed in an interface for XML Web services. These services are module applications, which are used a standard SOAP (Simple Object Access Protocol) and locate any computer over Internet and publish, find and bind to services. This guarantees the interoperation and integration of the different kinds of systems. As a result, the problem of e-learning systems for e-business environments was resolved and then the power of understanding about learning objects based on pedagogical design was increased for learner and instruction designers. And organizations of education hope for particular decreased costs in constructing e-learning systems.
Main machinery in the factory have various digital indicator to display its operating data for the manager. It is useful to control these datum at the remote office for factory automation in order to increase machine productivity. It is easy to use Ethernet infrastructure for remote communication. But most of all machinery in domestic factories still support RS232c or RS485 serial communication way. In this case to control machinery datum on the ethernet base, it is need to change RS232C or RS485 data to ethernet base. In this paper, in order to develop a remote progress management system through the wireless Internet, we show a design method to make easy maintenance by developing the system with both the JAVA language and RxTx Package for RS232c serial communication. For the system implementation, we added the digital indicator connect with a thermo couple to a machine which provide the real time status data of temperature. To connect machines management server program, we set up a convertor to change the RS485 data to the RS232c and also another convertor to change the RS232c data to wireless ethernet.
Kim, Won-Suk;Chung, Sang-Hwa;Choi, Hyun-Suk;Do, Mi-Rim
Journal of KIISE
/
v.41
no.10
/
pp.810-823
/
2014
The wireless mesh network based on IEEE 802.11s provides a routing based on a destination address as it inherits legacy internet architecture. However, this architecture interested in not 'what' which is originally the users goal but 'where'. Futhermore, because of the rapid increase of the number of mobile devices recently, the mobile traffic increases geometrically. It reduces the network effectiveness as increasing many packets which have same payload in the situation of many users access to the same contents. In this paper, we propose an OpenFlow-based contents routing for the wireless mesh network(WMN) to solve this problem. We implement contents layer to the legacy network layer which mesh network uses and the routing technique based on contents identifier for efficient contents routing. In addition we provide flexibility as we use OpenFlow. By using this, we implement caching technique to improve effectiveness of network as decreasing the packet which has same payload in WSN. We measure the network usage to compare the flooding technique, we measure the delay to compare environment using caching and non caching. As a result of delay measure it shows 20% of performance improve, and controller message decrease maximum 89%.
Journal of the Korea Institute of Information Security & Cryptology
/
v.28
no.2
/
pp.385-395
/
2018
With the development of Internet, cyber attack has become a major threat. To detect cyber attacks, intrusion detection system(IDS) has been widely deployed. But IDS has a critical weakness which is that it generates a large number of false alarms. One of the promising techniques that reduce the false alarms in real time is machine learning. However, there are problems that must be solved to use machine learning. So, many machine learning approaches have been applied to this field. But so far, researchers have not focused on features. Despite the features of IDS alerts are important for performance of model, the approach to feature is ignored. In this paper, we propose new feature set which can improve the performance of model and can be extracted from a single alarm. New features are motivated from security analyst's know-how. We trained and tested the proposed model applied new feature set with real IDS alerts. Experimental results indicate the proposed model can achieve better accuracy and false positive rate than SVM model with ordinary features.
Journal of the Korea Institute of Information Security & Cryptology
/
v.30
no.4
/
pp.617-629
/
2020
In order to overcome the limitations of the rule-based intrusion detection system due to changes in Internet computing environments, the emergence of new services, and creativity of attackers, network anomaly detection (NAD) using machine learning and deep learning technologies has received much attention. Most of these existing machine learning and deep learning technologies for NAD use supervised learning methods to learn a set of training data set labeled 'normal' and 'attack'. This paper presents the feasibility of the unsupervised learning AutoEncoder(AE) to NAD from data sets collecting of secured network traffic without labeled responses. To verify the performance of the proposed AE mode, we present the experimental results in terms of accuracy, precision, recall, f1-score, and ROC AUC value on the NSL-KDD training and test data sets. In particular, we model a reference AE through the deep analysis of diverse AEs varying hyper-parameters such as the number of layers as well as considering the regularization and denoising effects. The reference model shows the f1-scores 90.4% and 89% of binary classification on the KDDTest+ and KDDTest-21 test data sets based on the threshold of the 82-th percentile of the AE reconstruction error of the training data set.
A number of attempts to develop methods for measuring software effort have been focused on the area of software engineering and many models have also been suggested to estimate the effort of software projects. Almost all current models use algorithmic or statistical mechanisms, but the existing algorithmic effort estimation models have failed to produce accurate estimates. Furthermore, they are unable to reflect the rapidly changing technical environment of software development such as module reuse, 4GL, CASE tool, etc. In addition, these models do not consider the paradigm shift of software engineering and information systems(i.e., Object Oriented system, Client-Server architecture, Internet/Intranet based system etc.). Thus, a new approach to software effort estimation is needed. After reviewing and analyzing the problems of the current estimation models, we have developed a model and a system architecture that will improve estimation performance. In this paper, we have adopted a neural network model to overcome some drawbacks and to increase estimation performance. We will also address the efficient system architecture and estimation procedure by a similar case-based approach and finally suggest the heuristic search method to find the best estimate of target project through empirical experiments. According to our experiment with the optimally parsimonious neural network model the mean error rate was significantly reduced to 14.3%.
Kang, Jung Bae;Kim, Jin Hee;Kim, Chang Geol;Song, Beong Seop
Journal of Korea Society of Industrial Information Systems
/
v.18
no.4
/
pp.1-8
/
2013
In the modern society, instructional methods using diverse media have appeared thanks to the development of Information & Communication Technology, and applicability of such instructional methods has been fully corroborated. However, customized contents allowing for disabled children's environment are still insufficient. Hence, this study produced educational contents of play activities for children with developmental disability, through applying N-screen technology, IT technology that can provide the same contents via a variety of digital media. The produced contents allow programs to be set up according to a child's individual characteristics and be carried out anywhere and anytime via an Internet-enabled digital device. Further, the developed contents were produced so that they could be accessed from a child's various environment (home, school, etc.) via a PC, a smart phone, a portable from a child's various environment (home, school, etc.) via a PC, a smart phone, a portable device, etc. and that the same educational program could be conducted in linkage at home, school, etc. Three children with Intellectual disability and autism spectrum disorder were applied to the manufactured content. As a result, Content interaction between interaction between teachers and students in play training could use as a medium.In addition, the children's ability to select the appropriate components and reinforcements, special education professionals have used the content of the interviews are helpful in mediation than the existing content.
Park, Chung-Soon;Lee, Ji-Youn;Kim, Sun-Ju;Lee, Kyung-Hee;Ju, On-Ju
Journal of Korean society of Dental Hygiene
/
v.6
no.1
/
pp.49-61
/
2006
This study was intended to identify the pregnant women's oral health care behaviors and the necessity of active oral care so as to use in the dental hygiene education at dental clinics as basic materials to inform the importance of oral health during pregnancy and instruct how to improve it. And to suggest a dental service direction for dental hygienists, 150 pregnant women who visited the Ostetrics and Genecology Clinics located in tl,e north part of Cholla province were surveyed with questionnaire on their oral care behaviors, from september to October in 2004. The findings were as below: 1. 43.8% of the pregnant women have ever used the dental care institutes within the recent 3 months during pregnancy period. The purpose of the visits was mostly treatment of dental caries, accounting for 40.0%. Next came the treatment of periodontal diseases, accounting for 33.8%. 2. At dental care service, 84.7% of the pregnant women informed the clinic staff of their pregnancy, 12.0% of the pregnant women were having periodical oral examination. 3. 56.7% of the pregnant women have ever inquired about oral care methods, 24.0% of the pregnant women have ever taken any oral health education, of whom 47.1% had higher schooling over graduate school, with a statistically signifiant difference. 4. 55.3% of the pregnant women made changes in their oral care practice after they got pregnant. Change of oral care practices was more obvious in those who had higher schooling background, of whom specialist women accounted 76.9%. Change of oral care practices after pregnancy was statistically significantly different to the academic background and occupation. 5. Of the changes in oral care practice after pregnancy, 51.8% of the pregnant women answered they got sensitive to change in their oral status, and 39.8% increased the frequency of tooth brushing. 6. In selecting a tooth paste after they got pregnant, 58.0% of the women didn't give any special consideration to the kind of tooth paste, while 10.7% women as low selected such tooth pastes that contain fluoride. 7. Pregnant women's route for gathering oral care information was mostly mass media and Internet which accounted for 50.7%.
Tibetans who live in the Tibetan highlands, the Roof of the World, have their own unique lifestyle wherein they conform to its long history, natural environment, and their own form of clothing culture. In their costumes, the use of colors, patterns and designs express religious meaning and represent the hopes and heart of life, which respects nature. This study aims to analyze the colors used in Tibetan costumes and examine the meaning of these colors. In addition, this study intends to understand the specificity of Tibetan culture through a consideration of the symbolism of the colors of ethnic costumes. By examining the literature and conducting case studies, colors of Tibetan costumes were analyzed through the I.R.I HUE-TONE system. We analyzed 96 photographs of the costumes photographed during the Tibet ceremony costume, photographs seen at the Qinghai Tibet Culture Museum and photographs from the Internet museum. The results revealed the following: First, the most important element of the costumes is connected to the five colors of JangOsaek, which gives meaning to each color. Red, navy blue, yellow, white and green symbolize fire, the sky, earth, clouds or snow, and grasslands, respectively. Second, Tibetan costumes are characterized by bold color contrasts such as red and green, black and white, red and yellow, and yellow and purple to achieve an intense harmony of colors. Third, these fancy costumes express the unique aesthetics of the Tibetan people. The primary colors follow general emotions, but they can also include their own emotion.
In order to investigate the eating out behavior of university students, this survey was conducted using the questionaires for 710 students(369 male, 341 female) from 11 universities in Seoul. It was revealed that 39.4% of the subjects spent $60,000{\sim}100,000$ won for monthly eating out cost and 57.8% of them ate out more than once a day. Most of them expended less than 3,500 won for lunch, while 36.5% of them spent $4,000 {\sim}5,000$ won for dinner. Dinner was regarded more important than lunch. Korean foods were the most preferred menu for eating out with friends and fast foods were the second. But Boonsik(snack bar foods), Chinese foods and Japanease foods were rarely selected. Frequency of selecting fast foods was 8 times greater than that of Boonsik. This indicates that the preference of western flavor and the pursuit of convenience is getting more obvious. While dating, western foods were preferred, followed by Korean foods, fast foods. The 80 kinds of foods were reported as favored eating out foods. Although 50 among 80 were Korean foods, the rest of them were Koreanized foreign foods most of those were western style. This may suggest that when the students become adults, they will be much fond of western dish for their dinning out. This tendency of preferring western flavor were much apparent in foods for dinner compared with lunch. In both sexes, the standard of food choice was in the order of taste, price, mood, hygiene, service and brand name. But male students were more conscious of price and service while female students were more concerned about taste and hygiene. Most unsatisfying feature in restaurant was unstable atmosphere for both sexes. Taste was the most important sensory factor in selecting the foods, followed by appearance, smell and texture. Major source of restaurant information was recommendation by friends or relatives. But the use of internet or magazine was negligible. Female students had more positive attitude, compared with male students, in using restaurant information and pursuing eating out for gourmet. The dining out menu of which price ranges about $3,000{\sim}5,000$ won could be preferable foods for most people. Therefore, instead of blaming them for eating too much fast foods, new menus which fit the food preference and affordability of the students should be developed.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.