• Title/Summary/Keyword: java script

Search Result 215, Processing Time 0.025 seconds

The Design and Implementation of Databank System Based on the Web (웹을 기반으로 한 문제은행 시스템 설계 및 구현)

  • Nah, Jong-Seok;Ko, Byung-Oh
    • Journal of The Korean Association of Information Education
    • /
    • v.4 no.2
    • /
    • pp.202-211
    • /
    • 2001
  • Learner-oriented education and distance education based on Information & Communication technology are educational countermeasure to various demands of Information age. Especially Web has the characteristics of providing proper environments for implementing constructivism study theory. Yet, existing web-based evaluation system is implemented by HTML and Java script so it has low interaction and imperfect educational effects. Therefore, We evaluated students' study understanding ability of real-time distance education system and analyzed evaluation results to offer useful information for level study considering individual variation. In this thesis, with these results, we designed and implemented interworking and multimedia databank system without time and space limitations on Client/Server environment.

  • PDF

Development of Web-based Multimedia Content for a Physical Examination and Health Assessment Course (웹기반의 건강사정 멀티미디어 컨텐츠 개발)

  • Oh Pok-Ja;Kim Il-Ok;Shin Sung-Rae;Jung Hoe-Kyung
    • Journal of Korean Academy of Nursing
    • /
    • v.34 no.6
    • /
    • pp.994-1003
    • /
    • 2004
  • Purpose: This study was to develop Web-based multimedia content for Physical Examination and Health Assesment. Method: The multimedia content was developed based on Jung's teaching and learning structure plan model, using the following 5 processes: 1) Analysis Stage, 2) Planning Stage, 3) Storyboard Framing and Production Stage, 4) Program Operation Stage, and 5) Final Evaluation Stage. Results: The web based multimedia content consisted of an intro movie, main page and sub pages. On the main page, there were 6 menu bars that consisted of Announcement center, Information of professors, Lecture guide, Cyber lecture, Q&A, and Data centers, and a site map which introduced 15 week lectures. In the operation of web based multimedia content, HTML, JavaScript, Flash, and multimedia technology(Audio and Video) were utilized and the content consisted of text content, interactive content, animation, and audio & video. Consultation with the experts in context, computer engineering, and educational technology was utilized in the development of these processes. Conclusions: Web-based multimedia content is expected to offer individualized and tailored learning opportunities to maximize and facilitate the effectiveness of the teaching and learning process. Therefore, multimedia content should be utilized concurrently with the lecture in the Physical Examination and Health Assesment classes as a vital teaching aid to make up for the weakness of the face-to- face teaching-learning method.

Geohashed Spatial Index Method for a Location-Aware WBAN Data Monitoring System Based on NoSQL

  • Li, Yan;Kim, Dongho;Shin, Byeong-Seok
    • Journal of Information Processing Systems
    • /
    • v.12 no.2
    • /
    • pp.263-274
    • /
    • 2016
  • The exceptional development of electronic device technology, the miniaturization of mobile devices, and the development of telecommunication technology has made it possible to monitor human biometric data anywhere and anytime by using different types of wearable or embedded sensors. In daily life, mobile devices can collect wireless body area network (WBAN) data, and the co-collected location data is also important for disease analysis. In order to efficiently analyze WBAN data, including location information and support medical analysis services, we propose a geohash-based spatial index method for a location-aware WBAN data monitoring system on the NoSQL database system, which uses an R-tree-based global tree to organize the real-time location data of a patient and a B-tree-based local tree to manage historical data. This type of spatial index method is a support cloud-based location-aware WBAN data monitoring system. In order to evaluate the proposed method, we built a system that can support a JavaScript Object Notation (JSON) and Binary JSON (BSON) document data on mobile gateway devices. The proposed spatial index method can efficiently process location-based queries for medical signal monitoring. In order to evaluate our index method, we simulated a small system on MongoDB with our proposed index method, which is a document-based NoSQL database system, and evaluated its performance.

A Case Study on the Design-First Approach and using UML for a Video Rental Store (Design-First Approach 와 UML이용)

  • Kook, Joong-Kak
    • Journal of the Korea Computer Industry Society
    • /
    • v.8 no.1
    • /
    • pp.1-8
    • /
    • 2007
  • In this paper, teaching object-oriented design in a programming course is a big challenge for instructors. "Objects-first" is a popular strategy for teaching object-oriented programming in the educational settings, by introducing the concepts of objects, classes, and instances before procedural elements of a programming language. Still, this approach emphasizes coding rather than other critical aspects of software development, notably problem-solving and design. We propose a "design-first" approach, which subsumes an objects-first approach into lessons that also introduce object-oriented analysis and design, using elements of UML before implementing any code. We also present video rental store (SRS) that uses the design-first approach to help students of various teaming styles in a software engineering course. It interfaces with an IDE we have chosen specifically to support the design-first approach, and SRS which has been shown to be effective in helping students learn object-oriented programming concepts.

  • PDF

Implementation and application of interactive Web3D Contents (상호대화식 Web3D 컨텐츠의 구현 및 응용)

  • Kim Hyeock-Jin
    • Journal of the Korea Computer Industry Society
    • /
    • v.6 no.2
    • /
    • pp.317-324
    • /
    • 2005
  • The web technology related with internet at present is changed into the 3D interactive environment form one sided communication of simple contents. In this paper, a high quality interactive Web3D Contents was realized by using the TurnTool, a authoring tool. This paper suggests the method that can easily and quickly realize the Web3D manual which is more realistic md capable of interaction with user. This method makes up for the weak points in the existing Web3D tool system. Therefore we can realize the contents that able to easily interact through minimizing file size md omitting procedure of additional EAI(External Authoring Interface) by using the Java Script.

  • PDF

Static Analysis of Large Scale Software Repositories Using WALA and Boa (WALA와 Boa를 활용하여 대규모 소프트웨어 저장소를 정적으로 분석하는 도구 개발)

  • Park, Gyunghee;Ryu, Sukyoung
    • Journal of KIISE
    • /
    • v.44 no.10
    • /
    • pp.1081-1086
    • /
    • 2017
  • A program analysis of a large-scale open-source software repository has a significant meaning in that it allows us to examine the changes and improvements of the software in repositories, and this brings more reliable results based on a large amount of programs. In this paper, we introduce a new static analysis framework WALABOA, which enables a scalable static analysis of large-scale software repositories. In addition, we show new findings from applying WALABOA, together with a module comparing the analysis results from a static analysis and a dynamic analysis, in evaluation of the field-based analysis, one of JavaScript static analysis techniques used in WALA.

A Study on UCC and Information Security for Personal Image Contents Based on CCTV-UCC Interconnected with Smart-phone and Mobile Web

  • Cho, Seongsoo;Lee, Soowook
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.2
    • /
    • pp.56-64
    • /
    • 2015
  • The personal image information compiled through closed-circuit television (CCTV) will be open to the internet with the technology such as Long-Tail, Mash-Up, Collective Intelligence, Tagging, Open Application Programming Interface (Open-API), Syndication, Podcasting and Asynchronous JavaScript and XML (AJAX). The movie User Created Contents (UCC) connected to the internet with the skill of web 2.0 has the effects of abuse and threat without precedent. The purpose of this research is to develop the institutional and technological method to reduce these effects. As a result of this research, in terms of technology this paper suggests Privacy Zone Masking, IP Filtering, Intrusion-detection System (IDS), Secure Sockets Layer (SSL), public key infrastructure (PKI), Hash and PDF Socket. While in terms of management this paper suggests Privacy Commons and Privacy Zone. Based on CCTV-UCC linked to the above network, the research regarding personal image information security is expected to aid in realizing insight and practical personal image information as a specific device in the following research.

The Development of a System for Product Search Using a Sensibility and Configuration Database on Designing Men's Jackets (신사복 재킷디자인의 감성 및 형상 데이터베이스를 이용한 제품검색 시스템 개발에 관한 연구)

  • Park, Yun-A
    • Journal of the Korean Home Economics Association
    • /
    • v.44 no.4 s.218
    • /
    • pp.133-144
    • /
    • 2006
  • The contemporary period is called "the age of sensibility" in which each individual consumer seeks to have her or his own products. Businesses are in need of design developments with an emphasis on customer sensitivity, and at the same time consumers must understand their own sensitivity to acquire information on designs that suit them. This research established a sensitivity and configuration database on designing men's jackets using the sensitivity engineering approach to clothing design information. The user interface was created on the Internet. Sixty-seven sensitivity terms of vocabulary appropriate for the assessment of men's jacket design were selected, and the different designs were classified into six items and 24 categories. Thirty men's jackets with different designs were produced for sensory testing and the results were analyzed in accordance with general linear I statistics. A sensitivity database was established for each category. My-sql, PHP, Java Script, and Html were used for the configuration database work. The configuration of items/categories, with the most appropriate sensitivity database information assigned to the selected sensitivity vocabulary, was programmed for display on the computer screen. The sensitivity vocabulary of a customer's choice for each factor was selected for the program to run, while the category and product configuration of the men's jacket most suitable for the search was displayed based on the user interface.

A SECURITY ARCHITECTURE FOR THE INTERNET OF THINGS

  • Behrens, Reinhard;Ahmed, Ali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.6092-6115
    • /
    • 2017
  • This paper demonstrates a case for an end-to-end pure Application Security Layer for reliable and confidential communications within an Internet of Things (IoT) constrained environment. To provide a secure key exchange and to setup a secure data connection, Transport Layer Security (TLS) is used, which provides native protection against replay attacks. TLS along with digital signature can be used to achieve non-repudiation within app-to-app communications. This paper studies the use of TLS over the JavaScript Object Notation (JSON) via a The Constrained Application Protocol (CoAP) RESTful service to verify the hypothesis that in this way one can provide end-to-end communication flexibility and potentially retain identity information for repudiation. As a proof of concept, a prototype has been developed to simulate an IoT software client with the capability of hosting a CoAP RESTful service. The prototype studies data requests via a network client establishing a TLS over JSON session using a hosted CoAP RESTful service. To prove reputability and integrity of TLS JSON messages, JSON messages was intercepted and verified against simulated MITM attacks. The experimental results confirm that TLS over JSON works as hypothesised.

Development and Evaluation of e-EBPP(Evidence-Based Practice Protocol) System for Evidence-Based Dementia Nursing Practice (근거중심 치매 간호실무를 위한 e-EBPP 시스템 개발 및 평가)

  • Park, Myonghwa
    • Korean Journal of Adult Nursing
    • /
    • v.17 no.3
    • /
    • pp.411-424
    • /
    • 2005
  • Purpose: The purpose of this study was to develop and evaluate e-EBPP(Evidence-based Practice Protocol) system for nursing care for patients with dementia to facilitate the best evidence-based decision in their dementia care settings. Method: The system was developed based on system development life cycle and software prototyping using the following 5 processes: Analysis, Planning, Developing, Program Operation, and Final Evaluation. Result: The system consisted of modules for evidence-based nursing and protocol, guide for developing protocol, tool for saving, revising, and deleting the protocol, interface tool among users, and tool for evaluating users' satisfaction of the system. On the main page, there were 7 menu bars that consisted of Introduction of site, EBN info, Dementia info, Evidence Based Practice Protocol, Protocol Bank, Community, and Site Link. In the operation of the system, HTML, JavaScript, and Flash were utilized and the content consisted of text content, interactive content, animation, and quiz. Conclusion: This system can support nurses' best and cost-effective clinical decision using sharable standardized protocols consisting of the best evidence in dementia care. In addition, it can be utilized as an e-learning program for nurses and nursing students to learn use of evidence based information.

  • PDF