• 제목/요약/키워드: learning environments

Search Result 1,270, Processing Time 0.032 seconds

Development of a Scale to Measure Participation according to the International Classification of Functioning, Disability and Health (ICF) (ICF 모델에 기초한 장애인의 참여 척도 개발)

  • Kim, Kyung Mee;Yoon, Jae-Young
    • 재활복지
    • /
    • v.14 no.3
    • /
    • pp.95-119
    • /
    • 2010
  • This study aims to develope participation scale of people with disabilities according to the International classification of Functioning, Disability, and Health(ICF). ICF includes a component for classifying and qualifying participation of individuals in the context of their environments. The participation scale were developed using 7 times with different focus groups using the ICIDH-2 as a contextual framework. Candidate 41 items were developed based on the 8 participation components and put into a survey format. Finally, purposeful sample of 363 people with mobility limitations was conducted survey. As a result of survey, participation scale is composed of 38 items that are placed in 7 domains used in the activity/participation component of the ICF: holisitc health; communication; mobility; domestic life; interpersonal interactions and relationships; social and economic life; civic life. This scale does not include the domains of learning and applying knowledge, general tasks and demands, recreation and leisure but more focuses on social and civic life.

Impact of the Fidelity of Interactive Devices on the Sense of Presence During IVR-based Construction Safety Training

  • Luo, Yanfang;Seo, JoonOh;Abbas, Ali;Ahn, Seungjun
    • International conference on construction engineering and project management
    • /
    • 2020.12a
    • /
    • pp.137-145
    • /
    • 2020
  • Providing safety training to construction workers is essential to reduce safety accidents at the construction site. With the prosperity of visualization technologies, Immersive Virtual Reality (IVR) has been adopted for construction safety training by providing interactive learning experiences in a virtual environment. Previous research efforts on IVR-based training have found that the level of fidelity of interaction between real and virtual worlds is one of the important factors contributing to the sense of presence that would affect training performance. Various interactive devices that link activities between real and virtual worlds have been applied in IVR-based training, ranging from existing computer input devices (e.g., keyboard, mouse, joystick, etc.) to specially designed devices such as high-end VR simulators. However, the need for high-fidelity interactive devices may hinder the applicability of IVR-based training as they would be more expensive than IVR headsets. In this regard, this study aims to understand the impact of the level of fidelity of interactive devices in the sense of presence in a virtual environment and the training performance during IVR-based forklift safety training. We conducted a comparative study by recruiting sixty participants, splitting them into two groups, and then providing different interactive devices such as a keyboard for a low fidelity group and a steering wheel and pedals for a high-fidelity group. The results showed that there was no significant difference between the two groups in terms of the sense of presence and task performance. These results indicate that the use of low-fidelity interactive devices would be acceptable for IVR-based safety training as safety training focuses on delivering safety knowledge, and thus would be different from skill transferring training that may need more realistic interaction between real and virtual worlds.

  • PDF

Multi-Class Multi-Object Tracking in Aerial Images Using Uncertainty Estimation

  • Hyeongchan Ham;Junwon Seo;Junhee Kim;Chungsu Jang
    • Korean Journal of Remote Sensing
    • /
    • v.40 no.1
    • /
    • pp.115-122
    • /
    • 2024
  • Multi-object tracking (MOT) is a vital component in understanding the surrounding environments. Previous research has demonstrated that MOT can successfully detect and track surrounding objects. Nonetheless, inaccurate classification of the tracking objects remains a challenge that needs to be solved. When an object approaching from a distance is recognized, not only detection and tracking but also classification to determine the level of risk must be performed. However, considering the erroneous classification results obtained from the detection as the track class can lead to performance degradation problems. In this paper, we discuss the limitations of classification in tracking under the classification uncertainty of the detector. To address this problem, a class update module is proposed, which leverages the class uncertainty estimation of the detector to mitigate the classification error of the tracker. We evaluated our approach on the VisDrone-MOT2021 dataset,which includes multi-class and uncertain far-distance object tracking. We show that our method has low certainty at a distant object, and quickly classifies the class as the object approaches and the level of certainty increases.In this manner, our method outperforms previous approaches across different detectors. In particular, the You Only Look Once (YOLO)v8 detector shows a notable enhancement of 4.33 multi-object tracking accuracy (MOTA) in comparison to the previous state-of-the-art method. This intuitive insight improves MOT to track approaching objects from a distance and quickly classify them.

Autoencoder-Based Anomaly Detection Method for IoT Device Traffics (오토인코더 기반 IoT 디바이스 트래픽 이상징후 탐지 방법 연구)

  • Seung-A Park;Yejin Jang;Da Seul Kim;Mee Lan Han
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.281-288
    • /
    • 2024
  • The sixth generation(6G) wireless communication technology is advancing toward ultra-high speed, ultra-high bandwidth, and hyper-connectivity. With the development of communication technologies, the formation of a hyper-connected society is rapidly accelerating, expanding from the IoT(Internet of Things) to the IoE(Internet of Everything). However, at the same time, security threats targeting IoT devices have become widespread, and there are concerns about security incidents such as unauthorized access and information leakage. As a result, the need for security-enhancing solutions is increasing. In this paper, we implement an autoencoder-based anomaly detection model utilizing real-time collected network traffics in respond to IoT security threats. Considering the difficulty of capturing IoT device traffic data for each attack in real IoT environments, we use an unsupervised learning-based autoencoder and implement 6 different autoencoder models based on the use of noise in the training data and the dimensions of the latent space. By comparing the model performance through experiments, we provide a performance evaluation of the anomaly detection model for detecting abnormal network traffic.

A Study on the i-YOLOX Architecture for Multiple Object Detection and Classification of Household Waste (생활 폐기물 다중 객체 검출과 분류를 위한 i-YOLOX 구조에 관한 연구)

  • Weiguang Wang;Kyung Kwon Jung;Taewon Lee
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.135-142
    • /
    • 2023
  • In addressing the prominent issues of climate change, resource scarcity, and environmental pollution associated with household waste, extensive research has been conducted on intelligent waste classification methods. These efforts range from traditional classification algorithms to machine learning and neural networks. However, challenges persist in effectively classifying waste in diverse environments and conditions due to insufficient datasets, increased complexity in neural network architectures, and performance limitations for real-world applications. Therefore, this paper proposes i-YOLOX as a solution for rapid classification and improved accuracy. The proposed model is evaluated based on network parameters, detection speed, and accuracy. To achieve this, a dataset comprising 10,000 samples of household waste, spanning 17 waste categories, is created. The i-YOLOX architecture is constructed by introducing the Involution channel convolution operator and the Convolution Branch Attention Module (CBAM) into the YOLOX structure. A comparative analysis is conducted with the performance of the existing YOLO architecture. Experimental results demonstrate that i-YOLOX enhances the detection speed and accuracy of waste objects in complex scenes compared to conventional neural networks. This confirms the effectiveness of the proposed i-YOLOX architecture in the detection and classification of multiple household waste objects.

A Method for Generating Malware Countermeasure Samples Based on Pixel Attention Mechanism

  • Xiangyu Ma;Yuntao Zhao;Yongxin Feng;Yutao Hu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.2
    • /
    • pp.456-477
    • /
    • 2024
  • With information technology's rapid development, the Internet faces serious security problems. Studies have shown that malware has become a primary means of attacking the Internet. Therefore, adversarial samples have become a vital breakthrough point for studying malware. By studying adversarial samples, we can gain insights into the behavior and characteristics of malware, evaluate the performance of existing detectors in the face of deceptive samples, and help to discover vulnerabilities and improve detection methods for better performance. However, existing adversarial sample generation methods still need help regarding escape effectiveness and mobility. For instance, researchers have attempted to incorporate perturbation methods like Fast Gradient Sign Method (FGSM), Projected Gradient Descent (PGD), and others into adversarial samples to obfuscate detectors. However, these methods are only effective in specific environments and yield limited evasion effectiveness. To solve the above problems, this paper proposes a malware adversarial sample generation method (PixGAN) based on the pixel attention mechanism, which aims to improve adversarial samples' escape effect and mobility. The method transforms malware into grey-scale images and introduces the pixel attention mechanism in the Deep Convolution Generative Adversarial Networks (DCGAN) model to weigh the critical pixels in the grey-scale map, which improves the modeling ability of the generator and discriminator, thus enhancing the escape effect and mobility of the adversarial samples. The escape rate (ASR) is used as an evaluation index of the quality of the adversarial samples. The experimental results show that the adversarial samples generated by PixGAN achieve escape rates of 97%, 94%, 35%, 39%, and 43% on the Random Forest (RF), Support Vector Machine (SVM), Convolutional Neural Network (CNN), Convolutional Neural Network and Recurrent Neural Network (CNN_RNN), and Convolutional Neural Network and Long Short Term Memory (CNN_LSTM) algorithmic detectors, respectively.

Implications for Memory Reference Analysis and System Design to Execute AI Workloads in Personal Mobile Environments (개인용 모바일 환경의 AI 워크로드 수행을 위한 메모리 참조 분석 및 시스템 설계 방안)

  • Seokmin Kwon;Hyokyung Bahn
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.1
    • /
    • pp.31-36
    • /
    • 2024
  • Recently, mobile apps that utilize AI technologies are increasing. In the personal mobile environment, performance degradation may occur during the training phase of large AI workload due to limitations in memory capacity. In this paper, we extract memory reference traces of AI workloads and analyze their characteristics. From this analysis, we observe that AI workloads can cause frequent storage access due to weak temporal locality and irregular popularity bias during memory write operations, which can degrade the performance of mobile devices. Based on this observation, we discuss ways to efficiently manage memory write operations of AI workloads using persistent memory-based swap devices. Through simulation experiments, we show that the system architecture proposed in this paper can improve the I/O time of mobile systems by more than 80%.

LH-FAS v2: Head Pose Estimation-Based Lightweight Face Anti-Spoofing (LH-FAS v2: 머리 자세 추정 기반 경량 얼굴 위조 방지 기술)

  • Hyeon-Beom Heo;Hye-Ri Yang;Sung-Uk Jung;Kyung-Jae Lee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.1
    • /
    • pp.309-316
    • /
    • 2024
  • Facial recognition technology is widely used in various fields but faces challenges due to its vulnerability to fraudulent activities such as photo spoofing. Extensive research has been conducted to overcome this challenge. Most of them, however, require the use of specialized equipment like multi-modal cameras or operation in high-performance environments. In this paper, we introduce LH-FAS v2 (: Lightweight Head-pose-based Face Anti-Spoofing v2), a system designed to operate on a commercial webcam without any specialized equipment, to address the issue of facial recognition spoofing. LH-FAS v2 utilizes FSA-Net for head pose estimation and ArcFace for facial recognition, effectively assessing changes in head pose and verifying facial identity. We developed the VD4PS dataset, incorporating photo spoofing scenarios to evaluate the model's performance. The experimental results show the model's balanced accuracy and speed, indicating that head pose estimation-based facial anti-spoofing technology can be effectively used to counteract photo spoofing.

Autoencoder Based Fire Detection Model Using Multi-Sensor Data (다중 센서 데이터를 활용한 오토인코더 기반 화재감지 모델)

  • Taeseong Kim;Hyo-Rin Choi;Young-Seon Jeong
    • Smart Media Journal
    • /
    • v.13 no.4
    • /
    • pp.23-32
    • /
    • 2024
  • Large-scale fires and their consequential damages are becoming increasingly common, but confidence in fire detection systems is waning. Recently, widely-used chemical fire detectors frequently generate lots of false alarms, while video-based deep learning fire detection is hampered by its time-consuming and expensive nature. To tackle these issues, this study proposes a fire detection model utilizing an autoencoder approach. The objective is to minimize false alarms while achieving swift and precise fire detection. The proposed model, employing an autoencoder methodology, can exclusively learn from normal data without the need for fire-related data, thus enhancing its adaptability to diverse environments. By amalgamating data from five distinct sensors, it facilitates rapid and accurate fire detection. Through experiments with various hyperparameter combinations, the proposed model demonstrated that out of 14 scenarios, only one encountered false alarm issues. Experimental results underscore its potential to curtail fire-related losses and bolster the reliability of fire detection systems.

The effect of peer tutoring on pediatric nursing education: a systematic review

  • Hyun Young Koo;Hyeran An;Bo Ryeong Lee
    • Child Health Nursing Research
    • /
    • v.30 no.4
    • /
    • pp.215-226
    • /
    • 2024
  • Purpose: This study aimed to systematically review studies on the effect of peer tutoring on pediatric nursing education for nursing students and identify its contents and characteristics. Methods: A comprehensive search was conducted from November to December 2023 across databases including PubMed, Embase, CENTRAL, CINAHL, ProQuest, and others. We included both published and unpublished literature in English or Korean. Three reviewers independently screened and selected eligible studies that involved undergraduate nursing students participating in peer tutoring programs focused on pediatric nursing education. We analyzed quantitative outcomes related to learning effects and learner responses. The quality of the studies was assessed using the revised Cochrane risk-of-bias tool for randomized trials and the risk of bias assessment tool for non-randomized studies. Results: Five studies were reviewed, encompassing randomized controlled trials, a non-randomized controlled trial, a cohort study, and a before-after study. These interventions were conducted in school settings or pediatric clinical environments and featured different forms of peer teaching: horizontal, near-peer, and reciprocal. The tutor-to-tutee ratios ranged from 1:3 to 1:36.5. The educational content covered nursing care for major neonatal diseases, communication skills, medication administration, and resuscitation techniques. Significant improvements in cognitive knowledge and communication skills were observed among nursing students. However, there was noticeable variability in the design and reporting of the studies. Conclusion: Peer tutoring programs can effectively enhance pediatric nursing education by improving nursing students' knowledge and skills. For future meta-analyses, more studies in this field reported according to reporting guidelines are needed.