• Title/Summary/Keyword: smart-learning

Search Result 1,825, Processing Time 0.025 seconds

The Design and Implement a Healthcare Alert App to Prevent Dementia (치매예방을 위한 헬스케어 알리미 앱 설계 및 구현)

  • Pi, SU-Young
    • Journal of Digital Convergence
    • /
    • v.16 no.10
    • /
    • pp.59-67
    • /
    • 2018
  • There are not that many m-health related services limited to the elderly. Many of the elderly who are at risk of dementia are unfamiliar to smart devices, so it is required to design an user-customized App. Therefore, I design and embody a mobile voice alert integrated app, which enables voice input to increase the accessibility of the elderly, so as to prevent diseases caused by declined cognitive function such as dementia. I conducted interviews and questionnaire after having the students use the app in Lifelong Education Center in H region of Gyeongbuk, and the analysis result has showed the high satisfaction. It is expected that it will be able to play a key role for M-Health service for the elderly since it is possible to prevent dementia through the voice health care alert app. I would like to learn deep learning in the future to predict the life patterns and the possibility of dementia of the elderly.

A Study on the operation of smart remote lecture - Focusing on Cisco Webex meeting- (스마트 원격강의 운영에 관한 연구 -시스코 웹엑스 미팅을 중심으로-)

  • Kim, Seung-In;Lee, Kaha
    • Journal of Digital Convergence
    • /
    • v.18 no.9
    • /
    • pp.317-322
    • /
    • 2020
  • The purpose of this study is to lay the groundwork for the operation method for correctly operating remote lectures at universities. Among the universities that started non-face-to-face classes due to 'COVID-19', college students and graduate students from some universities who conducted remote lectures through Cisco's Webex meeting were studied on how to operate the remote lecture platform. First, the requirements for lectures for remote lectures were established through the literature survey, and effective operation measures were proposed through the survey. The research method was conducted on a total of 45 college and graduate students from April 21 to May 15, 2020. The results of the study showed that the operation plan for the basic and meeting elements. Based on this study, we expect it to be used in disaster situations or classes that may occur after COVID-19. In the future, the usability evaluation of the remote class platform and the direction in which the domestic remote lecture platform should move should be presented.

Comparative Analysis for Educational Puzzle Game Development (교육용 퍼즐 게임 개발을 위한 비교)

  • Shin, Yongwoo
    • Journal of Korea Game Society
    • /
    • v.14 no.5
    • /
    • pp.7-14
    • /
    • 2014
  • Since educational and fun elements coexist in an educational game, it is important to come up with standards that can elicit fun with the game as well as educational standards. Many of the existing developed educational games have received low marks in the characteristics of entertainment and game design. Thus, how to make up for their entertainment characteristics is important. This paper analyzes gaming elements of puzzle games that were released for smart phones and gained massive popularity from their users and will apply them to educational games. Such games that have gained popularity and won a commercial success include Anipang, Anipang 2, Candy Crush Saga, Farm Heroes Saga and Pokopang. This study will analyze gaming elements of these games. By analyzing the educational games, it is applied to the game elements of casual games. In addition, we have proposed a element that can enhance the immersive. Game design elements that can improve entertainment characteristics include game rules, stages and missions. Elements that can increase immersion include items, background maps and new learning environments. This paper has significance in that it analyzes entertainment characteristics, which mean the fun of games through those that have been a commercial success and applies them to educational games.

Efficient Multicasting Mechanism for Mobile Computing Environment (교육 영상제작 시스템 설계 및 구현)

  • Kim, Jungguk;Cho, Wijae;Park, Subeen;Park, Suhyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.482-484
    • /
    • 2017
  • Over the past 70 years, movies and television have revolutionized the way people communicate. However, even with this development, TV has been used only as a means of communication targeting an unspecified number of people due to the restriction of media such as radio waves and movies. However, the development of the Internet and online video has come to a time when 100 million people watch YouTube videos uploaded from the other side of the world by eliminating these restrictions. The message that you want to deliver now can be delivered to anyone, but making the image with these messages remains the last obstacle to communication. To solve these problems, we implemented a web application and a video production program through AWS. This system basically provides the administrator with the video production through the easy interface, the information management and the program on the server on the internet through AWS, the assigned lecture including the computer and the smart phone, the learning materials, And implemented to increase the efficiency of educational video production service.

  • PDF

Application of support vector machine with firefly algorithm for investigation of the factors affecting the shear strength of angle shear connectors

  • Chahnasir, E. Sadeghipour;Zandi, Y.;Shariati, M.;Dehghani, E.;Toghroli, A.;Mohamad, E. Tonnizam;Shariati, A.;Safa, M.;Wakil, K.;Khorami, M.
    • Smart Structures and Systems
    • /
    • v.22 no.4
    • /
    • pp.413-424
    • /
    • 2018
  • The factors affecting the shear strength of the angle shear connectors in the steel-concrete composite beams can play an important role to estimate the efficacy of a composite beam. Therefore, the current study has aimed to verify the output of shear capacity of angle shear connector according to the input provided by Support Vector Machine (SVM) coupled with Firefly Algorithm (FFA). SVM parameters have been optimized through the use of FFA, while genetic programming (GP) and artificial neural networks (ANN) have been applied to estimate and predict the SVM-FFA models' results. Following these results, GP and ANN have been applied to develop the prediction accuracy and generalization capability of SVM-FFA. Therefore, SVM-FFA could be performed as a novel model with predictive strategy in the shear capacity estimation of angle shear connectors. According to the results, the Firefly algorithm has produced a generalized performance and be learnt faster than the conventional learning algorithms.

Drivers for Trust and Continuous Usage Intention on OTP: Perceived Security, Security Awareness, and User Experience (OTP에 대한 신뢰 및 재사용의도의 결정요인: 인지된 보안성, 보안의식 및 사용자경험을 중심으로)

  • Yun, Hae-Jung;Jang, Jae-Bin;Lee, Choong-C.
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.12
    • /
    • pp.163-173
    • /
    • 2010
  • PKI(Public Key Infrastructure)-based information certification technology has some limitations to be universally applied to mobile banking services, using smart phones, since PKI is dependent on the specific kind of web browser, Internet Explorer. OTP(One Time Password) is considered to be a substitute or complementary service of PKI, but it still shows low acceptance rate. Therefore, in this research, we analyze why OTP has not been very popular, and provide useful implications of making OTP more extensively and frequently used in the mobile environment. Perceived security of OTP was set as a higher-order construct of integrity, confidentiality, authentication, and non-repudiation. Research findings show that security awareness and perceived security of OTP is positively associated, and the relationship between perceived security and trust on OTP is statistically significant. Also, trust is positively related to intention to use OTP continuously.

Web based Customer Power Demand Variation Estimation System using LSTM (LSTM을 이용한 웹기반 수용가별 전력수요 변동성 평가시스템)

  • Seo, Duck Hee;Lyu, Joonsoo;Choi, Eun Jeong;Cho, Soohwan;Kim, Dong Keun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.4
    • /
    • pp.587-594
    • /
    • 2018
  • The purpose of this study is to propose a power demand volatility evaluation system based on LSTM and not to verify the accuracy of the demand module which is a core module, but to recognize the sudden change of power pattern by using deeplearning in the actual power demand monitoring system. Then we confirm the availability of the module. Also, we tried to provide a visualized report so that the manager can determine the fluctuation of the power usage patten by applying it as a module to the web based system. It is confirmed that the power consumption data shows a certain pattern in the case of government offices and hospitals as a result of implementation of the volatility evaluation system. On the other hand, in areas with relatively low power consumption, such as residential facilities, it was not appropriate to evaluate the volatility.

Feature-Strengthened Gesture Recognition Model Based on Dynamic Time Warping for Multi-Users (다중 사용자를 위한 Dynamic Time Warping 기반의 특징 강조형 제스처 인식 모델)

  • Lee, Suk Kyoon;Um, Hyun Min;Kwon, Hyuck Tae
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.10
    • /
    • pp.503-510
    • /
    • 2016
  • FsGr model, which has been proposed recently, is an approach of accelerometer-based gesture recognition by applying DTW algorithm in two steps, which improved recognition success rate. In FsGr model, sets of similar gestures will be produced through training phase, in order to define the notion of a set of similar gestures. At the 1st attempt of gesture recognition, if the result turns out to belong to a set of similar gestures, it makes the 2nd recognition attempt to feature-strengthened parts extracted from the set of similar gestures. However, since a same gesture show drastically different characteristics according to physical traits such as body size, age, and sex, FsGr model may not be good enough to apply to multi-user environments. In this paper, we propose FsGrM model that extends FsGr model for multi-user environment and present a program which controls channel and volume of smart TV using FsGrM model.

Mobile Finger Signature Verification Robust to Skilled Forgery (모바일환경에서 위조서명에 강건한 딥러닝 기반의 핑거서명검증 연구)

  • Nam, Seng-soo;Seo, Chang-ho;Choi, Dae-seon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1161-1170
    • /
    • 2016
  • In this paper, we provide an authentication technology for verifying dynamic signature made by finger on smart phone. In the proposed method, we are using the Auto-Encoder-based 1 class model in order to effectively distinguish skilled forgery signature. In addition to the basic dynamic signature characteristic information such as appearance and velocity of a signature, we use accelerometer value supported by most of the smartphone. Signed data is re-sampled to give the same length and is normalized to a constant size. We built a test set for evaluation and conducted experiment in three ways. As results of the experiment, the proposed acceleration sensor value and 1 class model shows 6.9% less EER than previous method.

Downscaling Forgery Detection using Pixel Value's Gradients of Digital Image (디지털 영상 픽셀값의 경사도를 이용한 Downscaling Forgery 검출)

  • RHEE, Kang Hyeon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.2
    • /
    • pp.47-52
    • /
    • 2016
  • The used digital images in the smart device and small displayer has been a downscaled image. In this paper, the detection of the downscaling image forgery is proposed using the feature vector according to the pixel value's gradients. In the proposed algorithm, AR (Autoregressive) coefficients are computed from pixel value's gradients of the image. These coefficients as the feature vectors are used in the learning of a SVM (Support Vector Machine) classification for the downscaling image forgery detector. On the performance of the proposed algorithm, it is excellent at the downscaling 90% image forgery compare to MFR (Median Filter Residual) scheme that had the same 10-Dim. feature vectors and 686-Dim. SPAM (Subtractive Pixel Adjacency Matrix) scheme. In averaging filtering ($3{\times}3$) and median filtering ($3{\times}3$) images, it has a higher detection ratio. Especially, the measured performances of all items in averaging and median filtering ($3{\times}3$), AUC (Area Under Curve) by the sensitivity and 1-specificity is approached to 1. Thus, it is confirmed that the grade evaluation of the proposed algorithm is 'Excellent (A)'.