• Title/Summary/Keyword: 원격서비스

Search Result 1,314, Processing Time 0.029 seconds

Development of e-Learning Platform based on Linux -e-Learning Contents Design Module with ISD Model- (리눅스 기반 인터넷 원격 교육 시스템 개발 - ISD Model 지원 교육용 컨텐츠 설계 모듈 -)

  • 성평식;박춘원
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2001.05a
    • /
    • pp.165-183
    • /
    • 2001
  • 지난해부터 인터넷 분야에서 가장 확실한 수익 모델을 갖춘 사업 분야로 e-Learning 분야가 손꼽히면서 많은 온라인 교육 서비스가 우후죽순처럼 등장해 이미 1,000여 개의 서비스가 각축을 벌이고 있다. 그러나 e-Learning은 무엇보다도 학습용 컨텐츠의 품질이 그 성패를 좌우한다 할 때 한국의 온라인 학습 컨텐츠의 품질은 부실하기 이를 데 없다는 게 중론이다. 이는 S/W 공학에서 S/W 품질 보장을 위해 개발 방법론이 중요한 것으로 인식되는 것과 이를 지원하기 위한 Method II등 여러 도구들이 보급되고 있는데 비해 학습 컨텐츠는 그 중요도와 개발이 복잡하고 정교함이 요구됨에도 불구하고 개발 방법론에 대한 인식과 개발방법론을 지원하기 위한 도구가 없음에 기인하는바 크다 할 수 있겠다. 아직까지 국내에서는 MacroMedia Director나 ToolBook, Authorware등 일반적인 저작 도구나 웹 기반의 컨텐츠를 제작하는 Dreamweaver등의 HTML Editor만 있으면 컨텐츠가 만들어 질 수 있는 것으로 착각하고 있는 경우가 많다. 교육 학습용 컨텐츠의 개발 주기를 살펴보면 요구 분석->교수 설계->저작->평가->배포의 단계를 거치게 되는데 이때 학습 컨텐츠의 품질은 사실 요구 분석과 교수 설계 단계에서 결정되게 되며 이 학습 컨텐츠의 품질을 결정하는 단계에서는 IT 분야 지식보다는 오히려 교육 공학적 지식이 더욱 요구된다. 그러나 현실적으로 이 단계의 절차적 복잡성과 전문성으로 인해 거의 대부분의 학습 컨텐츠들이 제대로 개발 주기를 거치지 못하고 검증되지 않은 스토리 보드에 의한 저작 단계로 바로 돌입하고 있는 것이 한국의 실정이라 하겠다. 따라서 본 프로젝트에 의해 개발 된 교수 설계 도구는 교육/학습 컨텐츠의 품질 보증을 위한 방법론인 교육 공학의 체제적 교수 설계 이론 Model (Instructional System Design Model), 특히 그 중에서도 이 분야의 사실상의 표준 이론(de facto standard)인 Dick & Carey 교수와 Gagne 교수의 인지주의 ISD Model을 기반으로 정교한 교수 설계와 코스 맵 설계를 가능하게 함으로써 학습 컨텐츠의 품질 보증 활동을 지원 할 수 있는 도구로 개발하였다. 특히 Linux 기반에서 PHP로 개발 함으로써 Platform에 구애받지 않은 사용 환경을 구현 하였으며 향후 많은 e-Learning Platform에 교수 설계 모듈로 장착 함으로써 기존의 e-Learning Platform들의 가치를 높일 수 있는 계기가 될 것으로 생각한다.

  • PDF

Mobile Object Security in Distributed Object Environment (분산객체 환경에서의 이동객체 보안)

  • Hong, Seong-Pyo;Song, Gi-Beom;Lee, Chiol-Seong;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.893-898
    • /
    • 2002
  • Integration with CORBA and mobile agent is improving various kinds problems that are happening in distributed system. This technology is guarantee the interoperability to other agent platforms and extend the mobile agent system but appears various kinds problems of suity. In this paper, we propose the mobile agent security system that is based on CORBA security service specification and MASIF. Since Proposed system is based on CORBA and MASIF, it is extend the large scale of distributed system and interoperable with other agent platforms.

  • PDF

Development of Smart App to Support the Paramedics Activities (구급 활동을 지원하는 스마트 앱 개발)

  • Eum, Sang-Hee;Kim, Gwang-Nyeon;Kim, Gi-Ryon;Nam, Jae-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.49-53
    • /
    • 2018
  • In the recent years, an attempts have been made to convergence medical technology and IT technology to overcome the limitations of temporal, spatial in the medical technology applications. Emergency care is primarily intended to provide primary care and stabilization to the patient, thereby saving the patient's life and minimizing the risk until hospital care. In this study, we developed an application S/W to support emergency services for emergency medical services. Paramedics can easily keep a log of emergency activities and monitor the patient's condition in real time with this application S/W on smart devices. In particular, medical signals and information emergency status of emergency patients can be measured or photographs of affected areas can be taken. In addition, this report can be delivered to remote medical doctors for rapid emergency measures and immediate hospital response.

Implementation and Performance Analysis of Single I/O Space Service for Cluster Computers (클러스터 컴퓨터를 위한 단일 I/O 공간 서비스의 구현 및 성능분석)

  • Kim, Tae-Kyu;Kim, Bang-Hyun;Kim, Jong-Hyun
    • The KIPS Transactions:PartA
    • /
    • v.13A no.6 s.103
    • /
    • pp.517-524
    • /
    • 2006
  • In cluster computers, it is essential to Implement the single I/O space(SIOS) supporting integrated I/O substructure to efficiently process I/O intensive applications. SIOS service provides with global I/O address space to directly access peripherals and hard disks in its own or remote nodes from any node in the cluster computer In this thesis, we propose the implementation method of SIOS in Linux clusters by using only freewares. This method is implemented at device driver level that uses Enhanced Network Block Device(ENBD) and file system level that uses S/W RAID and NFS. The major strengths of this method are easiness of implementation and almost no cost due to using freewares. In addition, since freewares used are open sources, it is possible to apply this method to other platforms with only slight modification. Moreover, experiments show that I/O throughputs are up to 5.5 times higher in write operations and approximately 2.3 times higher in read operations than those of CDD method that uses the device driver developed at kernel level.

Monitoring System for the Elderly Living Alone Using the RaspberryPi Sensor (라즈베리파이 센서를 활용한 독거노인 모니터링 시스템)

  • Lee, Sung-Hoon;Lee, June-Yeop;Kim, Jung-Sook
    • Journal of Digital Contents Society
    • /
    • v.18 no.8
    • /
    • pp.1661-1669
    • /
    • 2017
  • In 2017, Korea has reached 1.3 million elderly people living alone. The government is promoting the basic care service for the elderly by using care workers to check the security of the elderly living alone. However, due to lack of service personnel and service usage rate of elderly care workers, it is difficult to manage. To improve these environmental constraints, this study attempted to construct a monitoring system for elderly people living alone by using sensors such as temperature, humidity, motion detection, and gas leak detection. The sensor periodically collects the current status data of the elderly and sends them to the server, creates a real time graph based on the data, and monitors it through the web. In the monitoring process, when the sensor is out of the range of the specified value, it sends a warning text message to the guardian to inform the current situation, and is designed and implemented so as to support the safety life of the elderly living alone.

Group key management protocol adopt to cloud computing environment (클라우드 컴퓨팅 환경에 적합한 그룹 키 관리 프로토콜)

  • Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of Digital Convergence
    • /
    • v.12 no.3
    • /
    • pp.237-242
    • /
    • 2014
  • Recently, wind energy is expanding to combination of computing to forecast of wind power generation as well as intelligent of wind powerturbine. Wind power is rise and fall depending on weather conditions and difficult to predict the output for efficient power production. Wind power is need to reliably linked technology in order to efficient power generation. In this paper, distributed power generation forecasts to enhance the predicted and actual power generation in order to minimize the difference between the power of distributed power short-term prediction model is designed. The proposed model for prediction of short-term combining the physical models and statistical models were produced in a physical model of the predicted value predicted by the lattice points within the branch prediction to extract the value of a physical model by applying the estimated value of a statistical model for estimating power generation final gas phase produces a predicted value. Also, the proposed model in real-time National Weather Service forecast for medium-term and real-time observations used as input data to perform the short-term prediction models.

Design of an Economic Service Robot Hand Based on Biomimetics and TRIZ (생체 모방학과 트리즈를 이용한 보급형 서비스 로봇 핸드의 설계)

  • Ko, Hun-Keon;Cho, Chang-Hee;Kim, Kwon-Hee
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.34 no.11
    • /
    • pp.1741-1747
    • /
    • 2010
  • This work presents a study on the design of an economic service robot hand for tele-presence manipulators. The conceptual design of new robot hand is derived from biomimetics approach. Guided by the analysis of human arm' musculoskeletal structure, the fingers are actuated by cables and actuators in the forearm. High tension in the cables is achieved by screw-nut mechanism driven by DC motors. A set of combination springs is incorporated in each of the screw-nut mechanism for easy control of gripping force. The first prototype revealed difficulties with finger control and coupling problem between gripping force and wrist movement. The solutions to these problems have been derived from the contradiction analysis of TRIZ. The second design has been verified by tests on various objects with different weight and shape for full range of wrist motion.

Design of a Request Pattern based Video Proxy Server Management Technique for an Internet Streaming Service (인터넷 스트리밍 서비스를 위한 요청 기반 비디오 프록시 서버 관리 기법의 설계)

  • Lee, Jun-Pyo;Cho, Chul-Young;Lee, Jong-Soon;Kim, Tae-Yeong;Kwon, Cheol-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.6
    • /
    • pp.57-64
    • /
    • 2010
  • Due to the limited storage space in video proxy server, it is often required to replace the old video data which is not serviced for long time with the newly requested video. This replacement causes the service delay and increase of network traffic. To circumvent this problem, we propose the an efficient replacement scheme in a video proxy server. In addition, we present a video data management technique for decreasing the number of replacement in video proxy server. For this purpose, we employ a memory in video proxy server. If the video segment which is loaded in memory is requested once again by a different user, this segment is resided in memory. The video in the memory is stored in the video proxy server depending on the consuming pattern by users. The simulation results show that the proposed algorithm performs better than other algorithms in terms of packet hit rate and number of packet replacement.

A Dynamic Synchronization Method for Multimedia Delivery and Presentation based on QoS (QoS를 이용한 동적 멀티미디어 전송 및 프리젠테이션 동기화 기법)

  • 나인호;양해권;고남영
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.1 no.2
    • /
    • pp.145-158
    • /
    • 1997
  • Method for synchronizing multimedia data is needed to support continuous transmission of multimedia data through a network in a bounded time and it also required for supporting continuous presentation of multimedia data with the required norminal playout rate in distributed network environments. This paper describes a new synchronization method for supporting delay-sensitive multimedia Presentation without degration of Quality of services of multimedia application. It mainly aims to support both intermedia and intermedia synchronization by absorbing network variations which may cause skew or jitter. In order to remove asynchonization problems, we make use of logical time system, dynamic buffer control method, and adjusting synchronization intervals based on the quality of services of a multimedia. It might be more suitable for working on distribute[1 multimedia systems where the network delay variation is changed from time to time and no global clock is supported. And it also can effectively reduce the amount of buffer requirements needed for transfering multimedia data between source and destination system by adjusting synchronization intervals with acceptable packet delay limits and packet loss rates.

  • PDF

Attack and Defense Plan, Attack Scenarios on Voice of Internet Protocol (인터넷전화의 공격 시나리오 및 공격과 방어 방안)

  • Chun, Woo-Sung;Park, Dea-Woo;Chang, Young-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.245-248
    • /
    • 2011
  • Voice over Internet protocol(VoIP) is call's contents using the existing internet. Thus, in common with the Internet service has the same vulnerability. In addition, unlike traditional PSTN remotely without physical access to hack through the eavesdropping is possible. Cyber terrorism by anti-state groups take place when the agency's computer network and telephone system at the same time work is likely to get upset. In this paper is penetration testing for security threats(Call interception, eavesdropping, misuse of services) set out in the NIS in the VoIP. In addition, scenario writing and penetration testing, hacking through the Voice over Internet protocol at the examination center will study discovered vulnerabilities. Vulnerability discovered in Voice over Internet protocol presents an attack and defense plan.

  • PDF