• Title/Summary/Keyword: 인터넷 상호접속

Search Result 111, Processing Time 0.026 seconds

인터넷 실시간 자료를 이용한 고등학교 지구과학 학습 프로그램 개발 및 지원 홈페이지 구축

  • Gu, Ja-Ok;An, Hui-Su
    • 한국지구과학회:학술대회논문집
    • /
    • 2005.09a
    • /
    • pp.199-206
    • /
    • 2005
  • 지구과학은 실생활과 직접적으로 관련되거나 학생들이 친숙하게 생각하는 많은 개념들을 포함하고 있으며 이런 특성은 과학캠프나 자연탐사 활동에서 지구과학과 관련한 탐구주제가 학생들의 큰 호응을 얻는 사실을 설명할 수 있다. 하지만 정규 수업에서 이루어지는 지구과학 실험 수업은 교과서에 제시된 자료해석 위주의 실험이 많아 학생들의 흥미를 반감시키는 경우가 많으며 자료 측정과정에서 과학자가 느낄 수 있는 중요하고 귀중한 경험을 놓칠수 있다. 그런데 인터넷에서는 해양과 대기, 천문, 지질 각 분야에서 지속적으로 갱신되는 실시간 관측 자료를 제공해 주는 곳이 많으며 이 실시간 자료들을 고등학교의 지구과학 실험에 이용할 수 있도록 학습 프로그램을 개발하면 기존의 자료해석 실험이 가지는 한계를 극복하고 학생들의 지구과학에 대한 호응도를 높일 수 있으며 보다 다양한 탐구 능력을 향상 시킬 수 있다. 이러한 학습 프로그램의 특징은 탐구 중심 혹은 문제 해결 학습을 강조하는 현재의 교육 목표를 잘 반영할 수 있다. 본 연구의 목적은 인터넷에서 제공되는 지구과학 관련 실시간 자료들을 활용할 수 있는 고등학교 지구과학 학습 프로그램을 개발하고 이를 지원할 수 있는 홈페이지를 구축한 후 실제로 수업에 적용하여 교육적 효과를 확인하는 것이다. 연구 결과 실시간 자료를 이용하는 고등학교 학생들을 위한 지구과학 학습 프로그램을 12개의 주제에 대해서 완성했다. 먼저 지구과학실험 시간에 적용할 수 있는 2차시 분량의 학습 프로그램 6주제를 개발했는데 개발 주제는 '지진이 일어나고 있는 곳은 어디인가?', '진앙으로 판의 경계를 결정하기', '진앙의 위치를 찾아라', '암영대를 찾아라', '태양의 자전 주기를 측정하기', '태양활동' 이다. 각 주제별로 수업소개, 학습목표, 과정, 학습자료(학생 활동지, 기타 자료, 수업 내용과 관련한 실시간 자료 제공 사이트 목록), 평가 자료를 만들었다. 학생들의 활동 내용은 <지진이 일어나고 있는 곳은 어디인가?>의 주제를 예로 들면 학생들이 실시간으로 전 세계의 지진활동을 모니터하는 사이트에 접속하여 최근에 지진이 어디에서 일어났는지 알아보고 지난 30일 동안에 일어났던 규모 4 이상의 지진 자료를 다운 받아 세계 지도에 점으로 표시한다. 이 때 학생들은 손으로 진앙의 위치를 지도에 그리는 대신 엑셀의 그래프 기능을 이용하여 지도에 진앙의 위치를 나타내게 한다. 또 개인 과제 연구에 적용할 수 있는 학습 프로그램을 5가지 개발하여 학생들이 특정한 주제에 대하여 탐구 과제를 수행할 수 있게 했는데 개발된 주제는 '태양 활동으로 오로라 예측하기', '국제 우주 정거장을 찾아내자', '한반도 부근의 해양 기상과 해수의 물리적 상호 관계', '일기도 분석을 통한 태풍의 진로 예측', '우리 나라 조석 예측' 이다. 마지막으로 사이버 학습을 통해서 수업 시간의 제약 없이 과제 형태로 처치 가능한 학습 프로그램 개발 했는데 그 주제는 '태풍이 저위도에서 북상하는 이유?'이다. 개발된 프로그램 중 2차시 학습 프로그램은 과학고 중학생 영재반에게, 개인 탐구 과제는 과학고 1학년 학생들에게, 사이버 수업 형태는 과학고 2학년 학생에게 적용시켰다. 실시간 자료 활용을 지원하는 홈페이지를 만들어 자료 제공 사이트에 대한 메타 자료를 데이터베이스화했으며 이를 통해 학생들이 원하는 실시간 자료를 검색하여 찾을 수 있고 홈페이지를 방분했을 때 이해하기 어려운 그래프나 각 홈페이지가 제공하는 자료들에 대한 처리 방법을 도움말로 제공받을 수 있게 했다. 실시간 자료들을 이용한 학습은 학생들의 학습 의욕과 탐구 능력을 향상시켰으며 컴퓨터 활용 능력과 외국어 자료 활용 능력을 향상 시키는데도 도움을 주었다.

  • PDF

Emergence of Social Networked Journalism Model: A Case Study of Social News Site, "wikitree" (소셜 네트워크 저널리즘 모델의 출현: 소셜 뉴스사이트, "위키트리" 사례연구)

  • Seol, Jinah
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.83-90
    • /
    • 2015
  • This paper examines the rising value of social networked journalism and analyzes the case of a social news site based on the theory of networked journalism. Social networked journalism allows the public to be involved in every aspect of journalism production through crowd-sourcing and interactivity. The networking effect with the public is driving journalism to transform into a more open, more networked and more responsive venue. "wikitree" is a social networking news service on which anybody can write news and disseminate it via Facebook and Twitter. It is operated as an open sourced program which incorporates "Google Translate" to automatically convert all its content, enabling any global citizen with an Internet access to contribute news production and share either their own creative contents or generated contents from other sources. Since its inception, "wikitree global" site has been expanding its coverage rapidly with access points arising from 160 countries. Analyzing its international coverage by country and by news category as well as by the unique visit numbers via SNS, the results of the case study imply that networking with the global public can enhance news traffic to the social news site as well as to specific news items. The results also suggest that the utilization of Twitter and Facebook in social networked journalism can break the boundary between local and global public by extending news-gathering ability while growing audience's interest in the site, and engender a feasible business model for a local online journalism.

Study on implementation of Secure HTML5 Local Storage (안전한 HTML5 로컬스토리지 구현에 대한 연구)

  • Myeong, Hee-Won;Paik, Jung-Ha;Lee, Dong-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.13 no.4
    • /
    • pp.83-93
    • /
    • 2012
  • HTML5 has developed not to have browser dependancy considering interoperability as same as maintaining compatability with lower versions of HTML. HTML5, the newest web standardization is on going of being structured. Along with the smart phone boom, HTML5 is spotlighted because it can be applied to cross platforms in mobile web environments. Specially the local Storage that has been listed in new features in HTML5 supports offline function for web application that enables web application to be run even when the mobile is not connected to 3G or wifi. With Local storage, development of server-independent web application can be possible. However Local storage stores plaintext data in it without applying any security measure and this makes the plaintext data dangerous to security threats that are already exist in other client side storages like Cookie. In the paper we propose secure Local storage methods to offer a safe way to store and retrieve data in Local storage guaranteeing its performance. Suggested functions in this paper follow localStorage standard API and use a module that provide cryptographic function. We also prove the efficiency of suggested secure Local storage based on its performance evaluation with implementation.

The study on the effectiveness of smart home network service for IT underprivileged people and growth service model (IT소외 계층을 위한 실질적 스마트홈네트워크서비스의 영향 및 성장형 서비스모델에 대한 연구)

  • Kim, Byoung-Soo;Ji, Yeong-Soo;Han, Kyeong-Seok
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.6
    • /
    • pp.1000-1007
    • /
    • 2011
  • Home Networking will be implementing the interactive network by home appliances over wireless/wireline network framwork. That is, Home appliances, which are being operated within home space configure the network through wireline/wireless network infrastructure for interworking and interacitive services by external internet access. Based on home networking, smarthome is home space where can use automatic telecommunication and interactive service by home appliances. we can call smarthome based on home networking infrastructure as the conceptual gateway for evolving future converged space like u-city. From simple home control service to home automation service over home networking infrastructure, smarthome service is evolving to up-to-date intelligent life environment in growth of IT technology. however, its service model development was based on supplier-centered based on advanced IT technology. because of this situation, smarthome service has not been acknowledged IT underprivileged people as well as IT early-adaptor. so, this research paper will consider and try to find out what will be the feasible factors to make the best service for IT underprivileged people.

Physical Layer Diversity and its Effects on the Performance of WLANs (물리 계층의 다양성과 무선 랜의 성능에 미치는 영향)

  • Choi, Sunwoong;Park, Kihong;Kim, Chong-Kwon
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.723-731
    • /
    • 2005
  • Wide spread deployment of infrastructure WLANs has made Wi Fi an integral part of today's Internet access technology. Despite its crucial role in affecting end to end performance, past research has focused on MAC protocol enhancement, analysis and simulation based performance evaluation without sufficient consideration for modeling inaccuracies stemming from inter layer dependencies, including physical layer diversity, that significantly impact performance. We take a fresh look at IEEE 802.11 WLANs, and using experiment, simulation, and analysis demonstrate its surprisingly agile performance traits. Contention based MAC throughput degrades gracefully under congested conditions, enabled by physical layer channel diversity that reduces the effective level of MAC contention. In contrast, fairness and jitter significantly degrade at a critical offered load. This duality obviates the need for link layer flow control for throughput improvement but necessitates traffic control for fairness and QoS. We use experimentation and simulation in a complementary fashion, pointing out performance characteristics where they agree and differ.

Object Wrapping Model and Application for Integration of Security Interface (보안 인터페이스의 통합을 위한 객체 포장 모델 및 응용)

  • 김영수;최흥식
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.2C
    • /
    • pp.333-341
    • /
    • 2004
  • Along with the innovative enhancement of Internet technology and the emergency of distributed systems extended from client-server computing, it becomes indispensible and necessary to integrate and interconnect old legacy systems. Since building a distributed system requires consistency of integration, the proper reuse of incumbent systems is critical to successful integration of current systems to distributed ones. CORBA(Common Object Request Broker Architecture) and object wrapping technique can provide middleware solutions that extend the applications of a legacy system with little modification to the application level while keeping client consistency of standard interface. By using these techniques for system integration it is easier and faster to extend services on application development to distributed environments. We propose a model on object wrapping system that can manage, integrate, and separate the functions delivered from CORBA. We apply the object wrapping model specifically to integration of security system interfaces and also perform a test to verify the usability and the efficiency of our model.

Development of Web Application Based on N-screen for Play Activities of Children with Developmental Disorder (발달장애 아동의 놀이 활동을 위한 N-스크린 기반의 웹앱 개발)

  • Kang, Jung Bae;Kim, Jin Hee;Kim, Chang Geol;Song, Beong Seop
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.18 no.4
    • /
    • pp.1-8
    • /
    • 2013
  • In the modern society, instructional methods using diverse media have appeared thanks to the development of Information & Communication Technology, and applicability of such instructional methods has been fully corroborated. However, customized contents allowing for disabled children's environment are still insufficient. Hence, this study produced educational contents of play activities for children with developmental disability, through applying N-screen technology, IT technology that can provide the same contents via a variety of digital media. The produced contents allow programs to be set up according to a child's individual characteristics and be carried out anywhere and anytime via an Internet-enabled digital device. Further, the developed contents were produced so that they could be accessed from a child's various environment (home, school, etc.) via a PC, a smart phone, a portable from a child's various environment (home, school, etc.) via a PC, a smart phone, a portable device, etc. and that the same educational program could be conducted in linkage at home, school, etc. Three children with Intellectual disability and autism spectrum disorder were applied to the manufactured content. As a result, Content interaction between interaction between teachers and students in play training could use as a medium.In addition, the children's ability to select the appropriate components and reinforcements, special education professionals have used the content of the interviews are helpful in mediation than the existing content.

HTTP Request - SQL Query Mapping Scheme for Malicious SQL Query Detection in Multitier Web Applications (Multitier 웹 어플리케이션 환경에서 악의적인 SQL Query 탐지를 위한 HTTP Request - SQL Query 매핑 기법)

  • Seo, Yeongung;Park, Seungyoung
    • Journal of KIISE
    • /
    • v.44 no.1
    • /
    • pp.1-12
    • /
    • 2017
  • The continuously growing internet service requirements has resulted in a multitier system structure consisting of web server and database (DB) server. In this multitier structure, the existing intrusion detection system (IDS) detects known attacks by matching misused traffic patterns or signatures. However, malicious change to the contents at DB server through hypertext transfer protocol (HTTP) requests at the DB server cannot be detected by the IDS at the DB server's end, since the DB server processes structured query language (SQL) without knowing the associated HTTP, while the web server cannot identify the response associated with the attacker's SQL query. To detect these types of attacks, the malicious user is tracked using knowledge on interaction between HTTP request and SQL query. However, this is a practical challenge because system's source code analysis and its application logic needs to be understood completely. In this study, we proposed a scheme to find the HTTP request associated with a given SQL query using only system log files. We first generated an HTTP request-SQL query map from system log files alone. Subsequently, the HTTP request associated with a given SQL query was identified among a set of HTTP requests using this map. Computer simulations indicated that the proposed scheme finds the HTTP request associated with a given SQL query with 94% accuracy.

A Macro Attacks Detection Model Based on Trace Back Information (트레이스 백 정보에 기반한 매크로 공격 탐지 모델)

  • Baek, Yong Jin;Hong, Suk Won;Park, Jae Heung;Kang, Gyeong Won;Kim, Sang Bok
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.113-120
    • /
    • 2018
  • Today, the development of information and communication technology is rapidly increasing the number of users of network-based service, and enables real-time information sharing among users on the Internet. There are various methods in the information sharing process, and information sharing based on portal service is generally used. However, the process of information sharing serves as a cause of illegal activities in order to amplify the social interest of the relevant stakeholders. Public opinion attack using macro function can distort normal public opinion, so security measures are urgent. Therefore, security measures are urgently needed. Macro attacks are generally defined as attacks in which illegal users acquire multiple IP or ID to manipulate public opinion on the content of a particular web page. In this paper, we analyze network path information based on traceback for macro attack of a specific user, and then detect multiple access of the user. This is a macro attack when the access path information for a specific web page and the user information are matched more than once. In addition, when multiple ID is accessed for a specific web page in the same region, it is not possible to distort the overall public opinion on a specific web page by analyzing the threshold count value.

  • PDF

XML Web Services for Learning ContentsBased on a Pedagogical Design Model (교수법적 설계 모델링에 기반한 학습 컨텐츠의 XML 웹 서비스 구축)

  • Shin, Haeng-Ja;Park, Kyung-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.8
    • /
    • pp.1131-1144
    • /
    • 2004
  • In this paper, we investigate a problem with an e-learning system for e-business environments and introduce the solving method of the problem. To be more accurate, existing Web-hosted and ASP (Application Service Provider)-oriented service model is difficult to cooperate and integrate among the different kinds of systems. So we have produced sharable and reusable learning object, they have extracted a principle from pedagogical designs for units of reuse. We call LIO (Learning Item Object). This modeling makes use of a constructing for XML Web Services. So to speak, units of reuse from pedagogical designs are test tutorial, resource, case example, simulation, problem, test, discovery and discussion and then map introduction, fact, try, quiz, test, link-more, tell-more LIO learning object. These typed LIOs are stored in metadata along with the information for a content location. Each one of LIOs is designed with components and exposed in an interface for XML Web services. These services are module applications, which are used a standard SOAP (Simple Object Access Protocol) and locate any computer over Internet and publish, find and bind to services. This guarantees the interoperation and integration of the different kinds of systems. As a result, the problem of e-learning systems for e-business environments was resolved and then the power of understanding about learning objects based on pedagogical design was increased for learner and instruction designers. And organizations of education hope for particular decreased costs in constructing e-learning systems.

  • PDF