• Title/Summary/Keyword: 정보이론적 학습

Search Result 641, Processing Time 0.023 seconds

A theoretical study to establish the concept of textbooks using online content and the direction of future textbooks (온라인 콘텐츠 활용 교과서의 개념과 미래형 교과서의 방향 정립을 위한 이론적 고찰)

  • Ahn, Sung Hun
    • Journal of Creative Information Culture
    • /
    • v.7 no.4
    • /
    • pp.257-264
    • /
    • 2021
  • As online classes started in 2020 due to the COVID-19 outbreak, the use of online content in classes such as e-books, Google tools, and videos has increased. Accordingly, the need for textbooks made by teachers is emerging so that students can learn effectively even in an online environment. In addition, as online classes and student-participatory classes using various online contents expand, teachers are actively using online content-using textbooks as well as book-type textbooks. In other words, it is a time not only to prepare for online classes, but to establish the concept of online textbooks and to think about the system and direction of current textbooks in order to transform into a future education system. Therefore, in this paper, the basic data for establishing the concept of online content utilization textbooks that are currently being introduced have been analyzed and theoretical contents for the development direction of future textbooks to be developed in the future are explored.

The Study on Marker-less Tracking for the Car Mechanics e-Training AR(Augmented Reality) System (자동차 정비 e-Training 증강현실 시스템에서의 Marker-less Tracking 방안 연구)

  • Yoon, Ji-Yean;Kim, Yu-Doo;Moon, Il-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.2
    • /
    • pp.264-270
    • /
    • 2012
  • e-Training focusing on the experience and practice accelerates actual-active learning and enforces the learning effects against the existing theory based education. The most typical hans-on training system is augmented reality. Especially, in the training field installed augmented reality system, the automobile maintenance trainee experiences effective training with the immediate information, which is indicating the location of parts and the procedure of repairing. The tracking is the core technology of the augmented reality system. The performance of augmented reality system depends on the tracking technology. Therefore, this paper suggests the tracking technology which is proper to the e-Training augmented reality service technology for the car mechanics.

Patent Document Classification by Using Hierarchical Attention Network (계층적 주의 네트워크를 활용한 특허 문서 분류)

  • Jang, Hyuncheol;Han, Donghee;Ryu, Teaseon;Jang, Hyungkuk;Lim, HeuiSeok
    • Annual Conference of KIPS
    • /
    • 2018.05a
    • /
    • pp.369-372
    • /
    • 2018
  • 최근 지식경영에 있어 특허를 통한 지식재산권 확보는 기업 운영에 큰 영향을 주는 요소이다. 성공적인 특허 확보를 위해서, 먼저 변화하는 특허 분류 제계를 이해하고, 방대한 특허 정보 데이터를 빠르고 신속하게 특허 분류 체계에 따라 분류화 시킬 필요가 있다. 본 연구에서는 머신 러닝 기술 중에서도 계층적 주의 네트워크를 활용하여 특허 자료의 초록을 학습시켜 분류를 할 수 있는 방법을 제안한다. 그리고 본 연구에서는 제안된 계층적 주의 네트워크의 성능을 검증하기 위해 수정된 입력데이터와 다른 워드 임베딩을 활용하여 진행하였다. 이를 통하여 특허 문서 분류에 활용하려는 계층적 주의 네트워크의 성능과 특허 문서 분류 활용화 방안을 보여주고자 한다. 본 연구의 결과는 많은 기업 지식경영에서 실용적으로 활용할 수 있도록 지식경영 연구자, 기업의 관리자 및 실무자에게 유용한 특허분류기법에 관한 이론적 실무적 활용 방안을 제시한다.

Classifying and Measuring the Business Value of Information Technology Investment Based upon the Balanced Scorecard Model (Balanced Scorecard 모형에 의한 정보화 투자효과 분류 및 측정)

  • 이국희
    • The Journal of Information Technology and Database
    • /
    • v.5 no.1
    • /
    • pp.69-84
    • /
    • 1998
  • 본 연구는 정보화 투자효과 평가방법론의 틀을 형성하는 투자효과 분류체계와 측정활동의 모형을 제안하고 있다. 우선 기존에 사용되는 여러 가지 이론적 또는 실무적 투자효과 분류체계의 장단점을 분석한 후 Balanced Scorecard 모형에 의거하여 정보화 투자효과를 재무, 대고객, 내부 프로세스, 혁신과 학습 4가지 영역으로 분류하였다. 이러한 분류체계는 1990년대 정보화 투자가 창출하는 무형적이고 전략적인 효과를 비즈니스 용어와 성과지표로서 적절하게 수용하고 있고, 정보화 투자를 비즈니스 투자와 사업적 관점에서 바라볼 수 있게 한다. 그리고 정보화 투자와 기업성과 사이의 인과관계와 역동적 흐름을 체계적으로 파악할 수 있게 하는 장점이 있다. 이러한 분류체계에 근거하여 투자효과 측정활동은 기업성과지표의 도출, 기업성과지표별 정보화 효과 예측, 그리고 정보화 효과의 화폐가치 산출이라는 3가지 작업으로 구분된다. 본 연구에서는 각 작업별로 어떠한 절차, 방법, 기법들이 사용될 수 있는지를 제안하고 있다.

  • PDF

Network based Intrusion Detection System using Adaptive Resonance Theory 2 (Adaptive Resonance Theory 2를 이용한 네트워크 기반의 침입 탐지 모델 연구)

  • 김진원;노태우;문종섭;고재영;최대식;한광택
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.3
    • /
    • pp.129-139
    • /
    • 2002
  • As internet expands, the possibility of attack through the network is increasing. So we need the technology which can detect the attack to the system or the network spontaneously. The purpose of this paper proposes the system to detect intrusion automatically using the Adaptive Resonance Theory2(ART2) which is one of artificial neural network The parameters of the system was tunned by ART2 algorithm using a lot of normal packets and various attack packets which were intentionally generated by attack tools. The results were compared and analyzed with conventional methods.

Influence of Motivational, Social, and Environmental Factors on the Learning of Hackers (동기적, 사회적, 그리고 환경적 요인이 해커의 기술 습득에 미치는 영향)

  • Jang, Jaeyoung;Kim, Beomsoo
    • Information Systems Review
    • /
    • v.18 no.1
    • /
    • pp.57-78
    • /
    • 2016
  • Hacking has raised many critical issues in the modern world, particularly because the size and cost of the damages caused by this disruptive activity have steadily increased. Accordingly, many significant studies have been conducted by behavioral scientists to understand hackers and their practices. Nonetheless, only qualitative methods, such as interviews, meta-studies, and media studies, have been employed in such studies because of hacker sampling limitations. Existing studies have determined that intrinsic motivation was the dominant factor influencing hackers, and that their techniques were mainly acquired from online hacking communities. However, such results have yet to be causally proven. This study attempted to identify the causal factors influencing the motivational and environmental factors encouraging hackers to learn hacking skills. To this end, hacker community members using the theory of planned behavior were observed to identify the causal factors of their learning of hacking skills. We selected a group of students who were developing their hacking skills. The survey was conducted over a two-week period in May 2015 with a total of 227 students as respondents. After list-wise deletion, 215 of the responses were deemed usable (94.7 percent). In summary, the hackers were aware that hacking skills are considered socially unethical, and their attitudes toward the learning of hacking skills were affected by both intrinsic and extrinsic motivations. In addition, the characteristics of the online hacking community affected their perceived behavioral control. This study introduced new concepts in the process of conducting a causal relationship analysis on a hacker sample. Moreover, this research expanded the discussion on the causal direction of subjective norms in unethical research, and empirically confirmed that both intrinsic and extrinsic motivations affect the learning of hacking skills. This study also made a practical contribution by raising the educational and policy response issues for ethical hackers and demonstrating the necessity to intensify the punishment for hacking.

An Implementation of Neuro-Fuzzy Korean Spelling Corrector Using Keyboard Arrangement Characteristics (자판 배열 특성을 이용한 Neuro-Fuzzy 한국어 철자 교정기의 구현)

  • Jung, Han-Min;Lee, Geun-Bae;Lee, Jong-Hyeok
    • Annual Conference on Human and Language Technology
    • /
    • 1993.10a
    • /
    • pp.317-328
    • /
    • 1993
  • 본 논문은 신경망과 퍼지 이론을 결합한 한국어 철자 교정기 KSCNN(Korean Spelling Corrector using Neural Network)에 대하여 기술한다. KSCNN은 퍼셉트론(perceptron) 학습을 이용한 연상 메모리(associative memory)로 구성되며 자판 배열 특성을 고려한 퍼지 멤버쉽 함수에 의해 신경망의 입력값을 정한다. 본 철자 교정기의 장점은 인지적인 방법으로 철자를 교정하기 때문에 기존의 VA나 BNA와는 달리 오류의 종류에 영향을 받지 않으며 교정된 철자나 후보자들에 대한 견인값(attraction value)을 측정하여 시스템의 신뢰도를 높일 수 있다는 데 있다. 또한, 본 논문은 실험을 통해서 퍼지 멤버쉽 함수에 의한 입력 노드의 활성화가 자판 배열특성을 고려할 수 있기 때문에 시스템의 성능을 향상시킨다는 사실을 보여준다.

  • PDF

An Integrated Method for Generating Inductive Rule Sets (결합적 방법에 의한 귀납법칙 집합의 생성)

  • Lee, Chang-Hwan
    • The KIPS Transactions:PartB
    • /
    • v.10B no.1
    • /
    • pp.27-32
    • /
    • 2003
  • The rule induction system generates a set of inductive rules, and the task of selecting an optimal rule subset is one of the important problem in the area of rule induction. This paper proposes a new learning method which combines rule induction system with the paradigm of genetic algorithm. This paper shows that genetic algorithm can be effectively applied to optimal rule selection problem. The proposed system was evaluated using a set of different machine learning data sets and, showed better performance in all cases than other traditional methods.

Understanding Privacy Infringement Experiences in Courier Services and its Influence on User Psychology and Protective Action From Attitude Theory Perspective (택배 서비스 이용자의 프라이버시 침해 경험이 심리와 행동에 미치는 영향에 대한 이해: 태도이론 측면)

  • Se Hun Lim;Dan J. Kim;Hyeonmi Yoo
    • Information Systems Review
    • /
    • v.25 no.3
    • /
    • pp.99-120
    • /
    • 2023
  • Courier services users' experience of violating privacy affects psychology and behavior of protecting personal privacy. Depending on what privacy infringement experience (PIE) of courier services users, learning about perceived privacy infringement incidents is made, recognition is formed, affection is formed, and behavior is appeared. This paradigm of changing in privacy psychologies of courier services users has an important impact on predicting responses of privacy protective action (PPA). In this study, a theoretical research framework are developed to explain the privacy protective action (PPA) of courier services users by applying attitude theory. Based on this framework, the relationships among past privacy infringement experience (PIE), perceived privacy risk (PPR), privacy concerns (i.e., concerns in unlicensed secondary use (CIUSU), concerns in information error (CIE), concerns in improper access (CIA), and concern in information collection (CIC), and privacy protective action (PPA) are analyzed. In this study, the proposed research model was surveyed by people with experience in using courier services and was analyzed for finding relationships among research variables using structured an equation modeling software, SMART-PLS. The empirical results show the causal relationships among PIE, PPR, privacy concerns (CIUSU, CIE, CIA, and CIC), and PPA. The results of this study provide useful theoretical implications for privacy management research in courier services, and practical implications for the development of courier services business model.

Development and Applyment Selection Standards of Physical Computing Teaching Aids for Elementary SW Education According to the 2015 Revised Curriculum (2015 개정 교육과정의 초등학교 소프트웨어 교육을 위한 피지컬 컴퓨팅 교구 선택 기준 개발 및 적용)

  • Lee, Young-jae;Jeon, Hyung-gi;Kim, Yungsik
    • Journal of The Korean Association of Information Education
    • /
    • v.21 no.4
    • /
    • pp.437-450
    • /
    • 2017
  • This study derived optimized teaching aids that use the physical computing method as the solution for effective software education at the elementary level. We set standard for selecting physical computing teaching aids in elementary-level by gathering the opinions from previous studies and think tanks and then applied the standard to some aids and choose one. We also made lesson plan and tried it to the experimental group. Subsequently, students' logical thinking skills showed a statistically significant improvement in terms of the t-test. Also, in the analysis of the effect size, it was shown to have a positive influence on the improvement of the students' logical thinking skills. Additionally, survey of satisfaction evaluation from the students showed that the teaching aid selection standard was effective in selecting suitable teaching aids for elementary students and that the classroom activities utilizing physical computing teaching aids were at a suitable level for elementary students.