• Title/Summary/Keyword: 컴퓨터 활용 교육

Search Result 2,130, Processing Time 0.026 seconds

Development of the Educational Database of Picture Data for the Korean Geography Course of High School (고등학교 한국지리 교육용 영상자료 데이터베이스 개발)

  • Kwon, Dong-Hi
    • Journal of the Korean association of regional geographers
    • /
    • v.4 no.2
    • /
    • pp.65-77
    • /
    • 1998
  • One of the fundamental, important preconditions for effective teaching of geography is to collect a variety of picture data available for class and to manage the data systematically. The purpose of this study is to present one method about how to supply basic picture data available for class of Korean geography for the high school program to teachers in service and how to collect, manage and utilize the data. A total of 233 picture data related to contents of the textbook of Korean Geography have been gathered through this study, and a database has been constructed for the data. Directories were generated for individual units of the textbook, and the collected picture data was stored in the image file of each directory. This data was recorded in a CD and attached as an appendix. Since the primary purpose of this study is to suggest one method, the picture data in a database for the present study is just a fraction of lots of data available for class of Korean geography. If the user persistently enlarges and manages data based on the results of this study, the data will become a good instructional aid. The picture data can be printed over the transparent film and used for class by using the overhead protector (OHP), or it can be also used as a remote self-study tool through the computer telecommunications network (e.g., LAN or INTERNET. etc,). Most desirable, however, is to develop teachers' own method by taking account of separate units of the textbook or diverse educational environments.

  • PDF

Interrelationship between Records and Information (기록과 정보의 상관관계)

  • Song, Byoung-Ho
    • The Korean Journal of Archival Studies
    • /
    • no.20
    • /
    • pp.3-32
    • /
    • 2009
  • When the record management faces to the information environment, the practices based on self-judgment needs more open and considerate policies. New viewpoint that treat records as information and treat information as records will produce new mutual-conscious behavior that create records based on the value of information usage and maintain information data based on the reliability as an record. As the internal aspect how to create records well, how to transfer them well, and how to archives them well used to be the focus of record management, existing legislation, guidelines, and training seem to be mainly related to this front steps. We should also address issues according to the succeeding information services, including opening to the relevant, sharing, duplicating, information security, privacy protection, and constructing collections with continual supplement. This paper observe the confusion of the viewpoints in the recent reports, explain the need of fusion viewpoint, and suggest interconnecting feedback cycle between record management system and general information system.

A Study on the Cryptography Technology for Computing Stored and Encrypted Information without Key Leakage (키 유출 없이 저장되고 암호화된 정보를 계산할 수 있는 암호기술에 관한 연구)

  • Mun, Hyung-Jin;Hwang, Yoon-Cheol
    • Journal of Industrial Convergence
    • /
    • v.17 no.1
    • /
    • pp.1-6
    • /
    • 2019
  • Various cryptographic technologies have been proposed from ancient times and are developing in various ways to ensure the confidentiality of information. Due to exponentially increasing computer power, the encryption key is gradually increasing for security. Technology are being developed; however, security is guaranteed only in a short period of time. With the advent of the 4th Industrial Revolution, encryption technology is required in various fields. Recently, encryption technology using homomorphic encryption has attracted attention. Security threats arise due to the exposure of keys and plain texts used in the decryption processing for the operation of encrypted information. The homomorphic encryption can compute the data of the cipher text and secure process the information without exposing the plain text. When using the homomorphic encryption in processing big data like stored personal information in various services, security threats can be avoided because there is no exposure to key usage and decrypted information.

Using the Deep Learning for the System Architecture of Image Prediction (엔터프라이즈 환경의 딥 러닝을 활용한 이미지 예측 시스템 아키텍처)

  • Cheon, Eun Young;Choi, Sung-Ja
    • Journal of Digital Convergence
    • /
    • v.17 no.10
    • /
    • pp.259-264
    • /
    • 2019
  • This paper proposes an image prediction system architecture for deep running in enterprise environment. Easily transform into an artificial intelligence platform for an enterprise environment, and allow sufficient deep-running services to be developed and modified even in Java-centric architectures to improve the shortcomings of Java-centric enterprise development because artificial intelligence platforms are concentrated in the pipeline. In addition, based on the proposed environment, we propose a more accurate prediction system in the deep running architecture environment that has been previously learned through image forecasting experiments. Experiments show 95.23% accuracy in the image example provided for deep running to be performed, and the proposed model shows 96.54% accuracy compared to other similar models.

Early Alert System of Vespa Attack to Honeybee Hive: Prototype Design and Testing in the Laboratory Condition (장수말벌 공격 조기 경보 시스템 프로토타입 설계 및 실내 시연)

  • Kim, Byungsoon;Jeong, Seongmin;Kim, Goeun;Jung, Chuleui
    • Journal of Apiculture
    • /
    • v.32 no.3
    • /
    • pp.191-198
    • /
    • 2017
  • Vespa hornets are notorious predators of honeybees in Korean beekeeping. Detection of vespa hornet attacking on honeybee colony was tried through analysis of wing beat frequency profiling from Vespa mandarinia. Wing beat profiles of V. mandarinia during active flight and resting were distinctively different. From the wing beat profiling, algorithm of automated detection of vespa attack was encoded, and alert system was developed using Teensy 3.2 and Raspberry pi 3. From the laboratory testing, the prototype system successfully detected vespa wing beats and delivered the vespa attack information to the user wirelessly. Further development of the system could help precision alert system of the vespa attack to apiary.

An Enhancement Method of Document Restoration Capability using Encryption and DnCNN (암호화와 DnCNN을 활용한 문서 복원능력 향상에 관한 연구)

  • Jang, Hyun-Hee;Ha, Sung-Jae;Cho, Gi-Hwan
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.2
    • /
    • pp.79-84
    • /
    • 2022
  • This paper presents an enhancement method of document restoration capability which is robust for security, loss, and contamination, It is based on two methods, that is, encryption and DnCNN(DeNoise Convolution Neural Network). In order to implement this encryption method, a mathematical model is applied as a spatial frequency transfer function used in optics of 2D image information. Then a method is proposed with optical interference patterns as encryption using spatial frequency transfer functions and using mathematical variables of spatial frequency transfer functions as ciphers. In addition, by applying the DnCNN method which is bsed on deep learning technique, the restoration capability is enhanced by removing noise. With an experimental evaluation, with 65% information loss, by applying Pre-Training DnCNN Deep Learning, the peak signal-to-noise ratio (PSNR) shows 11% or more superior in compared to that of the spatial frequency transfer function only. In addition, it is confirmed that the characteristic of CC(Correlation Coefficient) is enhanced by 16% or more.

Data Preprocessing Technique and Service Operation Architecture for Demand Forecasting of Electric Vehicle Charging Station (전기자동차 충전소 수요 예측 데이터 전처리 기법 및 서비스 운영 아키텍처)

  • Joongi Hong;Suntae Kim;Jeongah Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.2
    • /
    • pp.131-138
    • /
    • 2023
  • Globally, the eco-friendly industry is developing due to the climate crisis. Electric vehicles are an eco-friendly industry that is attracting attention as it is expected to reduce carbon emissions by 30~70% or more compared to internal combustion engine vehicles. As electric vehicles become more popular, charging stations have become an important factor for purchasing electric vehicles. Recent research is using artificial intelligence to identify local demand for charging stations and select locations that can maximize economic impact. In this study, in order to contribute to the improvement of the performance of the electric vehicle charging station demand prediction model, nationwide data that can be used in the artificial intelligence model was defined and a pre-processing technique was proposed. In addition, a preprocessor, artificial intelligence model, and service web were implemented for real charging station demand prediction, and the value of data as a location selection factor was verified.

Differences in the social presence of instructor by instructor's social intervention and its effects on learning satisfaction in an online university (온라인대학에서 교수자의 사회적 촉진활동에 따른 교수자 사회적 실재감의 차이 및 이들의 관계가 학습만족도에 미치는 영향)

  • Lee, Euikil;Kim, Yun-Jung
    • The Journal of Korean Association of Computer Education
    • /
    • v.18 no.3
    • /
    • pp.69-78
    • /
    • 2015
  • This study aims to analyze differences in the social presence of instructor by instructor's social intervention, the effects of the social presence of instructor on learning satisfaction, and learner characteristics related to the social presence of instructor. Data including subjects' demographic information, interactions, social presence of instructor, social presence of the course, and learning satisfaction were collected from 119 adult learners in an online university in Korea. The main findings of this study are as follows. First, the social presence of instructor was higher in the higher-aged group or active group on intranet message board than the lower-aged group or inactive group on the board. Second, instructor's social intervention increased the level of perceived social presence of instructor. However, the active group on the board has shown the highest level of perceived social presence of instructor, without instructor's social intervention. Third, there was a high correlation between instructor's social intervention and the social presence of instructor, while the variables affecting learning satisfaction were the social presence of instructor and social presence of the course. From the results of this study, it is suggested that instructors' social interventions be provided systematically for those who are not active in social interaction to enhance their learning satisfaction.

The Effects of Repeated Pain Measurement to Injury Pictures on Cognitive and Affective Empathy in Medical Students (통증사진에 대한 반복적 통증평가가 의대생의 인지적 공감과 정서적 공감에 미치는 영향)

  • Lee, Sang-Kwon;Chun, Kyung-Ju;Chang, Chulhun L.;Kim, Sung-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.1
    • /
    • pp.402-411
    • /
    • 2017
  • To develop a more efficient computer-based empathy program that enables medical students to increase their empathy levels, and to test its applicability to medical students. We developed PACP (the Pain Assessment Computer Program) for measurement of medical students' levels of recognition of another's pain. An empathy questionnaire was administered to 145 medical students before and after the PACP. In the high empathy group, the scores for cognitive empathy increased significantly after completion of the PACP, while affective empathy scores showed no significant change. In contrast, in the low empathy group, both cognitive and affective empathy scores increased significantly after the PACP. The PACP effectively increased cognitive empathy for the high empathy group, and increased both cognitive and affective empathy, particularly for the low empathy group. Given the fact that existing empathy education programs are time-consuming and costly, and the demand for more efficient empathy education is high, the PACP as a useful tool can be applicable to medical students, particularly those with low empathy in order to enhance their empathic abilities within a short period of time.

The Corelation Research between Cyberbullying and Information Media Use - With Focus on Internet and Mobile Phone Use (사이버불링 발생과 정보매체활용 간의 상관분석 - 인터넷과 휴대전화 사용을 중심으로)

  • Kim, Bongseob;Park, Jongsun;Gam, Dongun;Jin, Sangki
    • The Journal of Korean Association of Computer Education
    • /
    • v.16 no.5
    • /
    • pp.17-29
    • /
    • 2013
  • Cyberbullying has a negative influence on teens. However, the academic approach and try is still an its early stages in spite of the issue of the seriousness and importance. Accordingly, this study conducted a survey of 1,112 elementary, middle and high school students. According to the survey, Internet bullying violence experience was from 20.3% to 39.0%, victim experience from 11.0% to 23.4%, mobile phone bullying violence experience was from 15.9% to 44.1%, victim experience from 5.5% to 21.8%. The factors affecting Internet bullying violence experience were gender, academic stress, internet accessibility, anonymity, use time of internet. The factors affecting mobile phone bullying violence experience were school table, academic stress, mobility, anonymity, use time of mobile phone. Finally, this study grasped the relation between Internet and mobile phone bullying. It was found that Internet bullying violence victim experience had something to do with mobile phone bullying violence victim experience. Especially, Internet bullying violence experience had a lot to do with mobile phone bullying violence experience, Internet bullying victim experience had a lot to do with mobile phone bullying victim experience.

  • PDF