• Title/Summary/Keyword: Collaborative processing

Search Result 318, Processing Time 0.02 seconds

Design of M-learning Tutoring System Using AFFIRIP model (AEFIRIP 모델을 이용한 M-learning 튜터링 시스템 설계)

  • Lee, Nam-Ju;Jun, Woo-Chun
    • 한국정보교육학회:학술대회논문집
    • /
    • 2006.08a
    • /
    • pp.307-312
    • /
    • 2006
  • M-learning (Mobile learning)을 기반으로 한 코스웨어나 모듈 설계 시 학습자의 적극적 참여와 의미 있는 상호작용의 기회 제공과 실제적 환경에서의 교육활동을 지원하는 것에 초점을 맞추어야 한다. 본 연구에서는 M-learning을 기반으로 실제적 상황에서의 학습을 위한 지능적 튜터링 모델인 AEFIRIP (Activation, Externalization, Focusing, Interpretations, Reflection, Information Processing)모델을 활용하여 독서교육 튜터링 시스템을 설계하였다. AEFIRIP 모델은 모바일 학습에 초점을 맞추어 실제적 상황에서 다양한 모바일 장비를 활용할 수 있도록 설계되었으며 CSCL(Computer Supported Collaborative Learning)학습의 일환으로 활용 가능하다. AEFIRIP 모델은 6단계의 구조화된 모바일 튜터링을 통하여 학습 활동을 위한 반자동화된 튜터링을 제공하며, 개별화 학습을 가능케 한다. 본 시스템은 M-learning에서 학습자의 독서 단계에 따라 개별화된 튜터링을 제공하는 것을 목적으로 한다. 이를 위해 자극 에이전트, 도움 에이전트, 요청 튜터링 에이전트, 튜터링 대화 에이전트, 개인 튜터링 에이전트, 튜터링 포인터 에이전트의 6단계의 튜터링 에이전트를 구안하였다. 본 시스템의 활용을 통하여 학습자는 실제적 환경에서 모바일 장비를 통하여 독서 활동과 관련한 튜터링을 제공받으며, 학습자와 교사 간 다양한 상호작용이 가능하다.

  • PDF

A Study of the Relationship Between Centrality and Research Performance in Collaborative Research Network (공동연구 네트워크에서 중심성과 연구성과 간의 관련성에 관한 연구)

  • Moon, Seonggu;Kim, Injai
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.7 no.5
    • /
    • pp.169-176
    • /
    • 2018
  • The purpose of this study is to analyze the relationship between the centrality and the research performance by conducting the social network analysis for the social science journal in the last 10 years. As a result of the relationship analysis, the correlation between centrality and research productivity was highly correlated in most groups, but the impact factor and frequency of citations were not significant. In relation with the comprehensive research such as a H-index, middle productive group correlation was more significant than the upper productive group.

Epidemic-Style Group Communication Algorithm ensuring Causal Order Delivery (인과적 순서 전달을 보장하는 전염형 그룹 통신 알고리즘)

  • Kim Chayoung;Ahn Jinho
    • The KIPS Transactions:PartA
    • /
    • v.12A no.2 s.92
    • /
    • pp.137-144
    • /
    • 2005
  • Many reliable group communication algorithms were presented to satisfy predetermined message ordering properties in small or medium-scale distributed systems. However, the previous algorithms with their strong reliability properties may be unappropriate for large-scale systems. To address this issue, some epidemic-style group communication algorithms were proposed for considerably improving scalability while guaranteeing the reasonably weaker reliability property than the existing ones. The algorithms are all designed for ensuring the atomic order message delivery property. But, some distributed applications such as multimedia systems and collaborative work, may require only the weaker message ordering property, i.e., causal order delivery. This paper proposes an efficient epidemic-style group communication algorithm ensuring causal order delivery to provide the indigenous scalability of the epidemic-style approach.

Design and Implementation of Distributed Pair Programming System based on IDE (IDE 기반의 분산 페어 프로그래밍 시스템의 설계 및 구현)

  • Park, Ji-Hoon;Lee, Kyung-Hwan
    • The KIPS Transactions:PartD
    • /
    • v.11D no.6
    • /
    • pp.1301-1310
    • /
    • 2004
  • In distributed office, the pairs can program together using a distributed pair programming system. Many CSCW tools featuring remote screen sharing function have insufficient usability, accessibility to introduce many developers to distributed pair programming. In this paper, we suggest a distributed pair programming system based on IDE, which many developers will accept and use easily. We have do#eloped a user scenario and GUI of the system, making distributed pair programming easier and designed with high extensibility by adapting design patterns and implemented in Java language. Our findings will be of significant help to developers dealing with implementation of distributed pair programming function into some commercial IDE.

Edutech in the Era of the 4th Industrial Revolution (4차 산업혁명 시대의 에듀테크)

  • Park, Ji Su;Gil, Joon-Min
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.9 no.11
    • /
    • pp.329-331
    • /
    • 2020
  • Edutech is a compound word of education and technology, and is an educational paradigm in the era of the 4th industrial revolution. This refers to next-generation education using information and communication technology (ICT) such as big data, artificial intelligence (AI), robots, and virtual reality (VR) of the 4th industrial revolution. e-Learning is being used as an online lecture for education in ICT, but edutech is attracting attention along with e-learning as the feeding of non-face-to-face education has rapidly increased due to COVID-19. Therefore, this paper summarizes the reviewed papers on the blockchain-based badge service platform, simulation-based collaborative e-Learning system, video English dictionary, and blockchain-based access control audit system.

Reducing Cybersecurity Risks in Cloud Computing Using A Distributed Key Mechanism

  • Altowaijri, Saleh M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.1-10
    • /
    • 2021
  • The Internet of things (IoT) is the main advancement in data processing and communication technologies. In IoT, intelligent devices play an exciting role in wireless communication. Although, sensor nodes are low-cost devices for communication and data gathering. However, sensor nodes are more vulnerable to different security threats because these nodes have continuous access to the internet. Therefore, the multiparty security credential-based key generation mechanism provides effective security against several attacks. The key generation-based methods are implemented at sensor nodes, edge nodes, and also at server nodes for secure communication. The main challenging issue in a collaborative key generation scheme is the extensive multiplication. When the number of parties increased the multiplications are more complex. Thus, the computational cost of batch key and multiparty key-based schemes is high. This paper presents a Secure Multipart Key Distribution scheme (SMKD) that provides secure communication among the nodes by generating a multiparty secure key for communication. In this paper, we provide node authentication and session key generation mechanism among mobile nodes, head nodes, and trusted servers. We analyzed the achievements of the SMKD scheme against SPPDA, PPDAS, and PFDA schemes. Thus, the simulation environment is established by employing an NS 2. Simulation results prove that the performance of SMKD is better in terms of communication cost, computational cost, and energy consumption.

An Investigation of Cloud Computing and E-Learning for Educational Advancement

  • Ali, Ashraf;Alourani, Abdullah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.216-222
    • /
    • 2021
  • Advances in technology have given educators a tool to empower them to assist with developing the best possible human resources. Teachers at universities prefer to use more modern technological advances to help them educate their students. This opens up a necessity to research the capabilities of cloud-based learning services so that educational solutions can be found among the available options. Based on that, this essay looks at models and levels of deployment for the e-learning cloud architecture in the education system. A project involving educators explores whether gement Systems (LMS) can function well in a collaborative remote learning environment. The study was performed on how Blackboard was being used by a public institution and included research on cloud computing. This test examined how Blackboard Learn performs as a teaching tool and featured 60 participants. It is evident from the completed research that computers are beneficial to student education, especially in improving how schools administer lessons. Convenient tools for processing educational content are included as well as effective organizational strategies for educational processes and better ways to monitor and manage knowledge. In addition, this project's conclusions help highlight the advantages of rolling out cloud-based e-learning in higher educational institutions, which are responsible for creating the integrated educational product. The study showed that a shift to cloud computing can bring progress to educational material and substantial improvement to student academic outcomes, which is related to the increased use of better learning tools and methods.

Adaptive High-order Variation De-noising Method for Edge Detection with Wavelet Coefficients

  • Chenghua Liu;Anhong Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.412-434
    • /
    • 2023
  • This study discusses the high-order diffusion method in the wavelet domain. It aims to improve the edge protection capability of the high-order diffusion method using wavelet coefficients that can reflect image information. During the first step of the proposed diffusion method, the wavelet packet decomposition is a more refined decomposition method that can extract the texture and structure information of the image at different resolution levels. The high-frequency wavelet coefficients are then used to construct the edge detection function. Subsequently, because accurate wavelet coefficients can more accurately reflect the edges and details of the image information, by introducing the idea of state weight, a scheme for recovering wavelet coefficients is proposed. Finally, the edge detection function is constructed by the module of the wavelet coefficients to guide high-order diffusion, the denoised image is obtained. The experimental results showed that the method presented in this study improves the denoising ability of the high-order diffusion model, and the edge protection index (SSIM) outperforms the main methods, including the block matching and 3D collaborative filtering (BM3D) and the deep learning-based image processing methods. For images with rich textural details, the present method improves the clarity of the obtained images and the completeness of the edges, demonstrating its advantages in denoising and edge protection.

A Study on Developing Intrusion Detection System Using APEX : A Collaborative Research Project with Jade Solution Company (APEX 기반 침입 탐지 시스템 개발에 관한 연구 : (주)제이드 솔류션과 공동 연구)

  • Kim, Byung-Joo
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.1
    • /
    • pp.38-45
    • /
    • 2017
  • Attacking of computer and network is increasing as information processing technology heavily depends on computer and network. To prevent the attack of system and network, host and network based intrusion detection system has developed. But previous rule based system has a lot of difficulties. For this reason demand for developing a intrusion detection system which detects and cope with the attack of system and network resource in real time. In this paper we develop a real time intrusion detection system which is combination of APEX and LS-SVM classifier. Proposed system is for nonlinear data and guarantees convergence. While real time processing system has its advantages, such as memory efficiency and allowing a new training data, it also has its disadvantages of inaccuracy compared to batch way. Therefore proposed real time intrusion detection system shows similar performance in accuracy compared to batch way intrusion detection system, it can be deployed on a commercial scale.

A Study Mode of Synchronous & Asynchronous for Multimedia Distance Education System (동기 및 비동기 겸용모드의 멀티미디어 원격교육 시스템 개발에 관한 연구)

  • Kim, Sang-Jin;Kim, Seok-Soo;Park, Gil-Cheol;Hwang, Dae-Joon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.12
    • /
    • pp.2985-2995
    • /
    • 1997
  • In this paper, we proposed the "synchronous & asynchronous distance education system" which is able to interact among teachers and students for open education in cyberspace, and it is based telecommunication technology and multimedia technology. Specially, This system gets rid of the nufamiliarity and inconvenient feeling during the distance education. Also it supports the mediation of floor mode, for a group lecture and supports the synchronous mode for face-to-face effective and asynchronous mode for self-learning. The asynchronous mode has the down load function and the consultant mode (between teacher and student). The element technologies of this system consists of application sharing technique, whiteboard, various video window display, audio support, user interface, environment setup, session management, access control, network control and media control for collaborative distance education.

  • PDF