• Title/Summary/Keyword: Computer Usage

Search Result 1,243, Processing Time 0.022 seconds

Factors influencing the Usage and Acceptance of Multimedia-based Digital Textbooks in Pilot School

  • Kim, Mi-Ryang;Choi, Mi-Ae;Kim, Jae-Hyoun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.6
    • /
    • pp.1707-1717
    • /
    • 2012
  • Digital textbooks, considered as core textbooks tailored to the abilities and interests of students, provide them with a combination of textbooks, reference books, workbooks, dictionaries and multimedia contents. In this paper, we employ a modified version of the Technology Acceptance Model(TAM), a model which has been widely used and empirically validated to explain why individuals use a particular information technology(IT). This paper proposes that additional variables, such as educational impacts, contents quality, interaction and enjoyment, enhance our understanding of behaviors of pilot school teachers in using multimedia-based digital textbooks as a substitute for traditional paper-version of textbooks. A structural equation model is employed with survey data from 157 pilot school teachers in pilot program supported by Korean government and KERIS(Korea Education & Research Information Service), to empirically assess the strength of the relationships in the proposed model. It is hoped that the results from this study provide meaningful insight into the development and delivery of high quality digital textbooks.

Dynamic Spacer UPC Algorithm Adopting Token Bucket for Traffic Control in ATM Network (토큰 버킷을 적용한 다이나믹 스페이서 UPC 알고리즘)

  • Park, Yong-Goun;Hahn, Hern-Soo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2008.06a
    • /
    • pp.39-45
    • /
    • 2008
  • ATM망에서 트래픽의 버스트니스를 완화하기 위한 UPC(Usage Parameter Control) 알고리즘을 제안한다. 기존의 다이나믹 스페이서는 그린 토큰이 축적되어 있을 경우 도착하는 셀을 스페이서와 상관없이 네트워크로 셀을 유입시키는 동적인 스페이서 기능을 수행함으로써 CDV(Cell Delay Variation)에 의한 셀을 위반셀로 구별하지 못하고 그대로 통과시키는 단점이 있다. 즉 스페이서 기능을 사용하지 않음으로써 버스트니스해 질 수 있다. 따라서 본 논문에서는 버스트니스를 완화하기 위한 토큰 버킷을 다이나믹 스페이서 이전에 사용함으로써 다이나믹 스페이서의 버스트니스를 완화시키는 토큰 버킷을 적용한 다이나믹 스페이서 UPC 알고리즘을 제안한다.

  • PDF

Performance Analysis on Wireless Sensor Network using LDPC Code over Node-tonode Interference

  • Choi Sang-Min;Moon Byung-Hyun
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2006.05a
    • /
    • pp.143-147
    • /
    • 2006
  • Wireless sensor networks(WSN) technology has various applications such as surveillance and information gathering in the uncontrollable area of human. One of major issues in WSN is the research for reducing the energy consumption and reliability of data. A system with forward error correction(FEC) can provide an objective reliability while using less transmission power than a system without FEC. In this paper, we propose to use LDPC codes of various code rate(0.53, 0.81, 0.91) for FEC for WSN. Also, we considered node-to-node interference in addition to AWGN channel. The proposed system has not only high reliable data transmission at low SNR, but also reduced transmission power usage.

  • PDF

Implementation of RS232C Serial Communication by CSMA protocol (충돌검지 다중접속(CSMA) 프로토콜에 의한 RS232C 직렬통신의 구현)

  • Kwak, Hee-Soo;Han, Kyong-Ho
    • Proceedings of the KIEE Conference
    • /
    • 1998.07g
    • /
    • pp.2473-2475
    • /
    • 1998
  • In this paper, we implemented RS232C serial communication by the 2 wires(Data,GND), and multiple access, by the applying Collision Sensing Multiple Access(CSMA) Protocol. Multiple access is implemented by assigning a unique ID to each controller. The multiple access control operation starts by sending a command packet from a host to another host and the command packet is composed of ID bytes of source and target host computer, data bytes and the check sum, byte. In host computer, after sending command packet, the collision from loop back data. If collision is detected, it means a command packet was collided with another command packet for another host. The packet communication of the controller enables the multiple acces of the controller through the common serial data link. The application of this serial communication through CSMA protocol and the usage of two wires, have an effect on saving the wires and convenient of layout work.

  • PDF

Hybrid Fuzzy Adaptive Wiener Filtering with Optimization for Intrusion Detection

  • Sujendran, Revathi;Arunachalam, Malathi
    • ETRI Journal
    • /
    • v.37 no.3
    • /
    • pp.502-511
    • /
    • 2015
  • Intrusion detection plays a key role in detecting attacks over networks, and due to the increasing usage of Internet services, several security threats arise. Though an intrusion detection system (IDS) detects attacks efficiently, it also generates a large number of false alerts, which makes it difficult for a system administrator to identify attacks. This paper proposes automatic fuzzy rule generation combined with a Wiener filter to identify attacks. Further, to optimize the results, simplified swarm optimization is used. After training a large dataset, various fuzzy rules are generated automatically for testing, and a Wiener filter is used to filter out attacks that act as noisy data, which improves the accuracy of the detection. By combining automatic fuzzy rule generation with a Wiener filter, an IDS can handle intrusion detection more efficiently. Experimental results, which are based on collected live network data, are discussed and show that the proposed method provides a competitively high detection rate and a reduced false alarm rate in comparison with other existing machine learning techniques.

A Proposal on the Service Usage Context information based Extended Security Policy Framework in BYOD, Telework Environment (BYOD, 스마트워크 환경에서 확장된 이용 상황정보 기반 보안 정책 구조 제안)

  • Park, Hyun-Seung;Kang, Dong-Wan;Im, Chae-Tae
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2014.07a
    • /
    • pp.375-378
    • /
    • 2014
  • 예전 기업 그룹웨어 환경은 기업 소유의 기기을 활용하는 사내에 출근한 직원들 대상으로만 서비스 하였다. 그러나, 스마트폰 보급이 확대되면서 사외에서 기업내부로 접근하여 그룹웨어 등을 활용할 수 있는 스마트워크 서비스가 발전하였다. 또한 사내로 반입된 개인 소유 단말 기기가 그룹웨어 서비스를 접속할 수 있는 BYOD 도입 기업들이 증가하고 있다. BYOD, 스마트워크 환경에서 기기 접속 위치, 시간 등 다양한 접속 상황을 활용한 보안정책 관리 구조를 연구하였다. 본 논문에서는 서비스 접속 이후 보안에 취약한 서비스 접근 상황정보 중심 보안정책의 한계를 개선하기 위하여 서비스 웹/DB 서비스 이용 상황정보 기반 보안정책 구조를 제안한다.

  • PDF

A Study on the Game Usage Persistence according to the Difficulty of Casual Game in Mobile Environment (모바일 환경에서 캐주얼 게임의 난이도에 따른 게임 이용 지속성에 관한 연구)

  • Goo, Tae-Won;Kim, Hyo-Nam
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.01a
    • /
    • pp.233-236
    • /
    • 2018
  • 최근 급속도로 성장하는 모바일 시장은 게임 산업에서 가장 대표적인 게임 플랫폼으로 국내외에서 상당히 많은 수익과 성장을 이루고 있다. 매년 새로운 게임이 출시되서 유저들이 많이 플레이하지만 정작 몇 주 만에 유저들이 많이 빠져나오면서 실패한 게임들이 매년 나온다는 것이다. 본 논문에서는 실패하는 게임 개발을 줄이고 모바일게임 장르중에 대표적인 캐주얼 게임을 대상으로 남이도 조절을 통해서 유저들이 몰입하는 게임을 개발할 수 있는 내용을 제안하고자 한다.

  • PDF

FPGA based Implementation of FAST and BRIEF algorithm for Object Recognition (객체인식을 위한 FAST와 BRIEF 알고리즘 기반 FPGA 설계)

  • Heo, Hoon;Lee, Kwang-Yeob
    • Journal of IKEEE
    • /
    • v.17 no.2
    • /
    • pp.202-207
    • /
    • 2013
  • This paper implemented the conventional FAST and BRIEF algorithm as hardware on Zynq-7000 SoC Platform. Previous feature-based hardware accelerator is mostly implemented using the SIFT or SURF algorithm, but it requires excessive internal memory and hardware cost. The proposed FAST & BRIEF accelerator reduces approximately 57% of internal memory usage and 70% of hardware cost compared to the conventional SIFT or SURF accelerator, and it processes 0.17 pixel per Clock.

The Study on the Mobile internet proliferation in Korea (한국에서의 모바일인터넷활용에 관한 연구)

  • Kim, Kyung-Woo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.01a
    • /
    • pp.147-148
    • /
    • 2016
  • The purpose of this paper is to investigate the diffusion process of mobile internet use in Korea and to explore the determinants driving MIU. A survey was conducted to collect data to empirically assess the research model. In total, 543 usable responses were collected using a questionnaire derived from previous research. Both the structural equation model and partial least squares were used to study the model concerning different user groups. Findings, The results indicate that there are significant differences in the users' perceptions of mobile internet usage during its different innovation diffusion stages. Of the determinants, perceived enjoyment is the most important predictor of mobile internet use. In addition to motivating users by making services more enjoyable, the findings suggest that practitioners should take the differences of adopter groups into account. Making the mobile internet easy to use and compatible with users' lifestyles would promote the use of technology as well.

  • PDF

Readability of Printed Educational Materials Used to Inform Computer Tomography (환자/보호자 교육 및 건강정보제공용 인쇄매체의 읽기쉬움 평가 연구)

  • Yoo, Hye-Ra
    • Research in Community and Public Health Nursing
    • /
    • v.12 no.3
    • /
    • pp.670-679
    • /
    • 2001
  • This study examined the readability of 4 different kinds of patient education handouts about computer tomography tests from 5 different university-affiliated hospitals in Korea. Readability was evaluated in terms of syntax. length of sentence, usage of unfamiliar words. foreign words. Chinese words, abbreviation, and technical jargon. This study found that all of the handouts were very difficult to read. An excessive use of complex and long sentences was found. Unfamiliar words, rarely used in everyday life, were recklessly used. Most of the unfamiliar words were Chinese words and can be exchanged with Korean language. Excessive medical terminologies were used without any explanations. Based on the study results, guidelines to make the handouts easier and more accessible to patients and their family were recommended.

  • PDF