• Title/Summary/Keyword: Context Information Service

Search Result 956, Processing Time 0.027 seconds

An analysis of in-service teachers' perceived interactivity with AI teachers through RPP(Role-Play Presentation) (RPP(Role-Play Presentation)를 통한 교사의 AI 교사와의 지각된 상호작용성 분석)

  • Ko, Ho Kyoung;Huh, Nan;Noh, Jihwa
    • The Mathematical Education
    • /
    • v.60 no.3
    • /
    • pp.321-340
    • /
    • 2021
  • As many changes in the future society represented by the age of artificial intelligence(AI) are expected to come, efforts are being made to draw the shape of the future education and various research methods are being employed to support the attempts. While many research studies use methods for deriving generalized results such as expert survey and trend analysis in along with a review of literature, there are attempts to apply the scenario methodology to explore ideas and information needed within a changing context. A scenario method, one of the experiential learning strategies, aims to seek various and alternative approaches by establishing a plan from the present conditions considering future changes. In this study, in-service teachers' perceptions and expectations of the interactivity between human and AI teachers were visualized by applying the role-play presentation technique that grafted the concept of role-play game to the scenario method. In addition, the mandal-art method was introduced to support in conducting productive discussion during the teachers' collaboration. This method appeared to help to depict teachers' perceptions of AI teachers in the detailed and concrete form, which may flow in the abstract otherwise. Through analyses of the teachers' role-play presentations with the implementation of the madal-art method it was suggested that most teachers would want to collaborate with an AI teacher for improved instruction and individualized student learning while they would take the instructional authority over the AI teacher in the classroom.

Intelligent & Predictive Security Deployment in IOT Environments

  • Abdul ghani, ansari;Irfana, Memon;Fayyaz, Ahmed;Majid Hussain, Memon;Kelash, Kanwar;fareed, Jokhio
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.185-196
    • /
    • 2022
  • The Internet of Things (IoT) has become more and more widespread in recent years, thus attackers are placing greater emphasis on IoT environments. The IoT connects a large number of smart devices via wired and wireless networks that incorporate sensors or actuators in order to produce and share meaningful information. Attackers employed IoT devices as bots to assault the target server; however, because of their resource limitations, these devices are easily infected with IoT malware. The Distributed Denial of Service (DDoS) is one of the many security problems that might arise in an IoT context. DDOS attempt involves flooding a target server with irrelevant requests in an effort to disrupt it fully or partially. This worst practice blocks the legitimate user requests from being processed. We explored an intelligent intrusion detection system (IIDS) using a particular sort of machine learning, such as Artificial Neural Networks, (ANN) in order to handle and mitigate this type of cyber-attacks. In this research paper Feed-Forward Neural Network (FNN) is tested for detecting the DDOS attacks using a modified version of the KDD Cup 99 dataset. The aim of this paper is to determine the performance of the most effective and efficient Back-propagation algorithms among several algorithms and check the potential capability of ANN- based network model as a classifier to counteract the cyber-attacks in IoT environments. We have found that except Gradient Descent with Momentum Algorithm, the success rate obtained by the other three optimized and effective Back- Propagation algorithms is above 99.00%. The experimental findings showed that the accuracy rate of the proposed method using ANN is satisfactory.

Mediating Roles of Attachment for Information Sharing in Social Media: Social Capital Theory Perspective (소셜 미디어에서 정보공유를 위한 애착의 매개역할: 사회적 자본이론 관점)

  • Chung, Namho;Han, Hee Jeong;Koo, Chulmo
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.101-123
    • /
    • 2012
  • Currently, Social Media, it has widely a renown keyword and its related social trends and businesses have been fastly applied into various contexts. Social media has become an important research area for scholars interested in online technologies and cyber space and their social impacts. Social media is not only including web-based services but also mobile-based application services that allow people to share various style information and knowledge through online connection. Social media users have tendency to common identity- and bond-attachment through interactions such as 'thumbs up', 'reply note', 'forwarding', which may have driven from various factors and may result in delivering information, sharing knowledge, and specific experiences et al. Even further, almost of all social media sites provide and connect unknown strangers depending on shared interests, political views, or enjoyable activities, and other stuffs incorporating the creation of contents, which provides benefits to users. As fast developing digital devices including smartphone, tablet PC, internet based blogging, and photo and video clips, scholars desperately have began to study regarding diverse issues connecting human beings' motivations and the behavioral results which may be articulated by the format of antecedents as well as consequences related to contents that people create via social media. Social media such as Facebook, Twitter, or Cyworld users are more and more getting close each other and build up their relationships by a different style. In this sense, people use social media as tools for maintain pre-existing network, creating new people socially, and at the same time, explicitly find some business opportunities using personal and unlimited public networks. In terms of theory in explaining this phenomenon, social capital is a concept that describes the benefits one receives from one's relationship with others. Thereby, social media use is closely related to the form and connected of people, which is a bridge that can be able to achieve informational benefits of a heterogeneous network of people and common identity- and bonding-attachment which emphasizes emotional benefits from community members or friend group. Social capital would be resources accumulated through the relationships among people, which can be considered as an investment in social relations with expected returns and may achieve benefits from the greater access to and use of resources embedded in social networks. Social media using for their social capital has vastly been adopted in a cyber world, however, there has been little explaining the phenomenon theoretically how people may take advantages or opportunities through interaction among people, why people may interactively give willingness to help or their answers. The individual consciously express themselves in an online space, so called, common identity- or bonding-attachments. Common-identity attachment is the focus of the weak ties, which are loose connections between individuals who may provide useful information or new perspectives for one another but typically not emotional support, whereas common-bonding attachment is explained that between individuals in tightly-knit, emotionally close relationship such as family and close friends. The common identify- and bonding-attachment are mainly studying on-offline setting, which individual convey an impression to others that are expressed to own interest to others. Thus, individuals expect to meet other people and are trying to behave self-presentation engaging in opposite partners accordingly. As developing social media, individuals are motivated to disclose self-disclosures of open and honest using diverse cues such as verbal and nonverbal and pictorial and video files to their friends as well as passing strangers. Social media context, common identity- and bond-attachment for self-presentation seems different compared with face-to-face context. In the realm of social media, social users look for self-impression by posting text messages, pictures, video files. Under the digital environments, people interact to work, shop, learn, entertain, and be played. Social media provides increasingly the kinds of intention and behavior in online. Typically, identity and bond social capital through self-presentation is the intentional and tangible component of identity. At social media, people try to engage in others via a desired impression, which can maintain through performing coherent and complementary communications including displaying signs, symbols, brands made of digital stuffs(information, interest, pictures, etc,). In marketing area, consumers traditionally show common-identity as they select clothes, hairstyles, automobiles, logos, and so on, to impress others in any given context in a shopping mall or opera. To examine these social capital and attachment, we combined a social capital theory with an attachment theory into our research model. Our research model focuses on the common identity- and bond-attachment how they are formulated through social capitals: cognitive capital, structural capital, relational capital, and individual characteristics. Thus, we examined that individual online kindness, self-rated expertise, and social relation influence to build common identity- and bond-attachment, and the attachment effects make an impact on both the willingness to help, however, common bond seems not to show directly impact on information sharing. As a result, we discover that the social capital and attachment theories are mainly applicable to the context of social media and usage in the individual networks. We collected sample data of 256 who are using social media such as Facebook, Twitter, and Cyworld and analyzed the suggested hypotheses through the Structural Equation Model by AMOS. This study analyzes the direct and indirect relationship between the social network service usage and outcomes. Antecedents of kindness, confidence of knowledge, social relations are significantly affected to the mediators common identity-and bond attachments, however, interestingly, network externality does not impact, which we assumed that a size of network was a negative because group members would not significantly contribute if the members do not intend to actively interact with each other. The mediating variables had a positive effect on toward willingness to help. Further, common identity attachment has stronger significant on shared information.

  • PDF

Real-Time Tracking of Human Location and Motion using Cameras in a Ubiquitous Smart Home

  • Shin, Dong-Kyoo;Shin, Dong-Il;Nguyen, Quoc Cuong;Park, Se-Young
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.1
    • /
    • pp.84-95
    • /
    • 2009
  • The ubiquitous smart home is the home of the future, which exploits context information from both the human and the home environment, providing an automatic home service for the human. Human location and motion are the most important contexts in the ubiquitous smart home. In this paper, we present a real-time human tracker that predicts human location and motion for the ubiquitous smart home. The system uses four network cameras for real-time human tracking. This paper explains the architecture of the real-time human tracker, and proposes an algorithm for predicting human location and motion. To detect human location, three kinds of images are used: $IMAGE_1$ - empty room image, $IMAGE_2$ - image of furniture and home appliances, $IMAGE_3$ - image of $IMAGE_2$ and the human. The real-time human tracker decides which specific furniture or home appliance the human is associated with, via analysis of three images, and predicts human motion using a support vector machine (SVM). The performance experiment of the human's location, which uses three images, lasted an average of 0.037 seconds. The SVM feature of human motion recognition is decided from the pixel number by the array line of the moving object. We evaluated each motion 1,000 times. The average accuracy of all types of motion was 86.5%.

A Study on Antecedents of Online Trust in the Context of e-Government Services (전자정부 서비스 사용에 있어 온라인 신뢰에 관한 연구)

  • Moon, Chul-Woo;Kim, Jae-Hyoun
    • Journal of Internet Computing and Services
    • /
    • v.12 no.3
    • /
    • pp.57-67
    • /
    • 2011
  • Trust is generally assumed to be an important precondition for people's adoption of e-government services. This study analyzes the direct and indirect impact of information privacy, interactivity, subjective norms and words-of-mouth on perceived trust of e-government services and trust toward government. The Partial Least Square(PLS) was applied to the citizen survey data for hypotheses testing. PLS permits the simultaneous testing of cause-effect hypotheses while also allowing evaluation of the measurement model. Statistical results indicate that interactivity, subjective norms and words-of-mouth positively affects perceived trust of e-government services, which in turn affects the level of political efficacy and the trust toward the government. Interactivity has been found to affect words-of-mouth as well. However, information privacy has no significant effect on the trust of e-government services.

A Study of Fire Shunt Guidance Based on Wireless Sensor Networks (무선 센서 네트워크 기반의 화재 대피 유도 연구)

  • Kim, Yong-Woo;Kim, Do-Hyeon;Kwak, Ho-Young;Park, Hee-Dong
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.11
    • /
    • pp.1547-1554
    • /
    • 2008
  • This paper proposes a fire shunt guidance system model based on rule, it presents suitable shunt route in real-time according to collected fire information of the building inside using wireless sensor networks. So, this system model is composed of the sensor alert module, the behavior suggestion module, and the emergency device control module. The sensor alert module uses rule-base algorithm that monitored the information to collect periodically in wireless sensor networks. And, the behavior suggestion module proposed a suitable behavior, this module supports to judge the fire area with danger sensor list. Additional, the emergency device control module controls a related emergency device according to the suggested behavior and to present on a control screen. We experiment the fire shunt guidance system based on Internet Web for operation verification of the proposed system. Consequently, this study supports people safety with the behavior suggestion according to the context information when an emergency situation happens.

  • PDF

Adjacent Terminal Device Detection Technique for User Mobility Support on Home Entertainment System (홈 엔터테인먼트 시스템에서 사용자 이동성 지원을 위한 인접 터미널 장치 탐색 기법)

  • Kim, Sang-Wook;Jung, E-Gun
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.1
    • /
    • pp.156-167
    • /
    • 2009
  • Computing environment is evolving rapidly to ubiquitous environment. It thus makes people access and utilize any resource on the move and makes location of objects rise to the rank of the most important information. However provision of location information is too restrictive in small environments such as a home or building. In this paper we propose a home entertainment system which supports user mobility based on sensor networks and distributed devices. The proposed system estimates a user location by using signal strength received from Bluetooth ad-hoc networks. This estimated location information can tell which device a user can take advantage of while moving. In order to prove possibility of user mobility support, the system is implemented on our UPnP A/V framework home entertainment system to provide content streaming and the result shows that a provision of service for mobile users could be possible in small ubiquitous computing environments.

  • PDF

Exploring Control Mechanisms in BPO (Business Process Outsourcing) Arrangement by Korean Conglomerate: Resource Dependency Perspective (재벌기업의 BPO 통제 메커니즘에 관한 탐색적 연구: 자원 의존성 관점에서)

  • Kim, Gyeung-Min;Kim, Hyang-Bin
    • Information Systems Review
    • /
    • v.9 no.3
    • /
    • pp.67-82
    • /
    • 2007
  • The myth about BPO is: since firms do not want to continue to control the business process, they outsourced it to the external provider. Therefore, there is no need for controlling the outsourced process. Based on resource dependency theory, this study explores control mechanism used in BPO context. The overall approach of this study is qualitative, inductive and exploratory. First, a generic framework on the control structure is derived from extant literature, which includes outcome/process control, IS and social control. This framework is applied to a Korean BPO case. This study has found that the hybrid control structure consisting of behavior, outcome and social control mechanisms are effective for BPO success. As outsourcing grows rapidly and IS functions become smaller, the business struggles to redefine its IS capability. This research proposes setting up proper control mechanism between user and BPO service provider as new IS capability that business should focus on; and provides guidelines for managers in development of new IS capability.

Product-Sharing and Outcome Generation: New Contributions of Libraries to Research, Learning and Professional Development in Japanese Context

  • Oda, Mitsuhiro
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.45 no.2
    • /
    • pp.61-74
    • /
    • 2011
  • The author analyses the challenging activities of Japanese libraries in this decade by launching two keywords; "product-sharing" and "outcome generation." "Product-sharing" means that libraries share knowledge, skills, and records which are produced as the result of the services or in the process of activities. And "outcome generation" means that libraries generate any efficiency or effectiveness through their services to users. Using these concepts, reported are the current situation and aspects of Japanese libraries which try to make various contributions to the society; research and learning of the people, and education and training for professional librarians, and so on. In the analysis, the author shows some examples of "product-sharing" at first, including the records of reference transaction and the multi-functioned online public access catalogue. Especially, focused is on the various possibility and adoptability of the Collaborative Reference Database System of the National Diet Library of Japan. This system is one of digital reference service in Japan, and the database of reference transaction records is expected to be useful for research and academic studyies as knowledge-base of professional librarians. And the system is also expected to be a platform for LIS education and professional development in the e-learning environment. Secondly, as the examples of "outcome generation", explained are the problem-solving-type activities, and provision of the collection about books on struggling against disease and illness. A few examples of outcome in the problem-solving-type activities are these; increase of sales in the services for shop managers, business persons, and entrepreneurs, contribution to affluent daily life by providing the local information services to residents and neighbourhoods, and etc. And for both the patients with serious cases and their family or those who nurse them, books about other persons' notes or memorandum are the greatest support, and sometime healing. The author discuss the 'raison d'etre' of these activities focusing on public libraries in Japan.

A Study on the Web Archiving of Disaster Records: Focusing on the Roles and Functions of the OASIS Disaster Archive (재난기록의 웹 아카이빙에 대한 연구 - OASIS 재난아카이브의 역할과 기능을 중심으로 -)

  • Kim, Hyunjung
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.17 no.2
    • /
    • pp.27-56
    • /
    • 2017
  • The need for and importance of preserving various information resources on the web is constantly increasing. In addition to traditional types of records, the web contains communication records displaying various people's diverse viewpoints and connecting an event to its context. In particular, information resources produced during a disaster must be collected for long-term preservation. The "OASIS Disaster Archive" is a service provided through OASIS, which was developed and is managed by the National Library of Korea, to collect and preserve online information resources related to the recent disaster events in Korea. This study examines the characteristics and current status of the contents of the Disaster Archive to make suggestions for its improvements.