• Title/Summary/Keyword: Cyber space

Search Result 476, Processing Time 0.031 seconds

An Evaluation System for Learning Concentricity on Distance Education (원격강의의 학습집중도 평가 시스템)

  • Choi Byung-Do;Hyun Chul-Sang;Jung Jin-Uk;Kim Dong-Hak;Kim Wook-Hyun;Kim Chong-Gun
    • The KIPS Transactions:PartA
    • /
    • v.12A no.2 s.92
    • /
    • pp.181-190
    • /
    • 2005
  • The development of web-based distance education surroundings is steadily achieving. However the studying on the learning effect of learners is still weak against development of educational media itself. At present, most of the distance education system is showing limits in the evaluation of the learning effect because the teaming evaluation depends on mid or final-term exams by on-line or off-line. There is a strong point that the distance education is free from space and time. One of present weak points is limitation of evaluating learner's attitude which can estimate learning effects. Earnest teaming attitude at distance education is important factor for improving the learning effects. In this paper, we propose a model for improving the teaming effects by forcing real-time evaluation and returning feedback to learners at the cyber lectures. The developed experimental system is verified its possibilities.

A Study on the Awareness of User s to Avatar Characters in the Cyberspace (가상공간의 아바타 캐릭터에 대한 사용자의 인식조사)

  • 이향재
    • Archives of design research
    • /
    • v.17 no.3
    • /
    • pp.61-70
    • /
    • 2004
  • This study is focused on user awareness of avatar character in the cyber space. The purpose of this study is to investigate user preference toward avatar and test their awareness on it. The awareness of avatar is based on the applied degree of self-awareness, and also analyzed by factors using 3 elements such as loyalty, value and confidence in Maurice Wagner's study but self-projection was added to these three variables. The result shows that there is no significant statistical difference among response groups for age and sex classification but the preference and the value variables are significantly dependent on sex and age, respectively. There are strong correlation among each response variables for the awareness of avatar character and the loyalty and the preference variables are mostly correlated. The regression analysis shows that the preference of avatar is mostly affected by loyalty and thus the self awareness of avatar in the Cyberspace is proportional to user preference. It is shown that users do not awareness an avatar as a visual image but identify their avatar as an another selfness since they project themselves into those avatars.

  • PDF

Malware Analysis Based on Section, DLL (Section, DLL feature 기반 악성코드 분석 기술 연구)

  • Hwang, Jun-ho;Hwang, Seon-bin;Kim, Ho-gyeong;Ha, Ji-hee;Lee, Tae-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1077-1086
    • /
    • 2017
  • Malware mutants based on existing malware is widely used because it can easily avoid the existing security system even with a slight pattern change. These malware appear on average more than 1.6 million times a day, and they are gradually expanding to IoT / ICS as well as cyber space, which has a large scale of damage. In this paper, we propose an analytical method based on features of PE Section and DLL that do not give much significance, rather than pattern-based analysis, Sandbox-based analysis, and CFG, Strings-based analysis. It is expected that the proposed model will be able to cope with effective malicious code in case of combined operation of various existing analysis technologies.

Digital Image Watermarking Scheme in the Singular Vector Domain (특이 벡터 영역에서 디지털 영상 워터마킹 방법)

  • Lee, Juck Sik
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.16 no.4
    • /
    • pp.122-128
    • /
    • 2015
  • As multimedia information is spread over cyber networks, problems such as protection of legal rights and original proof of an information owner raise recently. Various image transformations of DCT, DFT and DWT have been used to embed a watermark as a token of ownership. Recently, SVD being used in the field of numerical analysis is additionally applied to the watermarking methods. A watermarking method is proposed in this paper using Gabor cosine and sine transform as well as SVD for embedding and extraction of watermarks for digital images. After delivering attacks such as noise addition, space transformation, filtering and compression on watermarked images, watermark extraction algorithm is performed using the proposed GCST-SVD method. Normalized correlation values are calculated to measure the similarity between embedded watermark and extracted one as the index of watermark performance. Also visual inspection for the extracted watermark images has been done. Watermark images are inserted into the lowest vertical ac frequency band. From the experimental results, the proposed watermarking method using the singular vectors of SVD shows large correlation values of 0.9 or more and visual features of an embedded watermark for various attacks.

An Extended I-O Modeling Methodology based on FSM (유한상태기계에 기반한 확장된 I-O 모델링 방법론)

  • Oh, Soo-Yeon;Wang, Gi-Nam;Kim, Ki-Hyung;Kim, Kangseok
    • Journal of the Korea Society for Simulation
    • /
    • v.25 no.4
    • /
    • pp.21-30
    • /
    • 2016
  • Recently manufacturing companies have used PLC control programs popularly for their automated production systems. Since the life cycle of production process is not so long, the change of the production lines occur frequently. Most of changes happen with modification of the position information and control process of the equipment. PLC control program is also modified based on the fundamental process. Therefore, to verify new PLC program by configuring virtual space according to real environment is needed. In this paper we show a logical modeling method, based on Timed-FSA useful for sequence control and dead-lock prevention. There is a problem wasting user's labor and time when defining a variety of states in a device. To overcome this problem, we propose an extended I-O model based on existing methods by adding a token concept of Petri Nets. Also we will show the usability of the extended I-O modeling through user study.

Experimental Implementation of Digital Twin Simulation for Physical System Optimization (물리시스템 최적화를 위한 디지털 트윈 시뮬레이션의 실험적 구현)

  • Kim, Kyung-Ihl
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.4
    • /
    • pp.19-25
    • /
    • 2021
  • This study proposes a digital twin implementation method through simulation so that the manufacturing process can be optimized in a manual manufacturing site. The scope of the proposal is a knowledge management mechanism that collects manual motion with a sensor and optimizes the manufacturing process with repetitive experimental data for motion recognition. In order to achieve the research purpose, a simulation of the distribution site was conducted, and a plan to create an optimized digital twin was prepared by repeatedly experiencing the work simulation based on the basic knowledge expressed by the worker's experience. As a result of the experiment, it was found that it is possible to continuously improve the manufacturing process by transmitting the result of configuring the optimized resources to the physical system by generating the characteristics of the work space configuration and working step within a faster time with the simulation that creates the digital twin.

A Home Management System Using Smart Devices in an IoT Environment (IoT 환경에서의 스마트디바이스를 활용한 주택관리시스템)

  • Ryu, Chang-Su
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.807-808
    • /
    • 2016
  • With the recent rise in nuclear families and single-member families, there is a need for the kind of home management unaffected by neither space nor time. Moreover, electronic devices in and around the home need to be managed efficiently and prevented from overheating, and there is an increasing risk of fire, theft, and leak of personal data with these devices, which is leading to an increase in the economic costs. Accordingly, there is a growing need for an efficient and secure smart home management system. This paper proposes a home management system that uses smart devices. This system has addressed the shortcomings of a conventional Internet-based home network. Furthermore, it communicates with IoT-enabled devices and features intelligent information home appliances that are isolated from personally identifiable information and which are secure against advanced persistent threats, a type of cyber-attack.

  • PDF

Direction of Designer-makers Business Activation through Strategic Design Support Policy-Focusing on 'Young man's Creative Work & Startup Support Project' (전략적 디자인 지원정책을 통한 디자이너-메이커스 비즈니스 활성화 방향 -청년 창의인력 취·창업지원사업을 중심으로-)

  • Park, Jun-Hong;Jeon, Young-Ok
    • Journal of Digital Convergence
    • /
    • v.17 no.4
    • /
    • pp.291-298
    • /
    • 2019
  • This study discusses the core contents and implications of the design support policy of government in the creation of the designer-makers' business ecosystem through the analysis of 'Young man's Creative Work & Startup Support Project'. This case, which aims to cultivate a design brand based on maker technology and to create jobs for young people, suggests the role of government as a creative culture creator so that designer-makers are able to create creative activities in a more free and creative atmosphere. Furthermore, this study emphasizes the importance of efficient integration and reorganization of similar maker support policies implemented by each government department, the necessity of a roadmap for realizing this, and the support for quality improvement. As a result, the design support policy of government for the designer-makers' business activation should evolve into the qualitative development of intellectual property based on a mature shared culture and the discovery of a new production paradigm model of the manufacturing industry based on the open manufacturers beyond the economic and numerical goals of creating new jobs.

Application of Discrete Wavelet Transforms to Identify Unknown Attacks in Anomaly Detection Analysis (이상 탐지 분석에서 알려지지 않는 공격을 식별하기 위한 이산 웨이블릿 변환 적용 연구)

  • Kim, Dong-Wook;Shin, Gun-Yoon;Yun, Ji-Young;Kim, Sang-Soo;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.3
    • /
    • pp.45-52
    • /
    • 2021
  • Although many studies have been conducted to identify unknown attacks in cyber security intrusion detection systems, studies based on outliers are attracting attention. Accordingly, we identify outliers by defining categories for unknown attacks. The unknown attacks were investigated in two categories: first, there are factors that generate variant attacks, and second, studies that classify them into new types. We have conducted outlier studies that can identify similar data, such as variants, in the category of studies that generate variant attacks. The big problem of identifying anomalies in the intrusion detection system is that normal and aggressive behavior share the same space. For this, we applied a technique that can be divided into clear types for normal and attack by discrete wavelet transformation and detected anomalies. As a result, we confirmed that the outliers can be identified through One-Class SVM in the data reconstructed by discrete wavelet transform.

The effect of smart learning based class on students with low academic achievement level: focusing on 3D application and AR of smart application (스마트러닝기반의 수업이 학업성취수준이 낮은 학생들에게 미치는 효과성 분석: 스마트앱의 3D와 AR 활용을 중심으로)

  • Hong, Ye-Yoon;Im, Yeon-Wook
    • Journal of Digital Convergence
    • /
    • v.19 no.1
    • /
    • pp.1-10
    • /
    • 2021
  • The purpose of the study is to investigate the impact and analyze the effect of smart learning based class to on the students with low academic achievement level. The study performed in G University in 2018 among students taking calculus II class. It includes 16 students with low academic achievement level, whose grades were under C in the previous calculus I class. They belonged to special class consisted of very low academic achievement level and had to pass calculus II. 3D and AR were actively used in the class. The result shows that they got visual understanding of space, which revealed through analyzing SNS, mid-term and final examination, lecture evaluation. Also, smart learning based mathematics class utilizing smartphone's application elevated academic achievement level and influenced positively on the interest and attitude toward mathematics regardless of previous academic achievement level.