• Title/Summary/Keyword: Design Environments

Search Result 3,143, Processing Time 0.032 seconds

Latent Profile Analysis of Medical Students' Use of Motivational Regulation Strategies for Online Learning (온라인 학습에서 의과대학생의 동기조절 프로파일 유형에 따른 인지학습과 학습몰입 간 관계 분석)

  • Yun, Heoncheol;Kim, Seon;Chung, Eun-Kyung
    • Korean Medical Education Review
    • /
    • v.23 no.2
    • /
    • pp.118-127
    • /
    • 2021
  • Due to the coronavirus disease 2019 pandemic, the new norm of online learning has been recognized as core to medical institutions for academic continuity, and students are expected to be motivated and engaged in learning while maintaining distance from other peers and educators. To facilitate students' and educators' newly defined roles in online medical education settings, it is crucial to understand how students are actively motivated and engaged in learning. Hence, this study explored medical students' motivational regulation profiles and examined the effects of motivational regulation strategies (MRS) on cognitive learning and learning engagement for online learning. Data were collected after the end of the first semester in 2020 from a sample of 334 medical students enrolled at a public university school of medicine. Latent profile analysis indicated three subgroups with different motivational regulation profiles: the low-profile, medium-profile, and high-profile groups. Regarding different MRS patterns in the high-profile group, mastery self-talk, performance approach self-talk, and the self-consequating strategy appeared to be most applicable for regulating learners' motivation. Analysis of variance showed that the profile groups with higher levels of MRS use were connected to a higher willingness to use cognitive learning strategies and a higher degree of engagement in online learning. The findings of this study emphasize the use of specific sets of MRS to support learning motivation and the need to design effective self-regulated learning environments in online medical education settings.

Recovery-Key Attacks against TMN-family Framework for Mobile Wireless Networks

  • Phuc, Tran Song Dat;Shin, Yong-Hyeon;Lee, Changhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.6
    • /
    • pp.2148-2167
    • /
    • 2021
  • The proliferation of the Internet of Things (IoT) technologies and applications, especially the rapid rise in the use of mobile devices, from individuals to organizations, has led to the fundamental role of secure wireless networks in all aspects of services that presented with many opportunities and challenges. To ensure the CIA (confidentiality, integrity and accessibility) security model of the networks security and high efficiency of performance results in various resource-constrained applications and environments of the IoT platform, DDO-(data-driven operation) based constructions have been introduced as a primitive design that meet the demand of high speed encryption systems. Among of them, the TMN-family ciphers which were proposed by Tuan P.M., Do Thi B., etc., in 2016, are entirely suitable approaches for various communication applications of wireless mobile networks (WMNs) and advanced wireless sensor networks (WSNs) with high flexibility, applicability and mobility shown in two different algorithm selections, TMN64 and TMN128. The two ciphers provide strong security against known cryptanalysis, such as linear attacks and differential attacks. In this study, we demonstrate new probability results on the security of the two TMN construction versions - TMN64 and TMN128, by proposing efficient related-key recovery attacks. The high probability characteristics (DCs) are constructed under the related-key differential properties on a full number of function rounds of TMN64 and TMN128, as 10-rounds and 12-rounds, respectively. Hence, the amplified boomerang attacks can be applied to break these two ciphers with appropriate complexity of data and time consumptions. The work is expected to be extended and improved with the latest BCT technique for better cryptanalytic results in further research.

Prototype Design and Security Association Mechanism for Policy-based on Security Management Model (정책기반 보안관리 모델을 위한 프로토타입과 정책 협상 메커니즘)

  • 황윤철;현정식;이상호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.131-138
    • /
    • 2003
  • With the Internet winning a huge popularity, there rise urgent problems which are related to Network Security Managements such as Protecting Network and Communication from un-authorized user. Accordingly, Using Security equipments have been common lately such as Intrusion Detection Systems, Firewalls and VPNs. Those systems. however, operate in individual system which are independent to me another. Their usage are so limited according to their vendors that they can not provide a corporate Security Solution. In this paper, we present a Hierarchical Security Management Model which can be applicable to a Network Security Policies consistently. We also propose a Policy Negotiation Mechanism and a Prototype which help us to manage Security Policies and Negotiations easier. The results of this research also can be one of the useful guides to developing a Security Policy Server or Security Techniques which can be useful in different environments. This study also shows that it is also possible to improve a Security Characteristics as a whole network and also to support Policy Associations among hosts using our mechanisms.

Design and Implementation of the CDMA2000 1x EV-DO Security Layer to which applies 3GPP2 C.S0024-A v.2.0 Standard (3GPP2 C.S0024-A v.2.0 표준을 적용한 CDMA2000 1x EV-DO 보안 계층 설계 및 구현)

  • Yang, Jong-Won;Cho, Jin-Man;Lee, Tae-Hoon;Seo, Chang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.59-65
    • /
    • 2008
  • In security layer in the CDMA2000 1x EV-DO, a standard - C.S0024-a v2.0 is being accomplished under the project of 3GPP2(3rd Generation Partnership Project2). Therefore, a security device is needed to implement the security layer which is defined on the standard document for data transfer security between AT(Access Terminal) and AN(Access Network) on CDMA2000 1x EV-DO environment. This paper realizes the security layer system that can make safe and fast transfer of data between AT and AN. It could be applied to various platform environments by designing and implementing the Security Layer in the CDMA2000 1x EV-DO Security Layer to which applies C.S0024-A v2.0 of 3GPP2.

Applied Method to Trusted Digital Content Distribution Architecture (신뢰할 수 있는 디지털 콘텐츠 유통 아키텍처 방안)

  • Kim, Hye-Ri;Hong, Seng-Phil;Lee, Chul-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.151-162
    • /
    • 2008
  • As the innovative internet technologies and multimedia are being rapidly developed, digital content is a remarkable new growth industry and supplied by various channel. For example, domestic sales volume in digital contents marked an annual increase of 14.7% since 2003. Against the merits of digital content distribution, Information reengineering aspects are getting more serious issues in these days such as infringement of copyright, flood of inappropriate content, invasion and infringement of privacy, etc. In this paper, we are making a suggestion of the TDCDA-Trusted Digital Content Distribution Architecture in order to solve above problems. TDCDA is provided to how well-define and design the trusted path in digital contents distribution in internet environments using a secure distribution mechanism, digital content integrity and copyright protection. Finally, we also proposed the TDCDA algorithm and applicable guidelines for feasible approach in real computing environment.

The Effect of AI and Big Data on an Entry Firm: Game Theoretic Approach (인공지능과 빅데이터가 시장진입 기업에 미치는 영향관계 분석, 게임이론 적용을 중심으로)

  • Jeong, Jikhan
    • Journal of Digital Convergence
    • /
    • v.19 no.7
    • /
    • pp.95-111
    • /
    • 2021
  • Despite the innovation of AI and Big Data, theoretical research bout the effect of AI and Big Data on market competition is still in early stages; therefore, this paper analyzes the effect of AI, Big Data, and data sharing on an entry firm by using game theory. In detail, the firms' business environments are divided into internal and external ones. Then, AI algorithms are divided into algorithms for (1) customer marketing, (2) cost reduction without automation, and (3) cost reduction with automation. Big Data is also divided into external and internal data. this study shows that the sharing of external data does not affect the incumbent firm's algorithms for consumer marketing while lessening the entry firm's entry barrier. Improving the incumbent firm's algorithms for cost reduction (with and without automation) and external data can be an entry barrier for the entry firm. These findings can be helpful (1) to analyze the effect of AI, Big Data, and data sharing on market structure, market competition, and firm behaviors and (2) to design policy for AI and Big Data.

A Study on the Relationship between Rem Kolhaas and SANAA through the Analysis of Architectural Space Characteristics (렘 콜하스와 SANAA의 건축공간 특성분석을 통한 공간의 관계성에 관한 연구)

  • Kim, Suk-Young
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.6
    • /
    • pp.113-127
    • /
    • 2021
  • This study aims to view the architectural space of the postmodern era as a concept of continuous change without being fixed, and to understand the spatial elements in architecture with a changing network of relationships. The purpose of the study is to analyze the spatial composition strategies of the two architects while revealing the spatial characteristics shown in Rem Kolhaas and SANAA's works in terms of relativity. The method of the study defines the meaning of non-fixed relationships through theoretical considerations of relativity and then looks at the architectural approaches of Rem Kollhaas and SANAA. The relationship was divided into programs, environments, users, and furniture and furniture in the space and analyzed the works of the two architects. As a result, both architects are similar in that they reject rigid programs by organization and use potentially inherent relationships for building space activation purposes, while Rem Koolhaas uses the user's behavior-inducing strategy, while SANAA uses the user's relaxation strategy.

Evaluation of Sliding Friction Properties of Laser Surface Texturing Dimple Pattern with DLC Coating under GaInSn Liquid Metal Lubricant (액체금속(GaInSn)윤활하에서 DLC(ta-C) 코팅된 레이저 표면 텍스쳐링 딤플패턴의 미끄럼 마찰특성평가)

  • Kwon, Gyubin;Jang, Youngjun;Chae, Younghun
    • Tribology and Lubricants
    • /
    • v.37 no.3
    • /
    • pp.106-111
    • /
    • 2021
  • There are several studies on reducing the friction that occurs on the relative sliding contact surface of moving parts under extreme environments. In particular, a solid lubricated bearing is studied to solve the tribological problem with friction reduction and durability parts using solid lubricants (lead or silver) in a vacuum atmosphere. Galinstan is mainly used as a liquid metal lubricant, but it is inevitable to have limited tribological applications owing to its high coefficient of friction. Many researchers work on surface texturing for surface modification and precision processing methods. To increase durability and low friction, DLC coating with hydrophobicity is applied on the contact surface texture. Therefore, using an untextured specimen, a dimple specimen, and a DLC-coated dimple specimen under liquid metal lubrication, this paper presents the following experimental sliding friction characteristics in the sliding friction test. 1) The average coefficient of friction of the DLC-coated dimple specimen and dimple specimen are lower compared to that of a non-patterned specimen. 2) In the DLC-coated dimple specimens, the average coefficient of friction changes according to the change in the dimple density. 3) DLC-coated dimple specimens with a density of 12.5 have the lowest average coefficient of friction under 41.6 N of normal load and 143.3 RPM.

Implementation of Responsive Web Application for Location-based Semantic Search (위치기반 시맨틱 검색을 위한 반응형 웹 애플리케이션 구현)

  • Lee, Suhyoung;Lee, Yongju
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.5
    • /
    • pp.1-12
    • /
    • 2019
  • Unlike existing Open APIs, Linked Data are made as a huge intelligent base to perform high-level SPARQL queries, and it is possible to create efficiently a new content by mashuping different information from various datasets. This paper implements a responsive web application for location-based semantic search. We mashup DBpedia, a kind of Linked Data, and GoogleMap API provided by Google, and provide a semantic browser function to confirm detail information regarding retrieved objects. Our system can be used in various access environments such as PC and mobile by applying responsive web design idea. The system implemented in this paper compares functional specifications with existing systems with similar functions. The comparison results show the superiority of our system in various aspects such as using semantic, linked-based browser, and mashup function.

A Study on the Interaction Smart Space Model in the Untact Environment (언택트 환경에서의 스마트 인터랙션 공간 모델 연구)

  • Yun, Chang Ok;Lee, Byung Chun;Kwon, Kyung Su
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.1
    • /
    • pp.89-97
    • /
    • 2021
  • Recently, as the importance of forced indoor living has increased in the untact era, the connection and relationship between space environments is increasing. That is, the smart interaction environment for providing services in various spaces collects and processes a number of surrounding environment information through various sensors to provide desired information according to the required place and time. In this environment, a new type of interaction paradigm is needed for the user to select and focus on environmental information. In this paper, we provide guidelines based on models and patterns for designing various interactions around space. Through interaction model-based technology, we provide guidelines for space-oriented interaction design. We propose an ideal interaction environment through guideline-based patterns and templates. Finally, by providing a space-oriented interaction environment suitable for smart interaction, users can freely obtain desired information.