• Title/Summary/Keyword: Instruction of Internet

Search Result 172, Processing Time 0.029 seconds

Development of Automated Quantitative Spray Control System for High Quality Crop Cultivation (고품질 작물 재배를 위한 자동화 정량 방제 제어 시스템 개발)

  • Oh, Seung-Ho;Yang, Seong-Wook;Kim, Hyung-Chan;Kim, Do-Hyeon;Doh, Yang-Hoi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.3
    • /
    • pp.267-274
    • /
    • 2017
  • Recently, several researches have been studied on agricultural automation system according to convergence of IT technology with agriculture. An automatic control system of the growth environment in crops is one of the these researches. The controls of damages caused by diseases and insects pest in crops are mainly carried out by manual mode or semi-automatic mode because of farmer's concerns for poor efficiency. But, this situation needs to be improved because it occurs various problems, such as human exposure to toxic pesticides, environmental pollution and waste due to drug overuse. In order to solve these problems, we developed an automatic quantity control system which based on the amount of pesticides for area under cultivation. The amount of pesticides is calculated according to the manufacturer's instruction for pesticides. To verify the effectiveness of our developed automatic system, we also compared with the systems of manual mode and the semi-automatic mode. The experimental results of a pest control performance of an automatic quantity control system showed that automatic system can reduce overuse of drugs. These results suggested that it can be expected to replace the existing system, with equivalent effectiveness to the manual mode.

Cyber-Lecture Management System based on XML (XML 기반의 사이버 강좌관리 시스템)

  • Kim, Hye-Young;Kim, Hwa-Sun;Kim, Heung-Sik;Kim, Sang-Gyun;Choi, Heung-Kook
    • The KIPS Transactions:PartA
    • /
    • v.10A no.5
    • /
    • pp.529-538
    • /
    • 2003
  • The speedy development of the world-wide web is rapidly growing the internet-based tools for the remote instruction. In interchanging and expressing the information of one another on the web, it is produced through the form of HTML(Hyoertext Text Markup Language). However, the structural disadvantage of the HTML is becoming to require a powerful XML(eXtensible Markup Language) which can store all the sphere of data, and transform them into another form. Nevertheless, because the powerful XML(eXtensible Markup Language). However necessary that XML standard should be applied appropriately. Because existing lecture data of cyber education sites cannot be shared, the users should passively use only the functions offered by cyber school. To solve the problem of this limit, in this study, the standardized data structure for XML is defined, and system model for processing between the server and the client is provided. By storing the lecture data of cyber education sites as XML on the web, stored data came to be reused without changing on any site. In the view of Users, they could used the Internet service with equipment that they want at any place and any time. To control any kinds of CK\LMS(Cyber Lecture Management System) for Administrator and Users, we offered a variety of Multimedia applications and an easy interface and built a new style of CLMS. Therefore, by strong and extracting the data related with the virtual education of the secondary school through the form of XML, for the effective interchange and sharing of the information, maximum utilization of the information can be achieved.

Awareness and Satisfaction of Health Insurance Coverage of Dental Scaling (건강보험의 치석제거 급여 범위 확대에 대한 인식 및 만족도에 관한 연구)

  • Hwang, Youn-Jung;Cho, Young-Sik;Lee, Su-Young
    • Journal of dental hygiene science
    • /
    • v.15 no.5
    • /
    • pp.620-627
    • /
    • 2015
  • The purpose of this study was to identify the factors associated with medical care utilization, the level of recognition, satisfaction, revisit and recommendation after implementing the expanded health insurance coverage of dental scaling. A questionnaire survey was conducted and analyzed among 608 adults living in Seoul and Gyeonggi-do April 1st to 30th, 2014. The results of the survey are as follows: 76.9% of the respondents know the expanded health insurance coverage, which is influenced by educational background and monthly income. The level of satisfaction, revisit and recommendation intention is affected meaningfully by educational background. Two factors, high school graduate or less and dental hygienist, meaningfully affect patients' satisfaction with scaling, and recommendation from others and Internet searching contribute to revisit. High school graduate or less is also one of the factors affecting the intention of recommendation, along with recommendation from others, Internet searching, scaling by a dental hygienist, and oral hygiene education before scaling. Summing up the results, patient's satisfaction and intention to recommend are high when dental hygienists provide oral hygiene instruction prior to scaling. This study suggests that dental hygienists help patients feel comfortable before treatment by building rapport with them. In addition, it is required that consistent efforts for quality improvement in scaling be sustained, that the patient's needs be identified to increase their satisfaction with scaling, and that studies to verify relevant factors be conducted.

A Study on Development of Robot - based Teaching-Learning Model for Improving Creativity (창의력 향상을 위한 로봇활용 교수 - 학습모형 개발 연구)

  • Jun, Woochun
    • Journal of Internet Computing and Services
    • /
    • v.16 no.5
    • /
    • pp.99-105
    • /
    • 2015
  • Currently robots are widely used in schools for educational purpose. With wide spread of robot-based education, it is known that major advantage of robot-based education is to enhance creativity and logical thinking of students. Although robots can be very useful tools for assisting students' study activities, there have not been lots of teaching-learning models for robot-based education.In this paper, a teaching-learning model is presented for robot-based education. The proposed model is designed based on constructivism. The proposed model consists of 6 stages: preparation, design, assembling, demonstration run, evaluation, and application & extension. The proposed model has the following characteristics. First, the proposed model is designed to enhance creativity and logical thinking ability of learners. Learners are supposed to be involved in self-directed activities and required to provide results based on their own ideas. Teachers are supposed to mediate students only if necessary. Second, learners are encouraged to participate in activity via diverse interaction. The interaction in this model includes learner-to-learner interaction, learner-to-teacher interaction, and learner-to-expert interaction. The proposed model encourages learners to solve the problem with cooperating each other. Also, teachers are supposed to guide students if necessary and observe and monitor behavior of students all the time. Third, motivation is provided in the beginning stage of the instruction. Fourth, in the proposed model, both study results and study process are equally important. In the model, study process is reviewed at the final stage.

An Exploratory Analysis School-based Intervention Studies to Prevent Smoking by American Adolescents (미국의 청소년 흡연예방을 위한 중재 프로그램의 현황)

  • Jung, Hye-Sun;Ha, Yeong-Mi;Jhang, Won-Gi;Lee, Ji-Won;Yi, Yun-Jeong;Yun, Soon-Nyung
    • Journal of the Korean Society of School Health
    • /
    • v.21 no.2
    • /
    • pp.119-134
    • /
    • 2008
  • Purpose: The purpose of this study is to understand a variety of intervention studies to prevent smoking by adolescents in U.S. and find out implications for Korea. Methods: This study reviewed articles found in the internet and analysed the data of US DHHS and CDC. Results: The School Health Policies and Programs Study (SHPPS) is a national survey periodically conducted to assess school health policies and programs of U.S. The main components of SHPPS are health education and physical education, health services, mental health and social services, school policies, and school environments. The CDC guidelines for school health programs to prevent tobacco use and addiction are composed of policy, instruction, curriculum, training, family involvement, tobacco-use cessation efforts, and evaluation. School-based interventions to prevent smoking can be classified into the categories of information-giving curricula, social competence curricula, social influence approaches, combined methods draw on social competence and social influence approaches and multi-modal programmes and Youth Empowerment study. The key programs for adolescent smoking prevention are ALERT Project, HSPP, TNT Project, MPP, NC YES. Conclusions: As smoking is often the first step of unhealthy behaviour such as alcohol drinking, illegal drugs, and violence, smoking prevention programmes for adolescents in U.S. have been comprehensive school-based health programs. In smoking prevention programs for adolescents, CDC plays a critical role by supporting survey, research, policy, and funds. The effectiveness of the programs was high when it was based on school and involved parents, community, and mass media. As the effect of each programme is not expected to last for a long time, consistent repetition of these interventions is essential. Current smoking prevention programs for adolescents are exploring the empowerment approach focused on the active involvement of participants rather than traditional approaches using order and discipline.

A Design on Information Security Occupational Classification for Future Convergence Environment (미래 융합환경 기반의 정보보호 직업군 설계)

  • Lee, Yunsoo;Shin, Yongtae
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.1
    • /
    • pp.201-215
    • /
    • 2015
  • Recently advanced security threats have increasingly occurred, and the necessity and importance of Information Security has been growing with the advent of the era of convergence beyond information-oriented age. Most domestic studies in the field of occupational classification of Information Security have only focused on technology-oriented occupations. Relatively little research has been carried out on the occupational classification in the view of convergence environment. Therefore, in this paper we gave a definition of Information Security occupations, classified them and draw required capabilities by occupations in order to design the occupational classification system of Information Security and the required capabilities for future convergence environment by analyzing the previous studies. We also reclassified the occupational classification and required capabilities by occupations, and verified the validity of them based on National Initiative for Cybersecurity Education's the occupational classification system of Information Security considering the future convertgence environment. It is expected that the results of this study will be employed as base data for manpower demand and supply and improvement of working conditions in the future convergence environments. In the future study we will build standardized instruction methods which provide occupational capabilities by using the required capabilities by occupations.

Next Generation Convergence Security Framework for Advanced Persistent Threat (지능형 지속 위협에 대한 차세대 융합 보안 프레임워크)

  • Lee, Moongoo;Bae, Chunsock
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.9
    • /
    • pp.92-99
    • /
    • 2013
  • As a recent cyber attack has a characteristic that is intellectual, advanced, and complicated attack against precise purpose and specified object, it becomes extremely hard to recognize or respond when accidents happen. Since a scale of damage is very large, a corresponding system about this situation is urgent in national aspect. Existing data center or integration security framework of computer lab is evaluated to be a behind system when it corresponds to cyber attack. Therefore, this study suggests a better sophisticated next generation convergence security framework in order to prevent from attacks based on advanced persistent threat. Suggested next generation convergence security framework is designed to have preemptive responses possibly against APT attack consisting of five hierarchical steps in domain security layer, domain connection layer, action visibility layer, action control layer and convergence correspondence layer. In domain connection layer suggests security instruction and direction in domain of administration, physical and technical security. Domain security layer have consistency of status information among security domain. A visibility layer of Intellectual attack action consists of data gathering, comparison, decision, lifespan cycle. Action visibility layer is a layer to control visibility action. Lastly, convergence correspond layer suggests a corresponding system of before and after APT attack. An introduction of suggested next generation convergence security framework will execute a better improved security control about continuous, intellectual security threat.

XML Web Services for Learning ContentsBased on a Pedagogical Design Model (교수법적 설계 모델링에 기반한 학습 컨텐츠의 XML 웹 서비스 구축)

  • Shin, Haeng-Ja;Park, Kyung-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.8
    • /
    • pp.1131-1144
    • /
    • 2004
  • In this paper, we investigate a problem with an e-learning system for e-business environments and introduce the solving method of the problem. To be more accurate, existing Web-hosted and ASP (Application Service Provider)-oriented service model is difficult to cooperate and integrate among the different kinds of systems. So we have produced sharable and reusable learning object, they have extracted a principle from pedagogical designs for units of reuse. We call LIO (Learning Item Object). This modeling makes use of a constructing for XML Web Services. So to speak, units of reuse from pedagogical designs are test tutorial, resource, case example, simulation, problem, test, discovery and discussion and then map introduction, fact, try, quiz, test, link-more, tell-more LIO learning object. These typed LIOs are stored in metadata along with the information for a content location. Each one of LIOs is designed with components and exposed in an interface for XML Web services. These services are module applications, which are used a standard SOAP (Simple Object Access Protocol) and locate any computer over Internet and publish, find and bind to services. This guarantees the interoperation and integration of the different kinds of systems. As a result, the problem of e-learning systems for e-business environments was resolved and then the power of understanding about learning objects based on pedagogical design was increased for learner and instruction designers. And organizations of education hope for particular decreased costs in constructing e-learning systems.

  • PDF

A Literature Review on Media-Based Learning in Science (과학과 미디어 기반 학습 관련 문헌 연구)

  • Byun, Taejin
    • Journal of The Korean Association For Science Education
    • /
    • v.37 no.3
    • /
    • pp.417-427
    • /
    • 2017
  • Media is the medium that impart information beyond time and space. They refer to characters or images that serve as means to convey information. From old media such as newspapers and television to new media such as the internet and smart phones, media has developed cumulatively with the development of technology. The goal of media education is to develop the understanding of the properties of media, the ability of critical interpretation of media and selective acceptance. Furthermore it is to cultivate the ability to express meaning creatively and communicate through media. I carried out 'the research of Korean classroom instruction models based on media' with Korean language and social studies education researchers from July 2016 to December 2016. This study is a fundamental study of the project. Based on 58 research papers published between 2006 and 2016, research trends and factors were extracted through literature studies related to media-based science learning. The Result has shown that the studies related to media-based science learning is on the rise, and more than half of all researchers studied about elementary school students. The studies were divided into research on students, research on teachers and pre-service teachers, research on smart devices or media contents, and research on the development of digital textbooks. Among the four variables, there were many researches related to students' cognitive and affective development, and the development and application of media contents.

Metamorphic Malware Detection using Subgraph Matching (행위 그래프 기반의 변종 악성코드 탐지)

  • Kwon, Jong-Hoon;Lee, Je-Hyun;Jeong, Hyun-Cheol;Lee, Hee-Jo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.37-47
    • /
    • 2011
  • In the recent years, malicious codes called malware are having shown significant increase due to the code obfuscation to evade detection mechanisms. When the code obfuscation technique is applied to malwares, they can change their instruction sequence and also even their signature. These malwares which have same functionality and different appearance are able to evade signature-based AV products. Thus, AV venders paid large amount of cost to analyze and classify malware for generating the new signature. In this paper, we propose a novel approach for detecting metamorphic malwares. The proposed mechanism first converts malware's API call sequences to call graph through dynamic analysis. After that, the callgraph is converted to semantic signature using 128 abstract nodes. Finally, we extract all subgraphs and analyze how similar two malware's behaviors are through subgraph similarity. To validate proposed mechanism, we use 273 real-world malwares include obfuscated malware and analyze 10,100 comparison results. In the evaluation, all metamorphic malwares are classified correctly, and similar module behaviors among different malwares are also discovered.