• Title/Summary/Keyword: Positive Computing

Search Result 247, Processing Time 0.022 seconds

A study of Carbon Dioxide Emissions due to the Cloud computing security (클라우드 컴퓨팅 보안에 따른 이산화탄소 배출에 관한 연구)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.101-108
    • /
    • 2014
  • Recently, The cloud computing technology is emerging as an important issue in the world and the cloud computing has attracted much attention to the technology about carbon dioxide reduction. However, Unlike to the positive aspects of a cloud computing are included several security vulnerabilities. For this reason, the carbon dioxide reduction of a cloud computing technology has a differences. Therefore, this paper will be analyzed to the carbon dioxide emission factors of a cloud computing through the cloud case studies related $CO_2$ emissions and experiments measured of $CO_2$ emissions a security system. and In the future, this is expected to be utilized as a basis for the security design and performance improvement.

A Perception on SW Education of Students with Scratch-Day (스크래치데이 참여학생들의 SW 교육에 대한 인식 연구)

  • Kim, Soohwan;Han, Seonkwan
    • Journal of The Korean Association of Information Education
    • /
    • v.18 no.4
    • /
    • pp.461-470
    • /
    • 2014
  • This study is to analyze students' perception about junior SW education by giving the questionnaire to the participants in Scratch-day. We taught the creative computing to 558 juniors on Scratch-day in 2013, 2014 and researched the questionnaire about their perceptions of creative computing education. We analyzed the current status of SW education from this process and extracted considerations about elementary SW education. We also proposed the possibility of its application to the elementary and middle school education. As a result of this study, it is observed that students think that creative computing education is fun and useful, and want to apply it to the public school education. Also, male students think more positive than female students about an intention to use, and students who have experienced with Scratch education consider it more useful and positive intention to use than those who have not. According to the structural model, it is found that the pleasure, easy of use, and usefulness of creative computing education have a positive influence on students' perception that it should be applied to public school education.

A Educational Program for Elementary Information Gifted Student using Unplugged Computing and EPL (언플러그드 컴퓨팅과 EPL을 이용한 초등정보영재교육프로그램의 개발)

  • Han, Seon-Kwan
    • Journal of The Korean Association of Information Education
    • /
    • v.15 no.1
    • /
    • pp.31-38
    • /
    • 2011
  • This study proposed a new education program for the information science gifted talent using unplugged computing and EPL that are new teaching approach of computer science. We analyzed unplugged computing contents and developed the advanced educational program for the information science gifted talent. We also made up a curriculum and teaching strategy and applied the elementary information science gifted talents the developed program with unplugged computing. In order to verify an effectiveness of new program, we tested t-test and found the positive results between before and after the program as well as an experimental group and the comparison group. In interview and observation about the gifted talents, we also saw that the students evaluated an unplugged computing lesson to the positive responses. We expect the proposed unplugged computing program will give many help for teaching the information science gifted talent.

  • PDF

The Effective Factors of Cloud Computing Adoption Success in Organization

  • Yoo, Seok-Keun;Kim, Bo-Young
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.6 no.1
    • /
    • pp.217-229
    • /
    • 2019
  • The purpose of the research is to verify how task characteristics for business and technology characteristics, economic feasibility, technology readiness, organizational factors, environmental factors of cloud computing affect the performance of cloud computing adoption through Fit and Viability. The research aims to verify the relationship among the success factors for adopting cloud computing based on the Fit-Viability model. Respondents who work for IT companies which is using cloud computing in South Korea were chosen. The data was analyzed by the structural equating model. As a result, Task characteristics and Technology characteristics affected Fit in a positive manner, while Technology readiness, Organizational factors and Environmental factors also positively impacted Viability. Fit and Viability both affected the successful adoption of cloud equally. In particular, Environmental factors were proven to have the biggest impacts on Viability, and affected highly indirect impact on the Performance of cloud computing adoption through Viability. Entering the era of the fourth industrial revolution, corporations have established digital transformation strategies to secure a competitive edge while growing continuously, and are also carrying out various digital transformation initiatives. For the success of adoption of foundational technologies, they need to understand not only the decision-making factors of adopting cloud computing, but also the success factors of adopting cloud computing.

Factors Affecting the Intention to Use of Personal Cloud Computing Service: A Case of Chinese Users (개인용 클라우드 컴퓨팅 서비스 수용의도에 영향을 미치는 요인: 중국 사례)

  • Kim, Soo-Hyun;Sun, Haoran
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.11
    • /
    • pp.877-884
    • /
    • 2013
  • As the Cloud Computing services are growing fast in the world, the number of Cloud Computing service users are being increased enormously in China. Studies on Intention-to-Use have been one of the interesting topics in the field of marketing. In this paper we investigate the factors influencing the intention-to-use of Cloud Computing services in China. Our research model is based on Technology Acceptance Model and includes 'privacy', 'information needs', 'service types', 'service appropriation', 'system quality', and 'system security'. We surveys the Chinese Cloud Computing service users and analyzes with Structural Equation Model. The results show that 'privacy', 'service appropriation', 'system quality', and 'system security' give positive effects to 'intention-to-use'. However, 'information needs' and 'service types' does not give positive effects.

Real-Time Digital Fuzzy Control Systems considering Computing Time-Delay

  • Park, Chang-Woo;Shin, Hyun-Seok;Park, Mig-Non
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.10 no.5
    • /
    • pp.423-431
    • /
    • 2000
  • In this paper, the effect of computing time-delay in the real-time digital fuzzy control systems is investigated and the design methodology of a real-time digital fuzzy controller(DFC) to overcome the problems caused by it is presented. We propose the fuzzy feedback controller whose output is delayed with unit sampling period. The analysis and the design problem considering computing time-delay is very easy because the proposed controller is syncronized with the sampling time. The stabilization problem of the digital fuzzy control system is solved by the linear matrix inequality(LMI) theory. Convex optimization techniques are utilized to find the stable feedback gains and a common positive definite matrix P for the designed fuzzy control system Furthermore, we develop a real-time fuzzy control system for backing up a computer-simulated truck-trailer with the consideration of the computing time-delay. By using the proposed method, we design a DFC which guarantees the stability of the real time digital fuzzy control system in the presence of computing time-delay.

  • PDF

A study on the vulnerability of the Cloud computing security (클라우드 컴퓨팅 보안의 취약성에 관한 연구)

  • Jeon, Jeong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1239-1246
    • /
    • 2013
  • Recently, The cloud computing technology is emerging as an important issue in the world, and In technology and services, has attracted much attention. However, the positive aspects of cloud computing unlike the includes several vulnerabilities. For this reason, the Hacking techniques according to the evolution of a variety of attacks and damages is expected. Therefore, this paper will be analyzed management models through case studies and experiments to the threats and vulnerabilities of the cloud computing. and In the future, this is expected to be utilized as a basis for the security design and performance improvement.

A study on the vulnerability and corresponding technique trends of the cloud computing service (클라우드 컴퓨팅 서비스의 취약성과 대응기술 동향에 관한 연구)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.13 no.6
    • /
    • pp.17-24
    • /
    • 2013
  • Recently, the cloud computing technology is emerging as an important issue in the world, and In the technology and services has attracted much attention. However, the positive aspects of cloud computing unlike the includes several vulnerabilities. For this reason, the hacking techniques according to the evolution of a variety of attacks and damages is expected. Therefore, this paper will be analyzed through case studies and experiments to the security technology trends of the cloud computing. and In the future, this is expected to be utilized as a basis for the security system design and corresponding technology development.

Operation and Satisfaction of Physical Computing Classes Using MODI (MODI를 활용한 피지컬 컴퓨팅 수업 운영 및 만족도)

  • Seo, Eunsil
    • Journal of Engineering Education Research
    • /
    • v.26 no.1
    • /
    • pp.37-44
    • /
    • 2023
  • Recently, the Internet of Things is attracting attention as an important key technology of the 4th Industrial Revolution, and SW education using physical computing is suggested as a good alternative to supplement the problems raised by beginners in programming education. Among the many teaching tools that can be used for physical computing education, MODI is a modular manufacturing tool that anyone can easily assemble like Lego. MODI is a teaching tool that can improve learners' achievement by linking a self-linked block-type code editor called MODI Studio to lay the foundation for programming in a relatively small amount of time and immediately check the results in person. In this paper, a physical computing education method using MODI was designed to be applied to basic programming courses for programming beginners and applied to after-school classes for middle school students. As a result, it was found that students' interest and satisfaction were much higher in physical computing classes using MODI than in text-based programming classes. It can be seen that physical computing education that allows beginners to see and feel the results in person is more effective than grammar-oriented text programming, and it can have a positive effect on improving basic programming skills by increasing students' participation.

Building On/off Attacks Detector for Effective Trust Evaluation in Cloud Services Environment

  • SALAH T. ALSHAMMARI;AIIAD ALBESHRI;KHALID ALSUBHI
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.101-107
    • /
    • 2024
  • Cloud computing is a widely used technology that has changed the way people and organizations store and access information. This technology is quite versatile, which is why extensive amounts of data can be stored in the cloud. Furthermore, businesses can access various services over the cloud without having to install applications. However, the cloud computing services are provided over a public domain, which means that both trusted and non-trusted users can access the services. Though there are several advantages of cloud computing services, especially to business owners, various challenges are also posed in terms of the privacy and security of information and online services. A kind of threat that is widely faced in the cloud environment is the on/off attack. In this kind of attack, a few entities exhibit proper behavior for a given time period to develop a highly a positive reputation and gather trust, after which they exhibit deception. A viable solution is provided by the given trust model for preventing the attacks. This method works by providing effective security to the cloud services by identifying malicious and inappropriate behaviors through the application of trust algorithms that can identify on-off attacks.