• Title/Summary/Keyword: Positive solutions

Search Result 745, Processing Time 0.027 seconds

A Study on UI/UX design of mobile application of Mindfulness (마음챙김 훈련을 위한 모바일 인터페이스 디자인)

  • OH, Jun-yep;Ma, Jung-Yi;Kyu, Mam-Sang;Gim, Wan-Suk;Lee, Joo-yeop
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.11
    • /
    • pp.179-192
    • /
    • 2018
  • The purpose of this study is to research the design solutions that should be taken into consideration when developing mobile applications of Mindfulness Training. We aim to provide basic UI / UX design guidances for being effectiveness of mobile application of Mindfulness Training. For this purpose, We research in various aspects. Base on this, We select an approach and apply the application screen prototypes. We suggest some points for to be considered in the development of UI / IX design for mobile applications for Mindfulness Training based on obtained knowledge through this research process.

SAUDI ARABIAN UNDERGRADUATE STUDENTS' PERCEPTIONS OF E-LEARNING QUALITY DURING COVID19 PANDEMIC

  • Alkinani, Edrees A.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.66-76
    • /
    • 2021
  • The quality of the E-learning education in Saudi Arabia has been a major concern by many academicians, especially, and people in general as this platform has not been a priority for education. Not until recently, the world has been impacted by the Covid-19 pandemic, which makes every education institution shifted to the online platform to continue the education for the students. Thus, many studies on the perceptions on the online learning have been carried out, and though many are focusing on the perceptions by the education institutions' faculty and administration, there is a lack in the amount of study performed to analyse the students' perceptions of online learning during the pandemic time. The current study is conducted by utilising qualitative methods in order to collect information and investigate the students' perception regarding online learning during the pandemic Covid-19, based on their individual experiences. A number of fifteen (15) students were selected as respondents for the study, in which structured interviews were conducted by using a convenient sampling technique for data collection. Through the discussion, all of the positive and negative perceptions of online learning, as well as the factors contributing to those perceptions were identified. The results of the study found that the positive perceptions were contributed based on the flexibility, cost-effectiveness, availability of the electronic research databases, and well-designed online classroom interfaces. For the negative perceptions from using online learning platforms, the respondents informed that they were contributed by the lecturer's delayed feedback, lack of technical support by lecturers, low in self-esteem and self-motivation, feel isolated, one-way of educational methods, and poorly-designed class materials. Through the findings, the school's administration and lecturers would be able to know the struggles experienced by the students, and eventually come out with better solutions to improve their teaching methods.

A Latent Factor (PLS-SEM) Approach: Assessing the Determinants of Effective Knowledge Transfer

  • ANJUM, Reham;KHAN, Hadi Hassan;BANO, Safia;NAZIR, Sidra;GULRAIZ, Hira;AHMED, Wahab
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.2
    • /
    • pp.851-860
    • /
    • 2021
  • The Knowledge Transfer (KT) for higher education institutions (HEIs) is boundless. Still and all, the members of the staff affiliated with these institutions do recognize an array of hitches in relation to KT practices. The study in question underscores social interactions, training, and Information and Communication Technology (ICT) as the primary barriers and treats them as the independent variables of the study. The study posits that inadequate management of the above-mentioned barriers would impact effective KT unfavorably. Besides, putting forth some striking solutions needed to fix the obstructions that hamper the adequate management of the KT exercises is another aim of the study. For data collection purposes, the study picks out higher education institutions (public) of the Quetta district. The reckoned sample size is 317 subjects. The research type that has been used is cross-sectional research and, in this context, the cross-sectional explanatory sequential design has been used. Concerning the findings of the paper, the results of PLS-SEM show positive and significant relationships of social interaction and training with knowledge transfer, while ICT shows an insignificant positive relationship with the knowledge transfer. The most influencing factor for the knowledge transfer is social interaction as suggested by social interaction theory.

ON THE SCALED INVERSE OF (xi - xj) MODULO CYCLOTOMIC POLYNOMIAL OF THE FORM Φps (x) OR Φpsqt (x)

  • Cheon, Jung Hee;Kim, Dongwoo;Kim, Duhyeong;Lee, Keewoo
    • Journal of the Korean Mathematical Society
    • /
    • v.59 no.3
    • /
    • pp.621-634
    • /
    • 2022
  • The scaled inverse of a nonzero element a(x) ∈ ℤ[x]/f(x), where f(x) is an irreducible polynomial over ℤ, is the element b(x) ∈ ℤ[x]/f(x) such that a(x)b(x) = c (mod f(x)) for the smallest possible positive integer scale c. In this paper, we investigate the scaled inverse of (xi - xj) modulo cyclotomic polynomial of the form Φps (x) or Φpsqt (x), where p, q are primes with p < q and s, t are positive integers. Our main results are that the coefficient size of the scaled inverse of (xi - xj) is bounded by p - 1 with the scale p modulo Φps (x), and is bounded by q - 1 with the scale not greater than q modulo Φpsqt (x). Previously, the analogous result on cyclotomic polynomials of the form Φ2n (x) gave rise to many lattice-based cryptosystems, especially, zero-knowledge proofs. Our result provides more flexible choice of cyclotomic polynomials in such cryptosystems. Along the way of proving the theorems, we also prove several properties of {xk}k∈ℤ in ℤ[x]/Φpq(x) which might be of independent interest.

Minimize Web Applications Vulnerabilities through the Early Detection of CRLF Injection

  • Md. Mijanur Rahman;Md. Asibul Hasan
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.199-202
    • /
    • 2023
  • Carriage return (CR) and line feed (LF), also known as CRLF injection is a type of vulnerability that allows a hacker to enter special characters into a web application, altering its operation or confusing the administrator. Log poisoning and HTTP response splitting are two prominent harmful uses of this technique. Additionally, CRLF injection can be used by an attacker to exploit other vulnerabilities, such as cross-site scripting (XSS). Email injection, also known as email header injection, is another way that can be used to modify the behavior of emails. The Open Web Application Security Project (OWASP) is an organization that studies vulnerabilities and ranks them based on their level of risk. According to OWASP, CRLF vulnerabilities are among the top 10 vulnerabilities and are a type of injection attack. Automated testing can help to quickly identify CRLF vulnerabilities, and is particularly useful for companies to test their applications before releasing them. However, CRLF vulnerabilities can also lead to the discovery of other high-risk vulnerabilities, and it fosters a better approach to mitigate CRLF vulnerabilities in the early stage and help secure applications against known vulnerabilities. Although there has been a significant amount of research on other types of injection attacks, such as Structure Query Language Injection (SQL Injection). There has been less research on CRLF vulnerabilities and how to detect them with automated testing. There is room for further research to be done on this subject matter in order to develop creative solutions to problems. It will also help to reduce false positive alerts by checking the header response of each request. Security automation is an important issue for companies trying to protect themselves against security threats. Automated alerts from security systems can provide a quicker and more accurate understanding of potential vulnerabilities and can help to reduce false positive alerts. Despite the extensive research on various types of vulnerabilities in web applications, CRLF vulnerabilities have only recently been included in the research. Utilizing automated testing as a recurring task can assist companies in receiving consistent updates about their systems and enhance their security.

Relationship between Sensory Processing and Personality in College Students (대학생의 감각처리와 성격의 관계)

  • Lee, Chunyeop;Jung, Namhae
    • The Journal of Korean Academy of Sensory Integration
    • /
    • v.21 no.1
    • /
    • pp.1-10
    • /
    • 2023
  • Objective : This study aimed to identify the relationship between sensory processing and personality in college students by using five personality factors. Methods : The study was conducted between October and December 2022 with 149 college students majoring in health studies. Sensory processing was evaluated using the Adolescent/Adult Sensory Profile (AASP), and personality was evaluated using the International Personality Item Pool (IPIP). The data collected were analyzed by descriptive statistics, frequency analysis, and Pearson correlation analysis, and the Statistical Package for the Social Sciences (SPSS) was used. Results : Extraversion and agreeableness showed a significant correlation with all sensory processing types. Neuroticism showed a positive correlation with all types of sensory processing other than sensory seeking, while openness to experience showed a positive correlation with sensory seeking. Conscientiousness showed a negative correlation with low registration and sensory sensitivity type (p<.01). Conclusion : This study found a relationship between sensory processing type and personality type through an evaluation of five personality in college students. This information can be used to find solutions to various problems that college students.

Determination of the NDR and Electron Transport Properties of Self-Assembled Nitro-Benzene Monolayers Using UHV-STM

  • Lee Nam-Suk;Chang Jeong-Soo;Kwon Young-Soo
    • Journal of Electrical Engineering and Technology
    • /
    • v.1 no.3
    • /
    • pp.366-370
    • /
    • 2006
  • We investigated the negative differential resistance (NDR) property of self-assembled 4,4-di(ethynylphenyl)-2'-nitro-l-(thioacetyl)benzene ('nitro-benzene'), which has been well known as a conducting molecule [1], Self-assembly monolayers (SAMs) were prepared on Au (111), which had been thermally deposited onto pre-treated $(H_2SO_4: H_2O_2=3:1)$ Si, The Au substrate was exposed to a 1mM solution of 1-dodecanethiol in ethanol for 24 hours to form a monolayer. After thorough rinsing of the sample, it was exposed to a $0.1{\mu}M$ solution of nitro-benzene in dimethylformamide (DMF) for 30 min and kept in the dark during immersion to avoid photo-oxidation. Following the assembly, the samples were removed from the solutions, rinsed thoroughly with methanol, acetone, and $CH_2Cl_2$, and finally blown dry with $N_2$. Under these conditions, we measured the electrical properties of SAMs using ultra high vacuum scanning tunneling microscopy (UHV-STM) and scanning tunneling spectroscopy (STS) [2]. As a result, we confirmed the properties of NDR in between the positive and negative region.

Indirection based Multilevel Security Model and Application of Rehabilitation Psychology Analysis System (재활심리분석시스템의 다중 우회기반 접근통제 모델 및 응용)

  • Kim, Young-Soo;Jo, Sun-Goo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.10
    • /
    • pp.2301-2308
    • /
    • 2013
  • These days, Rehabilitation psychology analysis system is being used by world wide web in everyday's life. And on the other hand, we are facing spam messages' problems. To block these spam message, we are using filtering or pricing systems. But these solutions are raising other problems such as impediment in reception or availability caused by false positive or payment resistance. To solve these problems, we propose an Indirect Model on Message Control System(IMMCS) which controls an unsolicited message and prevents an useful message from discarding. We design and implement the IMMCS to enhance the usefulness and the availability. Being tested the IMMCS to verify the usability and the efficiency, it gave us a very successful result.

The Effect of Training, Information Technology, Intellectual and Emotional Intelligence on Teacher's Performance

  • INGSIH, Kusni;PRAYITNO, Agus;WALUYO, Dwi Eko;SUHANA, Suhana;ALI, Shujahat
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.12
    • /
    • pp.577-582
    • /
    • 2020
  • The performance of a teacher has an important role in the success of education in general. This study aims to determine the factors that affect the decline in teacher performance in one of the junior secondary schools in Indonesia. Based on the literature review, four exogenous variables were identified, namely, training, utilization of information technology, intellectual intelligence, and emotional intelligence. This study uses primary data, collected from a questionnaire distributed to respondents. The questionnaire items are measured using a Likert scale. The sample in this study were all teachers at MTS Darul Falah Sirahan, totaling 32 people. The analysis technique used in testing the hypothesis of this study is multiple regression analysis. Statistical product and service solutions are used as analysis tools. The results of this study indicate that only the variable 'utilization of information technology' has a positive and significant effect. However, the variables 'training,' 'intellectual intelligence,' and 'emotional intelligence' did not have a significant effect. This finding contradicts the literature in general. Therefore, this study recommends improving training methods, both those carried out internally by schools and by related agencies, and schools still need to optimize guidance and potential for teacher's intelligence in improving performance.

A Study on Problems and Solutions for Trading System of Fishery Products Wholesale Market in Korea (수산물 도매시장 거래제도의 문제점과 개선방안)

  • Kang, Jong-Ho
    • The Journal of Fisheries Business Administration
    • /
    • v.45 no.1
    • /
    • pp.79-93
    • /
    • 2014
  • The Act on Distribution and Price Stabilization of Agricultural and Fisheries Product, which specifies rules and regulations on the trading system of fishery products wholesales markets, has been revised several times, mainly in order to improve the trading system. However, there is still a huge gap between the reality and law when it comes to the trading system of the fishery products wholesale market. This study aims to analyze the problems of the trading system of the fishery products wholesale market and to suggest ways to make improvement. The main problem facing the trading system of the fishery products wholesale market is sales on consignment by intermediate wholesalers, and this paper suggests two alternatives to solve the problem. First, intermediate wholesaler can be converted to market wholesalers, but it also entails other problems. The market wholesaler system has never been successfully adopted in the agricultural and fishery products wholesale market, and it is not clear which system is better between the wholesale market corporation and the market wholesaler system. Second, sales on consignment by intermediate wholesalers can be adopted with a positive view toward it. Negotiation transaction can be carried out for sales on consignment as a transaction method under the current Act on Distribution and Price Stabilization of Agricultural and Fisheries Products. However, since the act cannot provide a solution for listing, it is necessary to introduce Japan's negotiated transaction in advance system as a negotiation transaction method.