• Title/Summary/Keyword: Presence Information Data

Search Result 634, Processing Time 0.029 seconds

Differences in the social presence of instructor by instructor's social intervention and its effects on learning satisfaction in an online university (온라인대학에서 교수자의 사회적 촉진활동에 따른 교수자 사회적 실재감의 차이 및 이들의 관계가 학습만족도에 미치는 영향)

  • Lee, Euikil;Kim, Yun-Jung
    • The Journal of Korean Association of Computer Education
    • /
    • v.18 no.3
    • /
    • pp.69-78
    • /
    • 2015
  • This study aims to analyze differences in the social presence of instructor by instructor's social intervention, the effects of the social presence of instructor on learning satisfaction, and learner characteristics related to the social presence of instructor. Data including subjects' demographic information, interactions, social presence of instructor, social presence of the course, and learning satisfaction were collected from 119 adult learners in an online university in Korea. The main findings of this study are as follows. First, the social presence of instructor was higher in the higher-aged group or active group on intranet message board than the lower-aged group or inactive group on the board. Second, instructor's social intervention increased the level of perceived social presence of instructor. However, the active group on the board has shown the highest level of perceived social presence of instructor, without instructor's social intervention. Third, there was a high correlation between instructor's social intervention and the social presence of instructor, while the variables affecting learning satisfaction were the social presence of instructor and social presence of the course. From the results of this study, it is suggested that instructors' social interventions be provided systematically for those who are not active in social interaction to enhance their learning satisfaction.

A Study on Efficient RAID Storages using Flash Memory (플래시 메모리를 사용하는 효과적인 RAID 스토리지에 대한 연구)

  • Byun, Si-Woo;Hur, Moon-Haeng
    • Proceedings of the IEEK Conference
    • /
    • 2009.05a
    • /
    • pp.240-242
    • /
    • 2009
  • Flash memories are one of best media to support future computer's storages. However, we need to improve traditional data management scheme due to the relatively slow characteristics of flash operation of SSD. Due to the unique characteristics of flash media and hard disk, the efficiency of I/O processing is severely reduced without special treatment, especially in the presence of heavy workload or bulk data copy. In this respect, we need to design and develop efficient hybrid-RAID storage system.

  • PDF

Mitigation of Adverse Effects of Malicious Users on Cooperative Spectrum Sensing by Using Hausdorff Distance in Cognitive Radio Networks

  • Khan, Muhammad Sajjad;Koo, Insoo
    • Journal of information and communication convergence engineering
    • /
    • v.13 no.2
    • /
    • pp.74-80
    • /
    • 2015
  • In cognitive radios, spectrum sensing plays an important role in accurately detecting the presence or absence of a licensed user. However, the intervention of malicious users (MUs) degrades the performance of spectrum sensing. Such users manipulate the local results and send falsified data to the data fusion center; this process is called spectrum sensing data falsification (SSDF). Thus, MUs degrade the spectrum sensing performance and increase uncertainty issues. In this paper, we propose a method based on the Hausdorff distance and a similarity measure matrix to measure the difference between the normal user evidence and the malicious user evidence. In addition, we use the Dempster-Shafer theory to combine the sets of evidence from each normal user evidence. We compare the proposed method with the k-means and Jaccard distance methods for malicious user detection. Simulation results show that the proposed method is effective against an SSDF attack.

A Study of Factors Affecting Group Polarization in Online Communication : Based on Anonymity (온라인 커뮤니케이션에서 집단극화 현상에 영향을 미치는 요인에 관한 연구: 익명성 관점에서)

  • Suh, Eung-Kyo
    • Journal of Distribution Science
    • /
    • v.13 no.2
    • /
    • pp.75-83
    • /
    • 2015
  • Purpose - This study aims to identify the effects of communication cues, anonymity, and social presence on group polarization in computer-mediated communication (CMC) settings. Extant literature has introduced some theoretical backgrounds of social presence and SIDE (Social Identity model of Deindividuation Effects) to explain the effects of communication cues and anonymity. The concept of social presence emphasized the mediating role on communication cues and anonymity. However, most literature did not measure social presence and compare group polarization of all condition groups. This does not sufficiently explain the result of group polarization. Research design, data, and methodology - We believe that the direct impact of anonymity on group polarization can provide a more admissible and clearer explanation for the results. In addition, this study categorizes anonymity into two levels, as anonymity of group and anonymity of self. To justify the anonymity view, a laboratory experiment was conducted. The experiment was conducted in communication cues settings (visual cue; without visual cue) and anonymity settings (identified; anonymous). Each of the four settings has 10 groups consisting of five subjects each (total 200 subjects). The subjects are undergraduates from a large university, majoring in business. All experimental procedures and calculations of choice shift and preference change follow the literature. Results - First, the removal of visual cues does not produce a significant impact on group polarization, which cannot be explained by the social presence view. Second, the anonymous condition does not significantly affect group polarization, which also cannot be explained by the social presence view. However, the anonymous condition directly affects group polarization. Specifically, anonymity of self has a stronger effect on group polarization than anonymity of group. The result explains about the leading factor affecting group polarization. This study examines another view of how computer-mediated communication may be associated with group polarization. The process and outcome data from the experiment reveal that group polarization is not affected by level of social presence, but by level of anonymity. Group discussions conducted with visual cue CMC setting and identified CMC setting result in weaker group polarization. Conversely, group discussions conducted without visual cue CMC setting and anonymous CMC setting lead to stronger group polarization. The results of the study have the following implications. First, they provide clues for business organizations to design the most appropriate media conditions and preemptive social conditions to implement when making group decisions through CMC, to maximize achievements, generate amicable agreements, or actively share information. Second, this study can be useful in analyzing different adverse effects generated through Internet use. Conclusions - This research can help explain discussions and decision-making actions on Internet forums, which have recently increased, as well as providing a foundational basis in newly establishing policies for the forums. Finally, it should be noted that many other factors such as group size, topics, and group history may affect group polarization. These should be examined in future studies.

Cloud Attack Detection with Intelligent Rules

  • Pradeepthi, K.V;Kannan, A
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.4204-4222
    • /
    • 2015
  • Cloud is the latest buzz word in the internet community among developers, consumers and security researchers. There have been many attacks on the cloud in the recent past where the services got interrupted and consumer privacy has been compromised. Denial of Service (DoS) attacks effect the service availability to the genuine user. Customers are paying to use the cloud, so enhancing the availability of services is a paramount task for the service provider. In the presence of DoS attacks, the availability is reduced drastically. Such attacks must be detected and prevented as early as possible and the power of computational approaches can be used to do so. In the literature, machine learning techniques have been used to detect the presence of attacks. In this paper, a novel approach is proposed, where intelligent rule based feature selection and classification are performed for DoS attack detection in the cloud. The performance of the proposed system has been evaluated on an experimental cloud set up with real time DoS tools. It was observed that the proposed system achieved an accuracy of 98.46% on the experimental data for 10,000 instances with 10 fold cross-validation. By using this methodology, the service providers will be able to provide a more secure cloud environment to the customers.

The Research about a Control Data Duplication Transmission Technique (제어데이터 중복전송기법에 관한 연구)

  • Lee, Young-Ju;Kang, Soon-Duk
    • The Journal of Information Technology
    • /
    • v.9 no.4
    • /
    • pp.57-63
    • /
    • 2006
  • The intelligent elder brother groove network robot service the new broadband presence line is conversionce application service. Robot control data transmission hazard UDP packet of the remote control data which stands duplication necessary to transmit. TCP the error ratio to be high qualitative recording transmission pattern it of the transmission unit and is irregular the distance is distant to show and also the transmission lag is visible increases. The recording packet drop whose UDP degree error ratio will be high is frequent and does not arrive packet little by little increases is a possibility of knowing in the transmission unit. The technique which it proposes with traffic pattern of the transmission unit is visible the transfer characteristic of the same shape from 1% packet error ratio degree. The effective transmission technique of the robot control data which puts a base in UDP protocols was proposed from the present paper. Following research it leads and it follows the duplication transmission number of time in error rate of radio link and it was thought all that controls petty the research of the mechanism which progresses is necessary.

  • PDF

Special Quantum Steganalysis Algorithm for Quantum Secure Communications Based on Quantum Discriminator

  • Xinzhu Liu;Zhiguo Qu;Xiubo Chen;Xiaojun Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1674-1688
    • /
    • 2023
  • The remarkable advancement of quantum steganography offers enhanced security for quantum communications. However, there is a significant concern regarding the potential misuse of this technology. Moreover, the current research on identifying malicious quantum steganography is insufficient. To address this gap in steganalysis research, this paper proposes a specialized quantum steganalysis algorithm. This algorithm utilizes quantum machine learning techniques to detect steganography in general quantum secure communication schemes that are based on pure states. The algorithm presented in this paper consists of two main steps: data preprocessing and automatic discrimination. The data preprocessing step involves extracting and amplifying abnormal signals, followed by the automatic detection of suspicious quantum carriers through training on steganographic and non-steganographic data. The numerical results demonstrate that a larger disparity between the probability distributions of steganographic and non-steganographic data leads to a higher steganographic detection indicator, making the presence of steganography easier to detect. By selecting an appropriate threshold value, the steganography detection rate can exceed 90%.

Program Slicing in the Presence of Complicated Data Structure (복잡한 자료 구조를 지니는 프로그램에 대한 슬라이싱)

  • 류호연;강원임;박재홍
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1999.10a
    • /
    • pp.557-559
    • /
    • 1999
  • 프로그램 슬라이싱은 프로그램의 특정 문장에서 변수에 영향을 주는 문장들을 분해하는 방법으로 디버깅, 최적화, 프로그램 유지보수, 테스팅, 재사용 부품 추출 그리고 프로그램 이해를 포함하는 여러 응용 분야들에서 그 유용성을 확인할 수 있다. 본 논문은 포인터 변수와 포인터 변수에 의해 참조되는 동적 객체, 구조체, 배열을 포함하는 프로그램에 대한 정확한 슬라이스 생성에 관한 연구이다. 포인터 변수와 같은 복잡한 구조를 가지는 프로그램에서 포인터 변수나 포인터 변수가 참조하는 객체의 상태를 파악하기 위해서 객체 참조상태 그래프를 제시한다.

  • PDF

Optimization Driven MapReduce Framework for Indexing and Retrieval of Big Data

  • Abdalla, Hemn Barzan;Ahmed, Awder Mohammed;Al Sibahee, Mustafa A.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.1886-1908
    • /
    • 2020
  • With the technical advances, the amount of big data is increasing day-by-day such that the traditional software tools face a burden in handling them. Additionally, the presence of the imbalance data in big data is a massive concern to the research industry. In order to assure the effective management of big data and to deal with the imbalanced data, this paper proposes a new indexing algorithm for retrieving big data in the MapReduce framework. In mappers, the data clustering is done based on the Sparse Fuzzy-c-means (Sparse FCM) algorithm. The reducer combines the clusters generated by the mapper and again performs data clustering with the Sparse FCM algorithm. The two-level query matching is performed for determining the requested data. The first level query matching is performed for determining the cluster, and the second level query matching is done for accessing the requested data. The ranking of data is performed using the proposed Monarch chaotic whale optimization algorithm (M-CWOA), which is designed by combining Monarch butterfly optimization (MBO) [22] and chaotic whale optimization algorithm (CWOA) [21]. Here, the Parametric Enabled-Similarity Measure (PESM) is adapted for matching the similarities between two datasets. The proposed M-CWOA outperformed other methods with maximal precision of 0.9237, recall of 0.9371, F1-score of 0.9223, respectively.

Morphological Studies of Developmental Stages of Oculotrema hippopotami (Monogenea: Polystomatidae) Infecting the Eye of Hippopotamus amphibius (Mammalia: Hippopotamidae) Using SEM and EDXA with Notes on Histopathology

  • Rubtsova, Nataliya Yu.;Heckmann, Richard A.;Smit, Willem J.;Luus-Powell, Wilmien J.;Halajian, Ali;Roux, Francois
    • Parasites, Hosts and Diseases
    • /
    • v.56 no.5
    • /
    • pp.463-475
    • /
    • 2018
  • The present study was performed to observe histopathological effects of Oculotrema hippopotami Stunkard, 1924 infection in the eye of Hippopotamus amphibius, as well as to reveal new details of morphology and structural features of this monogenean and its comparison between 2 age stages of the parasite. This was done using both light and scanning electron microscopy, energy dispersive X-ray analysis (EDXA) and histopathology. The presence of a mixture of different generations (adult and sub-adult) in one host individual is common for Oculotrema Stunkard, 1924 in contrast to Polystoma Zeder, 1800. New metrical and graphical information obtained for adults and sub-adults compared with the previous studies. Here we show the presence of genital papillae in adults, metrical data on the distal part of the vas deferens. SEM micrographs of sperm ejaculatory structures and information about the flattened dorsal side of the body provided for the first time. Histopathological changes, such as necrosis and hemorrhage in host tissues as a result of O. hippopotami attachment structures are described. Structural analysis of different body parts of O. hippopotami of both age groups are also included. We show qualitative differences in the presence of hardening ions (S, P, Ca) in attachment structures (oral and haptor suckers) that increase with the age of the worm. The presence of sub-adults and adults on the same host, together with high levels of infection without high pathogenicity may account for Oculotrema being one of the most successful parasites among the Monogenea.