• Title/Summary/Keyword: e-Learning Systems

Search Result 641, Processing Time 0.026 seconds

Evolving Internet Information & Technology as Enablers for Creating Shared Values

  • Song, In Kuk;Chun, Junchul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.1
    • /
    • pp.309-317
    • /
    • 2015
  • Recently many companies began to realize their visions for the sustainable growth with the advent of CSV(Creating Shared Values). Michael E. Porter, a Harvard Professor, claims that placing social value creation at the core of business strategy has the potential to uncover big opportunities for individual companies and that shared value can play a significant role in increasing competitive advantages while fostering social prosperity. In consequence, the various researches have illustrated how to get the opportunity for competitive advantages from building a social value proposition into corporate strategy, and considerable studies have been promoted heavily from the managerial perspective. However, due to the lack of capability converging information technology with business strategy, any research effort to identify technological or Internet-related issues and to link the issues to CSV does not exist. With Korean being a Internet leading country, the demands of researches analyzing core technology, information, and service utilizing Internet are rapidly growing. The study aims to find out Internet-related enablers for CSV. This paper describes the concepts and features of CSV, identifies emerging Internet-related issues toward the opportunity for competitive advantage, and then depicts the rigorous research endeavors in the areas of Internet information, technology, and services. As a result, 11 papers presented and selected as the outstanding papers at APIC-IST 2014 handle the issues to be brought together, which include: Wireless and Sensor Network, Image Processing and HCI, Big Data and Business Intelligence, Security & Privacy in Internet, SNS & Communication, Smart-Learning and e-Learning, and Internet Business Strategy. The study finally recommends indispensible terms for substantially vitalizing CSV.

Malware Detection Using Deep Recurrent Neural Networks with no Random Initialization

  • Amir Namavar Jahromi;Sattar Hashemi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.177-189
    • /
    • 2023
  • Malware detection is an increasingly important operational focus in cyber security, particularly given the fast pace of such threats (e.g., new malware variants introduced every day). There has been great interest in exploring the use of machine learning techniques in automating and enhancing the effectiveness of malware detection and analysis. In this paper, we present a deep recurrent neural network solution as a stacked Long Short-Term Memory (LSTM) with a pre-training as a regularization method to avoid random network initialization. In our proposal, we use global and short dependencies of the inputs. With pre-training, we avoid random initialization and are able to improve the accuracy and robustness of malware threat hunting. The proposed method speeds up the convergence (in comparison to stacked LSTM) by reducing the length of malware OpCode or bytecode sequences. Hence, the complexity of our final method is reduced. This leads to better accuracy, higher Mattews Correlation Coefficients (MCC), and Area Under the Curve (AUC) in comparison to a standard LSTM with similar detection time. Our proposed method can be applied in real-time malware threat hunting, particularly for safety critical systems such as eHealth or Internet of Military of Things where poor convergence of the model could lead to catastrophic consequences. We evaluate the effectiveness of our proposed method on Windows, Ransomware, Internet of Things (IoT), and Android malware datasets using both static and dynamic analysis. For the IoT malware detection, we also present a comparative summary of the performance on an IoT-specific dataset of our proposed method and the standard stacked LSTM method. More specifically, of our proposed method achieves an accuracy of 99.1% in detecting IoT malware samples, with AUC of 0.985, and MCC of 0.95; thus, outperforming standard LSTM based methods in these key metrics.

Analysis of Prompt Engineering Methodologies and Research Status to Improve Inference Capability of ChatGPT and Other Large Language Models (ChatGPT 및 거대언어모델의 추론 능력 향상을 위한 프롬프트 엔지니어링 방법론 및 연구 현황 분석)

  • Sangun Park;Juyoung Kang
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.4
    • /
    • pp.287-308
    • /
    • 2023
  • After launching its service in November 2022, ChatGPT has rapidly increased the number of users and is having a significant impact on all aspects of society, bringing a major turning point in the history of artificial intelligence. In particular, the inference ability of large language models such as ChatGPT is improving at a rapid pace through prompt engineering techniques. This reasoning ability can be considered as an important factor for companies that want to adopt artificial intelligence into their workflows or for individuals looking to utilize it. In this paper, we begin with an understanding of in-context learning that enables inference in large language models, explain the concept of prompt engineering, inference with in-context learning, and benchmark data. Moreover, we investigate the prompt engineering techniques that have rapidly improved the inference performance of large language models, and the relationship between the techniques.

Development and Application of the Student Activity-centered High School Science Textbook Model: Focused on Earth Science (학생 활동 중심의 고등학교 과학 교과서 모형 개발 및 적용: 지구과학 영역을 중심으로)

  • Lee, Hyonyong;Lee, Hyundong;Chae, Dong-hyun;Lim, Sung-man;Jeon, Jaedon
    • Journal of the Korean Society of Earth Science Education
    • /
    • v.9 no.2
    • /
    • pp.139-151
    • /
    • 2016
  • The purposes of this study were to develop the student activity-centered science textbook model in high school and explore the field application possibility. For development of student activity-centered science textbook model, we conducted a literature survey about foreign science textbook and science curriculum and we developed the textbook development framework based on 7E learning model. Based on framework, we developed student activity-centered science textbook model about achievement standards 'systems and interaction - earth systems'. A development model is the total amount of five class periods and the various objectives were reflected in pursuit systems thinking & STEAM. 1~4 class periods, learning content composed of student activity-centered exploration activities that organically associated to make final products. Fifth class period was presented to explore job and career. A development model was applied to high school class for one time study. Applying the result of field study, students were responded positively in interested about science class, textbook contents, made final product. Through this study, if science textbook was made on the basis of the revised student activity-centered science textbook model, students were lead to positive change in science class.

An Analysis of the Status of OER(Open Educational Resources) Usage in Asia (아시아지역의 공개교육자원 활용현황 분석)

  • Lee, Eunjung;Kim, Yong
    • Journal of Internet Computing and Services
    • /
    • v.13 no.6
    • /
    • pp.41-53
    • /
    • 2012
  • Open educational resources(OER) enable the spread of mutual information exchange and provide advantages to both their users and institutions, such as reducing costs, improving content quality, and establishing relationships. The recent research on OER was about their connection to formal education, copyright trends, and corporate e-learning. There have been very few studies, however, on the utilization of OER and on the problems related to their practical use. Thus, this study was conducted for the purposes of analyzing the status of OER usage in education-related institutions and of providing suggestions for institution operation based on the analysis results, to promote the use of OER. A survey was conducted among more than 200 institutions in Asia, and the survey results showed that 'images and visual materials' are the most commonly used materials in Asia, and that the factors barring OER usage in the said region are 'lack of awareness', 'lack of skills', 'the absence of a reward system', and poor cooperation in participation. To promote OER usage, each institution should provide training courses about awareness, utilization skills, and copyrights. There is also a need to provide support for the establishment of reward systems and environments for OER usage. Finally, more active participation is required for inter-agency cooperation in OER sharing.

A Simulation Method For Virtual Situations Through Seamless Integration Of Independent Events Via Autonomous And Independent Agents

  • Park, Jong Hee;Choi, Jun Seong
    • International Journal of Contents
    • /
    • v.14 no.3
    • /
    • pp.7-16
    • /
    • 2018
  • The extent and depth of the event plan determines the scope of pedagogical experience in situations and consequently the quality of immersive learning based on our simulated world. In contrast to planning in conventional narrative-based systems mainly pursuing dramatic interests, planning in virtual world-based pedagogical systems strive to provide realistic experiences in immersed situations. Instead of story plot comprising predetermined situations, our inter-event planning method aims at simulating diverse situations that each involve multiple events coupled via their associated agents' conditions and meaningful associations between events occurring in a background world. The specific techniques to realize our planning method include, two-phase planning based on inter-event search and intra-event decomposition (down to the animated action level); autonomous and independent agents to behave proactively with their own belief and planning capability; full-blown background world to be used as the comprehensive stage for all events to occur in; coupling events via realistic association types including deontic associations as well as conventional causality; separation of agents from event roles; temporal scheduling; and parallel and concurrent event progression mechanism. Combining all these techniques, diverse exogenous events can be derived and seamlessly (i.e., semantically meaningfully) integrated with the original event to form a wide scope of situations providing chances of abundant pedagogical experiences. For effective implementation of plan execution, we devise an execution scheme based on multiple priority queues, particularly to realize concurrent progression of many simultaneous events to simulate its corresponding reality. Specific execution mechanisms include modeling an action in terms of its component motions, adjustability of priority for agent across different events, and concurrent and parallel execution method for multiple actions and its expansion for multiple events.

An Extended Generative Feature Learning Algorithm for Image Recognition

  • Wang, Bin;Li, Chuanjiang;Zhang, Qian;Huang, Jifeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.8
    • /
    • pp.3984-4005
    • /
    • 2017
  • Image recognition has become an increasingly important topic for its wide application. It is highly challenging when facing to large-scale database with large variance. The recognition systems rely on a key component, i.e. the low-level feature or the learned mid-level feature. The recognition performance can be potentially improved if the data distribution information is exploited using a more sophisticated way, which usually a function over hidden variable, model parameter and observed data. These methods are called generative score space. In this paper, we propose a discriminative extension for the existing generative score space methods, which exploits class label when deriving score functions for image recognition task. Specifically, we first extend the regular generative models to class conditional models over both observed variable and class label. Then, we derive the mid-level feature mapping from the extended models. At last, the derived feature mapping is embedded into a discriminative classifier for image recognition. The advantages of our proposed approach are two folds. First, the resulted methods take simple and intuitive forms which are weighted versions of existing methods, benefitting from the Bayesian inference of class label. Second, the probabilistic generative modeling allows us to exploit hidden information and is well adapt to data distribution. To validate the effectiveness of the proposed method, we cooperate our discriminative extension with three generative models for image recognition task. The experimental results validate the effectiveness of our proposed approach.

3D Massively Multiplayer Online Role Playing Game (MMORPG) Based Lecturing System (3차원 다중 사용자 온라인 게임 기반 강의 시스템)

  • Lim, Nak-Kwon;Lee, Hae-Young
    • Journal of the Korea Computer Graphics Society
    • /
    • v.16 no.1
    • /
    • pp.21-27
    • /
    • 2010
  • Today the lectures are usually practiced in a teacher-led traditional classroom system or a student-led e-learning system. Students passively follow the teacher's lectures in both systems, though. Also due to the advances in 3D Computer Graphics and Game technologies, there are trials to exploit the positive effect of games in learning. The serious games, specifically designed games for an educational goal, or existing games for a special class have been used as lectures. Still these games have a great difficulty in being integrated into the educational system technically and economically. Therefore a new 3D MMORPG based lecturing system is presented in this paper. In our new lecturing system, the characteristics of a 3D MMORPG, achievement, sociality, and immersion, are provided to motivate students to participate actively in a lecture. A teacher and students interact with each other in realtime as 3D characters in a 3D virtual classroom on-line. An ordinary teacher can also easily apply our new system to existing classes since a teacher only needs to specify a slide file to prepare a lecture. For the future work, a user study and the effect of our new lecturing system will be performed.

The Prediction of Cryptocurrency Prices Using eXplainable Artificial Intelligence based on Deep Learning (설명 가능한 인공지능과 CNN을 활용한 암호화폐 가격 등락 예측모형)

  • Taeho Hong;Jonggwan Won;Eunmi Kim;Minsu Kim
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.2
    • /
    • pp.129-148
    • /
    • 2023
  • Bitcoin is a blockchain technology-based digital currency that has been recognized as a representative cryptocurrency and a financial investment asset. Due to its highly volatile nature, Bitcoin has gained a lot of attention from investors and the public. Based on this popularity, numerous studies have been conducted on price and trend prediction using machine learning and deep learning. This study employed LSTM (Long Short Term Memory) and CNN (Convolutional Neural Networks), which have shown potential for predictive performance in the finance domain, to enhance the classification accuracy in Bitcoin price trend prediction. XAI(eXplainable Artificial Intelligence) techniques were applied to the predictive model to enhance its explainability and interpretability by providing a comprehensive explanation of the model. In the empirical experiment, CNN was applied to technical indicators and Google trend data to build a Bitcoin price trend prediction model, and the CNN model using both technical indicators and Google trend data clearly outperformed the other models using neural networks, SVM, and LSTM. Then SHAP(Shapley Additive exPlanations) was applied to the predictive model to obtain explanations about the output values. Important prediction drivers in input variables were extracted through global interpretation, and the interpretation of the predictive model's decision process for each instance was suggested through local interpretation. The results show that our proposed research framework demonstrates both improved classification accuracy and explainability by using CNN, Google trend data, and SHAP.

Developing a Web-Based Knowledge Product Outsourcing System at a University

  • Onte, Mark B.;Marcial, Dave E.
    • Journal of Information Processing Systems
    • /
    • v.9 no.4
    • /
    • pp.548-566
    • /
    • 2013
  • The availability of technology and the abundance of experts in universities create an ample opportunity to provide a venue that allows a knowledge seeker to easily connect with and request advice from university experts. On the other hand, outsourcing provides opportunities and remains one of the emerging trends in organizations, and can very clearly observed in the Philippines. This paper describes the development of a reliable web-based approach to Knowledge Product Outsourcing (KPO) services in the Silliman Online University Learning system. The system is called an "e-Knowledge Box."It integrates Web 2.0 technologies and mechanisms, such as instant messaging, private messaging, document forwarding, video conferencing, online payments, net meetings, and social collaboration together into one system. Among the tools used are WAMP Server 2.0, PHP, BlabIM, Wordpress 3.0, Video Whisper, Red5, Adobe Dreamweaver CS4, and Virtual Box. The proposed system is integrated with the search engine in URLs, Web feeds, email links, social bookmarking, search engine sitemaps, and Web Analytics Direct Visitor Reports. The site demonstrates great web usability and has an excellent rating in functionality, language and content, online help and user guides, system and user feedback, consistency, and architectural and visual clarity. Likewise, the site was was rated as being very good for the following items: navigation navigation, user control, and error prevention and correction.