• Title/Summary/Keyword: future Internet

Search Result 2,267, Processing Time 0.029 seconds

The Research on H-PCK(Pedagogical Contents Knowledge in Home Economics Education) formation process of 2017 Novice Teacher in Busan (신규임용교사의 H-PCK 형성과정 탐색: 2017 부산지역 가정과 신규임용 교사를 대상으로)

  • Kim, Nam Eun
    • Human Ecology Research
    • /
    • v.56 no.3
    • /
    • pp.247-262
    • /
    • 2018
  • This study investigates the process of PCK formation for 2017 novice teachers in Busan. This study was conducted parallel to quantitative research using the H-PCK measurement tool as well as qualitative research methods through an open questionnaire and after-interview. Consequently, the H-PCK level of novice teachers was 3.51. The knowledge of perspective on home economics education (KP) was 3.87, knowledge of home economics curriculum (KC) was 3.37 and the knowledge of home economics instructional strategies (KI) was 3.39. Study participants reported that curriculum knowledge, curriculum content knowledge, and teaching strategy knowledge were formed through preparation for appointment; however, it was not possible to judge if PCK was formed for the restructuring ability or the reconstruction ability. Knowledge related to curriculum content was learned through teacher training, internet teacher community, and internet information materials. Knowledge of teaching strategies was learned through 1-2 teaching consulting or peer scholarship. It is necessary to revise the university curriculum (such as expansion of curriculum education, expansion of experience in teaching practice, and actual case study) order to form PCK. Second, it should be developed and operated various training programs for the formation of home economics education curriculum knowledge. Third, it is necessary to organize a nationwide system to support the mentor. In the future, it is necessary to study PCK analysis for each unit and topic as well as to explain methods that can be provided to field teachers.

Django based ChatBot System Using KakaoTalk API (카카오톡 API를 이용한 Django 기반 챗봇 시스템)

  • Ko, Heungchan;Kim, Minsu;Lee, Solbi;Lee, Hyung-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.4 no.1
    • /
    • pp.31-36
    • /
    • 2018
  • In this paper, we developed a chatbot system using the Django framework using the KakaoTalk API so that college students can easily search for important information in their university. Unlike existing chatbot systems that provide only specific information, the chatbot developed in this research automatically provides search results for various types of user queries such as weather, YouTube, Naver real-time ranking search and language translation as well as important information within their own university. We developed a module using Apache, Python and Django in AWS Ubuntu server and developed a chatbot system that automatically responds to user queries by communicating with KakaoTalk server using KakaoTalk API and BeautifulSoup. The system developed in this study is expected to be applicable to the future university entrance information promotion and election promotion system.

An Analysis on the Trends and Issues of Convergence Technology Research (네트워크 분석을 통한 국내 융합기술 연구동향 분석)

  • Lim, Jung-Yeon
    • Journal of Internet of Things and Convergence
    • /
    • v.4 no.1
    • /
    • pp.23-29
    • /
    • 2018
  • The purpose of study was to analyze the trends of 2005 to 2018 revised 'convergence technology research' through text network analysis using NetMiner4.0 program. Data analysis was conducted by using keyword analysis, centrality analysis of 653 authors' keyword from 177 journals. The results of the study are as follows. First, Research on Converging Technology has been studied steadily over the past 13 years in Department of Industry Convergence. Second, the results of the search term frequency analysis show that the 'convergence technology', 'technology convergence', 'convergence', 'design', 'convergence education', 'STEAM', 'convergence research' were used as the main keywords of convergence technology research. Third, Community analysis results show that five communities have been classified five categories according to the characteristics of the search terms 'only IT', 'Cultural industry utilizing Convergence contents', 'Technology innovation and research analysis' And patent development'. Based on these results, we proposed the future directions of convergence technology research.

Research of Distributed Computing with REST Open API Web Services (REST 웹서비스 Open API를 사용한 분산처리 기법 연구)

  • Choi, Min
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.10
    • /
    • pp.2473-2481
    • /
    • 2014
  • The majority of next generation information systems will be working on portable mobile devices such as smartphones. REST Open API web services have quickly become popular among mobile application development. The use of REST web services are not only growing in popularity but totally changing the way of mobile applications development. This is because REST web services could be used in application development as a form of building blocks, which is completely independent, compatible, to any platforms. With this strength, REST web services encourage third party application to build add-on functionality. This research proposes the use of REST web service to replace the use of socket APIs into major internet communication APIs. To this end, this paper also provide performance evaluation of the REST web services compared to the conventional socket APIs, focusing on scalability by analytical and experimental evaluations. Finally, we summarize the possibility whether REST Open API web services have enough performance as future major internet communication primitive APIs.

Analysis of User Head Motion for Motion Classifier of Motion Headset (모션헤드셋의 동작분류기를 위한 사용자 머리동작 분석)

  • Shin, Choonsung;Lee, Youngho
    • Journal of Internet of Things and Convergence
    • /
    • v.2 no.2
    • /
    • pp.1-6
    • /
    • 2016
  • Recently, various types of wearable computers have been studied. In this paper, we analyze the characteristics of head motion information for the operation of the motion classifier produced motion headset that the user can use while listening to music. The prototype receives music from smart phone over bluetooth communications, and transmits the motion information measured by the acceleration sensor to the smart phone. And the smartphone classifies the motion of the head through a motion classifier. we implemented a prototype for our experiment. The user's head motion "up", "down", "left" and "right" were classified using a Bayesian classifier. As a result, in case of the movement of the head "up" and "down", there are a large changes in the x, z-axis values. In future we have a plan to perform a user study to find suitable variables for creating motion classifier.

Design and Implementaion of IPv4/IPv6 Translation Protocol (IPv4/IPv6 변환 프로토콜의 설계 및 구현)

  • Park, Seok-Cheon;Lee, Gwang-Bae
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.783-792
    • /
    • 2001
  • It is well known that, in the near future, the lifetime of the IPv4 address space will be limited and available 32-bit IP network addresses will not be left any more. In order to solve such IPv4 address space problem in an effective way, the transition to the new version using IPv6 architecture is inevitably required. At present, it is impossible to convert IPv4 into IPv6 at a time, since the coverage and the size of today's Internet is too huge. Therefore, the coexistence of both IPv4 and IPv6 must be arranged in a special and practical fashion for rapid conversion on the whole. IP protocol translation has been proposed to ease the translation of the Internet from IPv4 to IPv6. This paper presents the design and implementation of a transparent transition service that translates packet header as they cross between IPv4 and IPv6 networks. IPv4/IPv6 Translation Protocol is written in c source code and is tested by the local test recommended by ISO, which has the most excellent error detection function. The test was processed with a test scenario and it was found that the results were successful.

  • PDF

Toward Design and Implement to Multiple Schemes for Strong Authentication Mechanism - Case Studying : Secure Entrance System - (다단계 사용자 신분확인 메커니즘 설계와 구현 방안 : 출입통제 시스템 사례 중심으로)

  • Hong Seng-Phil;Kim Jae-Hyoun
    • Journal of Internet Computing and Services
    • /
    • v.7 no.2
    • /
    • pp.161-172
    • /
    • 2006
  • As the innovative technologies related to ubiquitous computing are being rapidly developed in recent IT trend, the concern for IT dysfunction(e.g., personal information abuse, information risk, threat, vulnerability, etc.) are also increasing. In our study, we suggested how to design and implement to multiple schemes for strong authentication mechanism in real system environments. We introduce the systematic and secure authentication technologies that resolve the threats incurring from the abuse and illegal duplication of financial transaction card in the public and financial institutions. The multiple schemes for strong authentication mechanism applied to java technology, so various application programs can be embedded, Independent of different platforms, to the smartcard by applying the consolidated authentication technologies based on encryption and biometrics(e.g., finger print identification). We also introduce the appropriate guidelines which can be easily implemented by the system developer and utilized from the software engineering standpoint of view. Further, we proposed ways to utilize java card based biometrics by developing and applying the 'smartcard class library' in order for the developer and engineers involved in real system environment(Secure entrance system) to easily understand the program. Lastly, we briefly introduced the potential for its future business application.

  • PDF

Joint Resource Allocation for Cellular and D2D Multicast Based on Cognitive Radio

  • Wu, Xiaolu;Chen, Yueyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.1
    • /
    • pp.91-107
    • /
    • 2014
  • Device-to-device (D2D) communication is an excellent technology to improve the system capacity by sharing the spectrum resources of cellular networks. Multicast service is considered as an effective transmission mode for the future mobile social contact services. Therefore, multicast based on D2D technology can exactly improve the spectrum resource efficiency. How to apply D2D technology to support multicast service is a new issue. In this paper, a resource allocation scheme based on cognitive radio (CR) for D2D underlay multicast communication (CR-DUM) is proposed to improve system performance. In the cognitive cellular system, the D2D users as secondary users employing multicast service form a group and reuse the cellular resources to accomplish a multicast transmission. The proposed scheme includes two steps. First, a channel allocation rule aiming to reduce the interference from cellular networks to receivers in D2D multicast group is proposed. Next, to maximize the total system throughput under the condition of interference and noise impairment, we formulate an optimal transmission power allocation jointly for the cellular and D2D multicast communications. Based on the channel allocation, optimal power solution is in a closed form and achieved by searching from a finite set and the interference between cellular and D2D multicast communication is coordinated. The simulation results show that the proposed method can not only ensure the quality of services (QoS), but also improve the system throughput.

Adaptive Multi-Layer Security Approach for Cyber Defense (사이버 방어를 위한 적응형 다중계층 보호체제)

  • Lee, Seong-kee;Kang, Tae-in
    • Journal of Internet Computing and Services
    • /
    • v.16 no.5
    • /
    • pp.1-9
    • /
    • 2015
  • As attacks in cyber space become advanced and complex, monotonous defense approach of one-one matching manner between attack and defense may be limited to defend them. More efficient defense method is required. This paper proposes multi layers security scheme that can support to defend assets against diverse cyber attacks in systematical and adaptive. We model multi layers security scheme based on Defense Zone including several defense layers and also discuss essential technical elements necessary to realize multi layers security scheme such as cyber threats analysis and automated assignment of defense techniques. Also effects of multi layers security scheme and its applicability are explained. In future, for embodiment of multi layers security scheme, researches about detailed architecture design for Defense Zone, automated method to select the best defense technique against attack and modeling normal state of asset for attack detection are needed.

A Development of Proactive Application Service Engine Based on the Distributed Object Group Framework (분산객체그룹프레임워크 기반의 프로액티브 응용서비스엔진 개발)

  • Shin, Chang-Sun;Seo, Jong-Seong
    • Journal of Internet Computing and Services
    • /
    • v.11 no.1
    • /
    • pp.153-165
    • /
    • 2010
  • In this paper, we proposed a Proactive Application Service Engine (PASE) supporting tailor-made distributed application services based on the Distributed Object Group Framework (DOGF) efficiently managing distributed objects, in the viewpoint of distributed application, composed application on network. The PASE consists of 3 layers which are the physical layer, the middleware layer, and the application layer. With the supporting services of the PASE, the grouping service manages the data gathered from H/W devices and the object's properties for application by user's request as a group. And the security service manages the access of gathered data and the object according to user's right. The data filtering service executes the filtering function to provide application with gathered data. The statistics service analysis past data. The diagnostic service diagnoses a present condition by using the gathered data. And the prediction service predicts a future's status based on the statistics service and the diagnostic service. For verifying the executability of the PASE's services, we applied to a greenhouse automatic control application in ubiquitous agriculture field.