• Title/Summary/Keyword: information needs analysis

Search Result 2,542, Processing Time 0.035 seconds

Effect of Data Visualization Education using Scratch on the Creativity of Elementary Preservice Teacher (스크래치 활용 데이터 시각화 교육이 초등학교 예비교사의 창의성에 미치는 영향)

  • Kim, Jungah;Kim, Yongmin;Kim, Jonghoon
    • Journal of The Korean Association of Information Education
    • /
    • v.24 no.6
    • /
    • pp.607-614
    • /
    • 2020
  • In this study, a scratch focused on data visualization was applied to 26 elementary school pre-service teachers to analyze the effect on improvement of creativity. Based on the results of the needs analysis conducted on 60 in-service elementary school teachers, the program using scratches according to the data visualization procedure was developed. With the developed educational program, 26 elementary school pre-service teachers were taught for 42 hours for a total of 4 months. In order to examine whether their creativity was improved, a creativity test was conducted and the effectiveness of the applied program was analyzed through a pre/post comparison tests. As a result of the analysis, it was found that the software education using scratch-oriented data visualization for elementary school pre-service teachers had significant effects on the fluency, sophistication, creativity average, and creativity index among the sub-elements of their creativity.

A Study on the Efficient Countermeasures of Military in Accordance with Changing Security Environments (4차 산업혁명에 따른 군사보안 발전방안 연구)

  • Kim, Doo Hwan;Park, Ho Jeong
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.47-59
    • /
    • 2020
  • The Army, which is dreaming of a military leap forward through the fourth industrial revolution, needs to also consider the side effects and adverse functions of the fourth industrial revolution. In particular, this study conducted an analysis of whether it was consistent with the global technological trend of normal 'military security'. This paper focuses on the countermeasures that could result from 4th industrial revolution by utilizing the text-mining technique and social network technique of big data. 1. Active promotion of a convergence program with private, public, militaryand industrial, academic, and solidarity, 2. Information Sharing for International Cooperation and Cooperation in Cyber security, 3. Military Innovation and Military Unsymmetric Cyber security innovation, 4.The Establishment of Military Security Convergence Interface Management System in accordance with the Fourth Industrial Revolution, 5. Cooperation in the transition from technology engineering to social technology, 6. Establishing a military security governance system in the military, 7. Specifying confidential military digital data We look forward to providing useful information so that the results of this study can help develop the military and enhance military confidentiality.

Spudsville: Designing a Minecraft Game for learning teaching English as a Second Language (스퍼드빌: 제2언어로서의 영어학습을 위한 마인크래프트 게임 설계)

  • Baek, Youngkyun;Kim, Jeongkyoum;Sam, Eisenberg
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.4
    • /
    • pp.143-157
    • /
    • 2022
  • The aim of this study is to design Spudsville, an immersive game environment in Minecraft that can effectively help learners acquire the English language. To create a successful learning experience using Minecraft, the researchers adopted the Agile Model and the Design Thinking approach. The researchers first conducted an analysis through an extensive literature review in order to assess the learners' needs. Afterwards, they designed and developed a Minecraft world based on the data collected during the analysis phase. The researchers learned that implementing constructivist and behaviorist approaches has benefits, even though applying a cognitivist-learning model to Spudsville could have provided the researchers with more insight on how learner processes information. Making these adjustments could improve Spudsville's effectiveness and could potentially help the ways in which gamified learning aids with language acquisition.

A Study on the Standard AI Developer Job Training Track Based on Industry Demand

  • Lee, Won Joo;Kim, Doohyun;Kim, Sang Il;Kim, Han Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.3
    • /
    • pp.251-258
    • /
    • 2022
  • In this paper, we propose a standard AI developer job training track based on industry needs. The characteristic of this curriculum is that it can minimize the mismatch of AI developer job competency between industries and universities. To develop an AI developer job training track, a survey will be conducted for AI developers working in industrial fields. In this survey, among the five NCS-based AI developer jobs, job analysis is conducted by deriving AI developer jobs with high demand for manpower in industrial fields. In job analysis, the core competency unit elements of the job are selected, and knowledge, skills, tools, etc. necessary to perform the core competency unit elements are derived. In addition, a standard AI developer job curriculum is developed by deriving core subjects and road-map that can educate knowledge, skills, tools, etc. In addition, we present an efficient AI developer job training method using the standard AI developer job training course proposed in this paper.

Performance Analysis for Privacy-preserving Data Collection Protocols (개인정보보호를 위한 데이터 수집 프로토콜의 성능 분석)

  • Lee, Jongdeog;Jeong, Myoungin;Yoo, Jincheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.12
    • /
    • pp.1904-1913
    • /
    • 2021
  • With the proliferation of smart phones and the development of IoT technology, it has become possible to collect personal data for public purposes. However, users are afraid of voluntarily providing their private data due to privacy issues. To remedy this problem, mainly three techniques have been studied: data disturbance, traditional encryption, and homomorphic encryption. In this work, we perform simulations to compare them in terms of accuracy, message length, and computation delay. Experiment results show that the data disturbance method is fast and inaccurate while the traditional encryption method is accurate and slow. Similar to traditional encryption algorithms, the homomorphic encryption algorithm is relatively effective in privacy preserving because it allows computing encrypted data without decryption, but it requires high computation costs as well. However, its main cost, arithmetic operations, can be processed in parallel. Also, data analysis using the homomorphic encryption needs to do decryption only once at any number of data.

Study on Digitalisation of the Tourism Industry in the Regions of the Russian Federation

  • Ivanova, Raisa;Skrobotova, Olga;Polyakova, Irina;Karaseva, Galina;Strelnikova, Marina
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.385-391
    • /
    • 2022
  • The relevance of the published study lies in the fact that since the introduction of the first Global Distribution System, new information and communication technologies have constantly been changing the tourism industry. In the context of a current digital environment, travel agencies can't avoid participating in digital transformation processes aimed at rethinking operational models, skills, and organisational structures in the regions. This publication aims to present and provide a critical overview of digitalisation processes in tourism development in the regions of the Russian Federation, as well as to reflect on the challenges to the widespread digitalisation processes in the regional tourism sector. The subject of research is digitalisation processes, as they radically transform the modern tourism industry, in the regions as well. The pragmatic research paradigm was considered the most appropriate for the study of tourism digitalisation processes in the regions, as it does not require the selection of a specific theoretical basis for data collection. The pragmatic approach forms an alternative to classical theoretical approaches and serves as a particular type of grounded theory, combining both inductive and deductive methods. No software was used for the inductive part of the analysis. The deductive part was conducted using the qualitative data analysis software Nvivo 11. Given the wide diversity of interested parties in the regional tourism digital area, a stratified purposive sampling method was preferred due to its ability to adequately represent the full picture of the phenomenon under study. The selection and stratum criteria were chosen to maximise the representation of different perspectives in the regional tourism digital area. The novelty of the study is due to the digitalisation processes, with an implication of new needs, while opening up promising opportunities for more productive tourism business in the regions of the Russian Federation. Currently, e-tourism in the Russian Federation has become a subject of lively debate among scholars and practitioners. However, the involvement of advanced digitalisation technologies in the field of information processes in the regions of the Russian Federation is of a very sporadic character.

HTML Text Extraction Using Tag Path and Text Appearance Frequency (태그 경로 및 텍스트 출현 빈도를 이용한 HTML 본문 추출)

  • Kim, Jin-Hwan;Kim, Eun-Gyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.12
    • /
    • pp.1709-1715
    • /
    • 2021
  • In order to accurately extract the necessary text from the web page, the method of specifying the tag and style attributes where the main contents exist to the web crawler has a problem in that the logic for extracting the main contents. This method needs to be modified whenever the web page configuration is changed. In order to solve this problem, the method of extracting the text by analyzing the frequency of appearance of the text proposed in the previous study had a limitation in that the performance deviation was large depending on the collection channel of the web page. Therefore, in this paper, we proposed a method of extracting texts with high accuracy from various collection channels by analyzing not only the frequency of appearance of text but also parent tag paths of text nodes extracted from the DOM tree of web pages.

A Study on the Effect of Middle-Aged People's Use of Cultural Programs in Public Library on their Library Perception and Life Satisfaction (중장년층의 공공도서관 문화프로그램 이용이 도서관 인식과 생활만족에 미치는 영향)

  • Jeong, Mi Ok;Kim, Giyeong
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.56 no.3
    • /
    • pp.181-211
    • /
    • 2022
  • This study designed the research model to identify whether the characteristics of cultural programs of public libraries and middle-aged people's experience of the programs impact on their life satisfaction. To verify our model, we conducted our survey to random middle-aged users of five public libraries in Gyeonggi-do and nine public libraries in Seoul, and 246 valid samples are used. Our analysis showed that the characteristics of cultural programs and middle aged people's experience of the programs affect their perception of cultural programs, and the regional perception of public libraries had a significant effect on fulfilling personal needs for life satisfaction. Our analysis also showed the change in values of public libraries that spread to the realm of daily life. This study is meaningful in suggesting directions for national and local public library policies and public library cultural programs.

Research on development of operation manual for AI convergence education competency strengthening project (AI 융합교육 역량강화 지원사업 운영 매뉴얼 개발 연구)

  • Park, Juhyoung;Cha, Sunghyun;Jung, sungsoo;Lee, Sangshin
    • 한국정보교육학회:학술대회논문집
    • /
    • 2021.08a
    • /
    • pp.425-431
    • /
    • 2021
  • In this study, in order to develop a manual for the AI convergence education competency strengthening project, project personnel were interviewed and an overall analysis of the business process was made. As a result of analysis, the manual includes methods to solve problems currently being raised in the field such as recruitment of graduate students, education program management, academic registration management, and budget management. In order to increase the continuity and efficiency of the project, it is necessary to build an administrative management site that provides information on the overall project, to strengthen publicity for general teachers about AI convergence education, and meet the educational needs and level of enrolled students.

  • PDF

A Store Recommendation Procedure in Ubiquitous Market for User Privacy (U-마켓에서의 사용자 정보보호를 위한 매장 추천방법)

  • Kim, Jae-Kyeong;Chae, Kyung-Hee;Gu, Ja-Chul
    • Asia pacific journal of information systems
    • /
    • v.18 no.3
    • /
    • pp.123-145
    • /
    • 2008
  • Recently, as the information communication technology develops, the discussion regarding the ubiquitous environment is occurring in diverse perspectives. Ubiquitous environment is an environment that could transfer data through networks regardless of the physical space, virtual space, time or location. In order to realize the ubiquitous environment, the Pervasive Sensing technology that enables the recognition of users' data without the border between physical and virtual space is required. In addition, the latest and diversified technologies such as Context-Awareness technology are necessary to construct the context around the user by sharing the data accessed through the Pervasive Sensing technology and linkage technology that is to prevent information loss through the wired, wireless networking and database. Especially, Pervasive Sensing technology is taken as an essential technology that enables user oriented services by recognizing the needs of the users even before the users inquire. There are lots of characteristics of ubiquitous environment through the technologies mentioned above such as ubiquity, abundance of data, mutuality, high information density, individualization and customization. Among them, information density directs the accessible amount and quality of the information and it is stored in bulk with ensured quality through Pervasive Sensing technology. Using this, in the companies, the personalized contents(or information) providing became possible for a target customer. Most of all, there are an increasing number of researches with respect to recommender systems that provide what customers need even when the customers do not explicitly ask something for their needs. Recommender systems are well renowned for its affirmative effect that enlarges the selling opportunities and reduces the searching cost of customers since it finds and provides information according to the customers' traits and preference in advance, in a commerce environment. Recommender systems have proved its usability through several methodologies and experiments conducted upon many different fields from the mid-1990s. Most of the researches related with the recommender systems until now take the products or information of internet or mobile context as its object, but there is not enough research concerned with recommending adequate store to customers in a ubiquitous environment. It is possible to track customers' behaviors in a ubiquitous environment, the same way it is implemented in an online market space even when customers are purchasing in an offline marketplace. Unlike existing internet space, in ubiquitous environment, the interest toward the stores is increasing that provides information according to the traffic line of the customers. In other words, the same product can be purchased in several different stores and the preferred store can be different from the customers by personal preference such as traffic line between stores, location, atmosphere, quality, and price. Krulwich(1997) has developed Lifestyle Finder which recommends a product and a store by using the demographical information and purchasing information generated in the internet commerce. Also, Fano(1998) has created a Shopper's Eye which is an information proving system. The information regarding the closest store from the customers' present location is shown when the customer has sent a to-buy list, Sadeh(2003) developed MyCampus that recommends appropriate information and a store in accordance with the schedule saved in a customers' mobile. Moreover, Keegan and O'Hare(2004) came up with EasiShop that provides the suitable tore information including price, after service, and accessibility after analyzing the to-buy list and the current location of customers. However, Krulwich(1997) does not indicate the characteristics of physical space based on the online commerce context and Keegan and O'Hare(2004) only provides information about store related to a product, while Fano(1998) does not fully consider the relationship between the preference toward the stores and the store itself. The most recent research by Sedah(2003), experimented on campus by suggesting recommender systems that reflect situation and preference information besides the characteristics of the physical space. Yet, there is a potential problem since the researches are based on location and preference information of customers which is connected to the invasion of privacy. The primary beginning point of controversy is an invasion of privacy and individual information in a ubiquitous environment according to researches conducted by Al-Muhtadi(2002), Beresford and Stajano(2003), and Ren(2006). Additionally, individuals want to be left anonymous to protect their own personal information, mentioned in Srivastava(2000). Therefore, in this paper, we suggest a methodology to recommend stores in U-market on the basis of ubiquitous environment not using personal information in order to protect individual information and privacy. The main idea behind our suggested methodology is based on Feature Matrices model (FM model, Shahabi and Banaei-Kashani, 2003) that uses clusters of customers' similar transaction data, which is similar to the Collaborative Filtering. However unlike Collaborative Filtering, this methodology overcomes the problems of personal information and privacy since it is not aware of the customer, exactly who they are, The methodology is compared with single trait model(vector model) such as visitor logs, while looking at the actual improvements of the recommendation when the context information is used. It is not easy to find real U-market data, so we experimented with factual data from a real department store with context information. The recommendation procedure of U-market proposed in this paper is divided into four major phases. First phase is collecting and preprocessing data for analysis of shopping patterns of customers. The traits of shopping patterns are expressed as feature matrices of N dimension. On second phase, the similar shopping patterns are grouped into clusters and the representative pattern of each cluster is derived. The distance between shopping patterns is calculated by Projected Pure Euclidean Distance (Shahabi and Banaei-Kashani, 2003). Third phase finds a representative pattern that is similar to a target customer, and at the same time, the shopping information of the customer is traced and saved dynamically. Fourth, the next store is recommended based on the physical distance between stores of representative patterns and the present location of target customer. In this research, we have evaluated the accuracy of recommendation method based on a factual data derived from a department store. There are technological difficulties of tracking on a real-time basis so we extracted purchasing related information and we added on context information on each transaction. As a result, recommendation based on FM model that applies purchasing and context information is more stable and accurate compared to that of vector model. Additionally, we could find more precise recommendation result as more shopping information is accumulated. Realistically, because of the limitation of ubiquitous environment realization, we were not able to reflect on all different kinds of context but more explicit analysis is expected to be attainable in the future after practical system is embodied.