• Title/Summary/Keyword: virtual class

Search Result 258, Processing Time 0.024 seconds

A Study on the Application of Virtual Space Design Using the Blended Education Method - A La Carte Model Based on the Creation of Infographic - (블렌디드 교육방식을 활용한 가상공간 디자인 적용에 관한 연구 -알 라 카르테 모델 (A La Carte) 인포그래픽 가상공간 제작을 중심으로-)

  • Cho, Hyun Kyung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.5
    • /
    • pp.279-284
    • /
    • 2022
  • As a study of the blended learning method on design education through the blended learning method, I would like to propose that more advanced learner-led customized design education is possible. Understanding in face-to-face classes and advantages in non-face-to-face classes can be supplemented in an appropriate way in remote classes. Advanced artificial intelligence and big data technology can provide personalized and subdivided learning materials and effective learning methods tailored to learners' levels and interests based on quantified data in design classes. In this paper, it was proposed to maximize the efficiency of the class by applying a method that exceeds the limitations of time and space through the proposal of the A La Carte model (A La Carte). It is a remote class that can be heard anytime, anywhere, and it is also possible to bridge the educational quality and educational gap provided to students living in underprivileged areas. As the goal of fostering creative convergence-type future talents, it is changing with a rapid technological development speed. It is necessary to adapt to the change in learning methods in line with this. An analysis of the infographic virtual space design and construction process through the A La Carte model (A La Carte) proposal was presented. Rather than simply acquiring knowledge, it is expected that knowledge can be sorted, distinguished, learned, and easily reborn with its own knowledge.

Applet Control using Java Bytecode Modification on the Internet Communication (인터넷 통신상에서 자바 바이트 코드 수정을 이용한 애플릿 제어)

  • 김광준;나상동;배용근
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.1
    • /
    • pp.90-99
    • /
    • 2003
  • Java applets are downloaded from web server through internet and executed in Java Virtual Machine of clients' browser. Before execution of java applets, JVM checks bytecode program with bytecode verifier and performs runtime tests with interpreter. However, these tests will not protect against undesirable runtime behavior of java applets, such as denial of service attack, email forging attack, URL spoofing attack, and annoying sound attack. In order to protect malicious applets, a technique used in this paper is java bytecode modification. This technique is used to restrict applet behavior or insert code appropriate to profiling or other monitoring efforts. Java byte modification is divided into two general forms, class-level modification involving subclassing non-final classes and method-level modification used when control over objects from final classes or interface. This paper showed that malicious applets are controlled by java bytecode modification using proxy server. This implementation does not require any changes in the web sever, JVM or web browser.

Design of General Peripheral Interface Using Serial Link (직렬 링크 방식의 주변 장치 통합 인터페이스 설계)

  • Kim, Do-Seok;Chung, Hoon-Ju;Lee, Yong-Hwan
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.4 no.1
    • /
    • pp.68-75
    • /
    • 2011
  • The performance of peripheral devices is improving rapidly to meet the needs of users for multimedia data. Therefore, the peripheral interface with wide bandwidth and high transmission rate becomes necessary to handle large amounts of data in real time for multiple high-performance devices. PCI Express is a fast serial interface with the use of packets that are compatible with previous PCI and PCI-X. In this paper, we design and verify general peripheral interface using serial link. It includes two kinds of traffic class (TC) labels which are mapped to virtual channels (VC). The design adopts TC/VC mapping and the scheme of arbitration by priority. The design uses a packet which can be transmitted through up to four transmission lanes. The design of general peripheral interface is described in Verilog HDL and verified using ModelSim. For FPGA verification, Xilinx ISE and SPARTAN XC3S400 are used.We used Synopsys Design Compiler as a synthesis tool and the used library was MagnaChip 0.35um technology.

A Novel Efficient Up-Link Scheduler for IEEE 802.16m (IEEE802.16m을 위한 효율적인 상향링크 스케줄러 연구)

  • Cho, Da-Young;Oh, Hyuk-Jun;Hong, Sung-Woong;Oh, Il-Hyuk;Ko, Kyung-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37A no.11
    • /
    • pp.979-985
    • /
    • 2012
  • The design of an efficient scheduler is a key design factor in IEEE 802.16m systems, in order to support services with various QoS smoothly. Although conventional studies of schedules have been suggested, those had problems that are not able to satisfy the delay condition and make the through-put declined, because they only focused on a specific action scenario rather than reflecting practical action scenarios which have real-time and non-real-time traffics variously. In this paper, an efficient uplink scheduling algorithm is proposed for IEEE 802.16m system by introducing the concepts of Virtual Time(VT) and Virtual Finish Time(VFT) based priority determination, and separate buffers for each QoS class in the mobile terminal. Simulation results showed that the proposed scheme had satisfied the delay requirement of real-time services even with improved throughput performance compared to conventional methods.

Three-dimensional surgical accuracy between virtually planned and actual surgical movements of the maxilla in two-jaw orthognathic surgery

  • Hong, Mihee;Kim, Myung-Jin;Shin, Hye Jung;Cho, Heon Jae;Baek, Seung-Hak
    • The korean journal of orthodontics
    • /
    • v.50 no.5
    • /
    • pp.293-303
    • /
    • 2020
  • Objective: To investigate the three-dimensional (3D) surgical accuracy between virtually planned and actual surgical movements (SM) of the maxilla in two-jaw orthognathic surgery. Methods: The sample consisted of 15 skeletal Class III patients who underwent two-jaw orthognathic surgery performed by a single surgeon using a virtual surgical simulation (VSS) software. The 3D cone-beam computed tomography (CBCT) images were obtained before (T0) and after surgery (T1). After merging the dental cast image onto the T0 CBCT image, VSS was performed. SM were classified into midline correction (anterior and posterior), advancement, setback, anterior elongation, and impaction (total and posterior). The landmarks were the midpoint between the central incisors, the mesiobuccal cusp tip (MBCT) of both first molars, and the midpoint of the two MBCTs. The amount and direction of SM by VSS and actual surgery were measured using 3D coordinates of the landmarks. Discrepancies less than 1 mm between VSS and T1 landmarks indicated a precise outcome. The surgical achievement percentage (SAP, [amount of movement in actual surgery/amount of movement in VSS] × 100) (%) and precision percentage (PP, [number of patients with precise outcome/number of total patients] × 100) (%) were compared among SM types using Fisher's exact and Kruskal-Wallis tests. Results: Overall mean discrepancy between VSS and actual surgery, SAP, and PP were 0.13 mm, 89.9%, and 68.3%, respectively. There was no significant difference in the SAP and PP values among the seven SM types (all p > 0.05). Conclusions: VSS could be considered as an effective tool for increasing surgical accuracy.

A Study on 2D/3D Map Navigation System Based on Virtual Reality (VR 기반 2D/3D Map Navigation 시스템에 관한 연구)

  • Kwon Oh-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.5
    • /
    • pp.928-933
    • /
    • 2006
  • This paper aims to build a 2D/3D map navigation that the user can efficiently operate in terms of feeding attribute information after securing 2D/3D space data. This system provides 2D/3D screen navigation that supports variety of operational visual effects and displays the location that the user is retrieving. Also it presents picture information of buildings with higher resolution and URL, name of store, phone number, other related information. Effectiveness of this system is as follows: first, development and distribution of a new technology of 2D/3D spatial database that changes the previous 2D/3D based system concept to the 2D/3D based one. Second, increase of developmental productivity by utilizing the integrated 2D/3D spatial database for developing various interfaces. Finally, it provides security of the preemptive technological position with world class domestic 2D/3D spatial database technologies.

A Study on Applet Control on the Internet Communication using Java Bytecode (자바 바이트 코드를 이용한 인터넷 통신의 애플릿 제어)

  • 김문환;나상동
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.5C
    • /
    • pp.523-531
    • /
    • 2003
  • Java applets are downloaded from web server through internet and executed in Java Virtual Machine of clients'browser. Before execution of java applets, JVM checks bytecode program with bytecode verifier and performs runtime tests with interpreter. However, these tests will not protect against undesirable runtime behavior of java applets, such as denial of service attack, email forging attack, URL spoofing attack, or annoying sound attack. In order to protect malicious applets, a technique used in this paper is java bytecode modification. This technique is used to restrict applet behavior or insert code appropriate to profiling or other monitoring efforts. Java byte modification is divided into two general forms, class-level modification involving subclassing non-final classes and method-level modification used when control over objects from final classes or interface. This paper showed that malicious applets are controlled by java bytecode modification using proxy server. This implementation does not require any changes in the web sever, JVM or web browser.

A Study on the Analysis of Patent Information in the Apparel Design -Focused on International Patent Classification- (의류디자인 분야의 특허정보 분석 -국제특허분류를 중심으로-)

  • 이금희
    • The Research Journal of the Costume Culture
    • /
    • v.11 no.6
    • /
    • pp.835-851
    • /
    • 2003
  • This study analyses patent information of apparel design using computer technology and researches the trend of patent application focused on International Patent Classification. In terms of trend by filling data, Patent application started first in 1974 and increased sharply in 1993 with 14 cases and increased to 25 cases in 2000. In case of Korea, they began somewhat late in 1996, but reached a similar level with the leading country in 2000. In terms of trend by applicant, Gerber Garment Technology, Inc. filed 7 cases TORAY IND INC, filed 6 cases Levi Strauss & Co. filed 4 cases, NEC HOME ELECTRONICS LTD filed 3 cases, TOYOBO CO LTD filed 3 cases. Japanese companies occupied 52% and United States's companies occupied 48%. In terms of trend by country, foreigner occupied 47% of the patents filed by United State. Japanese take up 10% of total patent of United States. Korean occupied 84% of total patent of Korea and foreigner, american occupied 16% of the patents filed by Korea. In regared to International Patent Classification, in the section level G filed 92 cases(53%). In class level, G06 marked the first place in United States, Japan, and Korea. In subclass level, G06F marksed the first place with 74 cases. G06T and A61B were regarded as the new technologies. The new technologies are representing the dimensions of garment or computer-rendered model, providing the virtual reality through the texture mapping, digital dressing room or virtual dressing, and performing or retriving display on a screen for the result of changing pattern ao dress design, The technologies of core patent are designing or producing custom manufactured item, providing or prealtering the data for pattern making and visually displaying, interactively generating or previewing of various articles.

  • PDF

Assessment of Emergency Remote Teaching for Clinical Interview Skills due to COVID-19: Its Implication for Future Online Medical Education (코로나19로 인한 일개 의과 대학의 비대면 의료 면담 실습수업 사례 분석)

  • Lee, Sang-ok;Kim, Yoo-Ri;Kim, Sung-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.1
    • /
    • pp.431-443
    • /
    • 2022
  • The purpose of this study is to share and assess the experiences of the emergency remote teaching method adopted for the medical communication course at a medical school due to the COVID-19 pandemic. The standardized patients hired for this 'Emergency Remote Teaching (hereafter ERT)' course said that students' interactions with them were less enthusiastic and less realistic, However, in the one-on-one virtual practice, the students seemed to be more focused than in the existing face to face practice. There were no differences in the unit practice test scores between ERT and the face-to-face course while in the face-to-face final exam, the test scores of FTF students were statistically higher than those of the ERT students, which might have resulted from the different methodologies of teaching. Further research on the virtual medical communication course is necessary to prepare medical students for the adoption of the telemedicine which could be accelerated in the near future.

A study on the meaning of Death Observed by Nursing College Students (간호 대학생의 시뮬레이션 실습을 통한 간호 의미고찰)

  • Mi–Hwa Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.49-56
    • /
    • 2023
  • This study is a qualitative study that explores the essential meaning of nursing through a simulation curriculum targeting nursing students. In this study, 18 students, who were 4th grade nursing students at a university in M city, Gyeongsangbuk-do, completed a simulation during the curriculum. Data collection was done through free-form reports and interviews to help students understand the part of nursing they thought through simulation classes. The collected data was analyzed using Krippendorff's phenomenological method. As a result of analyzing the meaning of nursing through simulation class, 3 categories, 10 topics, and 28 meaningful statements were derived. The three categories were derived as 'virtual nursing', 'thinking nursing', and 'together nursing'. As a result of this study, nursing students were seeking their own solution to solve nursing in unpredictable situations based on the philosophy of nursing through virtual simulation. It is expected that this will be used as basic data to develop various and in-depth simulation education programs in the future.