• Title/Summary/Keyword: 국가 프로그램

Search Result 1,256, Processing Time 0.027 seconds

A Study on Performance Analysis Data Collection Method Using Batch-job Scheduler onLarge-Scale Cluster System (대규모 클러스터 시스템에서 배치작업 스케줄러를 활용한 성능 분석 데이터 수집 방법 연구)

  • Jae-Kook Lee;Min-Woo Kwon;Do-Sik An;Taeyoung Hong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.37-39
    • /
    • 2023
  • 사용자 응용 프로그램의 특징을 분석하고 효율적인 시스템 운영을 통하여 사용자 프로그램 최적화를 지원하기 위하여 소프트웨어 프로파일링을 수행한다. 특히 국가 슈퍼컴퓨터인 누리온과 같이 8,400대가 넘는 계산노드로 구성된 클러스터 시스템에서 응용 프로그램의 프로파일링 데이터를 사용자의 개입없이 수집하고 데이터를 분석하는 것에는 한계가 있다. 본 연구에서는 배치작업 스케줄러를 활용하여 사용자의 개입 없이 응용 프로그램의 프로파일링 데이터를 수집하기 위한 방법을 제안한다. 그리고 제안한 방법을 누리온에서 구현하고 사용자 응용 프로그램이 실행될 때 프로파일링 데이터가 수집되는 것을 확인한다.

The Analysis of Knowledge Information Research and Development Activities for the Fourth Industrial Revolution: Focusing on the U.S. Intelligence Advanced Research Projects Activity(IARPA) (4차 산업혁명 시대 대응을 위한 지식정보 연구·개발 활동 분석: 미국 정보고등연구기획국(IARPA)을 중심으로)

  • Jeong, Yong-Il;Chung, Do-Bum;Mun, Hee Jin
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.2
    • /
    • pp.1-14
    • /
    • 2020
  • Leading the fourth industrial revolution era requires science and technology strategies that establish original research directions at the national level. To this end, it is necessary to look at the research and development activities for the fourth industrial revolution of technology-leading countries. In this study, the research programs of the U.S. Intelligence Advanced Research Projects Activity(IARPA), an organization focusing on cutting edge research on science and technology information such as artificial intelligence, are investigated by using network analysis. The findings show that, resolving around the information identification and forecasting, decision making and cybersecurity clusters, IARPA's research programs largely focus on finding hidden information and predicting specific events, supporting decision making by considering changes in and outside organizations or establishing cybersecurity. Also, this study finds that China and Japan, representative technology-leading Asian countries, refer to the research programs of IARPA to establish their science and technology policies. The results of this study suggest implications for Korea's science and technology policies in response to the fourth industrial revolution era.

Evaluating Core Project Operations of the National Library for Children & Young Adults in Korea (국립어린이청소년도서관 핵심 추진과제 운영평가)

  • Chang, Yun-Keum;Kwon, Na-Hyun;Ha, Eun-Hye
    • Journal of the Korean Society for information Management
    • /
    • v.28 no.4
    • /
    • pp.99-118
    • /
    • 2011
  • This study evaluated the core project operations of the National Library for Children & Young Adults to provide suggestions for its key functions and project operations plan. For this purpose, we conducted a survey for children's librarians and a focus group interview with the directors of children's libraries. The result showed that the overall functions were considered important and the contributions of the core project operations were rated positively. Among the core projects, 'Reading Promotion Program for Children' appeared to contribute most, while the most needed areas were contents development and continuous support for the reading promotion program for young adults. In addition, the need for diverse contents development, instructors and education tools were suggested for continuing education program, along with strengthening policy development and research functions.

A Study on Changes in Chinese Public Diplomacy Strategy and Performance (중국 공공외교 전략과 수행방식 변화 연구)

  • Ahn, Ji-Young
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.7
    • /
    • pp.169-184
    • /
    • 2020
  • This paper analyzes the implications of the change in the way China conducts public diplomacy, through an in-depth study of international education programs promoted under China's public diplomacy strategy. The leadership of Xi Jinping is now trying for China to become the top power in the world, not just a G2 country, based on China's economic growth over the past 40 years. Also, as a vision for the goal, the leadership is presenting the dream of the great revival of the Chinese nation. Currently, the international education program promoted at the level of public diplomacy in China is operated in an active, mid- to long-term manner within the national strategy, away from the past passive and responsive method. In other words, while China's past international education program was a passive model for dispelling the "Chinese Threat Theory," China's current international education program is evolving into an active model that can promote the "Chinese" order in the world.

Development of STEAM Program using App Inventor -Focusing on the Concept of Speed in Elementary Science Education- (앱인벤터를 활용한 STEAM 프로그램 개발 -초등학교 과학의 '속력' 개념을 중심으로-)

  • Shin, Seungki;Choi, Ikseon;Bae, Youngkwon
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.4
    • /
    • pp.530-544
    • /
    • 2015
  • We live in the modern society which is called as Knowledge-Information society. The national and social goal is to raise the creative person for preparing the rapidly changing society. Thus, the schools and families concentrate on and effort to enhance the creativity and problem solving ability. Specially, the school is pushing forward the STEAM education and Software education for raising the creativity person and enhancement of national competitiveness. In this study, we suggested for STEAM education the way how we utilize the App Inventor which was supported by MIT and came up as a computer programming language for Software education, and we verified and evaluated through professional group verification. We completed STEAM instructional design according to the results from the professional group verification, and we suggested the authentic instruction for STEAM education. In addition, we suggested the further prospects of Software education and instructions through going through the characteristics and application plan of App Inventer in terms of educational computer programming language.

A Study on the Framework of Comparing New Cybersecurity Workforce Development Policy Based on the ATE Programs of U.S. (미국 ATE 정책 기반의 신규 사이버보안 인력양성 정책 비교 프레임워크 연구)

  • Hong, Soonjwa
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.249-267
    • /
    • 2018
  • The US cybersecurity workforce policy is being pursued comprehensively and systematically, based on the NICE established initiated in 2010. Security Technologies, one of the eight areas of Advanced Technology Education(ATE) of the National Science Foundation(NSF) included in the STEM. This policy has been comprehensively promoted in conjunction with NICE, and this security technology field is operated with five detailed programs. In this paper, we examine in detail five cybersecurity workforce development programs supported by ATE, and compare them with the current status cultivation of cybersecurity workforce in Korea. After finding out the problems and improvements by comparison with the current situation of cybersecurity workforce development in Korea, we propose several implementations of nation-wide strategies for cultivating new cybersecurity workforce in Korea.

A Study on the Supporting Strategy of Cultural Programs in Korean Public Libraries (공공도서관 문화프로그램 지원방안 연구)

  • Ahn, In-Ja;Hoang, Gum-Sook
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.42 no.3
    • /
    • pp.325-344
    • /
    • 2008
  • Supporting strategies of national level are required as the cultural programs in Korean public libraries are becoming one of key tasks which takes more than 30% of total library duties. This study proposed 6 categories of supporting strategies as national and local libraries based on analysis of 88 public libraries's cultural programs and their requirements. The study's research methods mainly include literature investigation, case study and expert panel group discussions. The 6 supporting categories that this study proposes are: (1) Advisory committee working, (2) Development and distribution of the cultural program models (3) Development of cultural program packages, (4) Development and execution of educational programs for cultural program librarians. (5) Financial support policies, (6) Human Resources and networks for local level programs.

A Study on the Institutional Improvement Directions of Industrial Security Programs: Focused upon Policies and Practices in the U.S. (산업보안의 제도적 발전방안 연구: 미국 사례를 중심으로)

  • Choi, Justin Jin-Hyuk
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.197-230
    • /
    • 2010
  • This study examined the institutional improvement directions of industrial security programs, particularly focusing upon policies and practices in the U.S., to enhance the effectiveness of industrial security programs in Korea. This study also aimed to investigate the significance of institutional and/or policy implementations in preventing economic espionage attempt. Data leakage and/or loss of trade secrets in corporations has been a scary proposition and a serious headache to both the CEOs and the CSOs(Chief Security Officers). Security professionals or practitioners have always had to deal with data leakage issues that arise from e-mail, instant messaging(IM), and other Internet communication channels. In addition, with the proliferation of wireless and mobile technology, it's now much easier than ever for loss by data breaches to occur, whether accidentally or maliciously or even by an economic espionage attempt. The researcher in this study used both a case study and a comparative research to analyze the different strategies and approaches between the U.S. and Korea in regard of implementing policies to mitigate damages by economic espionage attempts and prevent them from occurring. The researcher first examined the current policies and practices in the U.S. in terms of federal government's and agencies' approach and strategies on industrial security programs and their partnerships with private-commercial-sectors. The purpose of this paper is to explain and suggest selected findings, and a discussion of actions to be taken on implementing a proactive and tactical approach to enhance the effectiveness of industrial security programs to fight against information loss or data leaks. This study used case reviews, literatures, newspapers, articles, and Internet resources relating to the subject of this study for triangulation of data. The findings during this research are as follows. This research suggests that both the private and the governmental sector should closely cooperate in the filed of industrial security to strengthen its traditional prevention strategies and reduce opportunities of economic espionage as well. This study finally recognizes both the very importance of institutional development led by the Government in preventing economic espionage attempts and its effectiveness when properly united with effective industrial security programs.

  • PDF

Developing a Reference Model of Korean Recordkeeping System for Integrated Information Resources Management (통합적 정보자원관리를 위한 국가기반 전자기 록관리시스템 참조모형 구축에 관한 연구)

  • Suh, Hye-Ran;Seo, Eun-Gyoung;Lee, So-Yeon;Oh, Kyung-Ju;Jeong, Won-Shik
    • Journal of the Korean Society for information Management
    • /
    • v.23 no.1 s.59
    • /
    • pp.301-333
    • /
    • 2006
  • The study is to propose the reference model of Korean record management for integrated information resources management, based on the Korean regulative and administrative environments. Therefore, the study suggests the reasons why the electronic records must be come to the one of the national knowledge and information resources and reviews several integrated information management systems such as GKMS, KADO, ERA, EUN, and COVAX. Next, the study proposes the integrated records management system architecture, integrated national knowledge and information management environment architecture, and information technology architecture for Integrating resource management environment.

A Study on Development of National Examination Security Service (국가시험 보안업무의 발전적 방안연구)

  • Ha, jeong hoon
    • Korean Security Journal
    • /
    • no.55
    • /
    • pp.75-95
    • /
    • 2018
  • The purpose of this study is to find the development of the examination security business plan based on the problem that guards are now aware of examination security service. To achieve the purpose of this study, the interview was conducted by interviewing interviews with five field related graduates and seven field specialists who are currently engaged in the examination for more than six years. The guard who perform national examination security service proposed a development plan of national examination security services as follows. First, the security guards at the national examination must complete an education program suitable for the nature of the workplace. Second, disaster and emergency response training should be added. Third, national examination security guards should be provided with mental training, search equipment and advanced equipment. Fourth, The National Examination Security Service should be specified in the Security Law so that laws and regulations can actively respond. Fifth, the related organization (contracting party) must raise the cost of service according to reality after realizing the property. Sixth, The national security service should ensure that security guards who have completed the security guards' training will be recruited.