• Title/Summary/Keyword: 논문평가

Search Result 33,844, Processing Time 0.053 seconds

A Web Based System for Usability Project Planning and Testing (사용성 평가 계획 및 수행을 위한 웹 기반 시스템)

  • Park, Danbee;Hong, Ki-Hyung
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.4
    • /
    • pp.308-314
    • /
    • 2015
  • Usability has become an important consideration for product development, and as a result, there is a growing need for systems and tools that can support usability test projects. However, few studies so far have developed such systems and tools. During a usability test project, many participants take up different roles, such as project managers, usability testers, and subjects. We implement a web-based usability test system with which a project manager can manage and control all participants and documents throughout the entire usability test process, from the design of a usability test project to the analysis of the test results. A usability test generates many documents, such as subject agreement forms and before/after questionnaires. Since many different subjects can participate in a usability test, consistency during testing with different participants and efficient document management are the keys to success for a usability test. Since all users that participate in usability test projects can access web-based usability test systems through a web browser, regardless of the place where they are, the reliability of the testing results can improve since the tests are conducted in the locations where the target products are meant to be used. In particular, our system is useful for disabled individuals who cannot move.

A Study on Smartcard Security Evaluation Criteria for Side-Channel Attacks (스마트카드 부채널공격관련 안전성 평가기준 제안)

  • Lee, Hoon-Jae;Lee, Sang-Gon;Choi, Hee-Bong;Kim, Chun-Soo
    • The KIPS Transactions:PartC
    • /
    • v.10C no.5
    • /
    • pp.557-564
    • /
    • 2003
  • This paper analyzes the side channel attacks for smartcard devices, and proposes the smartcard suity evaluation criteria for side-channel attacks. To setup the smartcard security evaluation criteria for side-channel attacks, we analyze similar security evaluation criteria for cryptographic algorithms, cryptographic modules, and smartcard protection profiles based on the common criterion. Futhermore, we propose the smartcard security evaluation criteria for side-channel attacks. It can be useful to evaluate a cryptosystem related with information security technology and in addition, it can be applied to building smartcard protection profile.

Development of Assessment Model for the 'Information Society and Computer' subject of the 7th National Curriculum (7차 교육과정에 따른 '정보사회와 컴퓨터' 교과의 평가도구 개발)

  • Lee, Seung-hyun;Kwak, Eun-young;Kim, Hyeon-cheol
    • The Journal of Korean Association of Computer Education
    • /
    • v.7 no.1
    • /
    • pp.15-25
    • /
    • 2004
  • In this study, we present an assessment model for the 'Information Society and Computer' subject of the 7th National High School Curriculum. The Assessment model is developed to improve the quality of the curriculum by considering both of the objective of the National Curriculum and the property of the subject. To develop the assessment model, we analyzed textbooks used in most schools, developed achievement standards, classified assessment areas and standards. Adequacy and potential practice of the assessment model is also reviewed and evaluated by subject experts.

  • PDF

Quality Evaluation Method of Open Source Software (오픈소스 소프트웨어의 품질 수준 평가 방법)

  • Park, Ju-Byung;Yang, Hae-Sool
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.5
    • /
    • pp.2353-2359
    • /
    • 2012
  • Today, the use of the open source software is rapidly increasing. But, it is also true that the quality aspect of the open source software is not being considered seriously enough. As we see, the future prospect of the open source software seems to demand the development of a set of quality assessment technology for the open source software due to the current status of quality problems and sustained growth in its usage. Therefore, in this study a set of open source assessment models are analyzed to establish evaluation criteria, with which the open source software are to be evaluated.

Web-based individual adaptive testing system considering partial score (부분점수를 고려한 웹 기반 학습자 개별적응 평가시스템)

  • Kim, So-Youn;Hong, Euy-Seok
    • The Journal of Korean Association of Computer Education
    • /
    • v.9 no.2
    • /
    • pp.69-78
    • /
    • 2006
  • Educational evaluation is not the work to rank learners hierarchically, but the thing to increase the educational effectiveness by solving a learner's problem and improving the education process from the proper evaluation. The conventional evaluation systems have measured a learner's recognition level by dichotomy. Although they support the evaluation depending on a learner's academic ability and supply the feedback for wrong selection, it is insufficient to take out study-motive and give the establishment for a guidance point of learning. In this paper, we propose the web-based individual adaptive testing system in considering partial score for a learner. Our system are effective to estimate the ability of learner by considering partial score in detail and offer an feedback study from the self-diagnosis function for a learning results.

  • PDF

Design of Climate Change Vulnerability Assessment Database System for Heat wave and Drought (폭염과 가뭄을 위한 기후변화 취약성 평가 데이터베이스 시스템 설계)

  • Jung, Eun-Hwa;Kim, Chul-Won;Park, Jong-Hoon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.4
    • /
    • pp.813-818
    • /
    • 2018
  • In this paper, the assessment items were selected for water by drought, water quality by drought, and thermal diseases by heat wave. We described the selection background for these assessment items. and then we weighted the selected vulnerability assessment items. The vulnerability assessment procedures also describe the calculation methods applied in phases and the actual cases. The vulnerability assessment database was analyzed and a climate change vulnerability assessment system for heat waves and droughts using these vulnerability assessment procedures was designed.

A Study on the Improvement of Website Evaluation Method through AHP Approach (AHP 접근방법을 통한 웹사이트 유형별 평가기법 개선에 관한 연구)

  • Kim, Dae-Jin;Kim, Jin-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.7
    • /
    • pp.2420-2435
    • /
    • 2010
  • This study presented estimation framework that consider website pattern and user use purpose for website estimation improvement. Also, analyzed and evaluated existing website using estimation framework. In this study, divided by general user and company user and analyzed relative importance between each estimation factors in estimation framework and secured reliability of website estimation model because applies AHP method and presented key factors to website construction, operation, administration. Through this study, projected necessity of weight calculation between estimation area by site type to website estimation field researchers and differentiate contents offered that follow in user type(individual, company) to website planners and operators, projected guideline that can provide more efficient and strategic service.

An Efficient Incremental Evaluation Technique Using an Extended Dependency Chart (확장된 종속차트를 사용한 효율적인 점진 평가 방법)

  • Hun, Jung-Lan
    • Journal of Internet Computing and Services
    • /
    • v.10 no.2
    • /
    • pp.75-84
    • /
    • 2009
  • There have been numerous researches in minimizing the total cost of program development in order to improve productivity of the programs. The incremental evaluation is the evaluation method of reevaluating only affected parts instead of reevaluating overall program when the program has been changed. Since the incremental evaluation method carries its advantage, the method itself is very important when considering the execution efficiency of the program developing environment. This paper extends the dependency chart for an imperative language and presents the extended version of dependency chart which can be applied to the Object Oriented Programming Languages such 'Java'. This paper also presents the incremental evaluation algorithm for Object Oriented Programming Languages and proves its correctness, analyzing the efficiency of incremental evaluation by the simulation.

  • PDF

A Study for Evaluation Method of Safety Critical Software in Avionics Industry (안전필수 항공 산업용 소프트웨어 평가 방법 연구)

  • Lee, Hongseok;Kwon, Goohoon;Ko, Byeonggak
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.2
    • /
    • pp.91-97
    • /
    • 2015
  • This paper specifies several considerations about assessing safety-critical software in the aerospace domain. In order to evaluate safety critical software in the aerospace industry, it is required to identify an information of evaluation criteria of software under evaluation. The information is specified in the standard, but determination of evaluation criteria cannot be decided by itself and depends on the results of safety assessment of a system and system design. Thus, this paper explains required information of system development standard and safety assessment standard to determine software evaluation criteria. It surveys existing methodologies about evaluating software, and suggests method which is adapted to evaluation of an advanced surface movement guidance and control system (A-SMGCS) software.

A Study on Risk Analysis Methode Using Case-Based Reasoning (사례기반 추론을 이용한 위험분석방법 연구)

  • Lee, Hyeak-Ro;Ahn, Seong-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.135-141
    • /
    • 2008
  • The risk enlargement of cyber infringement and hacking is one of the latest hot issues. To solve the problem, the research for Security Risk Analysis, one of Information Security Technique, has been activating. However, the evaluation for Security Risk Analysis has many burdens; evaluation cost, long period of the performing time, participants’ working delay, countermeasure cost, Security Management cost, etc. In addition, pre-existing methods have only treated Analyzing Standard and Analyzing Method, even though their scale is so large that seems like a project. the Analyzing Method have no option but to include assessors’ projective opinion due to the mixture using that both qualitative and quantitative method are used for. Consequently, in this paper, we propose the Security Risk Analysis Methodology which manage the quantitative evaluation as a project and use Case-Based Reasoning Algorithm for define the period of the performing time and for select participants.