• Title/Summary/Keyword: 논문평가

Search Result 33,928, Processing Time 0.056 seconds

An Evaluation Method on Intrusion Detection System using Fuzzy Integrals (퍼지적분을 이용한 침입탐지시스템 평가방법)

  • 김미혜
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.2
    • /
    • pp.113-121
    • /
    • 2004
  • In a result that the types of intrusion detection are getting diverse in accordance with rapid internet sprawl, many intrusion detection systems have been developed. In this paper, we will propose a novel evaluation on the evaluation criteria for the intrusion detection systems using Fuzzy integrals

Fuzzy Approach of Learning Evaluation Model in Intelligent E-Learning Systems (지능형 가상 학습 시스템에서 학습 평가 모델의 퍼지적 접근)

  • Weon, Sung Hyun
    • The Journal of Korean Association of Computer Education
    • /
    • v.8 no.1
    • /
    • pp.55-63
    • /
    • 2005
  • Recently, web-based E-learning systems have entered the spotlight by providing new learning environments that break down spatial and temporal limitations. The key to building the web-based E-learning system is in determining how to effectively use the system and to evaluate the degree of learning achieved by the students that use it. In traditional off-line learning systems, we can evaluate students by counting how many questions, designed to evaluate their learning achievement, he or she answers correctly within a predetermined time limit. But this method would make individualized learning, a strong point of E-learning systems, impossible because these systems provide same learning strategy to all students even though they achieve a different level of learning. Therefore, in this paper, I will find any relationships between given test answers using fuzzy implication theory, I call these fuzzy correlations, and then generate evaluation results that are reflected in those relationships. I will compare the differences between this evaluation method and a traditional evaluation method where a student takes a test to evaluate his or her learning achievement after some learning period. Finally, I will discuss how we can use these results in individualized learning.

  • PDF

Development of Student Evaluation Items in Cooperative Web-based Learning and the Evaluation Cases Analysis according to Instruction Models (협동적 웹기반 학습에서 학습자 평가항목 개발 및 수업유형에 따른 평가사례 분석)

  • Park, Chan-Jung;Hyun, Jung-Suk
    • The Journal of Korean Association of Computer Education
    • /
    • v.7 no.6
    • /
    • pp.59-68
    • /
    • 2004
  • Cooperative web-based learning is an teaching strategy in which small teams, each of students with different levels of ability, use a variety of learning activities to improve their understanding of a subject via the web. The objective of this paper is to propose new assessment items for evaluating students fairly in cooperative web-based learning. As a result, improved academic achievement, improved behavior and attendance, and increased self-confidence can be made in cooperative web-based learning due to the fair assessment, In this paper, the environment and instructional strategies for successful learning are firstly examined. In addition, the existing evaluation items in traditional classroom are also analyzed in order to develop new evaluation criteria in the web. Based on these analyzed items, we propose new evaluation items for cooperative web-based learning. In addition, the proposed items related to participant ratio, cooperability, and accountability are analyzed according to team organization styles and instructional models.

  • PDF

Effects of Nostalgia, Expectation, and Evaluation on the Intention to Watch a Movie -Focused on the Case of - (향수(nostalgia), 기대 및 평가가 영화 관람의도에 미치는 영향 -<써니>의 사례를 중심으로-)

  • Park, Sun-Young
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.12
    • /
    • pp.614-625
    • /
    • 2013
  • The nostalgia marketing is active in various industrial areas. The nostalgic theme is emerging as a new trend in the film industry. This thesis attempts to investigate empirically the effect of nostalgia, the expectation and the evaluation on the intention to watch a movie. Nostalgia is a sentimental yearning for a former place or time. Expectation is classified into the utilitarian and the hedonic one; the evaluation into the subjective and the objective one. This thesis analyzed the effects of these five factors on the intention to watch a movie. The result shows that the older group felt more nostalgic than the younger; women more than men. Regarding the age, 10-20s are affected by the hedonic expectation, the subjective evaluation, and nostalgia, and over 30s are affected in order of the hedonic expectation and nostalgia. In terms of sex, men are affected most in order of the hedonic expectation, nostalgia and the subjective evaluation. Women are affected most in order of the hedonic expectation and the subjective evaluation. These results indicate that the marketing strategy needs to vary according to age and sex.

A Study on Security Evaluation for Mobile Web Services Message (모바일 웹서비스 메시지의 보안 평가에 관한 연구)

  • Lee, Seoung-Hyeon;Lee, Jae-Seung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.765-768
    • /
    • 2007
  • In this paper, the security evaluation method about mobile web services message is suggested in the method for improving the safety an reliability about the mobile web services message. In order that the goal of this paper is accomplished, the security threat and the security vulnerability which can be occurred in the mobile web services message are defined. The evaluation method for performing the security evaluation about the mobile web services message is defined. Also, the requirements for the mobile web services message security evaluation are defined. Finally, the evaluation framework for performing the mobile web services message security evaluation is constituted, and the evaluation scenario example is suggested. By using the mobile web services message security evaluation defined in the paper, before the mobile web services is deployed, the security threats and security vulnerability can be verified. Also, the countermeasure for the security threat and security vulnerability discovered in the verification result can be prepared. Therefore, the sorority and reliability about the mobile web services can be improved.

  • PDF

Requirements Evaluation Method for Concurrent Development of Embedded System based on Discrete Event System Formalism (내장형 시스템의 동시적 개발을 위한 이산 사건 시스템 형식론 기반 요구사항 평가 방법)

  • Choi, Jae-ung;Choi, Chang-beom
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.2
    • /
    • pp.61-69
    • /
    • 2018
  • As the technology of information and communication has developed over recent years, an embedded system is applied in multiple industries and becomes more complicated. For this reason, embedded system development cost and time are also increased. For decreasing the cost and time, this paper suggests requirement evaluation method for concurrent development of an embedded system based on Discrete Event System(DEVS) Formalism. This paper proposes a method of describing the requirements specification in the form of DEVS atomic model. Also, the paper proposes the evaluator model that compares evaluation target system and the requirements model that is an implementation of requirement specification and proposes the evaluation method using them. In addition, we propose a method to utilize the requirement model created for requirements evaluation in the concurrent development process of the embedded system. As the case study, this paper proceeds requirement evaluation of Kinect depth data processing system.

Accessibility Evaluation of Accredited Certificate Subscriber Software (공인인증서 가입자 소프트웨어의 접근성 평가)

  • Hong, Kyoung-Soon;Choi, Seong-Eun;Kim, Suk-Il
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.2
    • /
    • pp.40-53
    • /
    • 2011
  • This paper proposes methods of evaluating and measuring accessibility of accredited certificate subscriber software which is one of crucial applications to submit personal certifications while web surfing. The presented methodology is to evaluate accessibility by using a certain assessment tool and is to normalize accessibility level into points, so that the software developers who are unfamiliar to screen readers can easily perform accessibility evaluation. The software from the major 78 organizations has went through the assessment. Those of 48 organizations, 62% out of the total, have acquired less than 70 points, implying the software of them is not accessible by the blind. The remaining 18 software got the highest point(88), are partly inaccessible by the blind that uses screen readers. This implies that the proposed methods are applicable to evaluate the accessibility of the software.

A Quantitative Method for Quality Improvement of Information System Audit Evaluation (정보시스템 감리평가 품질 향상을 위한 정량화 방법)

  • Lee, Ki-Young;Kim, Young-Ho;Han, Ki-Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.4
    • /
    • pp.173-184
    • /
    • 2012
  • As a result of the compulsory of information system audit and a rise in audit demand, the quality improvement of information system audit is being emphasized. However, since the current information system audit heavily depends on the auditor's experience, skill, and subjective judgments, it incurs distrust in the objectivity and reliability of audit results from audit interest person. Furthermore, so far research activities aimed at securing the objectivity and reliability of audits have not been adequately carried out. Therefore, this paper presents a quantitative method for information system audit evaluation in order to contribute to the quality improvement of overall information system audit through securing compliance, objectivity, and reliability of information system audit. The quantitative method is largely composed of two sectors, such as evaluation areas and items, scores calculation for evaluation items, and can generally apply the information system audit standard to information system audit evaluation.

Automatic Product Feature Extraction for Efficient Analysis of Product Reviews Using Term Statistics (효율적인 상품평 분석을 위한 어휘 통계 정보 기반 평가 항목 추출 시스템)

  • Lee, Woo-Chul;Lee, Hyun-Ah;Lee, Kong-Joo
    • The KIPS Transactions:PartB
    • /
    • v.16B no.6
    • /
    • pp.497-502
    • /
    • 2009
  • In this paper, we introduce an automatic product feature extracting system that improves the efficiency of product review analysis. Our system consists of 2 parts: a review collection and correction part and a product feature extraction part. The former part collects reviews from internet shopping malls and revises spoken style or ungrammatical sentences. In the latter part, product features that mean items that can be used as evaluation criteria like 'size' and 'style' for a skirt are automatically extracted by utilizing term statistics in reviews and web documents on the Internet. We choose nouns in reviews as candidates for product features, and calculate degree of association between candidate nouns and products by combining inner association degree and outer association degree. Inner association degree is calculated from noun frequency in reviews and outer association degree is calculated from co-occurrence frequency of a candidate noun and a product name in web documents. In evaluation results, our extraction method showed an average recall of 90%, which is better than the results of previous approaches.

Architecture Evaluation Utilizing CBAM and AHP (생체인식 소프트웨어의 품질 평가모듈에 관한 연구)

  • Yang, Hae-Sool;Lee, Man-Ho;Yoon, Young-Mi
    • The KIPS Transactions:PartD
    • /
    • v.13D no.5 s.108
    • /
    • pp.699-708
    • /
    • 2006
  • The latest biometric field have marched fast with security technology of IT. As importance of present biometrics is realized, internal and external biometrics software market is trend that is soaring. Accordingly, high reliability of biometric software and request of high quality software are enlarged. Evaluation items and criteria must be established for biometric software quality assurance. In this paper, we development the evaluation module for biometric software test based on ISO/IEC 12119 that is the standard about software quality requirement and test, and ISO/IEC 9126 that is standard about evaluation of software product, and ISO/IEC 14598-6 that is the standard about construction of the evaluation module. Constituents of biometric software products(product descriptor, user document program and data) is subject to the quality evaluation module that we developed in this paper, we can expect improvement in the quality of software by using with a standard such as ISO/IEC 9126-3 that can be used in software development process.