• Title/Summary/Keyword: 논문평가

Search Result 33,928, Processing Time 0.051 seconds

Web-based Automatic Question-Issuing System Using Level Estimation for Learners (학습자의 수준평가를 이용한 웹 기반 자동 문제 출제 시스템)

  • Lee, Hyeon-Joo;Lee, Mi-Sook;Hong, Seung-Mi;Lee, Chan-Hee;Jung, Soon-Ho
    • The KIPS Transactions:PartA
    • /
    • v.10A no.5
    • /
    • pp.579-588
    • /
    • 2003
  • We propose a new web-based automatic question-issuing system, which automatically issue some problems suited to a learner's level according to estimation and analysis of his answers examined previously and communicates interactively with him by using web. Till now, in many researches system issues problems by a learner's direct choice or randomly. So they lack compensation for learner's misunderstanding and wrong answers. This system allows a learner to determine the ratio of ease and difficulty and the number of problems at initial problem-solving time and then issues problems, which reflect his level, from problem pool. Also its accumulative estimate-analysis and current estimate-analysis make it possible for a learner to study intensively about his faulty area.

A Quantitative Quality Evaluation Approach for the Artifacts of the Defense Component Based Development (국방 CBD 산출물을 위한 정량적 품질 평가 방법)

  • Lee Kil-Sup;Lee Hyun-Chul;Lee Sung Jong
    • The KIPS Transactions:PartD
    • /
    • v.12D no.7 s.103
    • /
    • pp.993-1000
    • /
    • 2005
  • Recently, software quality evaluation based on ISO/IEC 9126 and ISO/IEC 14598 has been widely accepted in various areas. However, these standards for software quality do not provide practical guidelines to apply the quality model and the evaluation process of software product=5. And the qualify management in most software projects has been conducted by managing defects without applying the standards for software qualify. Thus, we present a quantitative quality evaluation approach of artifacts in the Component Based Development (CBD). Particularly, our evaluation approach allows most of the standard evaluation process and adopts a quantitative quality model which uses the weights of quality characteristics obtained through carefully selected questionnaires for stakeholder and Analytic Hierarchical Process(AHP). Moreover, we have also examined the proposed evaluation approach with applying the checklists for the artifacts of the CBD to a small-scale software project. As a result, we believe that the proposed approach will be helpful for acquiring the high quality software.

A Study on the Development of Hybrid-typed Education Model for PO6 and PO7 Estimation (복합학제적 능력 및 의사소통 능력과 관련된 학습성과 평가를 위한 융합교육형 모델 개발에 관한 연구)

  • Kim, Eun-Joo;Cho, Young-Im;Do, Seung-Lee
    • Journal of Engineering Education Research
    • /
    • v.13 no.6
    • /
    • pp.132-142
    • /
    • 2010
  • The purpose of this study is to suggest the assessment method for PO6(teamwork) and PO7(communication skill), one of the most important assessment items in engineering accreditation. In this paper, we used the assessment criteria of Rubric, to empirically measure the teamwork and communication skill. Teamwork and communication skill (PO6, PO7) are the most critical social competences in modern society. Numerous studies on education showed that teamwork and communication skill can be enhanced through learning. We, therefore, need to investigate teamwork and communication skill in terms of education. However, research on the assessment method of the engineering accreditation, based on educational view is scarce. In this study, we suggest the assessment criteria of Rubric for PO6 and PO7 with the perspective of the education. We also tried to apply the developed criteria to the related subjects.

  • PDF

Performance Evaluation of I/O Intensive Stress Test in Cluster File System SANiqueTM (집중적인 입출력 스트레스 테스트를 통한 클러스터 파일 시스템 SANiqueTM의 성능평가)

  • Lee, Kyu-Woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.415-420
    • /
    • 2010
  • This paper describes the design overview of shared file system $SANique^{TM}$ and analyzes the performance evaluation results of I/O intensive stress test based on various cluster file system architectures. Especially, we illustrate the performance analysis for the comparison results between the $SANique^{TM}$ and the Linux file system EXT3 system that is used to generally in Unix world. In order to perform our evaluation, Oracle 10g database system is operated on the top of cluster file system, and we developed the various kinds of testing tools which are compiled by ESQL/C from Oracle. Three types of architectures are used in this performance evaluation. Those are the cluster file system $SANique^{TM}$, EXT3 and the combined architecture of $SANique^{TM}$ and EXT3. In this paper, we present that the results of $SANique^{TM}$ outperforms other cluster file systems in the overhead for providing the true sharing over the connecting server nodes.

Security Improvement Methods for Computer-based Test Systems (컴퓨터 기반 평가 시스템의 보안성 강화 방안)

  • Kim, Sang Hyun;Cho, Sang-Young
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.33-40
    • /
    • 2018
  • ICT technology has been applied to various educational fields, but applying to educational test field is limited. Computer-based test (CBT) can overcome temporal and spatial constraints of conventional paper-based test, but is vulnerable to fraud by test parties. In this paper, we propose real-time monitoring and process management methods to enhance the security of CBT. In the proposed methods, the test screens of students are periodically captured and transferred to the professor screen to enable real-time monitoring, and the possible processes used for cheating can be blocked before testing. In order to monitor the screen of many students in real time, effective compression of the captured original image is important. We applied three-step compression methods: initial image compression, resolution reduction, and re-compression. Through this, the original image of about 6MB was converted into the storage image of about 3.8KB. We use the process extraction and management functions of Windows API to block the processes that may be used for cheating. The CBT system of this paper with the new security enhancement methods shows the superiority through comparison of the security related functions with the existing CBT systems.

  • PDF

On the SEED Validation System (SEED 구현 적합성 검증 시스템에 관한 연구)

  • Kim, Yeok;Jung, Chang-Ho;Jang, Yoon-Seok; Lee, Sang-Jin;Lee, Sung-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.69-85
    • /
    • 2003
  • In this paper, we discuss a validation test for cryptographic algorithms. The cryptographic algorithms decide on the security and the confidence of a security system protecting sensitive information. So. the implementation of cryptographic algorithms is very critical of the system. The validation lest specifies the procedures involved in validating implementations of the cryptographic standards and provides conformance testing for components or procedures of the algorithm. We propose a SEED Validation System(SVS) to verify that the implementation correctly performs the SEED algorithm. The SVS is composed of two types of validation tests, the Known Answer test and the Monte Carlo test. The System generates the testing data for the Known Answer tests and the random data for the Monte Carlo tests. This system can be used to validate and certify the cryptographic product.

Evaluation Environment based on V2X Communication for Commercial Vehicle Cooperative Autonomous Driving (상용차 자율협력주행 플랫폼 평가를 위한 V2X 기반 평가환경 개발)

  • Han-gyun Jung;Seong-keun Jin;Jae-min Kwak
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.6
    • /
    • pp.450-455
    • /
    • 2021
  • In this paper, we introduce the contents of research on the establishment of an evaluation environment for autonomous cooperative driving platform for commercial vehicles based on V2X communication. For the evaluation of the autonomous cooperative driving platform based on V2X communication, various standards, standards, and guidelines for test evaluation should be developed and provided to the test subject, along with the establishment of test beds such as roads and V2X infrastructure that can apply various driving scenarios. do. In addition, based on this, various reference equipment and test equipment for actual test and evaluation should be developed. In this paper, various technologies, standards, equipment, and construction infrastructure developed to construct the evaluation environment for autonomous cooperative driving platform for commercial vehicles based on V2X communication are introduced.

Security Self-Analysis and Self-Evaluation for Public Information System (공공기관 정보시스템의 자가진단 보안 분석.평가 연구)

  • 김인중;정윤정;이철원;장병화;원동호
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.629-632
    • /
    • 2002
  • 공공기관은 자신의 정보시스템에 대한 보안 대책을 수립하기 위하여 자체 보안·분석평가를 수행함으로써 적절한 보안 목표와 방향을 설정해야 한다. 하지만, 현재 연구되어 있는 위험분석 및 보안평가방법론등은 복잡하고 전문적인 사항이 많으므로 자체 보안분석을 수행하기에는 인력 및 비용이 많이 소요된다. 이를 위하여 본 논문에서는 정보시스템의 위험분석방법론에서 제시하는 자산, 취약점, 위협, 대응책에 보안평가방법론을 포함하여 정보시스템에 대한 모델링, 가정, 증상, 원인, 해결책등을 통한 자가진단 보안 분석·평가 방법을 제시한다.

  • PDF

The Evaluation Model for Embedded Software (임베디드 소프트웨어 평가 모델 구축 방안)

  • 최현미;성아영;조나경;최병주;반효경;김재웅
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10b
    • /
    • pp.349-351
    • /
    • 2004
  • 임베디드 소프트웨어는 탑재할 대상에 맞게 구성하고 맞춤화(customize)하는 작업 이 필요하므로 그 종류가 다양하고 시스템을 구성하는 컴포넌트들이 밀접하게 연관되어 있기 때문에 이를 평가하기 위해서는 일반 소프트웨어와 다른 관점이 필요하다. 본 논문에서는 임베디드 소프트웨어의 구성을 분석하였고, 이를 기반으로 임베디드 소프트웨어의 특징을 반영하여 품질 평가와 기능평가를 포함한 체계적인 임베디드 소프트웨어 평가 모델의 구축 방안에 대해 제시하였다.

  • PDF

The evaluation methods for persistent association technologies in MPEG-21 (MPEG-21에서 컨텐츠와 메타데이터의 연결 기술을 위한 평가 도구)

  • 김종남;김경수;박근수;김문철
    • Proceedings of the IEEK Conference
    • /
    • 2003.07d
    • /
    • pp.1463-1466
    • /
    • 2003
  • 최근에 원본 컨텐츠에 부가적인 메타데이터를 워터마크 형식으로 연결시키기 위한 시도들이 많이 있었지만, 이들을 객관적으로 평가하고 비교할 수 있는 표준 도구들이 미미하였다. 이를 위해 MPEG-21 (Moving Picture Expert Group)에서는 멀티미디어 프레임워크 측면에서 이에 대한 방법들을 정의하고, 평가 절차에 대한 표준화를 시도하고 있다. 본 논문은 MPEG-21 에서 논의중인 디지털 컨텐츠와 이에 관련된 메타데이터의 지속적 연결을 위한 기술 평가 방법을 소개한다. 이 기술에 대한 배경, 표준화 현황 및 방향, 기술들의 종류, 응용분야, 기술의 평가 항목 등에 대해 자세히 서술 할 것이다.

  • PDF