• Title/Summary/Keyword: 연구가이드

Search Result 3,033, Processing Time 0.036 seconds

Quantitative Analysis of Development Defects to Guide Testing (시험 가이드라인을 결정하기 위한 정량적인 결함 분석 사례 연구)

  • Lee, J.K.;Shin, S.K.;Nam, S.S.;Park, K.C.
    • Electronics and Telecommunications Trends
    • /
    • v.18 no.2 s.80
    • /
    • pp.99-109
    • /
    • 2003
  • 검출된 소프트웨어의 결함에 대한 분석은 소프트웨어의 품질을 향상시키기 위한 여러 활동에 많은 도움을 주고 있다. 특히 개발중인 소프트웨어 컴포넌트들에 대한 검출된 결함 분석은 개발기간에 소프트웨어내에 숨어있는 결함(latent defect)에 초점이 맞추어져 시험에 많은 도움을 주고 있다. 본 논문은 대형 교환 소프트웨어로부터 시험에서 검출된 결함 데이터를 이용하여 소프트웨어의 특성을 조사, 분석하여 이를 시험에 활용하고 시험의 효율성과 시험효과에 대한 가이드 라인을 제안한다.

A Study on the Present Stage of Research Support Services of Academic Library in Korea (국내 대학도서관 연구지원서비스의 현단계)

  • Lee, Yong-Jae;Lee, Ji-Wook
    • Journal of Korean Library and Information Science Society
    • /
    • v.51 no.1
    • /
    • pp.305-327
    • /
    • 2020
  • This study aims to suggest the ways to reinforce academic library's research support services for professors and researchers in Korea. For this purpose, this study collected the development plans of academic libraries in Korea, and analysed the plans for supporting research activities, and also analysed each library's homepage. And this research classified the research support services of academic libraries into eight types for further analysis. The types are 'subject guide', 'academic information literacy', 'research analysis service', 'research consulting', 'research ethics education', 'thesis writing guide', 'bibliography management program', 'interlibrary loan·original text copy'. As a result, it is shown that the most libraries emphasized 'custom-tailored user education' and marked it on development plan. As subsequent plans, libraries provided the action plans of 'expansion of scholarly DB instruction on each subject', 'expansion of custom-tailored research support services', 'construction of research support service system' one after another. This study suggests 'activation of subject guide service', 'expansion of academic information literacy programs for supporting research', 'introduction of research performance analysis services', and 'support for establishment of research ethics' as ways to strengthen academic libraries' research support services.

A Study on Development of Enhancement Guidelines of Smart Application Accessibility for the Disabled (장애인을 위한 스마트 애플리케이션 접근성 향상 가이드라인 개발 연구)

  • Jun, Woochun
    • Journal of The Korean Association of Information Education
    • /
    • v.19 no.1
    • /
    • pp.69-76
    • /
    • 2015
  • In current information society, there is a barrier called digital divide. Due to this barrier, the disabled have difficulties to communicate with the world. Recently, with advanced smart techniques, smart devices become necessity for the disabled. Currently improvements of smart application accessibility become a great concern for the disabled. The purpose of this paper is to present some guidelines for enhancing smart application accessibility for the disabled. The enhancement guidelines are developed based on the existing mobile accessibility guidelines and modified for better adaptability for the disabled. Our principles are as follows: minimizing blue light emission from smart devices, automatic focus on input window, action trace, font color change, emergency notification by motion, gesture recognition, control location, scrolling avoidance, auditory service for visual warning, and icon literation.

A Study on the Improvements of the Big Data Guideline in Korea (빅데이터 개인정보보호 가이드라인(안)의 개선 방향에 관한 연구)

  • Kim, Sunnam;Lee, Hwansoo
    • Informatization Policy
    • /
    • v.21 no.4
    • /
    • pp.20-39
    • /
    • 2014
  • The age of big data has not only opened new opportunities for economic growth in various industries, but it has also created new problems related to personal information protection and privacy invasion. Given this situation, Korea's communications commission has proposed a big data guideline that specifies how companies should collect and utilize personal information in the big data environment. However, this guideline is more focused on industrial development than personal information protection, and it contains many features that conflict with personal information protection law as it currently exists. As a result, civic groups strongly oppose the guideline, as it may create serious privacy issues for subjects of information gathering. Thus, this paper analyses the limitations of the guideline by comparing it with domestic and foreign laws about personal information protection and privacy. We also discuss the direction of legalization and institutionalization with respect to the secure use of big data.

A Study on non-linear trajectory shaped apparatus applied solar tracking device (비선형 궤적형상을 적용한 태양광 추적장치에 대한 연구)

  • Han, Jae-Hyeon;Moon, Chae-Joo;Chang, Young-Hak;Choi, Man-Soo;Kim, Young-Gon;Jeong, Moon-Seon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.11
    • /
    • pp.1277-1284
    • /
    • 2015
  • In this paper, 1-axis tracking mechanism of solar-cell panel, which is able to rotate from -90 degree to +90 degree for maintaining always perpendicular between solar-cell panel and sun, was analyzed. This paper propose the non-linear shaped guidance and analyze mathematical formulation of non-linear shape. This analysis shows that it is able to identify the non-linear shaped guidance. Especially, even though the length of rotating link have changed, the non-linear shaped guidance could be confirm with proper size. As effectiveness of this result, 10% efficiency rising is estimated compared to the conventional 1-axis tracking mechanism and also optimal non-linear shaped guidance can be suggested for various size of solar-cell panel. Therefore the flexible mass-production is possible for various size of non-linear shaped guidance.

Cyber Security Framework for Critical Infrastructure (기반시설 사이버보안 프레임워크 도출방안)

  • Kwon, Sungmoon;Lee, Seokcheol;Jang, Jiwoong;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.241-250
    • /
    • 2017
  • Contrary to past critical infrastructure network, current critical infrastructure network is adopting IoT devices and efficient management system using the external networks. Using this system, productivity and management efficiency could be enhanced compared to past critical infrastructure network. But cybersecurity issue could be occurred at external network connection, so cybersecurity guideline is necessary. However, critical infrastructure organizations tend to use the cybersecurity guideline issued by government because it is hard to develop cybersecurity guideline on their own. But the government's cybersecurity guideline isn't suitable for the critical infrastructure network because it doesn't include critical infrastructure's specific characteristics. Therefor, we suggested the development method of cybersecurity guideline for the critical infrastructure network based on analysing cybersecurity guideline standards and critical infrastructure networks.

Development of Transportational Guide System for Joining Small Wire with Gabion (개비온 끝단 소둔선 결합용 이송 가이드 장치 개발 연구)

  • Lee, Jong kil;Kin, Jong-Tae
    • 대한공업교육학회지
    • /
    • v.31 no.1
    • /
    • pp.211-225
    • /
    • 2006
  • Gabion can be used for the purpose of preventing overflow of river and side loss of road. However the manufacturing process of the gabion is manually controlled especially to the joining process at the terminal part of gabion with small diameter wire. In this paper automatic feeding guide system was designed and fabricated to make automation. The fabricated system was tested in the factory level. Pneumatic system was considered as the main idea of the feeding system. 3/2-way and 5/2-way manual control valve, eight double-acting cylinders were used. The system took 46.48 seconds during a cycle. Additional environmental noise and vibration were not detected when the machine operated at the working area. Based on the theoretical simulation and actual test the fabricated system was well controlled. The system was applied to the patent in 2006.

Study on Improvement of Vulnerability Diagnosis Items for PC Security Enhancement (PC보안 강화를 위한 기술적 취약점 진단항목 개선 연구)

  • Cho, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.3
    • /
    • pp.1-7
    • /
    • 2019
  • There are various cyber attacks on business PCs. In order to reduce the threat of PC security, we are preventing the vulnerability from being diagnosed beforehand. However, this guideline is difficult to cope with because the domestic vulnerability guide does not update the diagnostic items. In this paper, we examine the cyber infringement cases of PCs and the diagnostic items of foreign technical vulnerabilities in order to cope with security threats. In addition, an improved guide is provided by comparing the differences in the diagnostic items of technical vulnerability from abroad and domestic. Through 41 proposed technical vulnerability improvement items, it was found that various security threats can be coped with. Currently, it is mainly able to respond to only known vulnerabilities, but we hope that applying this guideline will reduce unknown security threats.

A Comparative Analysis Study of IFLA School Library Guidelines Using Semantic Network Analysis (언어 네트워크 분석을 통한 IFLA의 학교도서관 가이드라인 비교·분석에 관한 연구)

  • Lee, Byeong-Kee
    • Journal of Korean Library and Information Science Society
    • /
    • v.51 no.2
    • /
    • pp.1-21
    • /
    • 2020
  • The purpose of this study is to explore semantic characteristics of IFLA school library guidelines through network analysis. There are two versions, 2002 edition and 2015 revision of the guidelines. This study analyzed the 2002 edition and 2015 revision of the IFLA school library guidelines view point of semantic network, and compared characteristics of two versions. The keywords were to extracted from two texts, semantic network were composed based on co-occurrence relations with keywords. The centrality(degree centrality, closeness centrality, betweenness centrality) was analyzed from the network. In addition, this study conducted topic modeling analysis using LDA function of NetMiner4.0. The result of this study is following these. First, When comparing the centrality, the 'Program, Teaching, Reading, Inquiry, Literacy, Media' keyword was higher in the 2015 revision than in the 2002 edition. Second, 'Inquiry' in degree centrality and 'Achievement' in closeness centrality which were not included in the 2002 edition top-ranked keyword list, have new appeared in 2015 revision. third, As a result of the analysis of topic modeling, compared to the 2002 version, the importance of topics on programs and services, teaching and learning activities of librarian teacher, and media and information literacy is increasing in the 2015 revision.

A Study on Data Literacy Competency Building Measures: Focusing on Research Data Management Education (데이터 리터러시 역량 강화 방안에 관한 연구 - 연구데이터 관리 교육을 중심으로 -)

  • Juseop Kim;Suntae Kim
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.57 no.1
    • /
    • pp.115-137
    • /
    • 2023
  • The purpose of this study is to present a guide for the development of research data management education programs for researchers affiliated with domestic universities and research institutions. In order to present the relevant program guide, first, we investigated and analyzed educational programs for overseas research data management. The educational programs studied and analyzed are RDMRose, RDMLA, DataONE, Digital Research Alliance of Canada, NNLM, PARTHENOS and Coursera. In addition, in order to confirm the appropriateness of the education program, it was reviewed through the detailed competency of data literacy researched in Korea. As a result of the review, most of the detailed competencies for data literacy were satisfied. Finally, a program guide for researchers was presented by synthesizing the research data management education programs that were investigated and analyzed. The results of this study will help develop research data management education programs that can systematically support and activate researchers belonging to universities and institutions.