• Title/Summary/Keyword: 인증 프로그램

Search Result 496, Processing Time 0.029 seconds

Validity Assessment of Ed-Program & License for Internet IR Specialist (지식산업 전문인력 정책개발을 위한 정보검색사 교육과 자격 시험제 타당성 분석)

  • 유사라
    • Journal of the Korean Society for information Management
    • /
    • v.18 no.2
    • /
    • pp.77-104
    • /
    • 2001
  • Searching and retrieving information on the Web that define the core-function of Internet IR specialists is one of the activities that practitioners and searchers of LIS fields do exceptionally yell. Various education programs and license examinations for Internet IR specialists have been carried out by many organizations, without consistent monitoring or objective evaluation of those validity and functionality, which community of information professionals requires. This study focused on investigating the current practice of the education and license exam, and identifying problems that hinder the validity of those programs, and alerting the professionals to enhance and expand serious cooperation to keep up with the evolving interests of Internet IR specialists as a great challenge we all(partners, researchers, and policy-makers in government) face.

  • PDF

A Study on Engineering Education based on Cooperation between University and Enterprises (산학협력기반 공학교육모델에 관한 연구)

  • Park, Cheol-Woo
    • Journal of Engineering Education Research
    • /
    • v.11 no.4
    • /
    • pp.5-10
    • /
    • 2008
  • Conventional engineering education models have fallen to give satisfactory results to enterprises. So this paper deals with the new engineering education system, Engineering House, to overcome it. EH is made of three spaces and three concepts. Concept means system. Three concepts are things about a education program, a research cooperation, a open-door policy of EH facilities. First of all, Education system for undergraduates is most important of all. We intend to give them chances for real engineering experiences. Specialist from companies are participated in the education. The second is a research network. EH is managed by two or three professors together and their researches are carry out with companies's researcher. Key-point is doing all together. The third is service system for regional enterprises. EH's facilities are opened. Our students and professors are supporting directly. Mainly high price measuring machine is used. Like these, networks with companies are very helpable for undergraduate's educations and job connections. These are the work based learning system. Engineering House system look forward to getting to good program for undergraduate, based on the co-operation between university and enterprises.

Research on Web standards compliance and professional level of domestic Web Developer (국내 웹 개발자의 웹표준 준수 및 전문성 수준에 대한 연구)

  • Shin, Moon-sun;Jeong, Kyeong-ja;Kim, Byung-chul
    • Journal of Digital Convergence
    • /
    • v.14 no.4
    • /
    • pp.201-208
    • /
    • 2016
  • Recently, non-standard techniques of web like Active-X caused not only user inconvenience but also barriers to the business of Internet. The government recognized that the serious environmental situation of using Internet is needed to be improved. Especially, HTML5 convergence technology is meant to be a specific platform over the devices, users, and systems. It also means web standards to support more creative business service model and emerging market. In this paper, we performed a survey on Web standards compliance and web development professional level of domestic web developers. In addition, we present the basic direction of government policy of software and software-positive human resources policy, that is based on the analysis of the survey results. Our study will be able to contribute to construct policies to support digital convergence industry and to strengthen technical assistance and expertise to build training programs for the spread of global Web standards (HTML5).

Improvement of size measurement polystyrene spheres of diameters 3$\mu$m and 10$\mu$m by optical microscope with CCD camera (CCD 카메라가 장착된 광학현미경을 사용한 폴리스티렌구 (3 $\mu$m와 10 $\mu$m)의 평균지름측정)

  • 정기영;박병천;깅주식;송원영;오범환
    • Korean Journal of Optics and Photonics
    • /
    • v.9 no.6
    • /
    • pp.362-367
    • /
    • 1998
  • Center Distance Finding (CDF) is a technique to find the sphere diameter by measuring the distance between two contacting spheres. The focal spots of the sphere clusters are formed in the back-focal plane by the transmission-mode optical microscope with the pseudothermal illumination source. Digital images taken by the CCD camera were processed by the software called Global Lab Image. The centers of the focal spots are found and the spot positions are expressed in terms of the CCD pixel elements, whose coordinate are calibrated by a heterodyne interferometer. The new CDF measurement system has been developed, which are more advantageous in time and convenience than the existing system, while the measurement uncertainly remains sufficient for its use as a magnification standard for optical microscopy. Two kinds of polystyrene spheres whose nominal diameters 3 and 10 $\mu\textrm{m}$ (NIST SRM 1962 and 1960) are measured with the uncertainly less than 1% at the confidence level of 99%, and the results are compared with the results of National Institute of Standards and Technology.

  • PDF

DDoS attack traffic through the analysis of responses to research (트래픽 분석을 통한 DDoS 공격에 대한 대응책 연구)

  • Hong, Sunghyuck
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.3
    • /
    • pp.1-6
    • /
    • 2014
  • DDoS (Distributed Denial Service, Distributed Service) attacks are being generated for a constant threat on the Internet, countermeasures for this have been proposed. However, the problem has become an increasingly effective instruction in any Measures are a variety of attacks and sophisticated attacks. Attackers can change a steady attack tools to respond to these, the experts as a countermeasure to this constantly research for a fresh attack. This paper is to introduce countermeasures to DDoS recent representative examples of 7.7DDoS and look for 3.3DDoS existing types of DDoS attacks increased PPS attacks, high traffic sent, web service delay and router and firewall settings, applications and to describe the DDoS countermeasures research by certification, is so that you can plan effectively for the future DDoS attacks proposed method.

  • PDF

Cyber impact on education and job satisfaction -Certificate holders in the center of- (사이버 교육이 직무만족도에 미치는 영향 -자격증 취득자 중심으로-)

  • Chung, Yong-Geol;Lim, Sang-Ho
    • Journal of Digital Convergence
    • /
    • v.10 no.4
    • /
    • pp.159-165
    • /
    • 2012
  • In this paper, the qualification process to target trainees of 200 questionnaires collected 158 call was using the SPSS 18.0 statistical program was statistical results are as follows. First, the demographic characteristics of 158 people a total of 146 people men (92.4%) were 30 and 40 adults. Second, according to gender for women than men showed high satisfaction of sayibeogang. More than a college education group showed a high level of satisfaction. Depending on the marital satisfaction of married people was higher sayibeogang. In addition, cyber-lecture on satisfaction surveys women, highly educated, married, educated in the group were satisfied. 74.5% of total variance, variance, with 88.7 percent reliability was very high reliability. Thus, students' demographic variables, motivation, learning to fit in the field of instructional design and content to support the various efforts will be.

A Study of Improving Safety Management in Taekwondo Events (태권도 이벤트의 안전관리 개선 방안)

  • Cho, Hyun-Joo;Kim, Doo-Han
    • Korean Security Journal
    • /
    • no.53
    • /
    • pp.231-251
    • /
    • 2017
  • Taekwondo has developed into a global sport that sports 80 million people from 208 countries around the world. Korea is the mother country of Taekwondo, and there are many international Taekwondo events in Korea. As important as the image of Taekwondo contents, it will be operation plan and management for event facilities. In particular, safety management for participants is more important than anything else. In case of Taekwondo where there are many national events, there are many foreign visitors, so safety management in facilities and running programs needs to be important. In this study, we conducted in - depth interviews with experts with a career in Taekwondo events. Based on the in - depth interviews, we analyzed the safety management problems of the international Taekwondo events and suggested improvement directions to overcome them. Based on the results of these researches, the improvement direction of Taekwondo event safety management proposed in the first category is a demand for improving safety and injury related system construction. The second category, the safety improvement of visitors, is to secure professional manpower and secure budgets. Also, what is important in the third category, facility safety area, is the proposal to introduce facility safety certification system.

  • PDF

Analysis of the workforce challenges of medical device manufacturers (의료기기 제조업체의 구인난에 관한 분석)

  • Park, Rog-Gook;Lee, Woo-Cheon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.21 no.1
    • /
    • pp.71-82
    • /
    • 2016
  • This study has been carried out to provide data for the workforce by analyzing personnel status of medical device manufacturers, level of difficulty in securing human resource, reason for difficulty in securing human resource, resignation rate, and recruitment methods. Results, medical device manufacturers are required overseas sales personnel responsible for international certification and exported, regardless of the production item. And the company is located in the metropolitan area did not facilitate a secure workforce. Medical device manufacturers have difficulties in securing personnel, regardless of the employees and sales. In particular, Class 3 production company was more difficult. The reason that it is difficult to secure the human resources is attributable to the poor working conditions of the private companies and there is a few possible employees equipped with the job competency demanded by corporate entities. With respect to the analysis on the retirement rate, the larger the company scale and the more the employee number, more difficulty is experienced in the human resource management. Therefore, for any medical device manufacturers with large organization scale, it would be critical to introduce appropriate human resource management program.

Development of the Accreditation Criteria for Engineering Technology Education Programs in Junior Colleges (전문대학 공학기술교육 프로그램 인증 준거 개발)

  • Hahm, Seung-Yeon;Rho, Tae-Cheon
    • 대한공업교육학회지
    • /
    • v.30 no.2
    • /
    • pp.82-103
    • /
    • 2005
  • The purpose of this study was to develop and present the accreditation criteria for engineering technology education programs in junior colleges. Research methods used in this study were review of related literature, experts discussion, and Delphi technique. Especially, Delphi technique was the major research method of this study. The Delphi surveys were taken for about seven weeks and three rounds at a higher level of expert participation. Major results of the study were as follows: 1. It proved that thirty six of total forty items had the content validity as the accreditation criteria of engineering technology education programs for junior colleges. CVR(Content Validity Ratio) of four items were below .33 and eliminated four items from the final accreditation criteria. 2. It proved that total Cronbach ${\alpha}$ was very high .9142 and reliability was very high all over items. It proved that six items made worse reliability, therefore it was desirable to exclude six items for increase of reliability. But the final accreditation criteria included six items, because they had a high validity as well as increasing rate of Cronbach ${\alpha}$ was very low with the exception of them. 3. Items of high importance were drawn out through analysis of importance. It proved that thirty of total forty items were more than 4.00 average in importance and ten items were less than average. 4. In conclusion, the final accreditation criteria were developed and presented through such analysis of validity, reliability and importance. The final accreditation criteria for engineering technology education programs in junior colleges were composed of seven domains of educational objectives, learning outcomes, curriculum, staff, facilities, institutional support, and student assessment.

Watermarking of Gray Logo & Color Image based on Human Visual System (인간시각 시스템 기반의 그레이로고 & 컬러 이미지의 워터마킹)

  • NOH Jin Soo;SHIN Kwang Gyu;RHEE Kang Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.3 s.303
    • /
    • pp.73-82
    • /
    • 2005
  • Recently, The wide range of the Internet applications and the related technology developments enabled the ease use of the digital multimedia contents (fixed images, movies, digital audios). However, due to the replay ability which the contents may be easily duplicated and not only the duplicates are capable of providing the same original quality. There are mainly the encipher techniques and the watermarking techniques which are studied and used as solutions for the above problem in order to protect the license holders' rights. To the protection of the IP(Intellectual Property) rights of the owner, digital watermarking is the technique that authenticates the legal copyrighter. This paper proposed the watermarking algorithms to watermark the 256 gray logo image and the color image by applying the wavelet transformation to the color stand-still images. The proposed algorithms conducted the watermark insertion at the LH frequency region among the wavelet transformation regions (LL, LH, HL, HH). The interleaving algorithms which applied in data communication was applied to the watermark. the amount of watermark increased which consequently caused the PSNR to decrease but this might provide the perseverance against the external attacks such as extraction, filtering, and crop.