• Title/Summary/Keyword: 정보교육 특징

Search Result 610, Processing Time 0.033 seconds

A Study on the University Satisfaction and College Life of Students Admitted through the Affirmative Action Program (기회균형 선발전형 학생들의 대학만족도와 대학생활에 대한 연구)

  • Choi, Yoon-Hee;Lim, Joon-Mook
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.10
    • /
    • pp.788-803
    • /
    • 2022
  • This study was conducted to find out the characteristics of H University's students admitted through affirmative action program. The differences between the affirmative action program enrollment students and all students were compared by descriptive statistics and correlation analysis methods. In addition, in-depth interviews were conducted for students who entered the affirmative action program. A qualitative research method was used to analyze the contents of in-depth interviews. The results of the study are as follows. First, the higher the entrance score, the higher the university score for students in the affirmative action program. Second, the college satisfaction of students entering the affirmative action program is higher than that of students enrolled. Third, according to the results of the in-depth interview, the affirmative action program students were both active and not. In conclusion, it is necessary to establish a system in which students can actively prepare for their careers in universities. Accordingly, the expansion of the affirmative action program is likely to contribute to the development of universities.

Introduction and Analysis of Open Source Software Development Methodology (오픈소스 SW 개발 방법론 소개 및 분석)

  • Son, Kyung A;Yun, Young-Sun
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.163-172
    • /
    • 2020
  • Recently, concepts of the Fourth Industrial Revolution technologies such as artificial intelligence, big data, and cloud computing have been introduced and the limits of individual or team development policies are being reviewed. Also, a lot of latest technology source codes have been opened to the public, and related studies are being conducted based on them. Meanwhile, the company is applying the strengths of the open source software development methodology to proprietary software development, and publicly announcing support for open source development methodology. In this paper, we introduced several software development methodology such as open source model, inner source model, and the similar DevOps model, which have been actively discussed recently, and compared their characteristics and components. Rather than claiming the excellence of a specific model, we argue that if the software development policy of an individual or affiliated organization is established according to each benefit, they will be able to achieve software quality improvement while satisfying customer requirements.

Analysis of Presence and Immersion Elements of VR Game (VR게임의 실재감과 몰입감 요소 분석)

  • Kim, Tae-Gyu;Jang, Woo-Seok
    • Journal of Korea Entertainment Industry Association
    • /
    • v.13 no.8
    • /
    • pp.69-76
    • /
    • 2019
  • Backed by the fourth industrial revolution as the background of the research, VR, AR and MR have increased interest and wireless Oculus Quest is releasing, creating hardware recall and continuing virtual reality devices, and game software develop or service VR games using such devices. As a result, it is expected that VR game markets will continue to grow in the future. For this purpose, we understand the technical factors of presence and immersion that appear in virtual reality games and should be able to apply them when we produce VR games. Through the process, we analyzed elements of VR game concept, immersion, and presence and analyzed three games that were commercialized. As a suggestion, we need to take into account presence and immersion characteristics when developing and experiencing virtual reality games in the future.

Social Engineering Attack Characteristics and Countermeasure Strategies of Major Threat Countries (주요 위협국의 사회공학 공격특징과 대응전략)

  • Jeewon Kim
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.165-172
    • /
    • 2023
  • Nation-state social engineering attacks are steadily being carried out as they are highly effective attacks, primarily to gain an advantage over secret information, diplomatic negotiations or future policy changes. As The Ukraine-Russia war prolongs, the activities of global hacking organizations are steadily increasing, and large-scale cyberattack attempts against major infrastructure or global companies continue, so a countermeasure strategy is needed. To this end, we determined that the social engineering attack cycle excluding physical contact among various social engineering models is the most suitable model, and analyzed the preferred social engineering attack method by comparing it with geopolitical tactics through case analysis. AS a result China favors phishing attacks, which prefer quantity over quality, such as man-made tactics, Russia prefers covert and complex spear phishing reminiscent of espionage warfare, and North Korea uses geopolitical tactics such as spear phishing and watering holes for attacks on the US and South Korea Most of the other countries aimed to secure funds with ransomware. Accordingly, a Clean Pass policy for China, periodic compulsory education in Russia, and international sanctions against North Korea were presented as countermeasure strategies.

A Study on Korean Language Translation of Chinese Traditional Hansi in the 1910s and 1920s (1910~20년대 시인의 전통 한시 국역 양상과 의미 연구 - 최남선, 김소월, 김억, 이광수를 중심으로 -)

  • Chung, So-yeon
    • Journal of Korean Classical Literature and Education
    • /
    • no.34
    • /
    • pp.149-191
    • /
    • 2017
  • This study examines Korean language translations of traditional Chinese hansi in the 1910s and 1920s. In the $20^{th}$ century, many poets translated Chinese and Korean traditional hansi into Korean. In the early $20^{th}$ century, Korean language began to be used as a national public language. At that time, not only hansi but also poetry from several other languages had been translated into Korean. Choi Nam-sun in the 1910s and Kim So-woel, Kim Eok, and Lee Kwang-su in the 1920s translated Chinese traditional hansi, focusing on famous Dang dynasty poetry from Tu Fu and Li Bai, etc. Choi Nam-sun's translation in the 1910s aimed to consider poetry as a written literature. On the contrary, Kim So-woel, Kim Eok, and Lee Kwang-su believed that Korean modern verse literature should be songs as well as poetry, and their translations in the 1920s aimed to create songs as spoken literature by focusing on orality and universality. Though Korean is now the language, the literary history of hansi continues in modern poetry.

The present situation and trend of China archives science (중국(中國) 당안학(檔案學)와 현황(現況) 및 발전추세(發展趨勢))

  • Feng, Fuj-Ling
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.1 no.1
    • /
    • pp.37-52
    • /
    • 2001
  • 1. establishment and development of China archives science: With the centuries-old history of archives and archives management, early China archives science came into being in 1930s, and the research pushed forward by archives enterprise has made great achievements since then. 1.1 Expanding research fields: Foundation

Global Online Leadership Strategies for Public and Private Sectors (공공기관 및 수출기업 글로벌 온라인 홍보전략)

  • Jeong, Euiseob;Moon, SunJoo;Kim, Chanho;Yun, Insik;Park, Boyana
    • Journal of Korea Technology Innovation Society
    • /
    • v.16 no.1
    • /
    • pp.1-19
    • /
    • 2013
  • A myriad of information production channels and medium including internet, social media, and multi media channels emerged, often with conflicting interests, disseminate unwanted and inaccurate information which could result in sudden severe public relations damage to the global companies with world class products if not dealt with in the professional way. Properly crafted and managed public relations thus should become the integral part of all organizations. In particular online public relations leadership becomes even more important to public organizations responsible for national branding and interests and to private sectors expanding into the global markets. The research aims to increase global competitiveness of the pubic and exporters by presenting the online leadership strategy 101. For this purpose, locally produced web sites are analysed both from technical and global marketing perspectives. From the research all web sites were classified into three types of ghost, wreck, and moron. The 2012 research showed that 99% was moron, followed by 67% wreck and 1% ghost. The research presents must strategies for global public relations and marketing. They include strategic planning, public relation training, white hat search engine optimization, web standards, web accessibility, mobile web site and the inbound marketing strategies.

  • PDF

Efficient Pseudo Random Functions for the e-seal Protection Protocol (e-seal 보안 프로토콜을 위한 효율적인 Pseudo Random Function)

  • Min Jung-Ki;Kang Seok-Hun;Chung Sang-Hwa;Kim Dong-Kyue
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06c
    • /
    • pp.274-276
    • /
    • 2006
  • e-seal은 RFID(Radio Frequency IDentification) 기술을 사용하여 원격에서 자동으로 봉인상태를 확인할 수 있는 컨테이너 봉인 장치를 말한다. RFID의 특징상 반도체 칩에 기록된 정보를 제 삼자가 쉽게 판독 및 변조할 수 있다는 취약점으로 인하여 활성화되지 못하고 있는 실정이다. ISO에서는 RFID의 취약점을 보안하기 위한 표준작업(ISO 18185)을 진행 중이다. 이 중, ISO 18185-4는 e-seal에 저장되는 자료나 리더와의 RF통신에서 데이터 보호를 위한 표준이다. 이와 관련된 연구로는 인증 프로토콜과 ISO 18185-4를 위한 보고서로 제출된 보안 프로토콜이 있다. 제안된 e-seal 보안 프로토콜을 적용하기 위해서는 e-seal과 리더 간의 데이터를 암/복호화할 키가 필요하지만, 키 서버를 통해 전달받은 마스터 키를 데이터 암/복호화 키로 바로 사용하는 것은 보안 상의 문제점을 야기할 수 있기 때문에 PRF(Pseudo Random Function)을 이용하여 마스터 키로부터 MTK(Mutual Transient Key)를 유도하고, MTK를 암/복호화 키로 사용해야 한다. 기존의 PRF는 일방향 해시 함수(MD5, SHA 등)를 기반으로 하는 HMAC[2. 3]을 일반적으로 사용하였다. 그러나 일방향 해시 함수는 e-seal과 같은 제한된 자원을 갖는 환경에 적합하지 않다. 따라서, 본 논문에서는 e-seal 보안 프로토콜을 위한 효율적인 PRF을 제안한다. 기존의 일방향 해시 함수 기반이 아닌 블록 암호화 알고리즘을 기반으로 하는 MAC을 이용하여 PRF을 보다 효율적으로 구현하였고, 블록 암호화 알고리즘은 AES를 선택 합성체 $GF((2^4)^2)$을 통해 하드웨어 모듈을 최적화 하였다. AES를 기반으로 하는 MAC은 HMAC에 비해 면적 및 처리율에서 뛰어난 결과를 보여주었다.<0.01).이상의 연구 결과, cook-chill생산 시 녹차 추출물의 첨가가 미생물적 품질유지에 효과가 있다고 사료되는 바 본 연구결과를 기초로 급식소에서 음식 생산 시 녹차 추출물 및 천연 항균성 물질 첨가에 따른 미생물적 품질 및 관능적 품질검사를 통한 레시피 개발에 관한 지속적인 연구가 수행되어야 하겠다.다.다리다보니 점심시간을 활용할 수 없게 되는 문제점에 대한 재검토가 필요하다. 따라서 차후 학교급식의 안전성 확보를 위한 급식환경 개선의 일환으로 식당공간 확보 시 신속한 시간 내에 급식이 가능하도록 넓은 공간과 쾌적한 환경의 식당 조성에 대해 관심을 기울여야 할 것으로 사료된다. 이상 여부를 반영하는 임상증상의 빈도가 높은 청소년기 남녀 중학생의 경우 아침과 저녁의 결식빈도 및 외식과 간식의 빈도가 높았고, 아침식사의 질과 체형만족도가 낮은 것으로 나타나 청소년의 건강과 식습관 및 체형만족도가 상호 관련성이 높은 것으로 나타났다. 따라서 본 연구 결과는 성장기 청소년의 건강 유지를 위하여 바람직한 식습관의 중요성을 재인식할 수 있었으며, 올바른 식습관 확립을 위한 영양교육의 중요성이 재확인되었다.경제적일 것으로 판단된다.er 90 % of good relative dynamic modulus of elasticity due to fineness of formation caused by the increase of the unit powder content and the improvement of flowability, without regard to the replacement of crushed stone fines. Therefore, it can be said that the usage of crushed stone fines can control the strength of super flowing concrete by replacement and re

  • PDF

Analysis of Domestic SNA-based Governance Study Trends (소셜네트워크분석을 통한 국내 거버넌스 연구 동향 분석)

  • Kim, Na-Rang;Choi, Hyung-Rim;Lee, Taihun
    • Journal of Digital Convergence
    • /
    • v.16 no.7
    • /
    • pp.35-45
    • /
    • 2018
  • Research on the establishment of new governance aimed at efficient policy planning and the implementation thereof by the government has been conducted in response to social changes. Nonetheless, governance is comprehensive and encompasses different meanings; it takes various forms in the process of its actual application. Therefore, systematic classification of research on governance and analysis on its research trend are required. Accordingly, three researchers who majored in policy sciences, business informatics, and library and information science, respectively, searched for theses related to governance published since 2016 from Research Information Sharing Service and conducted a social network analysis (SNA) on them. According to their research results, the main research topics were largely classified into collaborative governance and local governance. Keywords throughout the topics included network, participation, conflict, and trust in line with the characteristics of governance. Representative subjects of governance included education, urban regeneration, and the environment. Further, measurement of betweenness centrality showed local governance was a main topic for convergent research. This study will lead to a greater understanding of research on governance and help activate such research. One limitation of this study is that it analyzed only theses with the keywords but not all theses on governance. Follow-up research should analyze all theses on governance and statistically verify them with SNA indexes.

Extending StarGAN-VC to Unseen Speakers Using RawNet3 Speaker Representation (RawNet3 화자 표현을 활용한 임의의 화자 간 음성 변환을 위한 StarGAN의 확장)

  • Bogyung Park;Somin Park;Hyunki Hong
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.7
    • /
    • pp.303-314
    • /
    • 2023
  • Voice conversion, a technology that allows an individual's speech data to be regenerated with the acoustic properties(tone, cadence, gender) of another, has countless applications in education, communication, and entertainment. This paper proposes an approach based on the StarGAN-VC model that generates realistic-sounding speech without requiring parallel utterances. To overcome the constraints of the existing StarGAN-VC model that utilizes one-hot vectors of original and target speaker information, this paper extracts feature vectors of target speakers using a pre-trained version of Rawnet3. This results in a latent space where voice conversion can be performed without direct speaker-to-speaker mappings, enabling an any-to-any structure. In addition to the loss terms used in the original StarGAN-VC model, Wasserstein distance is used as a loss term to ensure that generated voice segments match the acoustic properties of the target voice. Two Time-Scale Update Rule (TTUR) is also used to facilitate stable training. Experimental results show that the proposed method outperforms previous methods, including the StarGAN-VC network on which it was based.