• Title/Summary/Keyword: 정보기술 활동

Search Result 2,745, Processing Time 0.032 seconds

OCL Based Specification and Verification of Structural Constraints for UML Analysis Models (UML 분석 모델의 구조적 제약사항에 대한 OCL 기반의 명세 및 검증)

  • Chae, Heung-Seok;Yeom, Keun-Hyuk
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.2
    • /
    • pp.186-200
    • /
    • 2006
  • Analysis model focuses only on functional requirements and postpones nonfunctional requirements and implementation specific issues until subsequent design activities are undertaken. Based on the analysis models, the design activities are performed by refining and clarifying the analysis models. Thus, the quality of analysis models has a vast impact on the design models. Therefore, much effort should be taken to build correct analysis model. In this paper, we propose a set of structural constraints that analysis models of typical object-oriented development methods should satisfy. Three kinds of constraints are proposed: class related constraints, relation related constraints, and usage related constraints. For each constraint, formal definition and description with OCL are provided. In addition, through a case study with two medium-sired industrial systems, we demonstrated that the proposed approach can help to identify and correct serious deficiencies in object-oriented analysis models.

Review on the Terror Network in Smart Media Era (스마트미디어 시대의 테러네트워크에 관한 고찰)

  • Lim, You Seok;Kim, Sang Jin
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.85-93
    • /
    • 2013
  • Today, the structure of terrorist organizations in the form of a variety of network complexity are evolving. However, terrorist organization not combining randomly generated network but preferential attachment a network. So, it's research should be preceded a better understanding about the characteristics and type of terror network for a effective counter-terrorism policy of law enforcement. In addition, the appropriate response strategy have to technique establish in an era of smart media. In particular, homegrown terrorist attacks on unspecified people without boundaries of countries and regions unlike the traditional terrorism. Also, homegrown terrorism are violence and criminal activity by new various of religion, politics, philosophy. Besides the extreme members of homegrown terror networks went grow up through the evolutionary process in the age of smart media. Law enforcement agencies must identify the terrorist network at the national level. Therefore, terror networks evolving in the online space, forming a radical homegrown terror organizations have access to the network. Intelligence community track terrorist networks and to block the negative aspects of the smart media outlets should be considered.

Personalized Itinerary Recommendation System based on Stay Time (체류시간을 고려한 여행 일정 추천 시스템)

  • Park, Sehwa;Park, Seog
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.1
    • /
    • pp.38-43
    • /
    • 2016
  • Recent developments regarding transportation technology have positioned travel as a major leisure activity; however, trip-itinerary planning remains a challenging task for tourists due to the need to select Points of Interest (POI) for visits to unfamiliar cities. Meanwhile, due to the GPS functions on mobile devices such as smartphones and tablet PCs, it is now possible to collect a user's position in real time. Based on these circumstances, our research on an automatic itinerary-planning system to simplify the trip-planning process was conducted briskly. The existing studies that include research on itinerary schedules focus on an identification of the shortest path in consideration of cost and time constraints, or a recommendation of the most-popular travel route in the destination area; therefore, we propose a personalized itinerary-recommendation system for which the stay-time preference of the individual user is considered as part of the personalized service.

Development of Customized 3D Characters for Growth Management and Prediction of Adolescents Using Big Data (빅데이터를 활용한 청소년 성장관리와 예측을 위한 맞춤형 3D 캐릭터 개발 연구)

  • Choo, Hye-Jin;Ha, Seo-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.1
    • /
    • pp.250-257
    • /
    • 2018
  • Today, the integration of the rapid development of ICT and the smart devices moves our lives quickly into an online community environment through not only quick and easy information search but also various social media. Accordingly, individual activities in the smart media environment are pouring out vast quantities of data in many fields, accumulating a tremendous amount of data. The everyday data of individuals is reproducing different values from the previous ones, while suggesting new customized services that utilize them in various fields. Recently, big data utilization has attracted a great attention in the field of healthcare. Especially, development of healthcare service linked with mobile is expected to bring a new paradigm in this field. In this study, creation of a 3D avatar character model as a means to transfer information to individuals more efficiently is proposed in the development of mobile customized service for health promotion and growth prediction of children and adolescents, at the same time, an effective visual expression method to have a sense of immersion and unity is searched.

A Study on the Security Management System Model for the Information Security of the Aviation infrastructure (항공기반시설의 정보보호를 위한 보안관리체계 모델에 관한 연구)

  • Jung, Chang-Hwa;Lee, Joon-Taik;Chung, Dong-Keun
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.87-96
    • /
    • 2011
  • The importance of the security management system for the aviation infrastructure cannot be overemphasized. What is especially important on the security management system for it is the assessment that is detaild and systematic. This article presents a framework based on a Hanulcha-type security management system model for a Information security of the Aviation infrastructure. This system checks, estimates and analyzes the goal of security with effect, especially in case of the security-accident on the aviation infrastructure because this system model gives the integrated security assessment method.

Evolution of Internet Trademark Infringement in the U.S. (미국 인터넷상표권 침해관련 법률의 변화에 관한 연구)

  • Kang, Joon Mo
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.61-71
    • /
    • 2014
  • Global commerce is apparently here to bind Korean firms as well as Koreans. The advertising, buying and selling of goods and services recognizes no borders. As a result, enforcing territorially based trademark rights has become ever more challenging. Remote trademark owners who peacefully coexisted in a time before the internet and increasing globalism are now bumping heads. The internet also has made it easier for unscrupulous operators to deceive consumers and divert customers from established businesses by misappropriating trademarks on web-sites and in domain names. U.S. federal courts have been willing to help American businesses halt trademark infringements that reaches outside the United States. This is particularly true for e-business, via the internet, and the trend toward enforcement seems to be in favor of the trademark owner. This article discusses this trend as well as the extraterritorial enforcement of trademark rights by U.S. courts under the Lanham Act. It also offers suggestions for protecting valuable trademark rights worldwide. This paper will contribute to global Korean firms and Koreans who carefully read arguments in this valuable literature.

A Discriminant Analysis on the User Classification of Mobile Telecommunications Service and HSDPA Service Strategy (다중판별분석을 이용한 이동통신서비스 사용자 분류와 HSDPA 서비스 전략에 관한 연구)

  • Lee, Jun-Yub
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.5
    • /
    • pp.83-92
    • /
    • 2010
  • Along with the advance of industrial technology in mobile telecommunications and diversity in customer needs, today's Korean mobile telecommunication market has rapidly expanded due to stronger competition among businesses as well as increasing the number of subscribers. 3G roll-outs of mobile telecommunications service, so called "HSDPA" has seriously promoted marketing strategies among mobile telecommunication companies which led to move to the next generation customers. Understanding the competitive situation, mobile telecommunications companies are currently focusing on increasing sales per subscriber as well as increasing the number of subscribers as a solution to occupy the leading position in the mobile telecommunications industry in the future. The purpose of this study was to classify the customers in mobile telecommunications service with or without higher tendency of intention to subscribe and use the service using discriminant analysis. Through the discriminant analysis, discriminant function which classifying the critical user has been identified. The result of this study will give useful marketing strategies in competitive HSDPA mobile telecommunications market.

Design and Development of e-Mentoring System for Full Inclusion (완전통합교육 지원을 위한 전자멘토링 시스템 설계 및 구현)

  • Lee, Jae-Ho;Kim, Sung-Wan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.6
    • /
    • pp.91-99
    • /
    • 2010
  • The purpose of this study is to design and develop an e-mentoring system for full inclusion. Through the literature review of related studies, the e-mentoring performance model was drawn. Based on this model, an e-mentoring system was designed and developed. Especially the horizontal mentoring was mainly considered during the procedure. To evaluate the usability of the system, 2 system managers, 5 mentors, and 5 mentees were chosen and they were interviewed by researchers. Researchers used an interview instrument(10 items) consisting of mentoring support(cognitive support, affective support, adaptability) and technical support(convenience, accuracy, look & feel) categories. On the whole affirmative responses were given in both mentoring support and technical support areas. It can be concluded that the e-mentoring system is very effective in supporting full inclusion. In future it is recommended that several empirical studies of utilizing the e-mentoring should be performed.

Development and Effect Verification of U-learning based Leveled Reading Education Support System (U-러닝 기반 수준별 독서교육지원 시스템 개발 및 효과검증)

  • Kim, Jeong-Rang;Ma, DaI-Sung;Cheon, Kyung-Rok;Choi, Hyun-Ho;Ko, Yoon-Mi
    • Journal of The Korean Association of Information Education
    • /
    • v.13 no.1
    • /
    • pp.41-49
    • /
    • 2009
  • It's going to be ubiquitous environment which is able to use web pages independent of time and a place by recent development of mobile techniques. On this, we improved the leveled reading supporting system according to U-learning environment and make student to read on both Off-line and On-line through connecting to E-book service. So we developed the reading supporting system which can improve the interests in reading and reading skill and proved the effects. U-learning based leveled reading education support system could be helped develop the reading ability by raising the interest in the activities reading and after reading.

  • PDF

A Study on Taxation Electronic Commerce (전자상거래의 조세정책에 관한 연구)

  • Kim, Ju-Taek
    • Korean Business Review
    • /
    • v.15
    • /
    • pp.59-78
    • /
    • 2002
  • It is only 9 to 10 years since the use of internet became commercial. But electronic commerce is now a familiar form of commercial transaction. Though the ratio of electronic commerce compared to total commercial transaction is still low, it is certain that electronic commerce will be the major form of transactions in the future. In July 1, 1997, United States made a public "A Framework for Global Electronic Commerce" to set up Internet to be a duty free zone and declared to play the trigger role in getting the international discussion of "A Framework for Global Electronic Commerce". In July 8, 1997, EU also adopted "Bonn Declaration"-minimizing government regulations and imposing no new tax on electronic commerce. Focusing the international trend, we need to develop the tax policy that is suitable for our country situation as soon as we can. To be able to do that, we must make an endless effort like selecting professionals, making new administrative part and supporting the research.

  • PDF