• Title/Summary/Keyword: 컴퓨터가이드

Search Result 302, Processing Time 0.03 seconds

A study of Analysis Method of Human Factors for Operation Improvement (운용성 향상을 위한 인적 요소 분석 방법에 관한 연구)

  • Chung, SungHak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.7
    • /
    • pp.57-67
    • /
    • 2013
  • This study suggests for effective operation of systematic analysis method for human factors which is based on the requirement architecture framework a requirement process to manage requirements for improvement is discussed, such as in requirements generation, database construction, management of experimental design, and management of the design traceability. For the objectives, we analyzed the method construct of the starting point views of user requirement which is adopted the requirement architecture concept to cover the whole activities required to do and the human factors guidelines and standards are suggested for verification and validation of the develop requirements. It is getting more attention as the operation of the enabling systems goes up these days. Throughout the propose of this study, human factors requirement database design presented in operational environment system for enabling system which is based on case study using a computer aided se tool. This study will be contributed to how the operational requirement database for the enabling system and operational human factors can be constructed in an integrated system design fashion.

An Vulnerability Analysis and Countermeasures for Security in Outdoor Risk Management System based on IoT Technology

  • Jee, Sung-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.7
    • /
    • pp.85-92
    • /
    • 2020
  • Following the development of Internet of Things (IoT) technology, the scope of application of IoT technology is expanding to industrial safety areas that detect and prevent possible risks in outdoor environments in advance, away from improving the convenience of living in indoor environments. Although this expansion of IoT service provides many advantages, it also causes security problems such as data leakage and modulation, so research on security response strategies is being actively carried out. In this paper, the IoT-based road construction risk management system in outdoor environment is proposed as a research subject. As a result of investigating the security vulnerabilities of the low-power wide-area (LPWA, BLE) communication protocol applied to the research targets, the security vulnerabilities were identified in terms of confidentiality, integrity, and availability, which are the three major elements of information security, and countermeasures for each vulnerability were proposed. This study is meaningful in investigating and analyzing possible vulnerabilities in the operation of the IoT-based risk management system and proposing practical security guidelines for each vulnerability.

Design and Development of WBI Contents: A Goal-based Scenarios (GBS) Model Approach (Goal-based Scenarios(GBS) 모형을 적용한 웹기반 교육용 컨텐츠의 설계 및 개발 연구)

  • Cho, Kyoo-Lak;Cho, Young-hoan;Kim, Meekyoung;Sung, Bongsik
    • The Journal of Korean Association of Computer Education
    • /
    • v.7 no.5
    • /
    • pp.9-21
    • /
    • 2004
  • In spite of the strong request that Internet, a new IT technique, should be extensively used in classroom settings, WBI is not still wide spread. One possible reason is that most WBIs developed so far are not qualitatively different from the traditional classroom ones and various design models for WBI are unknown. Developing a WBI program according to Goal-based Scenarios (GBS), a constructivistic instructional design model, this study offers a useful case for the design and development of WBI to educators and implementers. The program developed embodied seven important components of the GBS model. The development process also included needs assessment, task analysis, and learner and environment analysis, which are the basic components of the domain of instructional design. The GBS development case in this article will provide concrete guidelines to educational practitioners who have an intention to create a new type of WBI in schools as well as in corporate.

  • PDF

Designing Content Elements of the Programming Curriculum as a Instrumental Subject for Gifted Science High School (과학영재 고등학교 도구교과로서의 프로그래밍 교육과정 내용요소 설계)

  • Kim, JongHye
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.4
    • /
    • pp.1-11
    • /
    • 2014
  • In this study, contents of programming curriculum were designed as instrumental subjects for scientifically gifted students, not for IT gifted ones. Firstly, the programming curriculum consisted of 3 sections; Programming Understanding, Object-Oriented Programming, and Simulation Programming as a result of two semesters. Then, the lectures including project-based and problem-solving tasks were given to scientifically gifted students in a high school during one semester to verify whether they could apply the contents to studies and researches in math or science or not. As a result of this study, the students could improve numerical analysis and simulation program development capabilities in math or science as well as the problem-solving ability based on computational thinking. Moreover, it was proved that the students changed their perception about programing learning. They started to think that programing learning was necessary to studies and researches in math or science. The results of this study propose guideline to design programming curriculum as instrumental subjects for scientifically gifted students.

  • PDF

A Development of Android Based Debate Learning System for Divergent Thinking Cultivation (확산적 사고력 함양을 위한 안드로이드 기반 토론학습 시스템 개발)

  • Kim, Eun-Gil;Kim, Jong-Hoon
    • The Journal of Korean Association of Computer Education
    • /
    • v.14 no.1
    • /
    • pp.137-146
    • /
    • 2011
  • Edward de Bono's six thinking hats is effective to increase the excellence of the thinking and cultivate divergent thinking. In particular, this method is effective in finding a reasonable solution through analyzing issue from a variety of perspective. In this paper, we developed the system for an effective debate learning that student's own ideas based on six thinking hats are shared and expressed in speech and images through Android devices sensors. We analyzed the tools and guidelines by making design structural model for system design. The developed system was evaluated by the teacher through demonstration and practice and we analyzed through evaluation results the effectiveness and the improvement of the system. The evaluation results were analysed that the developed system is more effective improve motivation and debate ability than web based debate learning system.

  • PDF

Current Status of Information Security against Cyber Attacks in Universities and Its Improvement Methods (사이버 공격에 대비한 대학의 정보보안 현황 및 개선 방안)

  • Kang, Young-Sun;Choi, Yeong-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.12
    • /
    • pp.215-225
    • /
    • 2011
  • This paper suggests several methods of improving information securities of universities through the investigations of the current status of information securities in universities, which is becoming a hot topic in knowledge and information societies. In this paper, universities were randomly selected according to their size, and surveyed through email questionnaire to the persons in charge of security in each university, and 27 universities and 18 colleges were replied. From the survey results we confirmed that the pre-prevention is the most important thing in securing information assets, also in universities, and, in this paper, systematic support must be strengthened to establish a comprehensive security management policy and guidelines for the universities, and the importance of information assets and the necessity of security needs to be shared with the members in the universities. Moreover there must be full administrative and financial support, including recruitment and training of information security professionals and the establishing a separate security division.

A Method of Auto Photography Composition Suggestion (사진의 자동 구도 보정 제시 기법)

  • Choi, Yong-Sub;Park, Dae-Hyun;Kim, Yoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.1
    • /
    • pp.9-21
    • /
    • 2014
  • In this paper, we propose the auto correction technique of photography composition by which the eye line is concentrated and the stable image of the structure can be obtained in case the general user takes a picture. Because the general user photographs in most case without background knowledge about the composition of the photo, the subject location is not appropriate and the unstable composition is contrasted with the stable composition of pictures which the experts take. Therefore, we provide not the method processing the image after photographing, but he method presenting automatically the stable composition when the general users take a photograph. The proposed method analyze the subject through Saliency Map, Image Segmentation, Edge Detection, etc. and outputs the subject at the location where the stable composition can be comprised along with the guideline of the Rule of Thirds. The experimental result shows that the good composition was presented to the user automatically.

A study on the Stress of Using Social Networking Services and Its Discontinuance Intention (소셜네트워크서비스(Social Network Service) 사용의 스트레스와 사용중단의도에 관한 연구)

  • Park, Kyung-Ja;Park, Seung-Bong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.12
    • /
    • pp.275-285
    • /
    • 2014
  • The development of ICT has promoted the infusion of 'social,' which is not only 'personal,' but also strengthens social connection and communication; and SNS lies in the center of the infusion. Although SNS has been positioning itself as a significant domain in our lives based on the developed technologies, such as openness, extendibility and real-time, it has caused social concerns due to unexpected side effects. Therefore, this study aims to identify the stressors causing SNS stress and the factors influencing discontinuance of SNS. As a result, 5 factors including 'techno-overload,' 'techno-invasion,' 'techno-insecurity,' 'techno-complexity' and 'pace of change' were found to be SNS stressors. It is thought that this study would provide an academic implication for the future studies of stress and discontinuance related to SNS and a guideline for establishing practical strategies.

Light-Weight Design of Automotive Torque Strut Based on Computer Aided Engineering (컴퓨터 시뮬레이션을 이용한 자동차용 Torque Strut의 경량 설계)

  • Kim, Kee Joo
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.41 no.10
    • /
    • pp.975-981
    • /
    • 2017
  • Savings in weight using lightweight materials such as aluminum alloy can lead to increase fuel economy. However, compared to steel, aluminum alloys have a lower strength for an equivalent life cycle. To reduce the weight of automobiles, research is being performed on the fabrication of lighter and stronger torque struts without having to sacrifice the safety of automotive components. In this study, a weight reduction design process for torque struts is proposed that is based on varying von-Mises stress contours using an aluminum alloy (A356) having a tensile strength of 245 MPa, instead of STKM11A steels. The optimized design can reduce the weight of the original steel torque strut by over 42% and it can contribute to the design of light-weight components and to the safe design of torque struts.

Multimodality Image Registration and Fusion using Feature Extraction (특징 추출을 이용한 다중 영상 정합 및 융합 연구)

  • Woo, Sang-Keun;Kim, Jee-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.2 s.46
    • /
    • pp.123-130
    • /
    • 2007
  • The aim of this study was to propose a fusion and registration method with heterogeneous small animal acquisition system in small animal in-vivo study. After an intravenous injection of $^{18}F$-FDG through tail vain and 60 min delay for uptake, mouse was placed on an acryl plate with fiducial markers that were made for fusion between small animal PET (microPET R4, Concorde Microsystems, Knoxville TN) and Discovery LS CT images. The acquired emission list-mode data was sorted to temporally framed sinograms and reconstructed using FORE rebining and 2D-OSEM algorithms without correction of attenuation and scatter. After PET imaging, CT images were acquired by mean of a clinical PET/CT with high-resolution mode. The microPET and CT images were fusion and co-registered using the fiducial markers and segmented lung region in both data sets to perform a point-based rigid co-registration. This method improves the quantitative accuracy and interpretation of the tracer.

  • PDF