• 제목/요약/키워드: 컴퓨터의자료

검색결과 2,732건 처리시간 0.029초

A Study on Nuclear Information Management System Utilizing Microcomputer (마이크로 컴퓨터를 이용한 원자력 분야 정보 관리 시스템 개발)

  • 김규선;김태승
    • Journal of the Korean Society for information Management
    • /
    • 제6권1호
    • /
    • pp.15-36
    • /
    • 1989
  • The r a p i d i n c r e a s e o f microcomputer technology has r e s u l t e d i n t h e broad a p p l i c a t i o n t o various f i e l d s . The purpose of t h l s paper 1s to design a computerized r e t r i e v a l system f o r nuclear information m a t e r i a l s using a microcomputer.

  • PDF

Application of MOOCs to High School Education (MOOCs의 고교 교육 적용 방안)

  • Choi, Seong-kwon;Lee, Tae-Wuk
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 한국컴퓨터정보학회 2019년도 제60차 하계학술대회논문집 27권2호
    • /
    • pp.215-218
    • /
    • 2019
  • 누구에게나 질 높은 강의를 무료로 수강할 기회를 제공하겠다는 MOOCs의 야심이 전통적인 교육방식에 변화를 불러일으키고 있다. 현재 대부분의 MOOCs 강의는 고등교육 수요자를 대상으로 하고 있지만 본 연구에서는 그동안 언급된 MOOCs의 장단점을 분석해서 고등학교에서 효과적으로 MOOCs를 활용할 방안을 탐구하였다. 그 결과, 전공 탐색의 기회와 학생부종합전형 활동자료로 활용하거나, 플립러닝 형태의 수업에서 강의자료로 활용하며 고교학점제의 시행에 따른 학생 선택 과목 확대에 대비하는 방안을 제안한다.

  • PDF

An Analysis of Security Requirement Based on Vulnerabilities in Cloud Computing System (클라우드 컴퓨팅 환경에서 취약점에 따른 보안 요구사항 분석)

  • Park, Min-Woo;Kim, Nam-Uk;Cho, Sinyoung;Eom, Jung-Ho;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 한국정보처리학회 2010년도 추계학술발표대회
    • /
    • pp.1312-1315
    • /
    • 2010
  • 본 논문은 클라우드 컴퓨팅 시스템의 필수적인 보안 요구사항에 대해 분석한다. 클라우드 컴퓨팅은 수 많은 자료와 방대한 자원을 다루는 시스템이다. 클라우드 컴퓨팅은 이와 같은 특징으로 인해 쉽게 해커의 공격 대상이 된다. 따라서 클라우드 컴퓨팅 산업에서는 무엇보다도 보안이 매우 중요한 요소이다. 본 논문에서는 잠재적인 위협으로부터 클라우드 컴퓨팅이 보유한 자료와 자원을 보호하기 위한 필수적인 보안 요구사항에 대해 분석한다.

Android Interactive Mobile Presentation (안드로이드 양방향 모바일 프레젠테이션 어플리케이션 개발)

  • Kwark, Ju-Hyung;Park, Se-Young;Lim, Chae-sung;Han, ik-joo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 한국정보처리학회 2011년도 추계학술발표대회
    • /
    • pp.1389-1392
    • /
    • 2011
  • 최근 스마트 기기의 보급화로 인해 많은 종류의 스마트기기용 어플리케이션이 개발되고 있다. 본 논문에서 다루는 안드로이드 OS(Android Operation System)를 사용한 양방향 모바일 프레젠테이션(Presentation) 이란 기존 일방적 전달방식의 프레젠테이션에서 모바일 플랫폼을 활용하여 청취자와 프레젠테이션 주최자간의 동일 자료를 통해, 제한적인 공간에서의 실시간적인 쌍방향 프레젠테이션 환경을 제공 해줄 수 있는 어플리케이션이다. 기존의 일방적인 방향으로 인해 생길 수 있는 청중들과의 커뮤니케이션의 개선과 발표 자료에 대한 가독성 저하의 문제를 해결하여 보다 발표자로 하여금 프레젠테이션의 효율을 높일 수 있도록 하였다.

Level Scale Interface Design for Real-Time Visualizing Large-Scale Data (대용량 자료 실시간 시각화를 위한 레벨 수준 표현 인터페이스 설계)

  • Lee, Do-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • 제13권2호
    • /
    • pp.105-111
    • /
    • 2008
  • Various visualizing methods have been proposed according to the input and output types. To show complex and large-scale raw data and information. LOD and special region scale method have been used for them. In this paper, I propose level scale interface for dynamic and interactive controlling large scale data such as bio-data. The method has not only advantage of LOD and special region scale but also dynamic and real-time processing. In addition, the method supports elaborate control from large scale to small one for visualization on a region in detail. Proposed method was adopted for genome relationship visualization tool and showed reasonable control method.

  • PDF

3D Seismic Data Processing Methodology using Public Domain Software System (공유 소프트웨어 시스템을 이용한 3차원 탄성파 자료처리 방법론)

  • Ji, Jun;Choi, Yun-Gyeong
    • Geophysics and Geophysical Exploration
    • /
    • 제13권2호
    • /
    • pp.159-168
    • /
    • 2010
  • Recent trend in petroleum/gas exploration is an application of 3D seismic exploration technique. Unlike the conventional 2D seismic data processing, 3D seismic data processing is considered as the one which requires expensive commercial software systems and high performance computer. This paper propose a practical 3D seismic processing methodology on a personal computer using public domain software such as SU, SEPlib, and SEPlib3D. The applicability of the proposed method has been demonstrated by successful application to a well known realistic 3D synthetic data, SEG/EAGE 3D salt model data.

A Forecasting Model of Phytophthora Blight Incidence in Red Pepper and It′s Computer System (고추역병의 예찰모형과 컴퓨터 시스템)

  • 황의홍;이순구
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • 제3권1호
    • /
    • pp.16-21
    • /
    • 2001
  • Regression models were obtained on the base of the correlation between Phytophthora blight incidence in red pepper and the microclimate data obtained from automated weather station (AWS) during 1997 and 1998. A computer program (PEPBLIGHT) was constructed based on the model that the R2 value is highest among regression models. This computer program uses the microclimate data from more than one AWS through the common dialogue box easy and it is able provide disease forecasting information. In addition, it could be applied far other diseases and converts the microclimate data of AWS to the input data for Statical Analysis System (SAS). PEPBLIGHT was first developed for the forecasting computer system of red pepper blight in Korea. PEPBLIGHT is operated on the MS Windows, so that it is easy to use.

  • PDF

Development of PBL-Based Computer Application Instruction Model (문제중심학습 기반 컴퓨터활용 수업 모형 개발)

  • Lee, Kyung Mi
    • The Journal of Korean Association of Computer Education
    • /
    • 제16권2호
    • /
    • pp.29-37
    • /
    • 2013
  • In the environment of emphasizing creativity, computer application instruction model is in demand which is developed for the group discussion, enlarging the range of thinking, and creativity. The purpose of this study is to develop a PBL-based computer application instruction model concerning creativity after researching problems during the use of computer education by group. The theoretical background of class model is PBL, and the efficiency and creativity of class is considered while using web-mind map as the tool for the discussion and data sharing. As a result of applying the suggested model to the students enrolled in the production of presentation instruction, it made probabilistic meaningful outcome where complaint with communication, data sharing, role sharing, difference of contribution, excessive run-time and etc. were reduced.

  • PDF

Development of Elementary learning materials for Data error detection and correction (데이터 에러 검출과 수정에 대한 초등교육자료 개발)

  • Ko, Hyeongcheol;Kim, Chongwoo
    • Journal of The Korean Association of Information Education
    • /
    • 제22권1호
    • /
    • pp.169-176
    • /
    • 2018
  • CS Unplugged education at the base of computer science is emphasized as an instrument for teaching the basic principles of elementary SW education, but these materials for elementary education are very lacking. So We'll present the data error detection and correction materials for elementary school classes. Based on previous studies related to this topic, we developed learning materials for elementary higher grade students using Hamming code. We introduces the card magic in the introduction part. 'error detection and correction' learning materials based on the principle of Hamming code, were composed as activity-based education. The results of the questionnaire survey showed that it had a positive effect on improving learners' understanding of computer science.

A Study on the Chain of Custody for Securing the Faultlessness of Forensic Data (포렌식 자료의 무결성 확보를 위한 수사현장의 연계관리 방법 연구)

  • Lee, Gyu-an;Shin, young-Tae;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • 제11권6호
    • /
    • pp.175-184
    • /
    • 2006
  • Computer Forensics functions by defending the effects and extracting the evidence of the side effects for production at the court. Has the faultlessness of the digital evidence been compromised during the investigation, a critical evidence may be denied or not even be presented at the trial. The presented monograph will deliberate the faultlessness-establishing chain procedures in disk forensics, system forensics, network forensics, mobile forensics and database forensics. Once the faultlessness is established by the methods proposed, the products of investigation will be adopted as a leading evidence. Moreover, the issues and alternatives in the reality of digital investigation are presented along with the actual computer forensics cases, hopefully contributing to the advances in computer digital forensics and the field research of information security.

  • PDF