• Title/Summary/Keyword: 컴퓨터 활용 교육

Search Result 2,130, Processing Time 0.028 seconds

Component Specification Using Z (컴포넌트 명세의 Z 활용)

  • Jang, Jong-Pyo;Lee, Sang-Jun;Kim, Byung-Ki
    • The Journal of Korean Association of Computer Education
    • /
    • v.3 no.2
    • /
    • pp.87-94
    • /
    • 2000
  • Software productivity doesn't satisfy the need of service of software users and software quality isn't improved. Moreover, we still have difficulty in software maintenance. As a plan to counteract solving this crisis, the technology that is called CBSE or Componentware is introduced. Componet Based Software Architecture, one of the technologies associated with CBSE, as a structural description of system, describes both the components composed system of and interaction among these components. Software Architecture provides the technology and the methodology of composition among components in the field of CBSE. is accepted one of core technologies. In this thesis, we analyse information necessary for component specification and then proposed that component specificaton activities using formal specification language Z which is verified with the ability of analysis and logicality. The proposed activities are composed of 9 tasks. By presenting specific 11 products, it is also proposed that component specification activities which is the base of CBSD(ComponentBased Software Development) for reusing.

  • PDF

Automatic Construction of Foreign Word Transliteration Dictionary from English-Korean Parallel Corpus (영-한 병렬 코퍼스로부터 외래어 표기 사전의 자동 구축)

  • Lee, Jae Sung
    • The Journal of Korean Association of Computer Education
    • /
    • v.6 no.2
    • /
    • pp.9-21
    • /
    • 2003
  • This paper proposes an automatic construction system for transliteration dictionary from English-Korean parallel corpus. The system works in 3 steps: it extracts all nouns from Korean documents as the first step, filters transliterated foreign word nouns out of them with the language identification method as the second step, and extracts the corresponding English words by using a probabilistic alignment method as the final step. Specially, the fact that there is a corresponding English word in most cases, is utilized to extract the purely transliterated part from a Koreans word phrase, which is usually used in combined forms with Korean endings(Eomi) or particles(Josa). Moreover, the direct phonetic comparison is done to the words in two different alphabet systems without converting them to the same alphabet system. The experiment showed that the performance was influenced by the first and the second preprocessing steps; the most efficient model among manually preprocessed ones showed 85.4% recall, 91.0% precision and the most efficient model among fully automated ones got 68.3% recall, 89.2% precision.

  • PDF

Effective resource selection and mobility management scheme in mobile grid computing (모바일 그리드 컴퓨팅에서 효율적인 자원 확보와 이동성 관리 기법)

  • Lee, Dae-Won
    • The Journal of Korean Association of Computer Education
    • /
    • v.13 no.1
    • /
    • pp.53-64
    • /
    • 2010
  • In this paper, we tried to enable a mobile device as a resource to access to mobile grid networks. By advanced Internet techniques, the use of mobile devices has been rapidly increased. Some researches in mobile grid computing tried to combine grid computing with mobile devices. However, according to intrinsic properties of mobile environments, mobile devices have many considerations, such as mobility management, disconnected operation, device heterogeneity, service discovery, resource sharing, security, and so on. To solve these problems, there are two trends for mobile grid computing: a proxy-based mobile grid architecture and an agent-based mobile grid architecture. We focus on a proxy-based mobile grid architecture with IP-paging, which can easily manage idle mobile devices and grid resource status information. Also, we use SIP(Session Initiation Protocol)to support mobility management, mobile grid services. We manage variation of mobile device state and power by paging cache. Finally, using the candidate set and the reservation set of resources, we perform task migration. The performance evaluation by simulation, shows improvement of efficiency and stability during execution.

  • PDF

Analysis of Preference Criteria for Personalized Web Search (개인화된 웹 검색을 위한 선호 기준 분석)

  • Lee, Soo-Jung
    • The Journal of Korean Association of Computer Education
    • /
    • v.13 no.1
    • /
    • pp.45-52
    • /
    • 2010
  • With rapid increase in the number of web documents, the problem of information overload in Internet search is growing seriously. In order to improve web search results, previous research studies employed user queries/preferred words and the number of links in the web documents. In this study, performance of the search results exploiting these two criteria is examined and other preference criteria for web documents are analyzed. Experimental results show that personalized web search results employing queries and preferred words yield up to 1.7 times better performance over the current search engine and that the search results using the number of links gives up to 1.3 times better performance. Although it is found that the first of the user's preference criteria for web documents is the contents of the document, readability and images in the document are also given a large weight. Therefore, performance of web search personalization algorithms will be greatly improved if they incorporate objective data reflecting each user's characteristics in addition to the number of queries and preferred words.

  • PDF

Statistical Examination and Improvement of the Internet Addition Testing Method for Adolescent - Focused on Young's Measurement (청소년 인터넷 중독 검사 방법의 통계적 고찰 및 개선 - Young의 척도를 중심으로)

  • Park, Chan-Jung;Kim, Hyung-Chul;Ko, Young-Min;Hyun, Jung-Suk;Kim, Cheol-Min
    • The Journal of Korean Association of Computer Education
    • /
    • v.13 no.4
    • /
    • pp.41-50
    • /
    • 2010
  • So far, the researches about the Internet addiction testing are diverse and enormous. However, since the testing factors have the same importance, there is no discrimination among the factors. In our paper, we analyze the problems of the existing researches by using Lisrel and data mining algorithms. Next, we propose an alternative for the Internet addiction testing. In order to accomplish these, we make an questionnaire consisted of Young's test and then, we asked to 440 primary and secondary school students. In addition, we analyzed the problems of Young's test with factor analysis and then, we distinguish more important items from others with J48 and PART. Finally, based on this analysis, we propose a method to diagnose addicted students and prescribe them.

  • PDF

Study on the mechanism for the dynamic traversing of multiple firewalls using the concept of one-time master key (일회용 마스터 키 개념을 이용한 다중 방화벽 동적 통과 메커니즘 연구)

  • Park, Hyoung-Woo;Kim, Sang-Wan;Kim, Jong-Suk Ruth.;Jang, Haeng-Jin
    • The Journal of Korean Association of Computer Education
    • /
    • v.13 no.5
    • /
    • pp.103-110
    • /
    • 2010
  • If an exterior computer wants to join the Grid/cloud computing platform for a while, all of the related firewalls' filtering rule should be immediately updated. As the platform of Internet application is gradually evolving into the Grid/Cloud environment, the R&D requirement for the dynamic traversing of the multiple firewalls by a single try is also increasing. In this paper, we introduce the new mechanism for the dynamic traversing of the multiple firewalls using the concept of the one-time master key that can dynamically unlock the tiers of firewalls simultaneously instead of the existed filtering rule based method like a lock management at each firewall. The proposed master keys are like one-time password, consisted of IP addresses, port numbers, and TCP's initial sequence numbers, and generated by end users not administrators. They're exchanged mutually in advance and used to make a hole at local-side firewalls for the other's packet incoming. Therefore, the proposed mechanism can function regardless of the number or type of firewalls.

  • PDF

Analysis of Performance Improvement of Collaborative Filtering based on Neighbor Selection Criteria (이웃 선정 조건에 따른 협력 필터링의 성능 향상 분석)

  • Lee, Soojung
    • The Journal of Korean Association of Computer Education
    • /
    • v.18 no.4
    • /
    • pp.55-62
    • /
    • 2015
  • Recommender systems through collaborative filtering has been utilized successfully in various areas by providing with convenience in searching information. Measuring similarity is critical in determining performance of these systems, because it is the criteria for the range of recommenders. This study analyzes distributions of similarity from traditional measures and investigates relations between similarities and the number of co-rated items. With this, this study suggests a method for selecting reliable recommenders by restricting similarities, which compensates for the drawbacks of previous measures. Experimental results showed that restricting similarities of neighbors by upper and lower thresholds yield superior performance than previous methods, especially when consulting fewer nearest neighbors. Maximum improvement of 0.047 for cosine similarity and that of 0.03 for Pearson was achieved. This result tells that a collaborative filtering system using Pearson or cosine similarities should not consult neighbors with very high or low similarities.

Design and Implementation of Smart Device Application for Instructional Analysis (스마트 디바이스 기반 수업분석 프로그램 설계 및 구현 -한국어 특성 반영과 교사활용도 증진을 위한 UI설계를 적용하여-)

  • Kang, Doo Bong;Jeong, Ju Hun;Kim, Young Hwan
    • The Journal of Korean Association of Computer Education
    • /
    • v.18 no.4
    • /
    • pp.31-40
    • /
    • 2015
  • The objective of this study is to develop and implement a smart device based instructional analysis application to enhance the efficiency of teaching in class. The main design features for this application are as follows: first, User Interface(UI) has been simplified to provide teachers a clear and easy-to-understand way to utilize the application. Second, the characteristics of Korean language were considered, such as sentence structure. Third, multi-aspect analysis is possible through adopting three analysis types - Flanders' interaction analysis, Tuckman's analysis, Mcgraw's concentration of instruction analysis. The practical instructional analysis application has been developed through this study, and this user-oriented application will be able to help teachers improve the quality of teaching in class. Also, this study can be a starting point for further researches on design principles of instructional analysis, especially with the recent technology and theories, such as a voice-recognition system, an edutainment applied instruction and an experiential learning.

A Study on Development of the Evaluation Model about Level of Security in National R&D Program (국가연구개발사업 연구보안수준 평가모델 개발에 관한 연구)

  • Bae, Sang Tae;Kim, Ju Ho
    • The Journal of Korean Association of Computer Education
    • /
    • v.16 no.1
    • /
    • pp.73-80
    • /
    • 2013
  • Government promotes that the strategy of national R&D converts from catch-up R&D type to leading R&D type for the future growth and national competitiveness according to the recent paradigm shift in the research and development. So the many national researches about foundation, source and core technology are actively being made. As a result of these researches, the security has become an important part of success factor in R&D. And so various security diagnosis and evaluation is being conducted about national R&D program. Existing the research security evaluation models are classified domains in terms of security management and created evaluation indicators according to the domains. However the models are inappropriate in case of researchers doing self-diagnosis of research security. This paper set up the domains in aspect of research management and then proposed the evaluation indicator of research security according to the domains. The evaluation indicator model that is suggested can be utilized in self-diagnosis of research security effectively.

  • PDF

A New Low-Cost Mutual Authentication Protocol in RFID based on Hash Function (해시함수 기반의 새로운 저비용 RFID 상호인증 프로토콜)

  • Bae, Woo-Sik;Lee, Jong-Yun;Kim, Sang-Choon
    • The Journal of Korean Association of Computer Education
    • /
    • v.14 no.1
    • /
    • pp.175-185
    • /
    • 2011
  • Recently RFID systems have been introduced in place of barcode systems to industries such as logistics, distribution, and manufacturing. Due to security vulnerabilities in wireless communication between the reader and tags, however, the authentication protocols for the communication have also been researched extensively. In order to solve the vulnerability of previously proposed protocols, this paper thus proposes an authentication protocol that satisfies the security requirements in the RFID system and minimizes the quantity of computation such as random number generation, transmitting the micro-time of databases. In addition, it is expected that the proposed cross authentication protocol is safe against replay attack, spoofing attack, traffic analysis, and eavesdropping attack when it is applied to the RFID system. Also, it has advantages such as providing a high level of security at a lower manufacturing cost.

  • PDF