• Title/Summary/Keyword: 컴퓨터 활용 교육

Search Result 2,105, Processing Time 0.028 seconds

A Study on Traffic Analysis Using Bus Information System (버스정보시스템을 이용한 교통흐름 분석에 관한 연구)

  • Kim, Hong Geun;Park, Chul Young;Shin, Dong Chul;Shin, Chang Sun;Cho, Yong Yun;Park, Jang Woo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.9
    • /
    • pp.261-268
    • /
    • 2016
  • One of the most comfortable transportation in our day to day life is the bus, which provides real time information. In order to obtain reliable information on the arrival time of this information, BIS (Bus Information System) needs to analyse the main factor for the traffic environment. To manage the system, regional information analysis by local municipalities should be prioritized. In this paper, we analyse the features that are expected to affect traffic environment by commuting the travel to school, market, tourism and other influences around Suncheon-si, which has the facilities for education, tourism and urban locality. Data cleaning is performed on the DB information that is being collected from characterization BIS, which is organized by day of the week, day and month, to analyse the key factors of the traffic flow. If this is utilized by applying a key factor to the real time information, it is expected to provide more reliable and accurate information.

A Study on Fuzzy Searching Algorithm and Conditional-GAN for Crime Prediction System (범죄예측시스템에 대한 퍼지 탐색 알고리즘과 GAN 상태에 관한 연구)

  • Afonso, Carmelita;Yun, Han-Kyung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.2
    • /
    • pp.149-160
    • /
    • 2021
  • In this study, artificial intelligence-based algorithms were proposed, which included a fuzzy search for matching suspects between current and historical crimes in order to obtain related cases in criminal history, as well as conditional generative adversarial networks for crime prediction system (CPS) using Timor-Leste as a case study. By comparing the data from the criminal records, the built algorithms transform witness descriptions in the form of sketches into realistic face images. The proposed algorithms and CPS's findings confirmed that they are useful for rapidly reducing both the time and successful duties of police officers in dealing with crimes. Since it is difficult to maintain social safety nets with inadequate human resources and budgets, the proposed implemented system would significantly assist in improving the criminal investigation process in Timor-Leste.

Analysis of Social Issues and Media-specific Characteristics Related to Presidential Records based on Semantic Network (언어 네트워크 기반 대통령기록물 관련 이슈 및 매체별 특성 분석)

  • Jung, Sang Jun;Yun, Bo-Hyun;Oh, Hyo-Jung
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.30 no.1
    • /
    • pp.181-207
    • /
    • 2019
  • This study analyzed social issues related to presidential records in press releases using semantic network analysis method. For this purpose, we 1) selected five major news medias in Korea - Chosun Ilbo, JoongAng Ilbo, Dong-A Ilbo, Hankyoreh, and Kyunghyang Newspaper; 2) collected relevant articles including the subject word "Presidential Records", and 3) analyzed issue trends based on timeline using semantic network. According to medias, the issue related to the presidential records were analyzed by comparing the specific keywords in terms of persons, entities, actions. At the results, It is possible to identify the reporting patterns and components of the presidential records related issues. And the difference of media characteristics according to news media tendency was derived.

A Study on the Characteristic Analysis of Local Informatization in Chungcheongbuk-do: Focus on text mining (충청북도의 지역정보화 특성 분석에 관한 연구: 텍스트마이닝 중심)

  • Lee, Junghwan;Park, Soochang;Lee, Euisin
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.10
    • /
    • pp.67-77
    • /
    • 2021
  • This study conducted topic modeling, association analysis, and sentiment analysis focused on text mining in order to reflect regional characteristics in the process of establishing an information plan in Chungcheongbuk-do. As a result of the analysis, it was confirmed that Chungcheongbuk-do occupies a relatively high proportion of educational activities to bridge the information gap, and is interested in improving infrastructure to provide non-face-to-face, untouched administrative services, and bridge the gap between urban and rural areas. In addition, it is necessary to refer to the fact that there is a positive evaluation of the combination of bio and IT in the regional strategic industry and examples of ICT innovation services. It has been confirmed that smart cities have high expectations for the establishment of various cooperation systems with IT companies, but continuous crisis management is necessary so that they are not related to political issues. It is hoped that the results of this study can be used as one of the methods to specifically reflect regional changes in the process of informatization.

The Improvement of Information Protection Service Cost Model in Public Institution (공공기관 정보보호서비스 대가 모델의 개선 방안)

  • Oh, Sangik;Park, Namje
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.7
    • /
    • pp.123-131
    • /
    • 2019
  • In this paper, related studies were investigated by dividing them into cost-benefit analysis, security continuity services, and SW-centric calculations. The case analysis was conducted on A institutions in the United States, Japan and South Korea. Based on this, an improvement model was prepared through comparison with the current system. The SCS(Security Continuity Service) performance evaluation system-based information protection service cost calculation model is proposed. This method applies a service level agreement(SLA) and NIST Cybersecurity framework that are highly effective through cost-effectiveness analysis and calculates consideration based on characteristics, performance criteria, and weights by information protection service. This model can be used as a tool to objectively calculate the cost of information protection services at public institutions. It is also expected that this system can be established by strengthening the current recommended statutory level to the enforceability level, improving the evaluation system of state agencies and public institutions, introducing a verification system of information protection services by national certification bodies, and expanding its scope to all systems.

Who Cares More about Security?: Effects of Personality Traits on PC Security Intention (누가 보안에 더 신경을 쓰는가?: 성격특성이 PC보안의도에 미치는 영향)

  • June-Young Kim;Tae-Sung Kim
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.99-114
    • /
    • 2018
  • Technical measures for computer security are essential, but they are not a sufficient condition for security. Therefore, a personal approach to user's security behavior should be developed. Personality, which is a human aspect, is a behavioral characteristic that characterizes each individual and facilitates prediction of how an individual will behave in certain situations. Protection motivation theory has been used extensively in the security research on human behavior. The present study discusses how protection motivation was formed from personality traits. Thus, organizations can refer the result of this study for their HRD and HRM concerns.

Perception of University Students on Nutrition Information According to Food & Nutrition Labeling Systems in Family Restaurant (패밀리 레스토랑의 영양표시제도 시행에 따른 대학생들의 영양정보에 관한 인식 연구)

  • Yang, Jung-Hwa;Heo, Young-Ran
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.42 no.12
    • /
    • pp.2068-2075
    • /
    • 2013
  • The purpose of this study is to investigate the perception of university students on nutritional information according to food and nutrition labeling systems. A total of 310 customers, who visited family restaurant, were surveyed by a self-recorded questionnaire from March 2006 to April 2011. A total of 286 respondents were surveyed; of the respondents, 108 were males and 178 were females. Two surveys were conducted on the perception of the respondent's health: once in 2006 and once in 2011. According to these surveys, 63.6% and 54% of respondents perceived themselves as unhealthy, respectively. When ordering a meal, respondents were more concerned with price rather than taste, nutrition, new menu items, and food presentation. Compared with 2006, in 2011 more respondents felt that family restaurants provided enough nutritional information and practical use of that information to their customers. When surveyed, respondents felt that the total calories played a significantly higher role in ordering food than foods with higher nutritional values. There was a significant increase in satisfaction with the current nutrition labeling system; in 2006, $2.87{\pm}0.99$, and 2011, $3.35{\pm}0.84$. There was also a significant increase in individuals who felt that there was a need for an ingredient labeling system; $3.68{\pm}0.9$ in 2006 and $4.32{\pm}0.61$ in 2011. There was also a higher demand for nutritional information; $2.85{\pm}0.66$ in 2006, $3.06{\pm}0.65$ in 2011. From these results, it was concluded that the nutrition labeling system adopted by family restaurants did not affect the degree of customers' interest in nutritional information. Contrast to the results, the amount and frequency of nutritional information provided to customers have increased continuously since 2006. Therefore, the nutrition labeling system and recommended dietary allowance should be expanded in order to promote a healthy diet.

A Study on the Game Addiction of Children with Domestic Violence Experience (가정폭력을 경험한 아동의 게임중독 연구)

  • Kim, Na-Ye
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.3
    • /
    • pp.145-156
    • /
    • 2015
  • The aim of this study is to identify whether the domestic violence experience of children has an impact on their game addition and to verify the direct effects and moderating effects of social support. The survey was conducted to the children who were 5th and 6th graders in Gwangju and Jeonnam. The responses from 328 subjects of domestic violence experience from were analyzed. The analytic results are as the following. When verifying the impact of a domestic violence experience of children on their game addiction, domestict violence was found as the key variable that has a negative impact on children's game addiction. The results indicated that children with higher levels of domestict violence more likely to have higher levels of game addiction. Furthermore, boy's addiction degree to game was higher than girls' and lower education levels of mother, higher grades were found to be associated with higher game addiction. The impact of children's social support on their game addiction was analyzed. The analytic results suggest that social support has a impact on their game addiction. In other words, higher social support means lower game addiction. The moderating effect of social support was analyzed. Social support check the moderating effect of domestic violence of children on their game addiction. The Implications of these findings were discussed.

A Study of International Confrontation on the Prevention of Cyber Crime (사이버범죄에 대한 국제적 대응방안)

  • Jeong, Jeong-Ile
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.323-354
    • /
    • 2005
  • As with the vast array of computer technology and its rapid development, along with the entry of the internet as one of the necessities of life, the so-called cyber space has become a vital component of our modern day living. While such cyber space has provided the society with much convenience and utility as to the gathering and acquiring of information, crimes involving cyber space has accordingly increased in both number and form, Nevertheless, the conventional law as existed before the development of the cyber space were unable to meet the demands of this new breed of crime, which inevitably led to the gap in the government ability to punish such criminals, Thus, in response to the rising number of cyber crimes, a large number of nations have either created or is in the process of committing human and financial resources to strengthen the investigative powers relating to cyber crimes and creating a new area of prohibiting such crimes. As a overview of cyber crime, (1)defines the terms, describes features of cyber crime, (2)explains the international prevention necessity of cyber crime, and (3)the necessity of legislating the cyber crime Fundamental Act (4)the recognition of the evidential values on the confiscated electronic records and reviews types of cyber crime including cyberterror. Lastly, emphasizes necessity on international cooperation for prevention of cyber crime as usual.

  • PDF

An Adaptive Server Clustering for Terminal Service in a Thin-Client Environment (썬-클라이언트 환경에서의 터미널 서비스를 위한 적응적 서버 클러스터링)

  • Jung Yunjae;Kwak Hukeun;Chung Kyusik
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.6
    • /
    • pp.582-594
    • /
    • 2004
  • In school PC labs or other educational purpose PC labs with a few dozens of PCs, computers are configured in a distributed architecture so that they are set up, maintained and upgraded separately. As an alternative to the distributed architecture, we can consider a thin-client computing environment. In a thin-client computing environment, client side devices provide mainly I/O functions with user friendly GUI and multimedia processing support whereas remote servers called terminal server provide computing power. In order to support many clients in the environment, a cluster of terminal servers can be configured. In this architecture, it is difficult due to the characteristics of terminal session persistence and different pattern of computing usage of users so that the utilization of terminal server resources becomes low. To overcome this disadvantage, we propose an adaptive terminal cluster where terminal servers ,ire partitioned into groups and a terminal server in a light-loaded group can be dynamically reassigned to a heavy-loaded group at run time. The proposed adaptive scheme is compared with a generic terminal service cluster and a group based non-adaptive terminal server cluster. Experimental results show the effectiveness of the proposed scheme.