• 제목/요약/키워드: Group Context

검색결과 806건 처리시간 0.025초

무선 LAN 환경에서 단말 이동시 전송되는 AP간 WEP 키 전송 개선 방안 (Improvement of WEP Key transmission between APs, during STA Movement in Wireless Environment)

  • 송일규;홍충선;이대영
    • 정보처리학회논문지C
    • /
    • 제11C권2호
    • /
    • pp.219-228
    • /
    • 2004
  • 무선LAN(wireless Local Area Network)이란 옥내 또는 옥외 환경에서 무선으로 네트워크 환경을 구축하는 것을 말하며, 기술적인 측면에서는 허브(Hub)에서 PC(Personal Computer), 노트북PC, PDA 등 클라이언트까지 유선 대신 전파나 빛을 이용하여 네트워크를 구축하는 방식을 말한다. 현재, IEEE 802.11 WG(Working Group) 중에는 AP(Access Point)간의 표준화된 프로토콜을 개발하는 TGf(Task Group F)가 있다. 이 그룹에서는 서로 다른 제조업체에서 생산한 AP 간의 상호연동을 보장하기 위한 IAPP(Inter Access Point Protocol)를 제안하였는데, 이는 동일 서브네트워크 내의 서로 다른 AP간에 이동성을 보장하기 위한 프로토콜로, STA(Station)들이 이동할 때 재인증 과정을 거치지 않고 AP간의 Security Context 정보나 Layer 2 forwarding 정보를 공유함으로서 STA간의 seamless 연결성을 제공한다. 본 논문에서는 위의 AP간 메시지 전달 시 발생할 수 있는 보안성이 요구되는 iapp-move 요청, 응답 메시지를 이미 사용되고 있는 인증된 경로를 통해 전달함으로써 WEP키 등의 보안성이 요구되는 정보의 유출을 막고, 무선구간의 보안성을 제공하기 위해 공개키를 이용한 방안을 제시하고자 한다.

ELEMENTARY TOPICS ON WEAK POLYGROUPS

  • Davvaz, B.
    • 대한수학회보
    • /
    • 제40권1호
    • /
    • pp.1-8
    • /
    • 2003
  • In this paper, we further develop the weak polygroup theory, we define quotient weak polygroup and then the fundamental homomorphism theorem of group theory is derived in the context of weak polygroups. Also, we consider the fundamental relation $\beta$$^{*}$ defined on a weak polygroup and define a functor from the category of all weak polygroups into the category of all fundamental groups.s.

차세대 기록물 기술표준에 관한 연구 - ICA EGAD의 Record In Context를 중심으로 - (Analyzing the Next-generation Archival Description Standard: "Record in Context" of ICA EGAD)

  • 박지영
    • 한국기록관리학회지
    • /
    • 제16권1호
    • /
    • pp.223-245
    • /
    • 2016
  • ICA의 CBPS에서는 지난 20여년간 ISAD(G)와 ISAAR(CPF)와 같은 기록물 기술표준을 개발해 왔다. 그리고 최근에 ICA는 새로운 조직인 EGAD를 구성하여 기존의 기록물 기술표준을 통합하고 있다. EGAD가 개발 중인 기술표준의 명칭은 'Record in Context'(RIC)이며, 개념모형과 온톨로지로 구성된다. 그런데 EGAD는 RIC의 개발을 위해 ICA의 기존 기록물 기술표준뿐 아니라, 호주나 스페인, 핀란드에서 최근에 개정된 기록물 기술표준과 박물관 및 도서관 분야의 협력을 통해 개발된 FRBRoo도 참고하였다. 이에 본 연구에서는 국제적인 기록물 기술표준의 개정 동향을 살펴보고, 이와 같은 동향이 국내의 기록물 기술표준의 발전에 주는 시사점을 도출하였다. 기록물의 기술표준은 표준화된 기술요소의 정확한 입력지침을 넘어서, 상위의 개념틀을 제공하고, 이를 바탕으로 유연한 기록물 기술과 데이터 공유가 용이한 온톨로지를 제공하기 위해 개선되고 있었다. 앞으로는 국내의 기록물 기술표준도 정보환경의 변화를 수용하고, 문화유산관리기관 간의 협력을 증진시킬 수 있는 방향으로 발전해야 할 것이다.

교역지대 내에서 공유된 배움의 다양한 변주: 목공 학습 공동체 교사들의 사례를 중심으로 (Variations of Shared Learning in Trading Zone: Focus on the Case of Teachers in the 'Learning Community of Woodworking')

  • 정영희;신세인;이준기
    • 과학교육연구지
    • /
    • 제43권2호
    • /
    • pp.239-257
    • /
    • 2019
  • 이 연구에서는 '목공과학교육연구회'라는 교사연구회의 사례를 중심으로 서로 다른 배경의 교사들의 모여 형성한 교역지대 내에서 이루어지는 배움의 공유와 이 배움이 교육현장에서 다양하게 변주되는 과정을 탐색하였다. 이를 위해 '목공과학교육연구회'에서 활동한 8인의 교사들과 심층 면담을 하며 자료를 수집하고, 근거이론 패러다임 모형에 따라서 이 자료를 질적으로 분석하였다. 근거이론 모형에 따른 분석 결과 교사 연구회 실천의 인과적 조건은 '교역지대 진입의 다양한 맥락'이었고, 중심현상은 '교역지대에서의 배움'이었다. 맥락적 조건은 '경계물로서의 목공과 나만의 적용경험'으로 나타났고, 작용/상호작용 전략으로는 '다양한 현장 속 실천 노력과 영향요인들'이었다. 중재적 조건은 '교육현장에서의 실천 노력'이었다. 결과적으로 패러다임 모형의 결과는 '교역지대에서 공유한 배움의 새로운 실천'으로 나타났다. 또한 선택코팅 결과 교사 연구회의 실천은 '비교과 창의 체험형', '진로교육형', '교과교육형', '학교경영형'이라는 네가지 유형으로 나타남을 규명하였다. 이러한 연구 결과를 바탕으로 교사연구회라는 교역지대에서 이루어지는 교사들의 공유된 배움의 실천은 이들의 배움의 욕구를 충족시킬 뿐만아니라, 교사 개개인의 맥락 속에서 다양한 교수적 실천으로 변주되며 교육의 다양성과 질의 향상을 이끌 수 있음을 제언하였다.

아이디어 도출단계에서의 그룹의사결정지원시스템 효과성에 관한 연구 (An experimental study on effectiveness of group decision support systems in diea-generation)

  • 김성희;박흥국;최상현;박종학
    • 한국경영과학회지
    • /
    • 제20권1호
    • /
    • pp.11-26
    • /
    • 1995
  • We have used various information technologies (IT) in group decision-making for increasing effectiveness and satisfaction of group decision-making process. Recently, a new form of IT so called Group Decision supprot System (GDSS) was introduced into group decision-making process. Previous experimental studies about effectiveness of GDSSS have been inconsistent and the results were mixed. There was no empirical studies about GDSS in Korea. In this study, we divide two groups-GDSS supported group and traditional face-to-face group and investigate impacts of GDSS on group decision-making processes and outcomes. An idea generation task for operational action plan development, implementing GEO's strategic vision, served as the decision-making context. Supported GDSS is GroupSystems V, which had been developed by Univ. of Arizona. It was translated by Korean. According to the results, Number of nonredundant ideas in GDSS group is two or three times more than Non-GDSS grop. GDSS group feel more equal status, have better interpersonal relationship, have more confidence on group decision than Non-GDSS group. But satisfaction of participants on decision-making process and outcome has not showed a significant difference between two groups. Because all of participants in GDSS group were novice to GDSS. With this results we suggest further studies on transforming western type GDSS to Korean decision-making culture. It will be cornerstone for development of GDSS in Korean desision-making culture. It will be cornerstone for devlopment of GDSS in Korean decsion making culture environment.

  • PDF

자폐스펙트럼장애 아동의 의사소통기술 향상을 위한 사회적 상황 기반 음악극 적용 사례 (A Case Study of Social Context-Based Musical Play Program for Improving Communication Skills of Children With Autism Spectrum Disorder)

  • 모세희
    • 인간행동과 음악연구
    • /
    • 제19권2호
    • /
    • pp.27-53
    • /
    • 2022
  • 본 연구는 고기능 자폐스팩트럼장애(ASD) 아동을 대상으로 학교에서 보편적으로 경험하게 되는 사회적 상황을 기반으로 구성된 음악극을 적용하였을 때 의사소통기술에 어떠한 변화를 보이는 지 알아보고자 진행되었다. 본 연구에 적용된 음악극은 실제적 상황에 대한 이해, 음악 안에서의 목표 행동 및 언어적 표현의 습득, 역할극을 통한 상황적 맥락 내 목표 행동의 실제적 적용을 유도하는 단계적 구조로 구성되었다. 대상자는 평균 연령 9세의 ASD 아동 3명이며, 주 2회 40분씩 총 8회기의 그룹 중재가 진행되었다. 결과분석을 위해 또래 및 성인(즉, 연구자) 대상 의견 개시 및 조율 행동, 대상자 간 자발적 상호작용 행동을 관찰하였으며, 사회적 기술 평정척도 실시를 통해 중재 전후 일상생활에서 나타나는 사회적 행동에 변화가 있는지 비교하였다. 분석 결과, 모든 대상자는 또래 대상 의견 개시 및 조율 행동과 성인 대상 자발적 상호작용 행동이 증가한 것으로 나타났다. 반면 또래에게 나타나는 자발적 상호작용 행동과 성인 대상 의견 개시 및 조율 행동에 있어서는 대상자 언어 및 발달 수준에 따라 개별적인 차이가 있었다. 이러한 결과는 사회적 상황 기반 음악극이 ASD 아동이 경험하는 사회적 환경과 유사한 맥락을 제시함으로써 실제적으로 요구되는 의사소통 행동과 타인과의 상호작용 시 자신의 행동을 보다 효과적으로 조절하도록 촉진할 수 있는 가능성을 뒷받침한다. 또한, 본 연구는 ASD 아동의 사회적 의사소통 향상을 위한 중재의 범위를 확장하고, 다각적 전략을 제시했다는 데 그 의의가 있다.

COST AND OPERATIONAL EFFECTIVENESS ANALYSIS

  • Toomepuu Juri
    • 한국국방경영분석학회지
    • /
    • 제4권1호
    • /
    • pp.91-109
    • /
    • 1978
  • The paper discusses Cost and Operational Effectiveness Analysis (COEA) in the context of a military study system. The objectives of a study system, development of study programs, and management of studies are addressed. Basic cost-effectiveness models are presented and the COEA planning steps, analytical processes, and implementation discussed.

  • PDF

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • 제20권2호
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

웹기반 그룹의사결정지원시스템을 위한 다목적 의사결정 알고리즘 개발 (A Multi-Objective Decision Making Procedure for Web-based GDSS)

  • Kim, Jae-Kyeong;Cho, Yoon-Ho
    • 한국경영과학회지
    • /
    • 제27권2호
    • /
    • pp.15-31
    • /
    • 2002
  • This research suggests an interactive methodology for multiple objective linear programming problems to help the group select a compromising solution in the World Wide Web environment. Our methodology lessens the burden of group decision makers, which is one of necessary conditions of the web environment. Only the partial weak order of variables and objectives from the group decision makers are enough for searching the best compromising solution. For such a purpose, we expand the Dror and Gass algorithm to the group decision context. And we suggest the system architecture of a web-based GDSS for the Implementation of our methodology.

An Interactive Methodology for the Web-based GDSS

  • Kim, Jae-Kyeong;Cho, Yoon-Ho
    • 한국지능정보시스템학회:학술대회논문집
    • /
    • 한국지능정보시스템학회 2000년도 추계정기학술대회:지능형기술과 CRM
    • /
    • pp.375-383
    • /
    • 2000
  • This research suggests an interactive methodology fur multiple objective linear programming problems to help the group select a compromising solution in the World Wide Web environment. Our methodology lessens the burden of group decision makers, which is one of necessary conditions of the web environment. Only the partial weak order of variables and objectives from the group decision makers are enough for searching the best compromising solution. For such a purpose, we expand the Dror and Gass algorithm to the group decision context. And we suggest the system architecture of a web-based GDSS fur the implementation of our methodology.

  • PDF