• Title/Summary/Keyword: Software service

Search Result 2,464, Processing Time 0.035 seconds

Development and application of software education programs to improve Underachievement

  • Kim, Jeong-Rang;Lee, Soo-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.1
    • /
    • pp.283-291
    • /
    • 2021
  • In this paper, we propose the development and application of a software education program for underachievers. The software education program for underachieving students was developed in consideration of the characteristics of learner's suffering from underachievement and the educational effects of software education, and is meaningful in that it proposes a plan to improve the learning gap in distance learning. Learners can acquire digital literacy and learning skills by solving structured tasks in the form of courseware, intelligent tutoring, debugging, and artificial intelligence learning models in educational programs. Based on the effects of software education, such as enhancing logical thinking ability and problem solving ability, this program provides opportunities to solve fusion tasks to underachievers. Based on this, it is expected that it can have a positive effect on the overall academic work.

A Study of College Students Local Volunteering Activity Making Use of Software Creativity Donation

  • Lee, KyungHee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.6
    • /
    • pp.181-188
    • /
    • 2022
  • This study analyzed the effectiveness of sharing activities through software creative sharing classes. The purpose is to find a way for related activities to be carried out continuously. For this study, pre and post were test on changes in self-esteem, responsibility, and sense of community targeting 25 university students in Chungnam. The collected data were analyzed with SPSS 24. The results derived from this study are as follows. First, the self-esteem was significantly higher after the software creative sharing class than before. Second, the responsibility was significantly higher after the software creative sharing class compared to the prior. Third, the sense of community was found to be significantly higher after the software creative sharing class than before. Therefore, it was found that the software creative sharing class had a positive effect on self-esteem responsibility and sense of community. Based on these data, a method to expand continuous participation in talent sharing was suggested.

A Study on the Primary Factors of Internal and External Competency for Improving Performance of Small and Medium Software Company (중.소 소프트웨어 기업의 성과 향상을 위한 내.외부 역량 요인에 관한 연구)

  • Yoo, Sang-Jun;Ki, Byoung-Gun;Choi, Jong-Hwa;Leem, Choon-Seong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.1
    • /
    • pp.17-31
    • /
    • 2009
  • The importance of software has been growing rapidly owing to the development of various Internet and e-business applications. The traditional approaches to software evaluation are based on the development process perspective, and their major concerns are no strongly related to use or customer-oriented evaluation of software. According to resource-based theory, company's resource is consisted of human, technology, market value, and finance. Customer satisfaction improved by product satisfaction and service satisfaction. Based on the previous studies the factors of human resources, technology, customer satisfaction are selected to evaluate software company's competence This research suggests the factor effecting on sales performance. And then statistical methods are used for verifying relationship between the factor and sales performance.

Personal Information Protection Recommendation System using Deep Learning in POI (POI 에서 딥러닝을 이용한 개인정보 보호 추천 시스템)

  • Peng, Sony;Park, Doo-Soon;Kim, Daeyoung;Yang, Yixuan;Lee, HyeJung;Siet, Sophort
    • Annual Conference of KIPS
    • /
    • 2022.11a
    • /
    • pp.377-379
    • /
    • 2022
  • POI refers to the point of Interest in Location-Based Social Networks (LBSNs). With the rapid development of mobile devices, GPS, and the Web (web2.0 and 3.0), LBSNs have attracted many users to share their information, physical location (real-time location), and interesting places. The tremendous demand of the user in LBSNs leads the recommendation systems (RSs) to become more widespread attention. Recommendation systems assist users in discovering interesting local attractions or facilities and help social network service (SNS) providers based on user locations. Therefore, it plays a vital role in LBSNs, namely POI recommendation system. In the machine learning model, most of the training data are stored in the centralized data storage, so information that belongs to the user will store in the centralized storage, and users may face privacy issues. Moreover, sharing the information may have safety concerns because of uploading or sharing their real-time location with others through social network media. According to the privacy concern issue, the paper proposes a recommendation model to prevent user privacy and eliminate traditional RS problems such as cold-start and data sparsity.

Positional Accuracy Analysis of Permanent GPS Sites Using Precise Point Positioning (정밀절대측위를 이용한 상시관측소 위치정확도 분석)

  • Kang, Joon-Mook;Lee, Yong-Wook;Kim, Min-Gyu;Park, Joon-Kyu
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.26 no.5
    • /
    • pp.529-536
    • /
    • 2008
  • Researches about 3-D Positioning system using GPS were carried out many-sided by national organs, laboratories, the worlds of science. And most of researches were development of relative positioning algorithm and its applications. Relative positioning has a merit, which can eliminate error in received signals. But its error increase due to distance of baseline. GPS absolute positioning is a method that decides the position independently by the signals from the GPS satellites which are received by a receiver at a certain position. And it is necessary to correct various kinds of error(clock error, effect of ionosphere and troposphere, multi-path etc.). In this study, results of PPP(Precise Point Positioning) used Bernese GPS software was compared with notified coordinates by the NGII(National Geographic Information Institute) in order to analyze the positional accuracy of permanent GPS sites. And the results were compared with results of AUSPOS - Online GPS Processing Service for comparison with relative positioning.

Access Control Method for Software on Virtual OS Using the Open Authentication Protocol (개방형 인증 프로토콜을 이용한 가상 운영체제에 설치된 SW 접근통제 방안)

  • Kim, Sun-Joo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.12
    • /
    • pp.568-574
    • /
    • 2013
  • In recent years, IT companies offer various cloud services using hardware-based technologies or software-based technologies. User can access these cloud services without the constraints of location or devices. The technologies are virtualization, provisioning, and big data processing. However, security incidents are constantly occurring even with these techniques. Thus, many companies build and operate private cloud service to prevent the leak of critical data. If virtual environment are different according to user permission, many system are needed, and user should login several virtual system to execute an program. In this paper, I suggest the access control method for application software on virtual operating system using the Open Authentication protocol in the Cloud system.

Study on International Bases for Improving International Competitiveness of Korean ICT Industries (국내 SW기업의 해외진출을 지원하기 위한 해외거점 정책 연구)

  • Nam, Youngho;Kim, Inkyu;Yoon, Ilseon
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.1
    • /
    • pp.53-62
    • /
    • 2014
  • The research tries to find appropriate nations and cities of the international supporting centers according to Korean firms' requests. It also tries to find out proper designs of governance structure and strategic and operational control system of the center. Two methods are used to find out Korean firms' requests. One is the expert interviews and the other is the questionnaire survey. The email survey is sent to 120 firms of IT service, package software, telecom facilities and broadcasting equipment industries. Their opinions in addition to interview results are used as a basis of selecting potential regions for new centers and types of their services. According to survey results, southeast asia is the most preferred region and Indonesia, Vietnam, Thailand, Malaysia and Singapore are selected as potential nations for a location of the center in southeast asia. However, the survey result is not fully agreed with the interviewees' opinions. The interviewees tell that there are not much demand in nations with low purchasing power and low IT industry level. That is, Indonesia and Vietnam are not proper places for the centers.

Analysis of error data generated by prospective teachers in programming learning (예비교사들이 프로그래밍 학습 시 발생시키는 오류 데이터 분석)

  • Moon, Wae-shik
    • Journal of The Korean Association of Information Education
    • /
    • v.22 no.2
    • /
    • pp.205-212
    • /
    • 2018
  • As a way to improve the software education ability of the pre - service teachers, we conducted programming learning using two types of programming tools (Python and Scratch) at the regular course time. In programming learning, various types of errors, which are factors that continuously hinder interest, achievement and creativity, were collected and analyzed by type. By using the analyzed data, it is possible to improve the ability of pre-service teachers to cope with the errors that can occur in the software education to be taught in the elementary school, and to improve the learning effect. In this study, logic error (37.63%) was the most frequent type that caused the most errors in programming in both conventional language that input text and language that assembles block. In addition, the detailed errors that show a lot of differences in the two languages are the errors of Python (14.3%) and scratch (3.5%) due to insufficient use of grammar and other errors.

Analysis and prospect of North Korea's Cyber threat (북한의 사이버전 위협에 대한 분석과 전망)

  • Lee, Dae Sung;Ahn, Young Kyu;Kim, Minsu
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.11-16
    • /
    • 2016
  • In modern society, the development of Information and Communication Technology has given people a lot of opportunities. But on the other side cyber attack also gives enormous damage to people. Recently Korea has become the target of cyber attack. The threat of it is growing. Especially North Korea has committed hostile actions against South Korea. North Korea has recently attacked the computer networks of South Korea's important national facilities. The types of North Korea's cyber attacks include the followings. First, if we see it with the viewpoint of software, it tries to destroy or control the Internet, infects the networks with viruses, worms, Trojan Horse and Distributed Denial of Service. I suggest the following to solve the problem. First, South Korea should unify the organizations to respond to the attacks of North Korea, as North Korea has a unified organization for the cyber attack. Second, they should think about the establishment of "Cyber Terrorism Prevention Act" to systematically respond to the software attacks.

Implementation of an AAL2 processor for voice gateway application (음성 게이트웨이 응용을 위한 AAL2 프로세서 구현)

  • 이상길;최명렬
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.11C
    • /
    • pp.1152-1157
    • /
    • 2002
  • In this paper, a detailed procedure of development for an AAL2 processor widely used in voice gateway application is introduced. The processor supports CPS and SSCS with voice service and framed mode data service. It provides 4 ATM virtual connections, which include 1020 AAL2 channels. The processor has one UTOPIA Level 1 interface for an ATM cell interface and 4 TDM ports for a voice channel interface. The TDM ports carry PCM/ADPCM voice streams. Most AAL2 processors are implemented as software, or hardware and software, so its latency is large. But this processor has very low latency as to CPS and SSCS because all of them are implemented in hardware. Also, it allows not only loopback and switching of CPS packets, but loopback and switching of TDM channels. The key feature is that the internal structure of the CPS and SSCS in this processor seems like as each software function, so they are called whenever they are required. In addition, they are reusable for another design and are scalable for more channels.