• Title/Summary/Keyword: dissertation

Search Result 567, Processing Time 0.019 seconds

A Study on the Activation Plan for Legal Deposit in National Assembly Library of South Korea: Focusing on Thesis and Dissertation (국회도서관 납본 활성화 방안에 관한 연구 - 디지털 학위논문을 중심으로 -)

  • Lee, Seungmin
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.53 no.4
    • /
    • pp.73-93
    • /
    • 2019
  • This study empirically analyzed the recognition and current status of university libraries related to the legal deposit of thesis and dissertation and investigated the ways to activate legal deposit to National Assembly Library. As a result, most universities conduct legal deposit of thesis and dissertation. However, most librarians face difficulties resulted from the duplication of deposits to many institutions. In the case that the deposits are not made, the main reasons are the university library's policies, duplication and inefficiency of the deposit procedures, and the limitation of obtaining copyright agreements. In order to address these limitations and to maximize the social and informational values of thesis and dissertation, this research proposed approaches to legal deposit of thesis and dissertation, including strengthening digital deposit system through the establishment of independent legal deposit law, preparing the effective ways of preservation. constructing an integrated deposit system, and developing professional collection of thesis and dissertation which can consolidate National Assembly Library.

Literature Review for Work-Related Musculoskeletal Disorders based on Theses from 1990 to 2005 (작업 관련성 근골격계 질환 학위 논문 분석 - 1990년부터 2005년까지 -)

  • Rhie, In-Sook;Kim, Soon-Lae
    • Korean Journal of Occupational Health Nursing
    • /
    • v.14 no.2
    • /
    • pp.93-107
    • /
    • 2005
  • Purpose: The purpose of this study is to identify the trends of studies on work-related musculoskeletal disorder and to suggest the direction of future research. Method: 144 research thesis for a degree on work-related musculoskeletal disorder were systematic reviewed and published from Jan. 1990 to Mar. 2005. The analyzed using descriptive statistics, an actual number, percentage. Result: As its result the work-related musculoskeletal disorder research which is announced from domestic the doctorate dissertation at the 2004 year 42 the most many 144 dissertation middle most to be 129 in master degree dissertation was 15 in Ph D degree. Dissertation contents character the contents against the result relation that it analyzes especially and a condition and an obstacle was many most at 84. Research plan in most description investigation research 121 the dissertation field to be the especially public health (hygiene, industry and environment) at this 57 most many research object person distribution manufacturing industry in the research object one dissertation was many most at the 40. The tools which are used in each measurement in the question tool which it uses most the question price of land which uses the condition investigation ticket which it made from the NIOSH and the ANSI most many 33, the hazard which analyzes a work attitude in the tool which it uses the RULA was many most at 14. In the stress test tool social psychological healthy measurement PWI (Psychological Wellbeing Index) the dissertation which uses the Job Strain of the Karasek Model to be many most at 19 PWI (Psychological Wellbeing Index) 7 easy use. Work-related musculoskeletal disorder measurement hazard in physiological index and the machinery and tools which it uses there were 9 researches to use an electromyogram most plentifully. With the effect goes to a work-related musculoskeletal disorder they are 33 where the age is many most from general quality. From healthy act with the relation of smoking the year to be many from 16 dissertations. Work of the corpse an attitude (the attitude which is inappropriate) with 5 and the work market the work burglar is many most at 9, the society-support of 36 where the stress is many psychologically most, the stress and service also the most many duty discretion (authority and autonomy) is 6 at the duty demand boat song 9. The service career to be many is 22 of extraordinarily with relation of service. Conclusion: It is recommended the research which it sees being limited in only domestic thesis for a degree the international comparative study to become accomplished. It comes to think with the fact that it will be necessary to make the protocol which it conforms in the civil official guide the test researches for the protocol or arbitration program which is standardized are necessary. Prevention and the civil official of work relation bones and sinews standing total disease hazard scientific base one program is necessary with base.

  • PDF

Design on the Standard Metadata for the E-Dissertation (전자형태 학위논문을 위한 표준 메타데이터 설계)

  • Nam Young-joon
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.39 no.3
    • /
    • pp.263-284
    • /
    • 2005
  • This study aims to develop a standard set for metadata to describe E-dissertation. This standard is designed for interoperability and for convenience of integrated information retrieval. This will allow one to improve existing federated searches, create united databases, and provide greater consistency for researchers searching for thesis and dissertation at different institutions. The fourteen meta elements-nine from Dublin Core and four from local need-are proposed along with newly expanded meta elements, 'thesis.degree.name', 'thesis.degree.level', 'thesis.degree.discipline' and 'thesis.degree.grantor.'

Design and Implementation of a Real-time Integrated Analysis Framework based on Multiprocessor Search Modules against Malicious Codes (악성코드 대응 MPSM기반 실시간통합분석체계의 설계 및 구현)

  • Moon, Yoon Jong
    • Convergence Security Journal
    • /
    • v.15 no.1
    • /
    • pp.69-82
    • /
    • 2015
  • This dissertation introduce how to react against the cybercrime and analysis of malware detection. Also this dissertation emphasize the importance about efficient control of correspond process for the information security. Cybercrime and cyber breach are becoming increasingly intelligent and sophisticated. To correspond those crimes, the strategy of defense need change soft kill to hard kill. So this dissertation includes the study of weak point about OS, Application system. Also this dissertation suggest that API structure for handling and analyzing big data forensic.

Classification of submitted KSNMT dissertation (대한핵의학기술학회 투고 논문 분류)

  • Han, Dong-Chan;Lee, Hyuk;Hong, Gun-Chul;Ahn, Byeong-Ho;Choi, Seong-Wook
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.21 no.1
    • /
    • pp.65-69
    • /
    • 2017
  • Purpose KSNMT(Korea Society of Nuclear Medicine Technology) stepping first step in 1997, has published first journal related with nuclear medicine technology in 1985. With classifying In Vivo Session Dissertation reported in the entire journal, trend of the Dissertation will be studied. Materials and Methods Dissertations which published from 1985 to first half of 2016 in the journal are classified with presentation form and with scanner, And all the data is organized with Excel program. Through the data, the number of dissertations published in each year, the number of dissertation published in details, and keyword distributions in each period are analyzed. Results The number of In-vivo section dissertations was 1151 and the number of In-vivo section dissertations that have common subject with In-vitro section was 28. The number of In-vivo section dissertation in 1980s was 46, in 1990s was 149, in 2000 was 467 and from 2010 to the first half of 2016 was 517. The number of dissertation with original articles was 571, with abstract was 529, with symposium was 31, with special lecture was 25, with review was 11, with interesting image was 7, with poster was 3 and with case report was 2. With symposium and special lecture excluded, which count 56, the number of dissertation with PET was 319, with Planar was 302, with SPECT was 172, with radiopharmaceutical was 113, with guard and safety management 103, with BMD was 28, etc. was 86. The number of dissertation about oncology was 201, about scanner was 179, about cardiovascular and circulatory system was 102, about safe environment was 82, about musculoskeletal system was 76, about nervous nuclear medicine was 66, about quality assurance was 61, about genitourinary system was 56, about endocrine system was 49, about digestive system was 44, about Therapy, about industrial safety was 24, about molecular imaging was 15, infection and inflammation was 9, about respiratory system was 8 and etc. was 108. The mostly used keyword through 1999 to 2005 was PET and through 2006 to 2016 was PET/CT. Conclusion To encourage various dissertations to be submitted, Korea Society of Nuclear Medicine should analyze date about not only about dissertations that are already published, but also about various research materials. Moreover, Korea Society of Nuclear Medicine also have to provide technical support such as sharing big data from homepage and systematical support to its member to publish dissertation that has high impact factor. It is important each individual researcher to have continuing effort as well as each organization cooperation.

  • PDF

Seismic Retrofit of the Public Facilities Using the Wrapping Composite Plate (래핑 복합플레이트를 이용한 공공시설의 내진보강)

  • Park, Choon-Wook
    • Journal of Korean Association for Spatial Structures
    • /
    • v.23 no.3
    • /
    • pp.45-55
    • /
    • 2023
  • The purpose of this study has a purpose to evaluate shear ability, ductility and energy dissertation of specimens that is to be applied to jacket using wrapping method. The experiments was conducted as a condition that simultaneously applied axial load and transverse force. The results of experiments represent story-displacement ratio, the stiffness, energy dissertation, plastic rotation which mean seismic resistance ablity on structure. And It represents the form of crack ditribution and failure in extreme stages. Based on the results of this experiment, Design examples are given to show the performance evaluation for the column reinforcing of old school buildings using nonlinear analysis is going to be conducted. Therefore, it is possible to apply the seismic retrofit method to public facilities.

A Comparative Study on the Evaluation of Process Capability for Non-Normal Distributions (비정규분포에 대한 공정능력 평가에 관한 비교 연구)

  • 이상용;채규용
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.5 no.3
    • /
    • pp.77-86
    • /
    • 2000
  • The main objectives of this dissertation is to propose a forth generation index C for the case where the target value T is not equal to the midpoint of the specification limits (i.e. asymmetric tolerances), and show that this index is more sensitive compared to the standard PCI's in detacting small shifts of the process mean from the target value. In conclusion, in this dissertation , a new methods for estimating a measure of process capability for non-normally distributed variable data is proposed using the percentage nonconforming.

  • PDF

Users' Perception on Theses and Dissertation Services (학위논문 이용현황과 활성화 방안에 관한 연구)

  • Shin, Yu-Ri;Chung, Eun-Kyung
    • Journal of Information Management
    • /
    • v.40 no.1
    • /
    • pp.29-46
    • /
    • 2009
  • Theses and Dissertation(TD) have been considered one of valuable scholarly resources, while there have existed some limitations to collect, organize, and provide them. The purpose of this study is to investigate users' perception on six TD services from five institutions and to propose improvement strategies. Six TD services includes National Library, National Assembly Library, RISS, dCollections, NDSL, and Council of Theses and Dissertation Common Use. Based on the survey results from 151 users, the findings of this study identified that National Assembly Library and RISS were preferred by users. In addition, users preferred keyword, full text, department, abstract, table of contents, as well as title and author over other bibliographic information. More importantly, users needs were placed on whether specific TD services provide full text or not. In case that is not possible to provide full text, users have a preference for full text link information. As a result, in order to improve the TD services, service promotion activities, diverse access points, and full text provision are desirable.

IP Spoofing 대응 기능을 가진 방화벽 시스템 구현

  • 최석윤;김중규
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 1997.03a
    • /
    • pp.163-181
    • /
    • 1997
  • This dissertation provides a theroetic study on the network security in general , the firewall in particular . In fact, the firewall has been recognized as a very promising option to obtain the security in the real world network environment . The dissertation provides a thorough theoretic investigation on the various problems raised in the computer network, and also explores a methodology of the security against IP spoofing. Moreover, it investigates a systematic procedure to make analysis plans of the firewall configuration. Based on the above investigation and analysis , this dissertation provides two approaches to network security, which address a number of issues both at the network and at application level. At the network level. a new methdo is proposed which uses packet filtering based on the analysis of the counter plot about the screen router. On the other hand at the application level, a novel method is exlored which employs security software , Firewall-1, on Bastion host. To demonstrate the feasibility and the effectiveness of the proposed methodologes, a prototype implementation is made. The experiment result shows that the screen router employing the proposesed anti-IP spoofing method at the network level is effective enough for the system to remain secure without being invaded by any illegarl packets entering from external hackers. Meanwhile , at the application level. the proposed software approach employing Firewall -1 is proved to be robust enough to provent hackings from the outer point to point protocol connection. Theoretically, it is not possible to provide complete secuirty to the network system, because the network security involove a number of issues raised from low level network equipments form high level network protocol. The result in this dissertation provides a very promising solution to network security due to its high efficiency of the implementation and superb protectiveness from a variety of hacking.

Intranet을 위한 방화벽 시스템구현에 관한 연구

  • 최석윤;김중규
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.2 no.1
    • /
    • pp.103-123
    • /
    • 1997
  • This dissertation provides a theoretic study on the network security in general , the firewall in particular. In fact the firewall has been recognized as a very promising option to obtain the security inthe real work network environment . The dissertation provides a throuth theoretic investigation on the various problems raised in the computer network, and also explores a methodology of the security against IP spoofing. Moreover, it investigates a systematic procddure to make analysis and plans of the firewall configuration . Based on the above investigation and analysis, this dissertation provides two approaches to network security , which address anumber of issuesboth at the network and at applicatino level. At the network level, a new method is proposed which uses packet filtering based on the analysis of the counter plot about the screen router.On the other hand, at the application level, a novel method is explored which employs secureity software. Firewall-1 , on Bastion host. To demonstrate the feasibililty and the effectiveness of the proposed methodologties , a prototype implementation is made The experiment result shows that the screen router employing the proposed anti-IP spoofing method at the network level is effective enough for the system to remain secure without being invaded by any illegal packets entering form external hackers. Meanwhile , at the application level, the proposed software approach employing Firewall-1 is proved to be robust enugh to prevent hackings from the outer point the point protocal connnection . Theoretically, it is not possible to provide complete security to the network system, because the network security involve a number of issues raised form low level network equipments form high level network protocol. The result inthis dissertation provides a very promising solution to network security due to its high efficiency of the implementation and superb protectiveness from a variety of hacking.