• Title/Summary/Keyword: information weakness

Search Result 789, Processing Time 0.031 seconds

Progress and Problems in Korean School Library Policies (학교도서관정책의 추이와 과제: 인력정책을 중심으로)

  • Lee, Jae-Whoan
    • Journal of Korean Library and Information Science Society
    • /
    • v.47 no.3
    • /
    • pp.41-70
    • /
    • 2016
  • The purpose of this article is to discuss about the progress and problems in Korean school library policies. The emphasis is on identifying both distinctive features and indigenous limitations in policy-making process, and special concerns are with both side effects and backgrounds of its rough-and-ready human resource policy. This article intends to approach the human resource policy issues from the viewpoints of school librarians as well as those of policy makers. The final suggestion includes both strategies and methods to make up and intensify the weakness of Korean school library policies, with focusing on enhancing the work competency of school librarians as well as the policy capacity of school library association.

Quality Evaluation of Academic Library Automation Systems (대학도서관 자동화시스템의 품질평가)

  • Lee Jae-Whoan
    • Journal of Korean Library and Information Science Society
    • /
    • v.30 no.1
    • /
    • pp.1-29
    • /
    • 1999
  • This study intends to identify the current situations, and, to investigate the major problems of academic library automation in South Korea. Emphasis was on the quality evaluation of the present library automation systems from the perspectives of both librarians and end-users. Three most representative automation systems were chosen for a comparative analysis: Seoul National University's SOLARS, Postech's LINNET, and Pusan National University's PULIP. Each automation system was analyzed and compared [no another in terms of the development history, the system functions, and, the strength and weakness. The final suggestion includes the philosophy and strategies for the future development of academic library automation systems.

  • PDF

A Framework for Web Log Analysis Using Process Mining Techniques (프로세스 마이닝을 이용한 웹 로그 분석 프레임워크)

  • Ahn, Yunha;Oh, Kyuhyup;Kim, Sang-Kuk;Jung, Jae-Yoon
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.1
    • /
    • pp.25-32
    • /
    • 2014
  • Web mining techniques are often used to discover useful patterns from data log generated by Web servers for the purpose of web usage analysis. Yet traditional Web mining techniques do not reflect sufficiently sequential properties of Web log data. To address such weakness, we introduce a framework for analyzing Web access log data by using process mining techniques. To illustrate the proposed framework, we show the analysis of Web access log in a campus information system based on the framework and discuss the implication of the analysis result.

The Ubiquitous Model for Campus Environment (캠퍼스 환경을 위한 유비쿼터스 모델)

  • Yu, Lei;Hwang, Kyung-Min;Cho, Tae-Beom;Yoon, Hwa-Mook;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.887-890
    • /
    • 2007
  • Today, many universities are progressing research of ubiquitous campus for discrimination and the part universities constructed ubiquitous campus with telecommunication company. It is applied with campus service. But, Currently ubiquitous campus environment has two weakness. First one is Non-practicality cause of Not enough supplying related device for using service to student. And the other one is that can't support Student Oriented Service. In this paper, We studied on model that tan analysis ubiquitous utilization of student and can be Student Oriented Service. To resolve this, we realized practical service via analysis of User IT Infra.

  • PDF

A Design for Single Web Authentication at Network Service Foundation (네트워크 서비스 기반의 단일 웹 인증 설계)

  • Lee, Jae-Wan;Ban, Kyung-Sig;Kim, Hyoung-Jin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.457-460
    • /
    • 2007
  • Recently, Network companies have introduced security solutions to protect the network from intrusions, attacks and viruses but the network has still weakness and vulnerability. It is time to bring more stable and reliable authentication system that would meet the Internet user's need. In this study, Current broadband networks don't have hierarchic and stable authentication solutions. And so, an integrated and hierarchic system is needed to provide a various kinds of application services.

  • PDF

Analysis and Suggestions of the Librarians Public Servants in USA, UK and Korea (영미 및 한국의 사서직제 분석과 시사점)

  • Yoon Hee-Yoon
    • Journal of Korean Library and Information Science Society
    • /
    • v.36 no.2
    • /
    • pp.121-140
    • /
    • 2005
  • The purpose of this paper is to analyze the public servant and librarian position in USA, UK, and Korea and to give suggestions to improve the position classification of librarianship in Korea. Professional librarian positions in USA and UK are very useful to understand the excellency of position classification system. On the other hand, librarian positions in Korea is useful to catch the present situation of librarianship and its backwardness. This paper can use for the grounds of an improvement of the librarian position in Korea. In order to improve current position classification of librarianship. we have to overcome a theoretical and actual weakness of the libraries and librarians and to act as the main stream for position reform.

  • PDF

An Effective Backtracking Search Algorithm for the P2P Resources (효과적인 역 추적 P2P 자원 검색 알고리즘)

  • Kim, Boon-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.6
    • /
    • pp.49-57
    • /
    • 2007
  • The P2P distributed systems are proceeded various studies lively to use the idleness computing resources under the network connected computing environments. It's a general mean to communication from the peer of the shortest downloaded time among same target files to be searched. The P2P search algorithms are very important primary factor to decide a real downloaded time in the criteria to select the peer of a shortest downloaded time. However the peer to give resources could be changed into offline status because the P2P distributed systems have very weakness connection. In these cases. we have a choice to retransmit resources mainly. In this study, we suggested an effective backtracking search algorithm to improve the performance about the request to retransmit the resource.

  • PDF

A Study of Key Distribution for Security on VANET (VANET에서 보안성 향상을 위한 키 분배에 관한 연구)

  • Too, Do Kyeong;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.10
    • /
    • pp.2192-2198
    • /
    • 2012
  • VANET is a network environment which provides the communication between vehicles and between vehicle and RSU using wireless communication. VANET is very important to protect safety and life of people. Because of that, security is considered enough and certification is very important when messages exchanged between vehicles. Recently, Zhang proposed using Diffie-Hellman key exchange protocol that is method exchanging messages in VANET system through RAISE. But this is many problems on weakness from various attacks. In this paper, proposed the method that establish symmetric key using ECDH key exchange protocol and confirm safety and time spending that generate key and exchange through comparison.

Design and Implementation of XML Authoring Tool for Digital Document on M-Commerce: X-Auth (모바일 전자 상거래에 적합한 전자 문서의 XML 저작 도구 설계 및 구현: X-Auth)

  • 강성민;황기태;김남윤
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.2B
    • /
    • pp.289-298
    • /
    • 2004
  • Recently, mobile commerce is widely spread around the world according to fast growth of the mobile communication market. The existing digital document is not well fit in mobile commerce because of weakness of the hardware of mobile devices, low bandwidth of wireless communication, and the constraints of the size and resolution of the display. In this paper, we analyzed the elements of the digital document proper for mobile commerce based on wireless communication, designed the XML form for the digital document, and implemented the X-Auth which is an authoring tool for the XML digital document. X-Auth does not require that the author or user know XML. And also it makes it possible to create the digital document fit for the size of the mobile device display and therefore remove inconvenience due to the scrolls.

On Designing a Control System Using Dynamic Multidimensional Wavelet Neural Network (동적 다차원 웨이브릿 신경망을 이용한 제어 시스템 설계)

  • Cho, Il;Seo, Jae-Yong;Yon, Jung-Heum;Kim, Yong-Taek;Jeon, Hong-Tae
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.37 no.4
    • /
    • pp.22-27
    • /
    • 2000
  • In this paper, new neural network called dynamic multidimensional wavelet neural network (DMWNN) is proposed. The resulting network from wavelet theory provides a unique and efficient representation of the given function. Also the proposed DMWNN have ability to store information for later use. Therefore it can represent dynamic mapping and decreases the dimension of the inputs needed for network. This feature of DMWNN can compensate for the weakness of diagonal recurrent neural network(DRNN) and feedforward wavelet neural network(FWNN). The efficacy of this type of network is demonstrated through experimental results.

  • PDF