• Title/Summary/Keyword: methodology(方法論)

Search Result 4,476, Processing Time 0.032 seconds

Foundation of Game Archiving Methodology Using Archiving Science (기록학의 담론을 활용한 게임 아카이빙 방법론 구축)

  • Kwon, Dae-Heon
    • Journal of Korea Game Society
    • /
    • v.20 no.1
    • /
    • pp.93-106
    • /
    • 2020
  • New-tro is emerging as a new trend affecting the game industry. In this regard, this study analyzed on korean game archiving where need is emphasized. As a result, korean game archiving lacks consistency and validity due to the absense of methodology. Therefore this study conducts a preliminary study of building a game archiving methodology. First, this study analyzed the discourse of archiving science, including Documentation strategy, and the study of cultural content archiving in other fields. Then by applying it to korean game archiving, this study embodies game archiving methodology.

A Study on the Analysis on Manipulation System of MORPG Game based on Finger Movement and Key Input Data (손가락 움직임과 키 입력 데이터를 기반으로 한 MORPG 게임의 조작계 분석 방법론에 관한 연구)

  • Jungha Kim
    • Smart Media Journal
    • /
    • v.12 no.9
    • /
    • pp.116-123
    • /
    • 2023
  • In this study, I will describe the difference in operating methods centered on the game operating system between beginners and expert groups in MORPG PC games and focus on the methodology to analyze them. First of all, a hypothesis was established to distinguish between beginners and expert groups based on the manipulation system of character movements commonly used in MORPG, and through this distinction, it was analyzed whether finger movement data and key stroke data related to the manipulation system can be significantly used in the future. Based on these analysis results, it was found that the analysis methodology that combines finger motion data and key stroke analysis is meaningful as a user test methodology for the PC MORPG game operating system in the future.

A Methodology for Evaluating Intrusion Detection System (침입탐지시스템 평가 방법론)

  • Yoo, Shin-Geun;Lee, Nam-Hoon;Shim, Young-Chul
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.11
    • /
    • pp.3445-3461
    • /
    • 2000
  • Although many different intrusion detectionsystems have been developed there have not been enough researches on the methodology for evaluating these intrusion delection systems. With this understanding,in this paper we present a methodology for evaluating infrusion detection systems from the view point of performance and robustness, both of which are considered the most important criteria Current research on evaluating the performance f intrusion detection systems mostly foduson the in issuse detection but not on the anormaly detection. Regarding evalieting robustness it is not easy to apply off -line methodologies and methods for testing robustness hae not been proposed in on -line methodolomes, In this paper we provide an systematic way of classifyin and generating anomalies and using this reult, present an methodology for evaluating the pertormance of intrusion detection systems in detecting anomaalies ans well as misuses . Moreover, ww study the factors that can damage the robustness of intrusion detection systems and suggest an methodology for assessing the robustness of intrusion detection systems.

  • PDF

A sequence-based personalized service for the short life cycle products (수명주기가 짧은 상품들에 대한 시퀀스 기반 개인화 서비스)

  • Choi, Ju-Choel
    • Journal of Digital Convergence
    • /
    • v.15 no.12
    • /
    • pp.293-301
    • /
    • 2017
  • Most new products not only suddenly disappear in the market but also quickly cannibalize older products. Under such a circumstance, retailers may have too much stock, and customers may be faced with difficulties discovering products suitable to their preferences among short life cycle products. To address these problems, recommender systems are good solutions. However, most previous recommender systems had difficulty in reflecting changes in customer preferences because the systems employ static customer preferences. In this paper, we propose a recommendation methodology that considers dynamic customer preferences. The proposed methodology consists of dynamic customer profile creation, neighborhood formation, and recommendation list generation. For the experiments, we employ a mobile image transaction dataset that has a short product life cycle. Our experimental results demonstrate that the proposed methodology has a higher quality of recommendation than a typical collaborative filtering-based system. From these results, we conclude that the proposed methodology is effective under conditions where most new products have short life cycles. The proposed methodology need to be verified in the physical environment at a future time.

A Methodology of Architectural Integrated Design Education based on 'Material Organization' (현대건축의 '물질조직화' 개념을 활용한 통합설계교육방법론 연구)

  • Kim, Jung Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.12
    • /
    • pp.735-743
    • /
    • 2017
  • This study examined a methodology of architectural integrated design education from the design methodology of architects in 1990s, particularly FOA, who thought of architecture as a material organization. Their design method starts from a prototype, which is a technical and material mediator, and processes a number of materials as specific information into an architectural organization. This method is used in the architectural design studio so that the students can integrate the knowledge leant from other classes into architectural proposals. Three case studies show they can successfully organize their proposals with structural and functional materials, which suggests that the FOA's design methodology is a potential solution for architectural integrated design education.

A Study on a Historical Context of the Design Methodology Movement With an Emphasis on Its relations to Cyborg Sciences (디자인 방법론의 역사적 맥락에 대한 연구 - 사이보그 과학과의 관계를 중심으로 -)

  • Park, Hae-Cheon
    • Archives of design research
    • /
    • v.19 no.5 s.67
    • /
    • pp.105-118
    • /
    • 2006
  • From a general perspective of design history, the design methodology movement is interpreted in relations to the rationalistic and universal characteristics of modernism. This essay explores a historical context of the movement, focusing on its discursive and practical relations to cyborg sciences that has been shaped by the research and development of military technology in Cold War America. The formation of such relations could be largely devided into two processes: One is the process in which methods and techniques of system science that included operation research, system analysis, and system engineering, were appropriated by the first generation methodologists who had tried to establish "the science of design", and the other is the one in which Herbert Simon's studies on problem solving and artificial intelligence became profoundly embedded in theoretical frameworks of design methodology after the first generation. Examining such processes critically, this essay argues that a design process became finally redefined by the third generation methodology, as a 'feedback loop' of circulation of production and consumption, that is, an apparatus of information-processing which gives a concrete form to the "invisible hand" of markets.

  • PDF

Establishment and Application of Nuclear Criticality Safety Validation Methodology (핵임계 안전성 검증 방법론 정립 및 적용)

  • Lee, Seo Jeong;Cha, Kyoon Ho
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.16 no.3
    • /
    • pp.315-330
    • /
    • 2018
  • A subcritical facility must ensure nuclear criticality safety under all circumstances. For this purpose, it is essential to have a procedure to validate that calculated values do not exceed upper subcritical limit (USL), determined by quantifying the bias and uncertainty. However, there are several validation methodologies of nuclear criticality safety and these can yield different USL. Therefore, it is necessary to analyze the validity of the methodologies to establish one methodology that can provide the most appropriate USL. In this study, two documents, a guide for validation of nuclear criticality safety calculational methodology (NUREG/CR-6698) and a criticality benchmark guide for light water reactor fuel in transport and storage package (NUREG/CR-6361), are compared and analyzed. In particular, the methodology in NUREG/CR-6361 is applied to the USLSTATS code. However, the analysis results show that the methodology in NUREG/CR-6698 is more appropriate, for several reasons. This is applied to decision of USL to design casks using SCALE code version 6.1.

Analysis and comparison of ontology development methodologies: based on CMM-I version 1.1 Maturity Level 2 and 3 (온톨로지 개발 방법론 분석 비교 (CMMI 버전 1.1 성숙 단계 2와 3을 기반으로))

  • Choi, Seung-Yong;Kim, Jeong-Ah;Jung, Ran;Bae, Je-Min;Hong, Chan-Ki;Choi, Sung-Woon
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.12
    • /
    • pp.1021-1036
    • /
    • 2007
  • As the requirement of Semantic Web and knowledge management has been rising, ontology developments have been carried out actively. Ontology is now at the point that systematic developing standardization should be made up like the developing a large scale software. Yet, It has not been made to optimize and standardize ontology development methodologies. In this study, to compare ontology development methodologies, METHONTOLOGY, CommonKADS, OTK in foreign countries and EOE in Korea are selected. The evaluating method is to introduce CMM-I version 1.1 framework. Ontology development methodologies have been evaluated in process areas that introduce for CMM-I maturity level 2 and 3. The purpose of this study is to find matured process and weak process in ontology development methodology on the view of process maturity, and suggests the areas to be Improved in it. The result of this study can be applied as basic data to establish and improve ontology development methodology.

A Methodology for Implementing Customer Oriented Internet Business: I Company Case (고객 우선 인터넷 비즈니스 구축 방법론: I사 사례를 중심으로)

  • Lee, Choong-Seok;Lee, Hee-Seok
    • Information Systems Review
    • /
    • v.3 no.2
    • /
    • pp.305-323
    • /
    • 2001
  • 인터넷의 등장으로 기업의 전통적 비즈니스 방식이 변화하고 있다. 인터넷 비즈니스는 인터넷 기술을 기업 내부 및 기업 간 비즈니스 프로세스에 활용하여 정보 제품 및 서비스를 거래한다. 인터넷 비즈니스 환경에서는 인터넷웹 사이트가 비즈니스의 출발점이 된다. 변화하는 고객 요구 사항 분석과 이를 반영한 웹 사이트 개선 활동은 인터넷 비즈니스 경쟁력 유지의 핵심이다. 현재까지 제안된 방법론들은 신규 인터넷 비즈니스 구축을 주목적으로 하며, 고객요구에 대한 분석이 제시되지 못하고 있다. 본 연구는 고객 우선 인터넷 비즈니스 구축 방법론을 제안한다. 본 방법론은 고객 분석, 가치 분석, 웹 설계, 구현 설계, 구축 단계로 구성된다. 각 단계의 세부 절차를 I 사이트 사례를 통하여 제시하였다. 본 연구는 기존 방법론과 달리 고객 분석 단계와 시나리오 기반의 요구 분석이 특징이며, 다음과 같은 의의를 가진다. 첫째, 본 방법론은 고객 중심의 인터넷 비즈니스 운영 및 개선에 효과적으로 활용 가능하다. 둘째, 시나리오의 활용으로 인터넷 비즈니스 시스템의 핵심인 네비게이션 설계를 사용자 중심적으로 향상 가능하다.

  • PDF

Reusability Enhancement of the MND-AF Artifacts in the Defense-CBD Methodology (국방 CBD 방법론에서 MND-AF 산출물 재활용성 제고)

  • Lee Hyun-Chul;Lee Sang-Ho;Jung Gyung-Chul;Lee Sung Jong
    • The KIPS Transactions:PartD
    • /
    • v.12D no.7 s.103
    • /
    • pp.1001-1006
    • /
    • 2005
  • The Ministry of National Defense has developed MND-AF and Defense-CBD methodology to make the integration and management of standardization effective through enhancing the interoperability and reusability of information systems. Yet no explicit guidelines or procedures have not been developed for the applying range and mutual relationship of the artifacts between MND-AF and Defense-CBD methodology. Thus, the development time is unnecessarily extended and budget also is increasing because both methodologies produce the artifacts respectively. This paper presents a reusability enhancement scheme for producing MND-AF artifacts according to Defense-CBD process by analyzing artifacts of two methodology les at each element level, so that it will reduce the overhead of producing the artifacts and enhance the completeness of the artifacts. In result, in the case of applying Defense-CBD methodology for developing a information system34 artifacts out of 37 MND-AF artifacts can be reusable.