• 제목/요약/키워드: technology integration hierarchy model

검색결과 19건 처리시간 0.022초

K-TIHM: Korean Technology Integration Hierarchy Model for Teaching and Learning in STEAM Education

  • Park, Chan Jung;Hyun, Jung Suk
    • 한국정보기술학회 영문논문지
    • /
    • 제10권2호
    • /
    • pp.111-123
    • /
    • 2020
  • The core competencies for the 21st century are creativity, critical thinking, collaboration, and communication. In recent classes where ICT (information, communication, and technology) is grafted, a lot of efforts are also being made to increase such competencies. According to a research work, ICT is most often used as a communication channel between teachers and students or as an online collaboration tool among students. However, ICT has only played a role as a guideline for instruction, but not included in the curriculum until now. The research on methods how to integrate technology into teaching and learning is in full swing due to the development of technology and the advent of Covid-19. In this paper, we propose a technology integration hierarchy model, namely K-TIHM that can be combined with STEAM education. Since only learning environments have been proposed in the existing research for technology-based STEAM education, our model proposes a series of technology integration hierarchy that can be applied by school age along with STEAM. Also, we analyze the differences in among the Korea's ICT education operation guidelines, the Korea's Software education guidelines, and ours. The proposed model can help developing the primary and secondary school curriculum integrated with technology.

QFD와 AHP를 이용한 ITS 프로젝트관리자 핵심역량 연구 (A Study on Core Competencies of ITS Project Managers Using QFD and AHP)

  • 이봉우;김자희;김우제
    • 한국IT서비스학회지
    • /
    • 제10권1호
    • /
    • pp.89-103
    • /
    • 2011
  • ITS (Intelligent Transportation System) has been more popular but ITS project managements remain complex because of diverse stakeholders and multidisciplinary processes of ITS. The multidisciplinary process enforces specialized competencies on ITS project managers comparing to other system integration project managers. In this paper, we derived core competencies of ITS projects from previous researches, built the hierarchy of the competencies, and employed AHP (Analytic Hierarchy Process) surveying ITS project managers and auditors with the hierarchy. Finally, we analyzed the difference of evaluation model on ITS project manager between project managers and auditors using Mann-Whitney U test. Additionally we suggest a method of building MECE (Mutually Exclusive and Collectively Exhaustive) structure for AHP using the HoQ (House of Quality). We expect our model to give some inspirations for raising capable ITS project managers and selecting a proper project manager for an ITS project.

Developing a Decision Making Model for Selecting an IT Post-Merger Integration Strategy

  • Suh, Byung-Wan;Baek, Seung-Ik
    • Journal of Information Technology Applications and Management
    • /
    • 제19권3호
    • /
    • pp.49-68
    • /
    • 2012
  • M&A (Merger and Acquisitions) is a standard corporate strategy frequently used by companies seeking to secure new growth engines and gain a solid foothold in their markets in order to become more globally competitive. To achieve the original goals of M&A, the two involved parties need to invest significant time and resources in integrating all aspects of the companies. A well-planned post-merger integration of information technology (IT PMI) by the two M&A parties is considered a crucial and difficult process because IT provides a fundamental infrastructure for integration. Considering various internal and external factors, the two parties normally formulate an IT PMI strategy. The many IT PMI strategies can be categorized into four major types: Renewal, Takeover, Standardization, and Synchronization. This study aims to develop a decision making model to help merger company and IT managers select the proper IT PMI strategy. More specifically, we identify key determinants that need to be considered when selecting a proper IT PMI strategy. The relative importance of each determinant is defined by analytic hierarchy process (AHP) analysis. Finally, this study evaluates each IT integration strategy under the identified determinants.

기후기술 융·복합 사업모델 평가를 위한 지표 개발 (Development of Indicators for Assessment of Technology Integrated Business Models in Climate Change Responses)

  • 오상진;성민규;김형주
    • 한국기후변화학회지
    • /
    • 제9권4호
    • /
    • pp.435-443
    • /
    • 2018
  • Climate technology applied to address climate change requires a comprehensive review such as environmental and social acceptability in addition to economic feasibility. Not only mitigation and adaptation technologies, but also integration of climate technologies into a business model with other relevant technologies including ICT, finance, and policy instruments could enhance technical, economic, and environmental performances to respond to climate changes. However, many climate projects (and business models) are currently not designed to consider adequately complex climate?related issues. In addition, there is a lack of research on assessment systems that can comprehensively evaluate business feasibility of such models. In this study, we developed a system consisting of nine major indicators in four fields to assess climate technology-based business models. Each indicator was weighed using the analytic hierarchy process (AHP) for systematic assessment of business models. The process can be utilized as a tool to guide improvement of climate technology business models.

XML 웹 서비스 검색 엔진의 개발 (Development of a XML Web Services Retrieval Engine)

  • 손승범;오일진;황윤영;이경하;이규철
    • Journal of Information Technology Applications and Management
    • /
    • 제13권4호
    • /
    • pp.121-140
    • /
    • 2006
  • UDDI (Universal Discovery Description and Integration) Registry is used for Web Services registration and search. UDDI offers the search result to the keyword-based query. UDDI supports WSDL registration but it does not supports WSDL search. So it is required that contents based search and ranking using name and description in UDDI registration information and WSDL. This paper proposes a retrieval engine considering contents of services registered in the UDDI and WSDL. It uses Vector Space Model for similarity comparison between contents of those. UDDI registry information hierarchy and WSDL hierarchy are considered during searching process. This engine suppports two discovery methods. One is Keyword-based search and the other is template-based search supporting ranking for user's query. Template-based search offers how service interfaces correspond to the query for WSDL documents. Proposed retrieval engine can offer search result more accurately than one which UDDI offers and it can retrieve WSDL which is registered in UDDI in detail.

  • PDF

Novel Trusted Hierarchy Construction for RFID Sensor-Based MANETs Using ECCs

  • Kumar, Adarsh;Gopal, Krishna;Aggarwal, Alok
    • ETRI Journal
    • /
    • 제37권1호
    • /
    • pp.186-196
    • /
    • 2015
  • In resource-constrained, low-cost, radio-frequency identification (RFID) sensor-based mobile ad hoc networks (MANETs), ensuring security without performance degradation is a major challenge. This paper introduces a novel combination of steps in lightweight protocol integration to provide a secure network for RFID sensor-based MANETs using error-correcting codes (ECCs). The proposed scheme chooses a quasi-cyclic ECC. Key pairs are generated using the ECC for establishing a secure message communication. Probability analysis shows that code-based identification; key generation; and authentication and trust management schemes protect the network from Sybil, eclipse, and de-synchronization attacks. A lightweight model for the proposed sequence of steps is designed and analyzed using an Alloy analyzer. Results show that selection processes with ten nodes and five subgroup controllers identify attacks in only a few milliseconds. Margrave policy analysis shows that there is no conflict among the roles of network members.

SE기반 무기체계 시험업무 아키텍처 모델 연구 (The Architecture Model for Defense Systems Test Works based on Systems Engineering)

  • 나태흠;허동은;김영민;이주연
    • 한국군사과학기술학회지
    • /
    • 제27권2호
    • /
    • pp.203-212
    • /
    • 2024
  • This paper describes the establishment of defense systems test works architecture model for the efficient operation of an expanded test organization and the provision of standardized test services after the integration of proving grounds in ADD. The system engineering vee model is applied to the defense system test works to define the project management model and the unit-test management model. In order to establish the defense systems test works architecture model, the process flow of test works, artifacts by life cycle, and interrelations between regulations and test works are explained, and Integrated Test Information System for implementation of architecture model is discussed. Through the defense systems test works architecture model presented in this study, it will contribute to quickly responding to the test requirements of complex and diverse defense systems, efficiently managing projects, and providing standardized test services.

지식모니터링시스템에서 감성기준을 고려한 EFASIT 모델 (An EFASIT model considering the emotion criteria in Knowledge Monitoring System)

  • 류경현;피수영
    • 인터넷정보학회논문지
    • /
    • 제12권4호
    • /
    • pp.107-117
    • /
    • 2011
  • 웹의 등장은 전통적인 정보검색을 비롯하여 지식관리와 일반 상거래 등 사회 전 분야의 급격한 변혁을 초래하였다. 그러나 검색엔진은 일반적으로 관련된 계산함수에 의해 순서화된 URL의 방대한 목록을 제공하지만, 관련 없는 정보의 필터링이나 사용자가 필요로 하는 정보의 검색에 많은 시간이 소요된다. 본 논문에서는 웹상의 효율적인 문서검색을 위해서 영역 코퍼스 정보를 바탕으로 확장된 퍼지 계층화 의사결정법(Extended Fuzzy AHP Method : EFAM)과 유사도 기법(SImilarity Technology : SIT)을 결합하고, 감성기준을 고려한 EFASIT(Extended Fuzzy AHP and SImilarity Technology)모델을 제안한다. 제안한 감성기준을 고려한 EFASIT 모델은 다양한 의사결정자들의 퍼지지식의 통합으로 좀 더 명확한 규칙을 생성할 수 있고 의사결정을 하는데 도움을 준다는 것을 실험을 통하여 확인한다.

RGT와 AHP을 활용한 이행 PMO 역량평가 모형 (An Evaluation Model of Transition PMO Competencies Using RGT and AHP)

  • 차환주;김자희
    • 한국IT서비스학회지
    • /
    • 제14권2호
    • /
    • pp.87-109
    • /
    • 2015
  • The IT outsourcing industry has been widespread for decades since the growth of the system integration industry stagnates and companies need to curtail expenses and improve the quality of IT services. According to previous studies on the success factors of the IT outsourcing, its transition phase is significant because of continuity of business and the handover of knowledge. Since a transition phase consists of several projects, but its goal is different from general projects, it needs special and professional management. Therefore, recent IT outsourcing business starts to introduce PMO (project management offices), of which success strongly depends on the competencies of the PMO. However, there are only few studies on which competencies of the PMO are important. In this paper, we suggest an evaluation model of transition PMO competencies derived using the repertory grid technique and the analytic hierarchy process. Additionally, we compare the differences between the views of several stakeholders on the importance of the competencies.

STEP을 이용한 PDM/CE환경의 구축과 데이타 무결성 확인 (Building A PDM/CE Environment and Validating Integrity Using STEP)

  • 유상봉;서효원;고굉욱
    • 한국전자거래학회지
    • /
    • 제1권1호
    • /
    • pp.173-194
    • /
    • 1996
  • In order to adapt today's short product life cycle and rapid technology changes., integrated systems should be extended to support PDM (Product Data Management) or CE(Concurrent Engineering). A PDM/CE environment has been developed and a prototype is Presented in this paper. Features of the PDM/CE environment are 1) integrated product information model (IPIM) includes both data model and integrity constraints, 2) database systems are organized hierarchically so that working data C8Mot be referenced by other application systems until they are released into the global database, and 3) integrity constraints written in EXPRESS are validated both in the local databases and the global database. By keeping the integrity of the product data, undesirable propagation of illegal data to other application system can be prevented. For efficient validation, the constraints are distributed into the local and the global schemata. Separate triggering mechanisms are devised using the dependency of constraints to three different data operations, i.e., insertion, deletion, and update.

  • PDF