• Title/Summary/Keyword: 과학기술종합정보

Search Result 328, Processing Time 0.027 seconds

A Study on the Improvement Scheme of University's Software Education

  • Lee, Won Joo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.3
    • /
    • pp.243-250
    • /
    • 2020
  • In this paper, we propose an effective software education scheme for universities. The key idea of this software education scheme is to analyze software curriculum of QS world university rankings Top 10, SW-oriented university, and regional main national university. And based on the results, we propose five improvements for the effective SW education method of universities. The first is to enhance the adaptability of the industry by developing courses based on the SW developer's job analysis in the curriculum development process. Second, it is necessary to strengthen the curriculum of the 4th industrial revolution core technologies(cloud computing, big data, virtual/augmented reality, Internet of things, etc.) and integrate them with various fields such as medical, bio, sensor, human, and cognitive science. Third, programming language education should be included in software convergence course after basic syntax education to implement projects in various fields. In addition, the curriculum for developing system programming developers and back-end developers should be strengthened rather than application program developers. Fourth, it offers opportunities to participate in industrial projects by reinforcing courses such as capstone design and comprehensive design, which enables product-based self-directed learning. Fifth, it is necessary to develop university-specific curriculum based on local industry by reinforcing internship or industry-academic program that can acquire skills in local industry field.

A Case Study on SK Telecom's Next Generation Marketing System Development (SK텔레콤의 차세대 마케팅 시스템 개발사례 연구)

  • Lee, Sang-Goo;Jang, Si-Young;Yang, Jung-Yeon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.2
    • /
    • pp.158-170
    • /
    • 2008
  • In response to the changing demands of ever competitive market, SK Telecom has built a new marketing system that can support dynamic marketing campaigns and, at the same time, scale up to the large volumes of data and transactions for the next decade. The system which employs Unix-based client-server (using Web browser interfaces) architecture will replace the current mainframe-based COIS system. The project, named NGM (Next Generation Marketing ), is unprecedentedly large in scale. However, both managerial and technical problems led the project into a crisis. The application framework that depended on a software solution from a major global vendor could not support the dynamic functionalities required for the new system. In March 2005, SK telecom declared the suspension of the NGM project. The second phase of the project started in May 2005 following a comprehensive replanning. It was decided that no single existing solution could cope with the complexity of the new system and hence the new system would be custom-built. As such. a number of technical challenges emerged. In this paper, we report on the three key dimensions of technical challenges - middleware and application framework, database architecture and tuning, and system performance. The processes and approaches, adopted in building NGM system, may be viewed as "best practices" in the telecom industry. The completed NGM system, now called "U.key System," successfully came into operation on the ninth of October, 2006. This new infrastructure is expected to give birth to a series of innovative, fruitful, and customer-oriented applications in the near future.

A Study on Open Source Transition Strategy of Record System (기록시스템의 오픈소스화 전략 연구)

  • An, Dae-jin;Yim, Jin-hee
    • The Korean Journal of Archival Studies
    • /
    • no.52
    • /
    • pp.119-170
    • /
    • 2017
  • This study aims to analyze the environment for the open-source records system and to identify the risk and requirements for the success of the strategy in Korea. For this, Chapter 2 presented a review of the strategic benefits of open source to public organizations, developers, and users. It also discussed the process of cooperatively developing and releasing the source code and the technology infrastructure supporting open source. In Chapter 3, six representative open-source projects in the field of records management were selected, and case studies were conducted. To derive comprehensive implications, we have divided the main development body of open-source projects into international organizations, international cooperation systems, national archives, and software development companies. We also analyzed the background and purpose of each project, the agents of development and funding, the governance model, the development period and cost, the business model and software architecture, the community composition, and the licensing strategy. Through this, we have derived four critical success factors. In terms of technology, a component-based design was required; therefore, we proposed a microservice architecture and a model-view-controller design pattern. Next, it was necessary to reestablish system requirements of records center and archives. Moreover, we also proposed a dual licensing strategy to allow developers to easily participate in open-source projects. Lastly, we emphasized a strong governance structure and an effective cooperation framework to create a sustainable community. For a record system to be open-source successfully in an organization-centered market, the roles of software developers and end users should be exercised more in the community. To achieve this, it is important to build various collaborative tools and development infrastructure from a planning stage to a centralized one.

The Education Model of Liberal Arts to Improve the Artificial Intelligence Literacy Competency of Undergraduate Students (대학생의 AI 리터러시 역량 신장을 위한 교양 교육 모델)

  • Park, Youn-Soo;Yi, Yumi
    • Journal of The Korean Association of Information Education
    • /
    • v.25 no.2
    • /
    • pp.423-436
    • /
    • 2021
  • In the future, artificial intelligence (AI) technology is expected to become a general-purpose technology (GPT), and it is predicted that AI competency will become an essential competency. Several nations around the world are fostering experts in the field of AI to achieve technological proficiency while working to develop the necessary infrastructure and educational environment. In this study, we investigated the status of software education at the liberal arts level at 31 universities in Seoul, along with precedents from domestic and foreign AI education research. Based on this, we concluded that an AI literacy education model is needed to link software education at the liberal arts level with professional AI education. And we classified 20 AI-related lectures released in the KOCW according to the AI literacy competencies required; based on the results of this classification, we propose a model for AI literacy education in the liberal arts for undergraduate students. The proposed AI literacy education model may be considered as AI·SW convergence to experience AI along with literacy in the humanities, deviating from the existing theoretical and computer-science-based approach. We expect that our proposed AI literacy education model can contribute to the proliferation of AI.

Understanding Biotechnology: An Analysis of High School Students' Concepts (생명공학의 기본 개념에 대한 고등학생의 이해도 조사 및 개념 분석)

  • Chung, Young-Lan;Kye, Bo-Ah
    • Journal of The Korean Association For Science Education
    • /
    • v.18 no.4
    • /
    • pp.463-472
    • /
    • 1998
  • Biotechnology is the process of using biological system for the production of materials. Genetic engineering, a subset of biotechnology, is the process of altering biological systems by the purposeful manipulation of DNA It is a new field in biology and no topic in biology is more likely to impact our personal lives and is therefore more worthy of our attention and understanding. The purpose of this study was to investigate students' understanding of the concepts of biotechnology, and a test tool which is made up of 20 basic questions was developed for the study. The subject of this study was high school students and the sample size was 486. In order to find out the source of students' misunderstanding, we also analysed high school textbooks and teachers were given the same tool applied to students. Two-way ANOVA was used for the analysis. Major findings of this study are as following; 1. Mean score of students was 41, and there was a significant difference between the scores of boys and girls(p<0.05). Female students scored higher than male students. The variables "region" and "major" had no significant influence. 2. Students' the most misunderstood concepts were "monoclonal antibody" and "gene cloning". Many students thought that a plamid DNA originally has a useful DNA in it, which is apparently wrong. 3. Mean score of teachers was 82, and the variabes of gender and career did not have statistically significant influence on the result(p>0.05). 4. Teachers got the lowest scores on the concepts of "gene therapy", "the accomplishment of biotechnology in agriculture and medicine", and "plasmid DNA". The results of item analysis implied that teachers' misunderstanding might be a part of the sources of students' misunderstaning. 5. Out of 18 basic concepts selected in the study, only 10 concepts were explained well enough in most textbooks. The results of item analysis indicated that textbooks also could be a part of the source of students' misunderstanding.

  • PDF

Deep Learning Approach for Automatic Discontinuity Mapping on 3D Model of Tunnel Face (터널 막장 3차원 지형모델 상에서의 불연속면 자동 매핑을 위한 딥러닝 기법 적용 방안)

  • Chuyen Pham;Hyu-Soung Shin
    • Tunnel and Underground Space
    • /
    • v.33 no.6
    • /
    • pp.508-518
    • /
    • 2023
  • This paper presents a new approach for the automatic mapping of discontinuities in a tunnel face based on its 3D digital model reconstructed by LiDAR scan or photogrammetry techniques. The main idea revolves around the identification of discontinuity areas in the 3D digital model of a tunnel face by segmenting its 2D projected images using a deep-learning semantic segmentation model called U-Net. The proposed deep learning model integrates various features including the projected RGB image, depth map image, and local surface properties-based images i.e., normal vector and curvature images to effectively segment areas of discontinuity in the images. Subsequently, the segmentation results are projected back onto the 3D model using depth maps and projection matrices to obtain an accurate representation of the location and extent of discontinuities within the 3D space. The performance of the segmentation model is evaluated by comparing the segmented results with their corresponding ground truths, which demonstrates the high accuracy of segmentation results with the intersection-over-union metric of approximately 0.8. Despite still being limited in training data, this method exhibits promising potential to address the limitations of conventional approaches, which only rely on normal vectors and unsupervised machine learning algorithms for grouping points in the 3D model into distinct sets of discontinuities.

Violations of Information Security Policy in a Financial Firm: The Difference between the Own Employees and Outsourced Contractors (금융회사의 정보보안정책 위반요인에 관한 연구: 내부직원과 외주직원의 차이)

  • Jeong-Ha Lee;Sang-Yong Tom Lee
    • Information Systems Review
    • /
    • v.18 no.4
    • /
    • pp.17-42
    • /
    • 2016
  • Information security incidents caused by authorized insiders are increasing in financial firms, and this increase is particularly increased by outsourced contractors. With the increase in outsourcing in financial firms, outsourced contractors having authorized right has become a threat and could violate an organization's information security policy. This study aims to analyze the differences between own employees and outsourced contractors and to determine the factors affecting the violation of information security policy to mitigate information security incidents. This study examines the factors driving employees to violate information security policy in financial firms based on the theory of planned behavior, general deterrence theory, and information security awareness, and the moderating effects of employee type between own employees and outsourced contractors. We used 363 samples that were collected through both online and offline surveys and conducted partial least square-structural equation modeling and multiple group analysis to determine the differences between own employees (246 samples, 68%) and outsourced contractors (117 samples, 32%). We found that the perceived sanction and information security awareness support the information security policy violation attitude and subjective norm, and the perceived sanction does not support the information security policy behavior control. The moderating effects of employee type in the research model were also supported. According to the t-test result between own employees and outsourced contractors, outsourced contractors' behavior control supported information security violation intention but not subject norms. The academic implications of this study is expected to be the basis for future research on outsourced contractors' violation of information security policy and a guide to develop information security awareness programs for outsourced contractors to control these incidents. Financial firms need to develop an information security awareness program for outsourced contractors to increase the knowledge and understanding of information security policy. Moreover, this program is effective for outsourced contractors.

Analysis of Climate Change Adaptation Researches Related to Health in South Korea (한국의 건강 분야 기후변화적응 연구동향 분석)

  • Ha, Jongsik
    • Journal of Climate Change Research
    • /
    • v.5 no.2
    • /
    • pp.139-151
    • /
    • 2014
  • It is increasingly supported by scientific evidence that greenhouse gas caused by human activities is changing the global climate. In particular, the changing climate has affected human health, directly or indirectly, and its adverse impacts are estimated to increase in the future. In response, many countries have established and implemented a variety of mitigation and adaptation measures. However, it is significant to note that climate change will continue over the next few centuries and its impacts on human health should be tackled urgently. The purpose of this paper is to examine domestic policies and research in health sector in adaptation to climate change. It further aims to recommend future research directions for enhanced response to climate change in public health sector, by reviewing a series of adaptation policies in the selected countries and taking into account the general features of health adaptation policies. In this regard, this study first evaluates the current adaptation policies in public health sector by examining the National Climate Change Adaptation Master Plan(2011~2015) and Comprehensive Plan for Environment and Health(2011~2020) and reviewing research to date of the government and relevant institutions. For the literature review, two information service systems are used: namely, the National Science and Technology Information Service(NTIS) and the Policy Research Information Service & Management(PRISM). Secondly, a series of foreign adaptation policies are selected based on the global research priorities set by WHO (2009) and reviewed in order to draw implications for domestic research. Finally, the barriers or constraints in establishing and implementing health adaptation policies are analyzed qualitatively, considering the general characteristics of adaptation in the health sector to climate change, which include uncertainty, finance, technology, institutions, and public awareness. This study provides four major recommendations: to mainstream health sector in the field of adaptation policy and research; to integrate cross-sectoral adaptation measures with an aim to the improvement of health and well-being of the society; to enhance the adaptation measures based on evidence and cost-effectiveness analysis; and to facilitate systemization in health adaptation through setting the key players and the agenda.

A Study of the Effects of Job-seeking Efficacy on Use Intention and Outcome of the Work-net (구직효능감(job-seeking efficacy)으로 인 한 Work-net의 이용의도 및 성과에 관한 연구)

  • Oh, Seong-Uk;Yoon, Sung-Joon
    • Journal of Global Scholars of Marketing Science
    • /
    • v.13
    • /
    • pp.113-133
    • /
    • 2004
  • The present study examines the the role of subjectively perceived factors of the attitude toward job-seeking activities in forming an intention to use a web. An integrative research model is presented and tested empirically. It includes the following two aspects of belief in Davis' TAM: perceived usefulness, perceived ease of use. Specially, internet job-seeking efficacy, or the belief in one's capabilities to organize and execute courses of Internet actions required to achieve given goals, is a potentially important factor in efforts to gain more favorable attitude toward Internet uses. Survey data were collected to develop a reliable operational measure of Internet job-seeking efficacy and to examine its construct validity. An four-item Internet job-seeking efficacy scale developed for the present study was found to be reliable and internally consistent. Also, many previous studies have established that perceived usefulness is an important factor influencing user acceptance and usage behavior of information technologies. However, very little research has been conducted to understand how that perception forms and changes over time. The current work presents and tests the determinants of perceived usefulness. The present study found that higher internet job-seeking efficacy is an important concept which is significantly related to job-seeking activities by positively influencing intention and performance as well as usefulness on the Internet.

  • PDF

Artifacts in Digital Radiography (디지털 방사선 시스템에서 발생하는 Artifact)

  • Min, Jung-Whan;Kim, Jung-Min;Jeong, Hoi-Woun
    • Journal of radiological science and technology
    • /
    • v.38 no.4
    • /
    • pp.375-381
    • /
    • 2015
  • Digital Radiography is a big part of diagnostic radiology. Because uncorrected digital radiography image supported false effect of Patient's health care. We must be manage the correct digital radiography image. Thus, the artifact images can have effect to make a wrong diagnosis. We report types of occurrence by analyzing the artifacts that occurs in digital radiography system. We had collected the artifacts occurred in digital radiography system of general hospital from 2007 to 2014. The collected data had analyzed and then had categorize as the occurred causes. The artifacts could be categorized by hardware artifacts, software artifacts, operating errors, system artifacts, and others. Hardware artifact from a Ghost artifact that is caused by lag effect occurred most frequently. The others cases are the artifacts caused by RF noise and foreign body in equipments. Software artifacts are many different types of reasons. The uncorrected processing artifacts and the image processing error artifacts occurred most frequently. Exposure data recognize (EDR) error artifacts, the processing error of commissural line, and etc., the software artifacts were caused by various reasons. Operating artifacts were caused when the user didn't have the full understanding of the digital medical image system. System artifacts had appeared the error due to DICOM header information and the compression algorithm. The obvious artifacts should be re-examined, and it could result in increasing the exposure dose of the patient. The unclear artifact leads to a wrong diagnosis and added examination. The ability to correctly determine artifact are required. We have to reduce the artifact occurrences by understanding its characteristic and providing sustainable education as well as the maintenance of the equipments.