• Title/Summary/Keyword: 네트워크 내재성

Search Result 85, Processing Time 0.029 seconds

Analysis of Information Seeking Behaviors of Social Science Teachers According to Their Tasks (사회과 교사의 정보추구행태 분석을 통한 교육정보서비스 제안)

  • Lim, JeongHoon;Lee, Jongwook;Lee, ByeongKi
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.30 no.3
    • /
    • pp.223-244
    • /
    • 2019
  • This study aims to propose educational information services for social science teachers by analyzing their information seeking behaviors. The author carried out in-depth interviews with thirteen social science teachers in Daejeon and analyzed them using an information seeking behavior model of Leckie, Pettigrew and Sylvain. The study results showed that information needs of social science teachers arise from extrinsic and intrinsic motivations according to their work roles and tasks. Also, the characteristics of information needs such as repeatability, predictability, urgency, and complexity appear to influence information seeking behaviors. The participants used various information sources including web, book, and interpersonal sources. Moreover, the study observed some factors that may influence perception toward information sources such as trustworthiness, information quality, packaging, prior success experience. Finally, the perception change and use frequency of information sources were also identified. Based on these findings, the author proposed information services for social science teachers including integrated information provision services, information literacy programs, networking services and readers advisory services.

The Study on Recent Research Trend in Korean Tourism Using Keyword Network Analysis (키워드 네트워크를 이용한 국내 관광연구의 최근 연구동향 분석)

  • Kim, Min Sun;Um, Hyemi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.68-73
    • /
    • 2016
  • This study was conducted to identify trends and knowledge structures associated with recent trends in Korean tourism from 2010 to 2015 using keyword data. To accomplish this, we constructed a network using keywords extracted from KCI journals. We then made a matrix describing the relationships between rows as papers and columns as keywords. A keyword network showed the connectivity of papers that have included one or more of the same keywords. Major keywords were then extracted using the cosine similarity between co-occurring keywords and components were analyzed to understand research trends and knowledge structure. The results revealed that subjects of tourism research have changed rapidly and variously. A few topics related to 'organization-employee' were major trends for several years, but intrinsic and extrinsic factors have been further subdivided and employees of specific fields have been targeted as subjects of research. Component analysis is useful for analyzing concrete research topics and the relationships between them. The results of this study will be useful for researchers attempting to identify new topics.

Predicting Construction Project Cost using Sensitivity Analysis in Stochastic Project Scheduling Simulation (SPSS) (확률 통계적 일정 시뮬레이선 - 민감도 분석을 이용한 최종 공사비 예측)

  • Lee Dong-Eun;Park Chan-Sik
    • Korean Journal of Construction Engineering and Management
    • /
    • v.6 no.4 s.26
    • /
    • pp.80-90
    • /
    • 2005
  • Activity durations retain probabilistic and stochastic natures due to diverse factors causing the delay or acceleration of activity completion. These natures make the final project duration to be a random variable. These factors are the major source of financial risk. Extending the Stochastic Project Scheduling Simulation system (SPSS) developed in previous research; this research presents a method to estimate how the final project duration behaves when activity durations change randomly. The final project cost is estimated by considering the fluctuation of indirect cost, which occurs due to the delay or acceleration of activity completion, along with direct cost assigned to an activity. The final project cost is estimated by considering how indirect cost behaves when activity duration change. The method quantifies the amount of contingency to cover the expected delay of project delivery. It is based on the quantitative analysis to obtain the descriptive statistics from the simulation outputs (final project durations). Existing deterministic scheduling method apply an arbitrary figures to the amount of delay contingency with uncertainty. However, the stochastic method developed in this research allows computing the amount of delay contingency with certainty and certain degree of confidence. An example project is used to illustrate the quantitative analysis method using simulation. When the statistical location and shape of probability distribution functions defining activity durations change, how the final project duration and cost behave are ascertained using automated sensitivity analysis method

A Research on the Cloud Computing Security Framework (클라우드 컴퓨팅 정보보호 프레임워크에 관한 연구)

  • kim, Jung-Duk;Lee, Seong-Il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1277-1286
    • /
    • 2013
  • Cloud computing's unique attributes such as elasticity, rapid provisioning and releasing, resource pooling, multi-tenancy, broad-network accessibility, and ubiquity bring many benefits to cloud adopters(company and organization), but also entails specific security risks associated with the type of adopted cloud and deployment mode. To minimize those types of risk, this paper proposed cloud computing security framework refered to strategic alliance model. The cloud computing security framework has main triangles that are cloud threat, security controls, cloud stakeholders and compose of three sides that are purposefulness, accountability, transparent responsibility. Main triangles define purpose of risk minimization, appointment of stakeholders, security activity for them and three sides of framework are principles of security control in the cloud computing, provide direction of deduction for seven service packages.

Remote Secure Entrance Control System using RFID and TCP/IP (RFID와 TCp/IP를 활용한 원격 보안 출입 제어 시스템)

  • Kim, Jeong-Sook;Kim, Cheon-Shik;Yoon, Eun-Jun;Hong, You-Sik
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.6
    • /
    • pp.60-67
    • /
    • 2008
  • At present, RFID system is highly welcomed as a substitute system with its bar code recognition system and self recognition equipment. Consequently, the system has multi applications and can be complementing to its security. In particular, RFID system is significantly related with electronic transaction equipments : transportation card, ID card in check point, attendance sheet. Based upon these characteristic, the system is becoming extremely popular in the field of logistics, harbor and stock management, animal control and product circulation & distribution. In this dissertation, I would like to present a more efficient and stable remote entry control system with the network-based TCP/IP. It is a simple example of ubiquitous computing function. Above all, approved protocol system should be applied to the remote entry control function. Its efficient function with the applied approval protocol based-remote entry control system should be confirmed. Therefore, a preliminary test should be prerequisite in automatic entrance function with the embedded and TCP/IP-based RFID system.

Neuroscientific Mechanism from Somatics in Dance Contents (무용콘텐츠에 내재된 소매틱스의 뇌과학적 메커니즘)

  • Kim, Eun Jung
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.6
    • /
    • pp.365-373
    • /
    • 2016
  • This research clarified a neuroscientific mechanism from somatics in dance contents developed using somatics methods through literature studies. To clarify these, first, I organized neuroscientific mechanism in somatics, second, researched neuroscientific mechanism in dance contents adopted from somatics practice. Somatics is limited to Feldenkrais Method. It is possible to explain neuroscientific mechanism through neuro-plasticity, proprioception and Sensory Integration. As a result Gaga and Tamalpa take the method Awareness thorugh Movement from Feldenrkrais. They integrate newly formed networks by informations from proprioceptive senses. This study is significant that suggest brain scientific practices in dances and somatics, explain mechanism between brain and body in dance practices and provide a base that explains mechanism of body movement in a view of brain science to choreographers and dancers to apply this mechanism in their study and training.

A Study on Driver-vehicle Interface for Cooperative Driving (협력운전을 위한 운전자-차량 인터페이스 연구)

  • Yang, In-Beom
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.5
    • /
    • pp.27-33
    • /
    • 2019
  • Various technical and societal approaches are being made to realize the auto driving (AD) and cooperative driving (CD) including communication network and extended advanced driver support system is under development. In CD, it is important to share the roles of the driver and the system and to secure the stability of the driving, so a efficient interface scheme between the driver and the vehicle is required. This study proposes a research model including driver, system and driving environment considering the role and function of driver and system in CD. An efficient interface between the driver and the vehicle to cope with various driving situations on the CD using the analysis of the driving environment and the research model is also proposed. Through this study, it is expected that the proposed research model and interface scheme could contribute to CD system design, cockpit module development and interface device development.

Blockchain Based Data-Preserving AI Learning Environment Model for Cyber Security System (AI 사이버보안 체계를 위한 블록체인 기반의 Data-Preserving AI 학습환경 모델)

  • Kim, Inkyung;Park, Namje
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.12
    • /
    • pp.125-134
    • /
    • 2019
  • As the limitations of the passive recognition domain, which is not guaranteed transparency of the operation process, AI technology has a vulnerability that depends on the data. Human error is inherent because raw data for artificial intelligence learning must be processed and inspected manually to secure data quality for the advancement of AI learning. In this study, we examine the necessity of learning data management before machine learning by analyzing inaccurate cases of AI learning data and cyber security attack method through the approach from cyber security perspective. In order to verify the learning data integrity, this paper presents the direction of data-preserving artificial intelligence system, a blockchain-based learning data environment model. The proposed method is expected to prevent the threats such as cyber attack and data corruption in providing and using data in the open network for data processing and raw data collection.

Three Steps Polyalphabetic Substitution Cipher Practice Model using Vigenere Table for Encryption (Vigenere 테이블을 이용한 3단계 다중 알파벳 치환 암호화 모델)

  • Nguyen Huu Hoa;Dang Quach Gia Binh;Do Yeong Kim;Young Namgoong;Si Choon Noh
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.33-39
    • /
    • 2022
  • Recently, cyberattacks on infrastructure have been continuously occurring with the starting of neutralizing the user authentication function of information systems. Accordingly, the vulnerabilities of system are increasing day by day, such as the increase in the vulnerabilities of the encryption system. In this paper, an alternative technique for the symmetric key algorithm has been developed in order to build the encryption algorithm that is not easy for beginners to understand and apply. Vigenere Cipher is a method of encrypting alphabetic text and it uses a simple form of polyalphabetic substitution. The encryption application system proposed in this study uses the simple form of polyalphabetic substitution method to present an application model that integrates the three steps of encryption table creation, encryption and decryption as a framework. The encryption of the original text is done using the Vigenère square or Vigenère table. When applying to the automatic generation of secret keys on the information system this model is expected that integrated authentication work, and analysis will be possible on target system. ubstitution alphabets[3].

The Empathy and Justice Contemplated From the Neuroscientific Perspective in the Age of Social Divisions and Conflicts (분열과 반목의 시대에 신경과학적 관점에서 고찰해보는 공감과 정의)

  • Ji-Woong, Kim
    • Korean Journal of Psychosomatic Medicine
    • /
    • v.30 no.2
    • /
    • pp.55-65
    • /
    • 2022
  • Although humans exist as Homo Empathicus, human society is actually constantly divided and conflicted between groups. The human empathy response is very sensitive to the justice of others, and depending on the level of others' justice, they may feel empathy or schadenfreude to the suffering of them. However, our empathy to others' suffering are not always fair, and have inherent limitations of ingroup-biased empathy. Depending on whether the suffering other persons belongs to an ingroup or an outgroup, we may feel biased empathy or biased schadenfreude to them without even realizing it. Recent advances in information and communication technology facilitate biased access to ingroup-related SNS or ingroup media, thereby deepening the establishment of a more biased semantic information network related groups. These processes, through interacting with the inherent limitation of empathy, can form a vicious cycle of more biased ingroup empathy and ingroup-related activities, and accelerate divisions and conflicts. This research investigated the properties and limitations of empathy by reviewing studies on the neural mechanism of empathy. By examining the relationship between empathy and justice from a neuroscientific point of view, this research tried to illuminate the modern society of division and conflict in a different dimension from the classical perspective of social science.