• Title/Summary/Keyword: 문화 컴퓨팅

Search Result 107, Processing Time 0.019 seconds

Perspectives and Challenges of Informatics Education: Suggestions for the Informatics Curriculum Revision (정보교육의 전망과 과제: 미래 정보과 교육과정 개발 방향)

  • Lee, Eunkyoung
    • The Journal of Korean Association of Computer Education
    • /
    • v.21 no.2
    • /
    • pp.1-10
    • /
    • 2018
  • As the emphasis on software education in the 2015 revised curriculum, Informatics has become one of the essential subjects for the middle school students, and contents and achievement standards have been developed focusing on the information culture literacy, computational thinking, and collaborative problem solving ability. The 2015 revised Informatics curriculum for the first grade of middle school has been applied for the first time in 2018. Various educational policies have been promoted such as training of teachers, development of teaching and learning materials and programs to support implementation of the actual school fields. In this study, we analyzed the improvement issues and tasks of the 2015 revised curriculum according to the change of the Informatics education policy of in the global, and suggested the development direction of the future Informatics curriculum in Korea. The direction of the development of the Informatics curriculum is focused on ensuring the linkage between school level and identity of informatics education.

Analyzing the Instruments on core competencies of the 2015 Revised Informatics Curriculum (2015 개정 교육과정의 정보과 핵심역량에 관한 검사도구 분석)

  • Woo, HoSung;Kim, JaMee;Lee, WonGyu
    • The Journal of Korean Association of Computer Education
    • /
    • v.21 no.2
    • /
    • pp.49-58
    • /
    • 2018
  • Competency is an extended concept rather than knowledge and skill, which means the ability to efficiently and rationally solve various problems. This study focuses on the core competencies presented in the 2015 Revised Informatics Curriculum and aims to analyze the constitution method and composition of domestic and overseas Instruments that can measure core competencies. As a result of analyzing 12 Instruments developed by the countries and organizations, nine Instruments measure two or more competencies based on computing thinking, information culture literacy, and cooperative problem solving ability. Three Instruments have one competency were measured. Ten instruments were computer based tests, and 50% of the items were developed by two or more of multiple choice item, subjective item, and descriptive item. It is important to note that this study provided a crucial step in the development of Instruments to diagnose competencies to be developed into informatics science education.

Design and Implementation of Hybrid Apps Design based on Spring MVC (스프링 MVC 기반에서 하이브리드 앱 디자인 설계 및 구현)

  • Lee, Myeong-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.3
    • /
    • pp.395-400
    • /
    • 2019
  • The Web environment of the frontend domain is increasingly competitive to preempt the new standard of presentation layer. N-Screen, a service that enables users to seamlessly use one content in various devices in Korea, is competing for market preemption by recognizing it as a core service of the future. In the cloud computing, N-screen is a typical service type. However, most of the frontend research required for groupware in enterprise environments has been limited to responsive web design for the web and native apps for mobile. Gradually, the need for MVC design patterns is increasingly widening in enterprise environments to overcome the cultural differences of companies and to support one source multi-use strategy supporting multiple devices and development productivity. Therefore, in this study, we will analyze and design JPetStore with hybrid application design based on Spring MVC, e-government standard framework environment of next generation web standard, and provide reference model of frontend hybrid apps design in future enterprise environment.

Main/Sub Device Authentication and Authorization Protocol in Ubiquitous Office Network (유비쿼터스 오피스 네트워크에서의 Main/Sub 디바이스 인증/인가 프로토콜)

  • Moon, Jong-Sik;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.105-118
    • /
    • 2009
  • In modern society, as the rapid development of IT technology combined with the computer-based high-speed communication networks makes it possible to provide a wide spectrum of services and devices, we have been confronting a new cultural transformation era, referred to as the information society. However, the requirements to be considered in security aspect have became more complicated and diversified, and there remains the same security weaknesses as in the existing media or protocol. Particularly, the office network device with roaming is susceptible to the different kinds of attacks such as terminal hacking, virus attacks, and information leakage because the computing capacity is relatively low and the loading of already developed security functions is difficult. Although developed as one solution to this problems, PKI security authentication technology isn't suitable for multi-domain environments providing uonments proffice network service, and so the development of a novel authentication system is needed. Therefore, in this paper researched the roaming and device authentication/auth for multitechnology using an ID-based public key, authorization ticket, and Sub-device ticket with a purpose to contribute to the development of the secured and efficient technology.

5G Mobile Communications: 4th Industrial Aorta (5G 이동통신: 4차 산업 대동맥)

  • Kim, Jeong Su;Lee, Moon Ho
    • The Journal of the Convergence on Culture Technology
    • /
    • v.4 no.1
    • /
    • pp.337-351
    • /
    • 2018
  • This paper discusses 5G IOT, Augmented Reality, Cloud Computing, Big Data, Future Autonomous Driving Vehicle technology, and presents 5G utilization of Pyeongchang Winter Olympic Games and Jeju Smart City model. The reason is that 5G is the main artery of the 4th industry.5G is the fourth industrial aorta because 5G is the core infrastructure of the fourth industrial revolution. In order for the AI, autonomous vehicle, VR / AR, and Internet (IoT) era to take off, data must be transmitted several times faster and more securely than before. For example, if you send a stop signal to LTE, which is a communication technology, to a remote autonomous vehicle, it takes a hundredth of a second. It seems to be fairly fast, but if you run at 100km / h, you can not guarantee safety because the car moves 30cm until it stops. 5G is more than 20 gigabits per second (Gbps), about 40 times faster than current LTE. Theoretically, the vehicle can be set up within 1 cm. 5G not only connects 1 million Internet (IoT) devices within a radius of 1 kilometer, but also has a speed delay of less than 0.001 sec. Steve Mollenkov, chief executive officer of Qualcomm, the world's largest maker of smartphones, said, "5G is a key element and innovative technology that will connect the future." With 5G commercialization, there will be an economic effect of 12 trillion dollars in 2035 and 22 million new jobs We can expect to see the effect of creation.

Design of Embodiment-based Programming Education using Arduino for Middle School Students (중학생을 대상으로 한 아두이노를 활용한 체현 기반 프로그래밍 교육 설계)

  • Eom, Hyun-Young;Lee, Kang-Hee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.1
    • /
    • pp.471-476
    • /
    • 2020
  • We propose an practical embodiment-based programming training course for middle school students using Arduino and conduct survey before and after the curriculum. Arduino is an open source physical computing platform that integrates the IDE used in processing language. It is a low-cost, relatively simple I/O interface compared to other platforms, and because of its practical formability, it is educational material suitable for programming. Subsequent surveys will provide feedback on changes in cognition of programming needs and improvement in thinking skills. In this study, the program based on embody-based programming using Arduino was conducted for 8 weeks for each first grade, and 112 middle school students for two years from '16 to '17. Based on the theoretical and practical training, the training was based on the application of the ultrasonic sensor to the RC car and the preparation of the adduction quadrotor drone. The purpose of this study is to prove that the recognition, necessity, and programming education of middle school students are effective for the improvement of thinking ability through the program based on embody-based programming using Arduino.

Development of SDN-based Network Platform for Mobility Support (이동성 지원을 위한 SDN 기반의 네트워크 플랫폼 개발)

  • Lee, Wan-Jik;Lee, Ho-Young;Heo, Seok-Yeol
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.1
    • /
    • pp.401-407
    • /
    • 2019
  • SDN(Softeware Defined Networking) has emerged to address the rapidly growing demand for cloud computing and to support network virtualization services. Therefor many companies and organizations have taken SDN as a next-generation network technology. However, unlike the wired network where the SDN is originally designed, the SDN in the wireless network has a restriction that it can not provide the mobility of the node. In this paper, we extended existing openflow protocol of SDN and developed SDN-based network platform, which enables the SDN controller to manage the radio resources of its network and support the mobility of the nodes. The mobility support function of this paper has the advantage that a node in the network can move using its two or more wireless interfaces by using the radio resource management function of the SDN controller. In order to test the functions implemented in this paper, we measured parameters related to various transmission performance according to various mobile experiments, and compared parameters related to performance using one wireless interface and two interfaces. The SDN-based network platform proposed in this paper is expected to be able to monitor the resources of wireless networks and support the mobility of nodes in the SDN environment.

Analysis of the Operation Status of General High School Informatics Curriculum (일반계 고등학교의 정보 과목 운영현황 분석)

  • Kim, MinJeong;Kim, JaMee;Lee, WonKyu
    • Journal of Creative Information Culture
    • /
    • v.5 no.3
    • /
    • pp.225-236
    • /
    • 2019
  • Viewing and approaching problems based on computational thinking can be improved through informatics education, which is essential for students to live in a future society. The purpose of this study is to analyze the operation status of informatics subjects that have become general electives in the 2015 revised curriculum, and to contribute to enhancing the effect of future informatics subject. To achieve this goal, a questionnaire was conducted for 400 students who graduated from high school in 2015-2016, and five students and five informatics subjects teachers were interviewed. Operation period of Infomatics subject, contents, method and evaluation method were analyzed. As a result, the operation of informatics subjects varied greatly from the second semester of the first year to the second semester of the third year. The most common method was teaching type, but the percentage of self-study was high in the second semester of the third year. The contents of the study did not learn all the contents, and the use rate of textbooks was low in the class. This study confirmed that the informatics subject class did not proceed in the form of observing the curriculum similarly to other subjects excluded. It is also significant that for the first time, the operational status of informatics subjects was analyzed.

Efficient QoS Policy Implementation Using DSCP Redefinition: Towards Network Load Balancing (DSCP 재정의를 통한 효율적인 QoS 정책 구현: 네트워크 부하 분산을 위해)

  • Hanwoo Lee;Suhwan Kim;Gunwoo Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.715-720
    • /
    • 2023
  • The military is driving innovative changes such as AI, cloud computing, and drone operation through the Fourth Industrial Revolution. It is expected that such changes will lead to a rapid increase in the demand for information exchange requirements, reaching all lower-ranking soldiers, as networking based on IoT occurs. The flow of such information must ensure efficient information distribution through various infrastructures such as ground networks, stationary satellites, and low-earth orbit small communication satellites, and the demand for information exchange that is distributed through them must be appropriately dispersed. In this study, we redefined the DSCP, which is closely related to QoS (Quality of Service) in information dissemination, into 11 categories and performed research to map each cluster group identified by cluster analysis to the defense "information exchange requirement list" on a one-to-one basis. The purpose of the research is to ensure efficient information dissemination within a multi-layer integrated network (ground network, stationary satellite network, low-earth orbit small communication satellite network) with limited bandwidth by re-establishing QoS policies that prioritize important information exchange requirements so that they are routed in priority. In this paper, we evaluated how well the information exchange requirement lists classified by cluster analysis were assigned to DSCP through M&S, and confirmed that reclassifying DSCP can lead to more efficient information distribution in a network environment with limited bandwidth.

The Evaluation of Crime Prevention Environment for Cultural Heritage using the 3D Visual Exposure Index (3D 시각노출도를 이용한 문화재 범죄예방환경의 평가)

  • Kim, Choong-Sik
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.35 no.1
    • /
    • pp.68-82
    • /
    • 2017
  • Strengthening surveillance, one of the most important factors in the crime prevention environment of cultural heritages, has difficulty in evaluating and diagnosing the site. For this reasons, surveillance enhancement has been assessed by modelling the shape of cultural heritage, topography, and trees digitally. The purpose of this study is to develop the evaluation method of crime prevention environment for cultural heritage by using the 3D visual exposure index (3DVE) which can quantitatively evaluate the surveillance enhancement in three dimensions. For the study, the evaluation factors were divided into natural, organizational, mechanical, and integrated surveillance. To conduct the analysis, the buildings, terrain, walls, and trees of the study site were modeled in three dimensions and the analysis program was developed by using the Unity 3D. Considering the working area of the person, it is possible to analyze the surveillance point by dividing it into the head and the waist position. In order to verify the feasibility of the 3DVE as the analysis program, we assessed the crime prevention environment by digitally modeling the Donam Seowon(Historic Site No. 383) located in Nonsan. As a result of the study, it was possible to figure out the problems of patrol circulation, the blind spot, and the weak point in natural, mechanical, and organizational surveillance of Donam Seowon. The results of the 3DVE were displayed in 3D drawings, so that the position and object could be identified clearly. Surveillance during the daytime is higher in the order of natural, mechanical, and organizational surveillance, while surveillance during the night is higher in the order of organizational, mechanical, and natural surveillance. The more the position of the work area becomes low, the more it is easy to be shielded, so it is necessary to evaluate the waist position. It is possible to find out and display the blind spot by calculating the surveillance range according to the specification, installation location and height of CCTV. Organizational surveillance, which has been found to be complementary to mechanical surveillance, needs to be analyzed at the vulnerable time when crime might happen. Furthermore, it is note that the analysis of integrated surveillance can be effective in examining security light, CCTV, patrol circulation, and other factors. This study was able to diagnose the crime prevention environment by simulating the actual situation. Based on this study, consecutive researches should be conducted to evaluate and compare alternatives to design the crime prevention environment.