• Title/Summary/Keyword: 운영 유형

Search Result 1,327, Processing Time 0.032 seconds

A Study on Information Services of Korean Literature Houses (국내 문학관 웹사이트의 정보 제공 개선 방안 연구)

  • Choi, Seongyeon;Seong, Heehye;Han, Jiyoon;Lee, Hye-Eun
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.32 no.3
    • /
    • pp.265-284
    • /
    • 2021
  • This study is to present improvement plans by examining how Korean literature house websites provide information services. Seventy-nine Korean literature houses out of eighty-eight members of the Korean Literature House Association were studied, except nine that did not construct websites. Three core elements, including website style, literary works information and writer information, together with thirteen sub-elements, were derived from precedent studies. As a result, it was found that 90% of the literature houses were operating websites, but the classification criteria for the literary works and cataloguing rules were not unified, and literature information was not provided sufficiently. Thus, this study suggested improvement plans such as support to build a website, developing cataloging guidelines for literature houses, providing more full-text literature and providing information about literary works and writer.

Planning Plan for Special Education Subjects by Analyzing the Factor of Selecting Special Education Institutions (특수교육기관 선택 요인 분석을 통한 특수교육대상자 배치계획)

  • Kim, Eun-Kyu;Lee, Yong-Hwan
    • The Journal of Sustainable Design and Educational Environment Research
    • /
    • v.17 no.3
    • /
    • pp.17-25
    • /
    • 2018
  • In this research, we analyze the factors considered by parents of subjects of special education when selecting special educational institutions for children, and present proposals for improving the placement plan of special subjects, The results are as follows. First, for special education subjects, a considerable number of kindergarten processes are required for compulsory education, and special education subjects are selected for elementary school entrance. Second, the factors of choosing the special educational institution of parents of special education subjects are the expertise of the teacher and the operation of the curriculum, the type and extent of child disability, the distance to school and the way of commuting, educational facilities, Treatment room etc). Thirdly, it was found that parents' choices are the largest among schools in the school area, as to how special education institutions of special education subjects are arranged. For proper placement planning, it is necessary to accurately grasp the number of subjects for special education, so the selection time of the subjects of special education shall be the process of kindergarten at the latest, the disparity of special education institutions and the disparity of educational facilities It is necessary to set school books to solve it.

A Study on Effective Security Control Model Based on Characteristic of Web Service (웹 서비스 특성 기반 효율적인 보안관제 모델 연구)

  • Lee, Jae-heon;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.175-185
    • /
    • 2019
  • The security control is to protect IT system from cyber infringement by deriving valid result values in the process of gathering and analyzing various information. Currently, security control is very effective by using SIEM equipment which enables analysis of systematic and comprehensive viewpoint based on a lot of data, away from analyzing cyber threat information with only fragmentary information. However, It can also be said that cyber attacks are analyzed and coped with the manual work of security personnel. This means that even if there is excellent security equipment, the results will vary depending on the user using. In case of operating a characteristic web service including information provision, This study suggests the basic point of security control through characteristics information analysis, and proposes a model for intensive security control through the type discovery and application which enable a step-wise analysis and an effective filtering. Using this model would effectively detect, analyze and block attacks.

The Kindergarten Teachers' Perception of Restriction Rules on Free Choice Activities at Their Classroom (자유놀이 제한 규칙에 대한 유치원 교사의 인식)

  • Won, Kyeson
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.8
    • /
    • pp.485-493
    • /
    • 2019
  • The purpose of this study is to gain basic information to manage the free choice activities of kindergarten by investigating the teachers' perception of restriction rules. The subjects of the study were 200 kindergarten teachers who worked in J province. The instrument used for this study was a questionnaire that focused on teachers' perception about the restriction rules for the free choice activities. The results of this study were as follows. First, the teachers considered restriction rules in the art center as the most important factor. Second, the teachers recognized that limiting the number of players in a same center is the most important thing among the three restriction rules. Third, the teachers' perception regarding the necessity of restriction rules is as follows. The rule of restricting the number of players is needed to prevent too many players focusing in a certain center. The rule of restricting play time is necessary to encourage children to play in various centers, and the rule of restricting play space is crucial to solidify the educational purpose that every interest center has. The meaning and the necessity of the restriction rules on children's free choice activities were further discussed as connected with children's right to play.

A Study on the Relationship between Specialized Topics and Library Space Composition (특화주제와 도서관 공간구성의 관계에 관한 연구)

  • Kim, Yoon-Jeong;Noh, Younghee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.30 no.2
    • /
    • pp.5-31
    • /
    • 2019
  • As one of the challenges providing sufficient Social Overhead Capital (SOC), such as cultural and sports facilities, installing small libraries and remodeling old public libraries are crucial to provide local community a public space and specialized services. In order to achieve such objectives, those libraries need to designate special themes while operating and providing services. In this study, we sought to find the relationship between the specialized themes and the spatial composition of the library. For this purpose, we investigated the specialized themes, spaces, services, spatial composition of program, and external environment. Analysis results showed that those libraries need to coordinate various areas according to the respective themes as well as categorization for its specialization subjects in order to stimulate activities of the libraries and to increase the usage rates. In addition, we have identified that a variety of spaces, such as thematic experience zones, are needed to improve the libraries' performance.

Design and Implementation of Software-Defined Storage Autoconfiguration Module for Integrated Use of Cloud File/Block/Object Storage (클라우드 파일/블록/객체 스토리지의 통합사용을 위한 소프트웨어 정의 스토리지 자동 설정 모듈의 설계 및 구현)

  • Park, Sun;Cha, ByungRae;Kim, Jongwon
    • Smart Media Journal
    • /
    • v.7 no.4
    • /
    • pp.9-16
    • /
    • 2018
  • In order to improve the economics and flexibility of cloud computing, tendency to automate the operation and management of cloud resources has become complicated. However, while automation for cloud storage depends on the manufacturer's storage hardware, it cannot flexibly support the storage type in accordance with users' needs. In this paper, we propose an automatic configuration module that supports block/file/object storages suitable for user environment. In order to automatically install ceph, a cloud storage, we propose an automatic installation and configuration module based on the Chef configuration management tool. In addition to that, we also propose an automatic configuration module based on a shell programming in pursuit of enabling users to use ceph storage of block/file/object. The proposed method can automatically set up and manage shared file, block, and object storages in a virtual or physical user environment with no hardware dependencies.

A Study on the Improvement of Crisis Alerts of Disaster-related Crisis Management Standardized Manuals (재난 관련 표준매뉴얼의 위기경보 개선방안에 관한 연구)

  • Kim, Yong-Soon;Choi, Don-Mook
    • Fire Science and Engineering
    • /
    • v.32 no.6
    • /
    • pp.126-133
    • /
    • 2018
  • Korea has been preparing and operating crisis management standardized manuals so that over 30 disaster types that need to be managed at the national level can be selected and systematically managed. This study analyzed the crisis alert levels of two standard manuals related to the case with reference to the contents of the Framework Act on the Management of Disaster and Safety and National Crisis Management Basic Guidelines. According to the Act and Guidelines, crisis alerts are issued before a crisis or disaster, but the criteria of crisis alerts of the two manuals showed that the national crisis had already occurred and the disaster occurred due to a marine vessel accident at the serious level. In addition, the results of timing of issuance of crisis alert were reviewed. If the signs can be identified, a crisis alert may be issued prior to the occurrence of the incident, but a crisis alert cannot be issued when an incident occurs without a sign. In the case of an incident where there are no signs, but there is a possibility of spreading to a national level disaster, the disaster management supervision agency could issue a crisis alert.

A Design of a Data Service providing Additional Information of ID Advertising (ID 광고의 부가정보를 제공하는 데이터서비스 설계)

  • KO, Kwangil
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.61-68
    • /
    • 2018
  • As the digital broadcasting era settled in, the TV, which was only used to watch broadcast programs, developed as a medium for operating various data services. This means that an environment, in which the viewers' TV usage behavior can be changed from a passive attitude to an attitude of actively consuming the media, has been established. Since the advertising market is an industry that is heavily influenced by changes in the media, these changes causes changes in the form of advertising and the advertising consumption behavior of viewers. In this environment, the broadcasting industry needs to think about the new growth strategy that links the possibility of data service with the advertisement market. In this study, we designed a data service that provides supplementary information of an ID advertisement, which has the weakness of short exposure time and shortage of information expression space. Specifically, we have designed the usage scenario and user interface of the data service and developed a method, based on the international digital broadcasting standard DV B, that provides the supplementary information defined by the type of ID advertisement to the data service.

  • PDF

An Analysis of Research Trends in Information Security Based on Behavioral Economics (행동경제학 기반 정보보안 연구 동향 분석)

  • Oh, Myeong Oak;Kim, Jung Duk
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.39-46
    • /
    • 2019
  • Recently, information security accidents are becoming more advanced as social engineering attacks using new types of malicious codes such as phishing. Organizations have made various efforts to prevent information security incidents, but tend to rely on technical solutions. Nevertheless, not all security incidents can be prevented completely. In order to overcome the limitations of the information security approach that depends on these technologies, many researchers are increasingly interested in People-Centric Security. On the other hand, some researchers have applied behavioral economics to the information security field to understand human behavior and identify the consequences of the behavior. This study is a trend analysis study to grasp the recent research trend applying the concept and idea of behavioral economics to information security. We analyzed the research trends, research themes, research methodology, etc. As a result, the most part of previous research is focused on 'operational security' topics, and in the future, it is required to expand research themes and combine behavioral economics with security behavioral issues to identify frameworks and influencing factors.

An RNN-based Fault Detection Scheme for Digital Sensor (RNN 기반 디지털 센서의 Rising time과 Falling time 고장 검출 기법)

  • Lee, Gyu-Hyung;Lee, Young-Doo;Koo, In-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.1
    • /
    • pp.29-35
    • /
    • 2019
  • As the fourth industrial revolution is emerging, many companies are increasingly interested in smart factories and the importance of sensors is being emphasized. In the case that sensors for collecting sensing data fail, the plant could not be optimized and further it could not be operated properly, which may incur a financial loss. For this purpose, it is necessary to diagnose the status of sensors to prevent sensor' fault. In the paper, we propose a scheme to diagnose digital-sensor' fault by analyzing the rising time and falling time of digital sensors through the LSTM(Long Short Term Memory) of Deep Learning RNN algorithm. Experimental results of the proposed scheme are compared with those of rule-based fault diagnosis algorithm in terms of AUC(Area Under the Curve) of accuracy and ROC(Receiver Operating Characteristic) curve. Experimental results show that the proposed system has better and more stable performance than the rule-based fault diagnosis algorithm.