• Title/Summary/Keyword: 정보기술도입

Search Result 3,459, Processing Time 0.033 seconds

A Study on the Descriptive Analysis for Coordination of the School's Library-Aided Instruction With the Problem-Based Learning in Korea School Libraries: Focusing on PBL Cases (PBL교과수업과 학교도서관 LAI의 연계를 위한 기술적 분석 - PBL 사례연구를 중심으로 -)

  • Jung, Jong-Kee
    • Journal of Korean Library and Information Science Society
    • /
    • v.49 no.4
    • /
    • pp.167-185
    • /
    • 2018
  • The purpose of this study is to analyse the cases related with PBL and to suggest the activation plan of LAI based on the derived results. The analysis objects were the PBL cases which have been performed from 2000 to 2018 in Korean schools. The PBL cases were analysed in the aspects of school levels, target grades, subject clusters, teaching patterns, information sources, cooperative teaching status, library cooperative teaching status, and educational effects. The results were like these; 1)The PBL was applied at the elementary schools the most, the next middle schools, and high schools. 2)The teaching pattern was the exclusive teaching the most, and the next pattern was team teaching with other teacher, and the lowest pattern was with librarian teacher. 3)The subject cluster was natural science cluster the most and the next was the human & social science cluster and the art, music and physical education cluster. 4)The PBL performed with school library was low. 5)The main effects of PBL were the improvements of academic achievement, learning satisfaction degree, creative ability, problem-solving ability, and self-directed learning capability. As the results, it's proposed that it's important for librarian teachers to have the aggressive attitude for the activation of LAI as well as the cooperation with PBL subject teachers from the planning step to the evaluation.

A Packet Processing of Handling Large-capacity Traffic over 20Gbps Method Using Multi Core and Huge Page Memory Approache

  • Kwon, Young-Sun;Park, Byeong-Chan;Chang, Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.6
    • /
    • pp.73-80
    • /
    • 2021
  • In this paper, we propose a packet processing method capable of handling large-capacity traffic over 20Gbps using multi-core and huge page memory approaches. As ICT technology advances, the global average monthly traffic is expected to reach 396 exabytes by 2022. With the increase in network traffic, cyber threats are also increasing, increasing the importance of traffic analysis. Traffic analyzed as an existing high-cost foreign product simply stores statistical data and visually shows it. Network administrators introduce and analyze many traffic analysis systems to analyze traffic in various sections, but they cannot check the aggregated traffic of the entire network. In addition, since most of the existing equipment is of the 10Gbps class, it cannot handle the increasing traffic every year at a fast speed. In this paper, as a method of processing large-capacity traffic over 20Gbps, the process of processing raw packets without copying from single-core and basic SMA memory approaches to high-performance packet reception, packet detection, and statistics using multi-core and NUMA memory approaches suggest When using the proposed method, it was confirmed that more than 50% of the traffic was processed compared to the existing equipment.

The Effect of Social Function and Telepresence on Intention to Offer Support Through Trust of Metaverse Participants (메타버스의 사회적 기능과 원격실재감이 메타버스 참여 주체의 신뢰를 통해 요청지원 의도에 미치는 영향)

  • Hwang, Inho
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.27 no.3
    • /
    • pp.29-46
    • /
    • 2022
  • COVID-19 has radically changed the behavior of members of society for exchange. In particular, the strong contagiousness of the virus is increasing networking on online platforms while reducing people's networking in the real world. Recently, the metaverse, which strengthened the presence based on 3D technology, is attracting attention from members of society such as individuals and companies. We present a method to improve metaverse utilization from the perspective of organizations and employees who have introduced metaverse for work. In other words, we check the effect of metaverse social function and telepresence on the employee's intention to offer support by improving the trust of the metaverse participants. We obtained samples through questionnaires targeting employees of organizations that introduced metaverse to their work, and verified the research hypothesis by applying the structural equation model. As a result, social interactivity, reciprocal favor, and telepresence of metaverse partially affected metaverse trust (platform, peer, organization), and metaverse trust increased the intention to offer support. Our study suggests a strategic direction to improve the metaverse utilization and exchange level of employees of organizations who want to use the metaverse for business.

A Study on the Design of KVMF 2.0 Protocol for Ensuring Backward/Forward Compatibility between Different KVMF Message Standard Versions

  • Jeong-Min, Lee;Won-Gi, Lim;Won-Jun, Cho;Yong-Cheol, Kim;Jeung-Sub, Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.3
    • /
    • pp.45-58
    • /
    • 2023
  • KVMF(Korean Variable Message Format) 1.0 protocol is the Army's standard tactical datalink protocol that defines standard messages and communication methods to enable data communication between various weapon systems through bitwise variable message processing. The protocol has been applied to a variety of Army weapon systems over the past decade and has contributed to upgrade the Army's operational capabilities by enabling the implementation of Network Centric Warfare (NCW), the core of modern warfare. Since the KVMF 1.0 protocol was applied, new weapon systems with new technologies have been introduced over time, and new weapon systems have new messages based on the characteristics of the weapon system. As a result, compatibility problems arose due to different message versions with existing weapon systems, and it was expected that these problems would continue to emerge in the future, considering the need for continuous message revisions. Therefore, it became necessary to solve this problem, so this paper proposed a KVMF 2.0 protocol design that guarantees compatibility between forward and backward versions. In this paper, we implemented the design as SW, and confirmed that the design worked successfully by test between forward and backward versions on test environment. Therefore, when the KVMF 2.0 protocol design is applied to a weapon system, we can expect that the weapon system can be compatible with the forward and backward versions working with the existing weapon systems as well as with the future weapon systems.

A Road Environment Analysis for the Introduction of Connected and Automated Driving-based Mobility Services from an Operational Design Domain Perspective (자율주행기반 모빌리티 서비스 도입을 위한 운행설계영역 관점의 도로환경 분석)

  • Bo-Ram, WOO;Ah-Reum, KIM;Yong-Jun, AHN;Se-Hyun, TAK
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.25 no.4
    • /
    • pp.107-118
    • /
    • 2022
  • As connected and automated driving(CAD) technology is entering its commercialization stage, service platforms providing CAD-based mobility services have increased these days. However, CAD-baded mobility services with these platforms need more consideration for the demand for mobility services when determining target areas for CAD-based mobility services because current CAB-based mobility design focus on driving performance and driving stability. For a more efficient design of CAD-based mobility services, we analyzed the applicability for the introduction of CAD-based mobility services in terms of driving difficulty of CAD and demand patterns of current non-CAD based-mobility services, e.g., taxi, demand-responsive transit(DRT), and special transportation systems(STS). In addition, for the spatial analysis of the applicability of the CAD-based mobility service, we propose the Index for Autonomous Driving Applicability (IADA) and analyze the characteristics of the spatial distribution of IADA from the network perspective. The analysis results show that the applicability of CAD-based mobility services depends more on the demand patterns than the driving difficulty of CAV. In particular, the results show that the concentration pattern of demand in a specific road link is more important than the size of demand. As a result, STS service shows higher applicability compared to other mobility services, even though the size of demand for this mobility service is relatively small.

A Case Study on the Introduction and Use of Artificial Intelligence in the Financial Sector (금융권 인공지능 도입 및 활용 사례 연구)

  • Byung-Jun Kim;Sou-Bin Yun;Mi-Ok Kim;Sam-Hyun Chun
    • Industry Promotion Research
    • /
    • v.8 no.2
    • /
    • pp.21-27
    • /
    • 2023
  • This study studies the policies and use cases of the government and the financial sector for artificial intelligence, and the future policy tasks of the financial sector. want to derive According to Gartner, noteworthy technologies leading the financial industry in 2022 include 'generative AI', 'autonomous system', 'Privacy Enhanced Computation (PEC) was selected. The financial sector is developing new technologies such as artificial intelligence, big data, and blockchain. Developments are spurring innovation in the financial sector. Data loss due to the spread of telecommuting after the corona pandemic As interests in sharing and personal information protection increase, companies are expected to change in new digital technologies. Global financial companies also utilize new digital technology to develop products or manage and operate existing businesses. I n order to promote process innovation, I T expenses are being expanded. The financial sector utilizes new digital technology to prevent money laundering, improve work efficiency, and strengthen personal information protection. are applying In the era of Big Blur, where the boundaries between industries are disappearing, the competitive edge in the challenge of new entrants In order to preoccupy the market, financial institutions must actively utilize new technologies in their work.

Design and Implementation of Ethereum-based Future Power Trading System (이더리움 기반의 선물(Future) 전력 거래 시스템 설계)

  • Youm, Sungkwan;Lee, Heekwon;Shin, Kwang-Seong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.584-585
    • /
    • 2021
  • As the production of new and renewable energy such as solar and wind power has diversified, microgrid systems that can simultaneously produce and consume have been introduced. In general, a decrease in electricity prices through solar power is expected in summer, so producer protection is required. In this paper, we propose a transparent and safe gift power transaction system between users using blockchain in a microgrid environment. A futures is simply a contract in which the buyer is obligated to buy electricity or the seller is obliged to sell electricity at a fixed price and a predetermined futures price. This system proposes a futures trading algorithm that searches for futures prices and concludes power transactions with automated operations without user intervention by using a smart contract, a reliable executable code within the blockchain network. If a power producer thinks that the price during the peak production period is likely to decrease during production planning, it sells futures first in the futures market and buys back futures during the peak production period to make a profit in the spot market. losses can be compensated. In addition, if there is a risk that the price of electricity will rise when a sales contract is concluded, a broker can compensate for a loss in the spot market by first buying futures in the futures market and liquidating futures when the sales contract is fulfilled.

  • PDF

Domain Knowledge Incorporated Local Rule-based Explanation for ML-based Bankruptcy Prediction Model (머신러닝 기반 부도예측모형에서 로컬영역의 도메인 지식 통합 규칙 기반 설명 방법)

  • Soo Hyun Cho;Kyung-shik Shin
    • Information Systems Review
    • /
    • v.24 no.1
    • /
    • pp.105-123
    • /
    • 2022
  • Thanks to the remarkable success of Artificial Intelligence (A.I.) techniques, a new possibility for its application on the real-world problem has begun. One of the prominent applications is the bankruptcy prediction model as it is often used as a basic knowledge base for credit scoring models in the financial industry. As a result, there has been extensive research on how to improve the prediction accuracy of the model. However, despite its impressive performance, it is difficult to implement machine learning (ML)-based models due to its intrinsic trait of obscurity, especially when the field requires or values an explanation about the result obtained by the model. The financial domain is one of the areas where explanation matters to stakeholders such as domain experts and customers. In this paper, we propose a novel approach to incorporate financial domain knowledge into local rule generation to provide explanations for the bankruptcy prediction model at instance level. The result shows the proposed method successfully selects and classifies the extracted rules based on the feasibility and information they convey to the users.

A Study on the 3D Measurement Data Application: The Detailed Restoration Modeling of Mireuksajiseoktap (미륵사지석탑 정밀복원모형 제작을 중심으로 한 3차원 실측데이터의 활용 연구)

  • Moon, Seang Hyen
    • Korean Journal of Heritage: History & Science
    • /
    • v.44 no.2
    • /
    • pp.76-95
    • /
    • 2011
  • After dismantled, Mireuksajiseoktap(Stone pagoda of Mireuksa Templesite) is being in the stage of restoration design. Now, different ways - producing restoration model, a 3 dimension simulation - have been requested to make more detailed and clearer restoration design prior to confirmation of its restoration design and actual restoration carry-out. This thesis proposes the way to build the detailed model for better restoration plan using extensively-used Reverse Engineering technique and Rapid Prototyping. It also introduces each stage such as a 3-dimension actual measurement, building database, a 3-dimension simulation etc., to build a desirable model. On the top of that, this thesis reveals that after dismantled, MIruksaji stone pagoda's interior and exterior were not constructed into pieces but wholeness, so that its looks can be grasped in more virtually and clearly. Secondly, this thesis makes a 3-dimension study on the 2-dimension design possible by acquiring basic materials about a 3-dimension design. Thirdly, the individual feature of each member like the change of member location can be comprehended, considering comparing analysis and joint condition of member. Lastly, in the structural perspective this thesis can be used as reference materials for structure reinforcement design by grasping destructed aspects of stone pagoda and weak points of the structure. In dismantlement-repair and restoration work of cultural properties that require delicate attention and exactness, there may be evitable errors on time and space in building reinforcement and restoration design based on a 2-dimension plan. Especially, the more complicate and bigger the subject is, the more difficult an analysis about the status quo and its delicate design are. A series of pre-review, based on the 3-dimension data according to actual measurement, can be one of the effective way to minimize the possibility that errors about time - space happen by building more delicate plan and resolving difficulties.

A Study Covering the Comparative Analysis of Educational Systems in Major Countries for Regular Cybersecurity Education (사이버보안 정규교육화를 위한 주요국 교육체계 비교분석 연구)

  • YOO, Jiyeon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.397-405
    • /
    • 2021
  • With the recent phenomenon of the Intelligence Information Society, the cyber security paradigm has begun to change. In particular, the increase of the interconnectedness of the hyperlinked society has extended the scope of damage that can be caused by cyber threats to the real world. In addition to that, it can also be a risk to any given individual who could accompany a crisis that has to do with public safety or national security. Adolescents who are digital natives are more likely to be exposed to cyber threats, which is mainly due to the fact that they are significantly more involved in cyber activities and they also possess insufficient security comprehension and safety awareness. Therefore, it is necessary to strengthen cyber security capabilities of every young individual, so that they can effectively protect themselves against cyber threats and better manage their cyber activities. It examines the changes of the security paradigm and the necessity for cyber security education, which is in direct accordance to the characteristics of a connected society that further suggests directions and a basic system of cyber security education, through a detailed analysis of the current state of Domestic and Overseas Cyber Security Education. The purpose of this study was to define cybersecurity competencies that are necessary within an intelligent information society, and to propose a regular curriculum for strengthening cybersecurity competencies, through the comparison and meticulous analysis of both domestic and overseas educational systems that are pertinent to cybersecurity competencies. Accordingly, a cybersecurity competency system was constructed, by reflecting C3-Matrix, which is a cyber competency system model of digital citizens. The cybersecurity competency system consists of cyber ethics awareness, cyber ethics behavior, cyber security and cyber safety. In addition to this, based on the basic framework of the cybersecurity competency system, the relevant education that is currently being implemented in the United States, Australia, Japan and Korea were all compared and analyzed. From the insight gained through the analysis, the domestic curriculum was finally presented. The main objective of this new unified understanding, was to create a comprehensive and effective cyber security competency curriculum.