• Title/Summary/Keyword: 정보 공개

Search Result 2,901, Processing Time 0.033 seconds

Middle school Home Economics teachers' perception and actual performance of self-supervision at school related to Home Economics (중학교 가정과 교사의 교과 관련 교내 자율장학에 대한 인식과 실태)

  • Go, Mi-Young;Chae, Jung-Hyun
    • Journal of Korean Home Economics Education Association
    • /
    • v.22 no.4
    • /
    • pp.91-107
    • /
    • 2010
  • The purpose of this study was to investigate what middle school Home Economics(HE) teachers perceive, practice and need for self-supervision at school related to HE. Questionnaires were sent by E-mail and 150 were collected. Descriptive statistics including frequency, percentage, average, standard deviation, t-test and ANOVA analysis were reported using SPSS/win 10.1. The results of this research were as follows: First, middle school HE teachers perceived that self-supervision at school was essential since it promoted self reflection of teachers themselves and improved professional skills. Furthermore, peer-coaching was highly preferred. Second, negative responses to the supervision of principal, vice-principal, and peer teachers overwhelmed positive answers. Information exchange among peer teachers was frequent, yet, approximately 22.6% of middle school HE teachers were still avoiding sharing information process for several reasons. About half of the teachers answered that all teachers needed to participate in this process. Third, they pointed out that self-supervision at school was not implemented well because of the lack of time due to the heavy work load, negative and passive attitude for the improvement of teaching-learning activities, administration-centered supervision that did not reflect teachers' opinion, and shortage of economical, and environmental support.. HE teachers perceived that peer teachers who were doing good practices were most helpful for the supervision. Also, they preferred self-evaluation at the end of the self-supervision at school. Forth, to improve self-supervision at school, there were very high demands for reduction of administrative work, additional time, fundamental philosophy toward HE education. Fifth, the purpose and detailed plans of self-supervision were recognized as the results that were democratically derived by the HE teachers. Sixth, class inspection and informal inspection were operated once in a year, and self-training was rarely operated. Peer coaching and self-coaching were operated occasionally. Self-coaching and peer coaching were reported as the most helpful types of supervision. In addition, HE teachers answered that supervision was helpful to teaching method followed by contents, evaluation, and philosophy of education.

  • PDF

A Development of Kolb's Learning Style Based Team Organization Support System (Kolb의 학습양식에 기반 한 팀 조직 지원 시스템 개발)

  • Park, Su-Hong;Jung, Ju-Young;Hong, Jin-Yong;Kim, Seong-Ok;Ryu, Young-Ho;Kang, Eun-Kyeong
    • Journal of The Korean Association of Information Education
    • /
    • v.12 no.1
    • /
    • pp.9-22
    • /
    • 2008
  • The purpose of this research is to develop a prototype of the support system in order for team building associated with web-based project learning having applied Kolb's learning style. To accomplish this purpose, the following research tasks were performed. First, core idea in order to embody the system's value, key activities, tools that will support pertinent activities and the strategy so as to develop guidelines, etc. were devised and prepared. Second, a system was designed on the basis of structural model of teaching design, then after, interface was developed. The core factors in this system are inspection of learning style, organizing a team and team building. Above all, it is required to make learners know about learning environments, of which they are in favor, and also its distinctive features through inspection of learning style, and then focusing on learning style, a team should be organized insomuch as to accommodate a variety of learning styles as much as possible. For the purpose of team building, after learning style of each constituent member of the team has been made known, then the roles will be divided among the constituent members of the team so as to suit their individual characteristics referring to each of their learning styles that have been exposed. To verify the value of this system developed and efficiency thereof, a focus group interview was conducted. The focus group consisted of professionals, all from related fields. After the interview, the points required to make further improvements were elicited and taken care of by follow-up actions as needed. And having reflected such improvements made, the final system was developed. With this newly developed system, learners can get the results of inspection of learning style so quickly by performing inspection any time any where, and based on the results from such inspection, a team comprising dissimilar constituents who exhibit a variety of different propensities will be automatically organized. Thus, this system may be used not only for web-based project learning having unspecified persons elected as constituents, but in the offline space also.

  • PDF

A personalized TV service under Open network environment (개방형 환경에서의 개인 맞춤형 TV 서비스)

  • Lye, Ji-Hye;Pyo, Sin-Ji;Im, Jeong-Yeon;Kim, Mun-Churl;Lim, Sun-Hwan;Kim, Sang-Ki
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2006.11a
    • /
    • pp.279-282
    • /
    • 2006
  • IP망을 이용한 IPTV 방송 서비스가 새로운 수익 모델로 인정받고 현재 국내의 KT, SKT 등이 IPTV 시범서비스를 준비하거나 진행 중에 있다 이 IPTV 서비스는 이전의 단방향 방송과는 달리 사용자와의 인터렉션을 중시하는 양방향 방송을 표방하기 때문에 지금까지의 방송과는 다른 혁신적인 방송서비스가 기대된다. 하지만 IPTV 서비스에 있어서 여러 통신사와 방송사가 참여할 수 있을 것으로 보여지는 것과는 달리 실상은 몇몇 거대 통신기업이 자신들의 망을 이용하는 가입자들을 상대로 한정된 사업을 벌이고 있다. 이는 IPTV 서비스를 위한 인프라가 구축되어 있지 않고 방통융합망의 개념을 만족시키기 위해 서비스 개발자가 알아야 할 프로토콜들이 너무나 많기 때문이다. 따라서 본 논문에서는 이러한 상황을 타개할 수 있는 수단을 Open API로 제안한다. 맞춤형 방송을 위한 시나리오를 TV-Anytime의 벤치마킹과 유저 시나리오를 참고하여 재구성하고 이 시나리오로부터 IPTV 방송 서비스를 위한 방통융합망의 기본적이고 강력한 기능들을 Open API 함수로 정의하였다. 여기에서의 방송 서비스는 NDR, EPG, 개인 맞춤형 광고 서비스를 말하며 각 서비스를 위한 서버는 통합망 위에 존재하고 이 서버들이 개방하는 API들은 다른 응용프로그램에 의해 사용되는 것이기 때문에 가장 기본적인 기능을 정의하게 된다. 또한, 제안한 Open API 함수를 이용하여 개인 맞춤형 방송 응용 서비스를 구현함으로써 서비스 검증을 하였다. Open API는 웹서비스를 통해 공개된 기능들로써 게이트웨이를 통해 다른 망에서 사용할 수 있게 된다. Open API 함수의 정의는 함수 이름, 기능, 입 출력 파라메터로 이루어져 있다. 사용자 맞춤 서비스를 위해 전달되는 사용자 상세 정보와 콘텐츠 상세 정보는 TV-Anytime 포럼에서 정의한 메타데이터 스키마를 이용하여 정의하였다.가능하게 한다. 제안된 방법은 프레임 간 모드 결정을 고속화함으로써 스케일러블 비디오 부호화기의 연산량과 복잡도를 최대 57%감소시킨다. 그러나 연산량 감소에 따른 비트율의 증가나 화질의 열화는 최대 1.74% 비트율 증가 및 0.08dB PSNR 감소로 무시할 정도로 작다., 반드시 이에 대한 검증이 필요함을 알 수 있었다. 현지관측에 비해 막대한 비용과 시간을 절약할 수 있는 위성영상해석방법을 이용한 방법은 해양수질파악이 가능할 것으로 판단되며, GIS를 이용하여 다양하고 복잡한 자료를 데이터베이스화함으로써 가시화하고, 이를 기초로 공간분석을 실시함으로써 환경요소별 공간분포에 대한 파악을 통해 수치모형실험을 이용한 각종 환경영향의 평가 및 예측을 위한 기초자료로 이용이 가능할 것으로 사료된다.염총량관리 기본계획 시 구축된 모형 매개변수를 바탕으로 분석을 수행하였다. 일차오차분석을 이용하여 수리매개변수와 수질매개변수의 수질항목별 상대적 기여도를 파악해 본 결과, 수리매개변수는 DO, BOD, 유기질소, 유기인 모든 항목에 일정 정도의 상대적 기여도를 가지고 있는 것을 알 수 있었다. 이로부터 수질 모형의 적용 시 수리 매개변수 또한 수질 매개변수의 추정 시와 같이 보다 세심한 주의를 기울여 추정할 필요가 있을 것으로 판단된다.변화와 기흉 발생과의 인과관계를 확인하고 좀 더 구체화하기 위한 연구가 필요할 것이다.게 이루어질 수 있을 것으로 기대된다.는 초과수익률이 상승하지만, 이후로는 감소하므로, 반전거래전략을 활용하는 경우 주식투자기간은 24개월이하의 중단기가 적합함을 발견하였다. 이상의 행태적 측면과 투자성과측면의 실증결과를 통하여 한국주식시장에 있어서 시장수익률을 평균적으로 초과할 수 있는 거래전략은 존재하므로 이러한 전략을 개발 및 활용할 수 있으며, 특히, 한국주식시장에 적합한 거래전략은 반전거래전략이고, 이 전략의 유용성은 투자자가 설정한 투자기간보다

  • PDF

A Study on the Field Data Applicability of Seismic Data Processing using Open-source Software (Madagascar) (오픈-소스 자료처리 기술개발 소프트웨어(Madagascar)를 이용한 탄성파 현장자료 전산처리 적용성 연구)

  • Son, Woohyun;Kim, Byoung-yeop
    • Geophysics and Geophysical Exploration
    • /
    • v.21 no.3
    • /
    • pp.171-182
    • /
    • 2018
  • We performed the seismic field data processing using an open-source software (Madagascar) to verify if it is applicable to processing of field data, which has low signal-to-noise ratio and high uncertainties in velocities. The Madagascar, based on Python, is usually supposed to be better in the development of processing technologies due to its capabilities of multidimensional data analysis and reproducibility. However, this open-source software has not been widely used so far for field data processing because of complicated interfaces and data structure system. To verify the effectiveness of the Madagascar software on field data, we applied it to a typical seismic data processing flow including data loading, geometry build-up, F-K filter, predictive deconvolution, velocity analysis, normal moveout correction, stack, and migration. The field data for the test were acquired in Gunsan Basin, Yellow Sea using a streamer consisting of 480 channels and 4 arrays of air-guns. The results at all processing step are compared with those processed with Landmark's ProMAX (SeisSpace R5000) which is a commercial processing software. Madagascar shows relatively high efficiencies in data IO and management as well as reproducibility. Additionally, it shows quick and exact calculations in some automated procedures such as stacking velocity analysis. There were no remarkable differences in the results after applying the signal enhancement flows of both software. For the deeper part of the substructure image, however, the commercial software shows better results than the open-source software. This is simply because the commercial software has various flows for de-multiple and provides interactive processing environments for delicate processing works compared to Madagascar. Considering that many researchers around the world are developing various data processing algorithms for Madagascar, we can expect that the open-source software such as Madagascar can be widely used for commercial-level processing with the strength of expandability, cost effectiveness and reproducibility.

Identifying Bridging Nodes and Their Essentiality in the Protein-Protein Interaction Networks (단백질 상호작용 네트워크에서 연결노드 추출과 그 중요도 측정)

  • Ahn, Myoung-Sang;Ko, Jeong-Hwan;Yoo, Jae-Soo;Cho, Wan-Sup
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.5
    • /
    • pp.1-13
    • /
    • 2007
  • In this research, we found out that bridging nodes have great effect on the robustness of protein-protein interaction networks. Until now, many researchers have focused on node's degree as node's essentiality. Hub nodes in the scale-free network are very essential in the network robustness. Some researchers have tried to relate node's essentiality with node's betweenness centrality. These approaches with betweenness centrality are reasonable but there is a positive relation between node's degree and betweenness centrality value. So, there are no differences between two approaches. We first define a bridging node as the node with low connectivity and high betweenness value, we then verify that such a bridging node is a primary factor in the network robustness. For a biological network database from Internet, we demonstrate that the removal of bridging nodes defragment an entire network severally and the importance of the bridging nodes in the network robustness.

  • PDF

CIA-Level Driven Secure SDLC Framework for Integrating Security into SDLC Process (CIA-Level 기반 보안내재화 개발 프레임워크)

  • Kang, Sooyoung;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.909-928
    • /
    • 2020
  • From the early 1970s, the US government began to recognize that penetration testing could not assure the security quality of products. Results of penetration testing such as identified vulnerabilities and faults can be varied depending on the capabilities of the team. In other words none of penetration team can assure that "vulnerabilities are not found" is not equal to "product does not have any vulnerabilities". So the U.S. government realized that in order to improve the security quality of products, the development process itself should be managed systematically and strictly. Therefore, the US government began to publish various standards related to the development methodology and evaluation procurement system embedding "security-by-design" concept from the 1980s. Security-by-design means reducing product's complexity by considering security from the initial phase of development lifecycle such as the product requirements analysis and design phase to achieve trustworthiness of product ultimately. Since then, the security-by-design concept has been spread to the private sector since 2002 in the name of Secure SDLC by Microsoft and IBM, and is currently being used in various fields such as automotive and advanced weapon systems. However, the problem is that it is not easy to implement in the actual field because the standard or guidelines related to Secure SDLC contain only abstract and declarative contents. Therefore, in this paper, we present the new framework in order to specify the level of Secure SDLC desired by enterprises. Our proposed CIA (functional Correctness, safety Integrity, security Assurance)-level-based security-by-design framework combines the evidence-based security approach with the existing Secure SDLC. Using our methodology, first we can quantitatively show gap of Secure SDLC process level between competitor and the company. Second, it is very useful when you want to build Secure SDLC in the actual field because you can easily derive detailed activities and documents to build the desired level of Secure SDLC.

A Fast Algorithm for Computing Multiplicative Inverses in GF(2$^{m}$) using Factorization Formula and Normal Basis (인수분해 공식과 정규기저를 이용한 GF(2$^{m}$ ) 상의 고속 곱셈 역원 연산 알고리즘)

  • 장용희;권용진
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.5_6
    • /
    • pp.324-329
    • /
    • 2003
  • The public-key cryptosystems such as Diffie-Hellman Key Distribution and Elliptical Curve Cryptosystems are built on the basis of the operations defined in GF(2$^{m}$ ):addition, subtraction, multiplication and multiplicative inversion. It is important that these operations should be computed at high speed in order to implement these cryptosystems efficiently. Among those operations, as being the most time-consuming, multiplicative inversion has become the object of lots of investigation Formant's theorem says $\beta$$^{-1}$ =$\beta$$^{2}$sup m/-2/, where $\beta$$^{-1}$ is the multiplicative inverse of $\beta$$\in$GF(2$^{m}$ ). Therefore, to compute the multiplicative inverse of arbitrary elements of GF(2$^{m}$ ), it is most important to reduce the number of times of multiplication by decomposing 2$^{m}$ -2 efficiently. Among many algorithms relevant to the subject, the algorithm proposed by Itoh and Tsujii[2] has reduced the required number of times of multiplication to O(log m) by using normal basis. Furthermore, a few papers have presented algorithms improving the Itoh and Tsujii's. However they have some demerits such as complicated decomposition processes[3,5]. In this paper, in the case of 2$^{m}$ -2, which is mainly used in practical applications, an efficient algorithm is proposed for computing the multiplicative inverse at high speed by using both the factorization formula x$^3$-y$^3$=(x-y)(x$^2$+xy+y$^2$) and normal basis. The number of times of multiplication of the algorithm is smaller than that of the algorithm proposed by Itoh and Tsujii. Also the algorithm decomposes 2$^{m}$ -2 more simply than other proposed algorithms.

A Hardware Implementation of the Underlying Field Arithmetic Processor based on Optimized Unit Operation Components for Elliptic Curve Cryptosystems (타원곡선을 암호시스템에 사용되는 최적단위 연산항을 기반으로 한 기저체 연산기의 하드웨어 구현)

  • Jo, Seong-Je;Kwon, Yong-Jin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.1
    • /
    • pp.88-95
    • /
    • 2002
  • In recent years, the security of hardware and software systems is one of the most essential factor of our safe network community. As elliptic Curve Cryptosystems proposed by N. Koblitz and V. Miller independently in 1985, require fewer bits for the same security as the existing cryptosystems, for example RSA, there is a net reduction in cost size, and time. In this thesis, we propose an efficient hardware architecture of underlying field arithmetic processor for Elliptic Curve Cryptosystems, and a very useful method for implementing the architecture, especially multiplicative inverse operator over GF$GF (2^m)$ onto FPGA and futhermore VLSI, where the method is based on optimized unit operation components. We optimize the arithmetic processor for speed so that it has a resonable number of gates to implement. The proposed architecture could be applied to any finite field $F_{2m}$. According to the simulation result, though the number of gates are increased by a factor of 8.8, the multiplication speed We optimize the arithmetic processor for speed so that it has a resonable number of gates to implement. The proposed architecture could be applied to any finite field $F_{2m}$. According to the simulation result, though the number of gates are increased by a factor of 8.8, the multiplication speed and inversion speed has been improved 150 times, 480 times respectively compared with the thesis presented by Sarwono Sutikno et al. [7]. The designed underlying arithmetic processor can be also applied for implementing other crypto-processor and various finite field applications.

A Comparative Study on Quantifying Uncertainty of Vitamin A Determination in Infant Formula by HPLC (HPLC에 의한 조제분유 중 비타민 A 함량 분석의 측정불확도 비교산정)

  • Lee, Hong-Min;Kwak, Byung-Man;Ahn, Jang-Hyuk;Jeon, Tae-Hong
    • Korean Journal of Food Science and Technology
    • /
    • v.40 no.2
    • /
    • pp.152-159
    • /
    • 2008
  • The purpose of this study was to determine the accurate quantification of vitamin A in infant formula by comparing two different standard stock solutions as well as various sample weights using high performance liquid chromatography. The sources of uncertainty in measurement, such as sample weight, final smaple vloume, and the instrumental results, were identified and used as parameters to determine the combined standard uncertainty based on GUM(guide to the expression of uncertainty in measurement) and the Draft EURACHEM/CITAC Guide. The uncertainty components in measuring were identified as standard weight, purity, molecular weight, dilution of the standard solution, calibration curve, recovery, reproducibility, sample weight, and final sample volume. Each uncertainty component was evaluated for type A and type B and included to calculate the combined uncertainty. The analytical results and combined standard uncertainties of vitamin A according to the two different methods of stock solution preparation were 627 ${\pm}$ 33 ${\mu}$g R.E./100 g for 1,000 mg/L of stock solution, and 627 ${\pm}$ 49 ${\mu}$g R.E./100 g for 100 mg/L of stock solution. The analytical results and combined standard uncertainties of vitamin A according to the various sample weighs were 622 ${\pm}$ 48 ${\mu}$g R.E./100 g, 627 ${\pm}$ 33 ${\mu}$g R.E./100 g, and 491 ${\pm}$ 23 ${\mu}$g R.E./100 g for 1 g, 2 g, and 5 g of sampling, respectively. These data indicate that the preparation method of standard stock solution and the smaple amount were main sources of uncertainty in the analysis results for vitamin A. Preparing 1,000 mg/L of stock solution for standard material sampling rather than 100 mg, and sampling not more than 2 g of infant formula, would be effective for reducing differences in the results as well as uncertainty.

Host-Based Intrusion Detection Model Using Few-Shot Learning (Few-Shot Learning을 사용한 호스트 기반 침입 탐지 모델)

  • Park, DaeKyeong;Shin, DongIl;Shin, DongKyoo;Kim, Sangsoo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.7
    • /
    • pp.271-278
    • /
    • 2021
  • As the current cyber attacks become more intelligent, the existing Intrusion Detection System is difficult for detecting intelligent attacks that deviate from the existing stored patterns. In an attempt to solve this, a model of a deep learning-based intrusion detection system that analyzes the pattern of intelligent attacks through data learning has emerged. Intrusion detection systems are divided into host-based and network-based depending on the installation location. Unlike network-based intrusion detection systems, host-based intrusion detection systems have the disadvantage of having to observe the inside and outside of the system as a whole. However, it has the advantage of being able to detect intrusions that cannot be detected by a network-based intrusion detection system. Therefore, in this study, we conducted a study on a host-based intrusion detection system. In order to evaluate and improve the performance of the host-based intrusion detection system model, we used the host-based Leipzig Intrusion Detection-Data Set (LID-DS) published in 2018. In the performance evaluation of the model using that data set, in order to confirm the similarity of each data and reconstructed to identify whether it is normal data or abnormal data, 1D vector data is converted to 3D image data. Also, the deep learning model has the drawback of having to re-learn every time a new cyber attack method is seen. In other words, it is not efficient because it takes a long time to learn a large amount of data. To solve this problem, this paper proposes the Siamese Convolutional Neural Network (Siamese-CNN) to use the Few-Shot Learning method that shows excellent performance by learning the little amount of data. Siamese-CNN determines whether the attacks are of the same type by the similarity score of each sample of cyber attacks converted into images. The accuracy was calculated using Few-Shot Learning technique, and the performance of Vanilla Convolutional Neural Network (Vanilla-CNN) and Siamese-CNN was compared to confirm the performance of Siamese-CNN. As a result of measuring Accuracy, Precision, Recall and F1-Score index, it was confirmed that the recall of the Siamese-CNN model proposed in this study was increased by about 6% from the Vanilla-CNN model.