• Title/Summary/Keyword: 중요도-실행도 분석

Search Result 811, Processing Time 0.029 seconds

A Convergent Perspective on Preference Attributes by Purchase Channel Choosing Used Cars (중고 자동차 선택시 구매경로별 선호속성에 관한 융합적 시각)

  • Byeon, Hyeonsu
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.3
    • /
    • pp.215-223
    • /
    • 2017
  • The purpose of the present study is to identify the differences of customer preference in online and offline used car business. Conjoint analysis is used for examining the attributes of used car choices. As a result, the order of importance in real used car market is as follows: brand, design, price, model, mileage. Whereas the order of importance in online used car market is as follows: brand, trust, price, web design, accident. Accordingly, the author suggested that customer preferences depend on the path people are approaching and the attributes of preference vary in online and real stores. For example, trust and accident are important attributes in online market in comparison with real market. Used car market is increasing and becoming important. The authorities and practitioners need to understand used car market and establish the related policies.

Building of Integrated Increment Interpretation System Based on Action Equations (작용 식 기반 통합 점진 해석 시스템 구축)

  • Han, Jung-Ran;Choi, Sung
    • The KIPS Transactions:PartA
    • /
    • v.11A no.3
    • /
    • pp.149-156
    • /
    • 2004
  • As software is large and sophisticate, in order to increase the productivity and efficiency of programs in programming development environments, it is necessary to support the integrated system that offers user interface integrated editing, compiling, debugging, and running steps. The key tool in such environments is an incremental translation. In this paper, in order to increase the productivity and reusability of software, the goal is to construct the integrated incremental interpretation system that supports friendly user interface with editor, debugger, and incremental interpreter. We define the new object-oriented language, IMPLO(IMPerative Language with Object) using EBNF notation, and construct the integrated incremental interpretation system using incremental interpreter of the language. To do so, we extend attribute grammars for specifying static semantics and present new action equations to describe the dynamic semantics. We executed the incremental interpretation by using analyzing the dynamic semantics and then implemented integrated incremental interpretation system with editor and debugger in C, Lex and Yacc using X windows on SUN. We obtain about 50% speedups in case of incremental execution time for example programs.

A Functional Unit Dynamic API Birthmark for Windows Programs Code Theft Detection (Windows 프로그램 도용 탐지를 위한 기능 단위 동적 API 버스마크)

  • Choi, Seok-Woo;Cho, Woo-Young;Han, Tai-Sook
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.9
    • /
    • pp.767-776
    • /
    • 2009
  • A software birthmark is a set of characteristics that are extracted from a program itself to detect code theft. A dynamic API birthmark is extracted from the run-time API call sequences of a program. The dynamic Windows API birthmarks of Tamada et al. are extracted from API call sequences during the startup period of a program. Therefore. the dynamic birthmarks cannot reflect characteristics of main functions of the program. In this paper. we propose a functional unit birthmark(FDAPI) that is defined as API call sequences recorded during the execution of essential functions of a program. To find out that some functional units of a program are copied from an original program. two FDAPIs are extracted by executing the programs with the same input. The FDAPIs are compared using the semi-global alignment algorithm to compute a similarity between two programs. Programs with the same functionality are compared to show credibility of our birthmark. Binary executables that are compiled differently from the same source code are compared to prove resilience of our birthmark. The experimental result shows that our birthmark can detect module theft of software. to which the existing birthmarks of Tamada et al. cannot be applied.

A Study on the Influence Behaviors of the Implementation of Teachers' Curriculum: Focus on Teachers' Perceptions of Curriculum and Resistance (교사들의 교육과정 저항성에 따른 실행형태 영향요인에 관한 연구)

  • Kim, Eun Jung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.11
    • /
    • pp.721-729
    • /
    • 2018
  • As is the case with South Korea, if the authority for decision making on curricula is concentrated on the state level, the perspective of the understanding on the curricula could be said to be essential. And, such an understanding on the curricula can be important not only to the theorist of curricula but also the teachers in educational institutions. Also, there have been a number of studies to examine the awareness of the teachers on education reform. However, the studies on the resistance factor was mainly focused on the relationships with traits of individuals, covering factors such as their habits, maturity, character, and age, etc. But, it was difficult to find consistency in the results of these studies. Therefore, in this study, the researcher selected the teachers as the key factor of the execution of the curricula and examined the awareness of the teachers on education resistance and the negative views thereupon in the relationship between the knowledge, attitude, skills, and education execution, with a view to find another meaning. The subjects of this study were selected among the teachers in middle or high schools located in Gangnam, Songpa, and Joonggu districts of Seoul. The survey was conducted online with 15 institutions over three weeks from April 13 to 30, 2018. The data gathered were analyzed using SPSS 20.0 and AMOS 20.0, in order to validate the hypotheses through frequency analysis, confidence analysis, factor analysis, structural equation model, and sobel-test. The result of the analyses showed that the factors that affected execution of curricula were the skill system, knowledge system, and attitude of the teachers, in that order, with a positively significant influence. And, significant differences were identified between the factors depending on high or low resistance among teachers.

Copy Propagation in CTOC (CTOC에서 복사 전파)

  • Kim, Ki-Tae;Kim, Je-Min;Yoo, Won-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.1-8
    • /
    • 2007
  • Although the Java bytecode has numerous advantages. there ate also shortcomings such as slow execution speed and difficulty in analysis. Therefore. in order for the Java class file to be effectively executed under the execution environment such as the network, it is necessary to convert it into optimized code. We implements CTOC. CTOC generated CFG using the existing bytecode then created the SSA Form for analysis and optimization. However. due to insertion or the ${\phi}$-function in the process of conversion into the SSA Form, the number of nodes increased. As a means of reducing the number of nodes, we performed copy propagation, which is an optimization method applicable to the SSA form. Copy propagation is the process of a value of a variable being topied to another variable. There are cases where conversion due to copy propagation alone does not yield significant effects. However, when variables are not used in the later optimization stages, copy propagation provides a means for eliminating the copy statement for the corresponding variable, making it an important step. This paper shows the copy propagation to obtain a more optimized code in SSA Form.

  • PDF

Transform Nested Loops into MultiThread in Java Programming Language for Parallel Processing (자바 프로그래밍에서 병렬처리를 위한 중첩 루프 구조의 다중스레드 변환)

  • Hwang, Deuk-Young;Choi, Young-Keun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.8
    • /
    • pp.1997-2012
    • /
    • 1998
  • It is necessary to find out the parallelism in tlle sequential Java program to execute it on the parallel machine. The loop is a fundamental source to exploit parallelism as it process a large portion of total execution time in sequential Java program on the parallel machine. However, a complete parallel execution can hardly be achieved due to data dependence. This paper proposes the method of exploiting the implicit parallelism by structuring a dependence graph through the analysis of data dependence in the existing Java programming language having a nested loop structure. The parallel code generation method through the restructuring compiler and also the translation method of Java source program into multithread statement. which is supported by the Java programming language itself, are proposed here. The perforance evaluatlun of the program translaed into the thread statement is conducted using the trip cunt of loop and the trip Count of luop and the thread count as parameters The resttucturing compiler provides efficient way of exploiting parallelism by reducing manual overhead conveliing sequential Java program into parallel code. The execution time for the Java program as a result can be reduced un the parallel machine.

  • PDF

The Analysis of the Differences in the SME's Perception about Industrial Technology Security Support Policy (산업기술 보안 지원정책에 대한 중소기업의 인식차이 분석)

  • Jung, Yuhan;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.4
    • /
    • pp.15-32
    • /
    • 2020
  • Increasing uncertainties in the technological innovation environment and increasing technology competition also present new challenges in terms of industrial technology security. Therefore, the purpose of this study was to identify the direction of policy change necessary for the improvement of related policies in the future by examining the importance and implementation of the government's industrial technology security support policies for small and medium-sized enterprises engaged in industrial technology innovation activities. As a result of the analysis, first of all, small and medium-sized enterprises that responded to the government's industrial technology security support policy were perceived to be less performing than the importance of the program. These results can be said to mean that selective budget expansion for related policy programs may be necessary, along with efforts to improve the quality of each program. Second, an analysis of the differences in group recognition between new technology certification firms and industrial technology verification(certification) companies showed that significant differences exist between groups for the program. These results suggest that more effective operation of the relevant policies may require policy enforcement in consideration of the level of security and will of each company in industrial technology, as much as the quantitative characteristics of the entity. This study is meaningful in providing the necessary policy directional basic information for the design and execution of more specific and effective industrial technology security policies by presenting empirical research results that domestic small and medium-sized enterprises are aware of about the government's industrial technology security policies.

The maturity model based mutual influence between software project management domains (소프트웨어 프로젝트 관리 영역간의 상호영향을 고려한 성숙도 모델)

  • Jeon, Sun-Cheon;Hong, Sa-Neung
    • 한국경영정보학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.850-858
    • /
    • 2008
  • 최근 공공기관 및 금융권에서는 경쟁력 향상을 위한 정보시스템의 통합으로 프로젝트 규모가 대형화되고 또한, 프로젝트 수가 증가하고 있어 적절한 소프트웨어 프로젝트 관리 방안이 필요하다. 그러나 프로젝트 관리 영역간의 미치는 영향에 대하여 체계적인 연구가 미흡하였다. 따라서 선행 연구를 통하여 프로젝트 관리에 중요한 영역을 도출하였고, 도출된 "범위, 일정, 품질, 인력, 위험"의 각 영역들간의 상호 미치는 영향도의 분석과 각 영역의 진행 상태를 "계획, 실행, 완료" 단계로 구분하여 수행도를 분석하였다. 분석된 영향도와 수행도의 결과를 종합하여 프로젝트 관리 수준을 평가하는 모델을 제시하였다. 본 연구는 IT 분야의 전문가 그룹을 통해 프로젝트 관리 영역들간의 영향 분석이 실증적으로 연구가 이루어졌고, 또한 각 영역의 진행상태를 측정 함으로써 실무적인 측면에서 더욱 체계적이고 균형 잡힌 프로젝트 관리와 감리 수행 시에 활용할 수 있을 것이다.

  • PDF

Control Flow Graph Extraction for Performance Analysis of Real-Time Embedded Software (실시간 내장형 S/W의 성능분석을 위한 Control Flow Graph 추출)

  • 황요섭;안성용;이정아;심재홍
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04a
    • /
    • pp.217-219
    • /
    • 2003
  • 최근 반도체 설계 및 생산 공정의 급속한 발달로 내장형 시스템이 대중화되는 추세이고 비용이나 제품 출시 기간에 있어서 내장형 소프트웨어는 중요한 하나의 요소로 대두되고 있다. 내장형 시스템은 일반 PC와는 다르게 메모리 크기. 전력 소비, 신뢰성, 사이즈. 비용 등과 같은 제약사항들을 내포하기 때문에 제한된 자원의 효율적인 이용과 소프트웨어의 최적화를 위해 소프트웨어의 성능을 분석하기 위한 필요성이 대두된다. 본 논문에서는 소프트웨어 성능분석 도구인 'Cinderella'를 확장하기 위하여 현재 가장 널리 사용되고 있는 이진 실행 파일인 ELF파일에서 성능을 측정하기 위한 기본 요소로서 Control flow graph를 추출하기 위한 알고리즘을 제안한다. 본 논문에서 제안한 알고리즘은 향후 ARM기반의 머신에서 ELF파일의 내장형 소프트웨어의 시간분석에 필요한 요소이다.

  • PDF

Behavior Analysis of Internet Applications based on Network Traffic (네트워크 트래픽 기반 인터넷 응용의 동작형태 분석)

  • Park, Jin-Wan;Yoon, Sung-Ho;Park, Jun-Sang;Kim, Myung-Sup
    • Annual Conference of KIPS
    • /
    • 2009.04a
    • /
    • pp.1210-1213
    • /
    • 2009
  • 네트워크 트래픽의 응용 별 분류는 최근 학계의 중요한 이슈 중 하나이다. 기존의 전통적인 트래픽 분류 방법으로 대표되는 well-known 포트 기반 분류 방법 및 페이로드 시그니쳐 기반 분류 방법의 구조적 한계점을 극복하기 위한 새로운 대안으로써, 트래픽의 상관관계를 통한 분류 방법이 제안되었다. 본 논문에서는 트래픽 상관관계에 대한 정형화된 식이나 룰을 찾는데 유용한 정보를 제공하기 위해 인터넷 응용 별 트래픽을 동작형태의 관점에서 분석하였다. 학내 망에서 자주 사용되는 인터넷 응용을 선정하고, 이들이 실행 초기에 발생시키는 트래픽을 플로우와 패킷 단위로 분석한 내용을 기술하였다. 특히, 인터넷 응용이 발생시키는 플로우 중 페이로드가 존재하는 첫 플로우를 first talk 라 정의하였으며, 이에 대한 상세한 분석 내용을 기술하였다.