• Title/Summary/Keyword: Management software

Search Result 4,218, Processing Time 0.03 seconds

Evaluation of ICT-Utilized Lessons on the based of CBAM model by Home Economics Teachers - on Concerns and Implementation - (CBAM 모형에 근거한 가정과 교사의 ICT 활용수업 평가 - 관심도와 실행 수준을 중심으로 -)

  • 채정현;황선경
    • Journal of Korean Home Economics Education Association
    • /
    • v.14 no.2
    • /
    • pp.37-52
    • /
    • 2002
  • This study was made on the concerns and implementation of the ICT(Inormation and Communication Technology)-utilized lesson by home economics teacher. The objective of this study is to investigate the stages of concern and the level of use of the ICT-utilized lesson by home economics teachers in Kyunggi Province through the concerns based adoption model(CBAM) and to provide assistance for ICT-utilizing lesson to be efficiently adopted to home economics. This study made selected 200 schools by random sampling among 233 middle schools which have two or more home economic teachers and 21 or more classes in Kyunggi Province which has a total of 395 middle schools and mail-surveyed on 400 home economics teachers by means of questionnaire. The stages of concern. the levels of use and the types of implementation were used as instruments in this survey. The results of this study on the stages of concern. the levels of use and the type of implementation of the ICT-utilized lesson by home economics teachers in Kyunggi Province were as following: First. the highest point of the concern of home economics teachers of ICT-utilized lesson was the stage of awareness. the second highest point was the stage of management. the 3rd stage. and the stage of information. the lst stage. Second. the highest level of implementation of ICT-utilized lesson by home economics teachers was the level of mechanical use. the 3rd stage(30.4%), which followed by the level of orientation. the 1st stage(22.5%). and the level of nonuse(16.7%). the level of rountine use. the 4th stage(13.7%) the level of integration. the 5th stage(11.8%). the level of preparation 2(3.9%). and the level of renewal. the 6th stage(1.0%) Third, information search was the most in the type of ICT-use and in the course of lesson CD-ROM was used the most.. During ICT-utilized lesson. most of teachers used computer one to two hours a week mainly in the lessons of clothing life and eating life. Home economics teachers took the most training of how to use word-processor(68.6%) during computer education. and 60 teachers(66.0%) gave positive response about the effect of computer education on teacher's learning. Finally. the biggest problem with ICT-use in the teacher's learning was the long preparation time for lesson. and problem with ICT-utilized lesson was the burden of time and effort spent to buy needed materials and to recompose the existing materials for the lesson. Therefore. so as to adopt ICT-utilized lesson efficiently into school it is needed that active promotion for the lesson should be made to teachers. training teachers to raise their ability to use computer and various kinds of software should be expanded. and school authorities' financial and administrative assistance should be given for the smooth proceeding of the lesson.

  • PDF

Implementation and Design of motorcar consumption management iOS based software with OBD-II and WiFi network (OBD-II WiFi를 이용한 iOS 기반의 자동차 소모품관리 소프트웨어 설계 및 구현)

  • Jeong, Da-Woon;Nam, Jae-Hyun;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.475-478
    • /
    • 2011
  • driver for safety always check the status of their vehicle, and it is essential to understand. But if you want to know the status of the driver of the vehicle in specialist referral time and money because it costs the operator shall be paid. Today's rapidly changing IT technology with the development of the various features of your phone to check the status of the vehicle was able to do. However, the car's existing phone system, car diagnostic expertise must be learned because it will reveal the status of the vehicle do not have the expertise to not highlight the need for diagnostic. To reflect these points in smartphone users to easily use their own vehicles at a time to determine the status of a system that is required. In this paper, OBD-II protocol conversion WiFi OBD-II connector, retrieving information from the driver of the vehicle replacement cycle of consumables required vehicle inspection, vehicle problems in real-time diagnostic information to the user ease of use shows the IOS implementation in the automotive supply was implemented based on the smartphone.

  • PDF

Study on establishing Green Port Policy in Korea to meet Ports' Characteristics: Development of Ulsan Green Port Policy by using AHP (우리나라 항만특성에 맞는 그린포트정책 수립에 관한 연구 - AHP를 이용한 울산항 그린포트 정책 우선순위 개발)

  • Kim, Tae-Goun;Kim, Hwan-Seong
    • Journal of Navigation and Port Research
    • /
    • v.38 no.5
    • /
    • pp.549-559
    • /
    • 2014
  • The increasing demand of maritime transportation and port development especially due to increased international trade resulted in a strengthening of regulating the greenhouse gas emissions mainly from ships by International Maritime Organization (IMO). Responding to these international environmental regulation and enforcement, the United States and the European seaports have expanded their Green Port Policy, which can promote the public welfare by reducing pollution caused by ships and ports. Accordingly, in 2010, Korean government enacted "The Framework Act on Low Carbon, Green Growth" and had pushed for all Korean ports to establish and implement their own green port policies. Therefore, the objective of this study is to establish the Green Port Policy Plan for sustainable and environmental friendly operations and developments of Ulsan port, which plans to be the oil hub port of Northeast Asia. To this end, we studied the current status of the environmental policy issues in Ulsan Port and international-&-domestic case studies on establishment of green port policy. With these studies, Ulsan green policy alternatives were identified that through the experts advice, and then were prioritized by adopting AHP survey analysis. As the result of this study, it was notified that LED lights replacement and AMP establishment as the hardware policy and the port environmental management department as the software policy were equally important policy options for the implementation of sustainable Ulsan Green Port Policy to meet port's characteristics.

Development of a Prototype Patient Monitoring System with Module-Based Bedside Units and Central Stations: Overall Architecture and Specifications (모듈형 환자감시기와 중앙 환자감시기로 구성되는 환자감시시스템 시제품의 개발: 전체구조 및 사양)

  • Woo, E.J.;Park, S.H.;Jun, B.M.;Moon, C.W.;Lee, H.C.;Kim, S.T.;Kim, H.J.;Seo, J.J.;Chae, K.M.;Park, J.C.;Choi, K.H.;Lee, W.J.;Kim, K.S.
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1996 no.05
    • /
    • pp.315-319
    • /
    • 1996
  • We have developed a prototype patient monitoring system including module-based bedside units, interbed network, and central stations. A bedside unit consists of a color monitor and a main CPU unit with peripherals including a module controller. It can also include up to 3 module cases and 21 different modules. In addition to the 3-channel recorder module, six different physiological parameters of ECG, respiration, invasive blood pressure, noninvasive blood pressure, body temperature, and arterial pulse oximetry with plethysmogaph are provided as parameter modules. Modules and a module controller communicate with up to 1Mbps data rate through an intrabed network based on RS-485 and HDLC protocol. Bedside units can display up to 12 channels of waveforms with any related numeric informations simultaneously. At the same time, it communicates with other bedside units and central stations through interbed network based on 10Mbps Ethernet and TCP/IP protocol. Software far bedside units and central stations fully utilizes gaphical user interface techniques and all functions are controlled by a rotate/push button on bedside unit and a mouse on central station. The entire system satisfies the requirements of AAMI and ANSI standards in terms of electrical safety and performances. In order to accommodate more advanced data management capabilities such as 24-hour full disclosure, we are developing a relational database server dedicated to the patient monitoring system. We are also developing a clinical workstation with which physicians can review and examine the data from patients through various kinds of computer networks far diagnosis and report generation. Portable bedside units with LCD display and wired or wireless data communication capability will be developed in the near future. New parameter modules including cardiac output, capnograph, and other gas analysis functions will be added.

  • PDF

Design of a Policy-based Security Mechanism for the Secure Grid Applications (안전한 그리드 응용을 위한 정책기반의 보안 기능 설계)

  • Cho, Young-Bok;You, Mi-Kyung;Lee, Sang-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.2
    • /
    • pp.901-908
    • /
    • 2011
  • For the available grid environmental realization, the resource supply PC must have to provide an appropriate security function of their operation environments. SKY@HOME is a kind of the grid computing environments. If this has not supervised by administrator handling smoothly, it is inherently vulnerable state to the security level of the grid environments, because the resource supply PC is not update a security function without delay. It is also have the troublesome problems which have to install of an additional security program for support the appropriate security. This paper proposes an integration security model on the policy-based that provides an update each level according to the situation of the resource supply PC for improving its problems as a security aspect of the SKY@HOME. This model analyzes the security state of the resource supply PC respectively, and then the result is available to provide an appropriate security of the resource supply PC using an integration security model. The proposed model is not need additionally to buy and install the software, because it is provided the security management server oriented service. It is also able to set up the suit security function of a characteristic of the each resource supply PC. As a result, this paper clearly show the participation of resource supply PC improved about 20%.

Development of a Moving Monitor System for Growing Crops and Environmental Information in Green House (시설하우스 이동형 환경 및 생장 모니터링 시스템 개발)

  • Kim, Ho-Joon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.3
    • /
    • pp.285-290
    • /
    • 2016
  • In rural area, our farmers confront decreasing benefits owing to imported crops and increased cost. Recently, the government encourage the 6th Industry that merges farming, rural resources, and information and communication technology. Therefor the government makes an investment in supplying 'smart greenhouse' in which a farmer monitor growing crops and environment information to control growing condition. The objective of this study is developing an Moving Monitor and Control System for crops in green House. This system includes a movable sensing unit, a controlling unit, and a server PC unit. The movable sensing unit contains high resolution IP camera, temperature and humidity sensor and WiFi repeater. It rolls on a rail hanging beneath the ceiling of a green house. The controlling unit contains embedded PC, PLC module, WiFi router, and BLDC motor to drive the movable sensing unit. And the server PC unit contains a integrated farm management software and home pages and databases in which the images of crops and environment informations. The movable sensing unit moves widely in a green house and gathers lots of information. The server saves these informations and provides them to customers with the direct commercing web page. This system will help farmers to control house environment and sales their crops in online market. Eventually It will be helpful for farmers to increase their benefits.

The Automation Model of Ransomware Analysis and Detection Pattern (랜섬웨어 분석 및 탐지패턴 자동화 모델에 관한 연구)

  • Lee, Hoo-Ki;Seong, Jong-Hyuk;Kim, Yu-Cheon;Kim, Jong-Bae;Gim, Gwang-Yong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.8
    • /
    • pp.1581-1588
    • /
    • 2017
  • Recently, circulating ransomware is becoming intelligent and sophisticated through a spreading new viruses and variants, targeted spreading using social engineering attack, malvertising that circulate a large quantity of ransomware by hacking advertising server, or RaaS(Ransomware-as-a- Service), from the existing attack way that encrypt the files and demand money. In particular, it makes it difficult to track down attackers by bypassing security solutions, disabling parameter checking via file encryption, and attacking target-based ransomware with APT(Advanced Persistent Threat) attacks. For remove the threat of ransomware, various detection techniques are developed, but, it is very hard to respond to new and varietal ransomware. Accordingly, in this paper, find out a making Signature-based Detection Patterns and problems, and present a pattern automation model of ransomware detecting for responding to ransomware more actively. This study is expected to be applicable to various forms in enterprise or public security control center.

Classification of BcN Vulnerabilities Based on Extended X.805 (X.805를 확장한 BcN 취약성 분류 체계)

  • Yoon Jong-Lim;Song Young-Ho;Min Byoung-Joon;Lee Tai-Jin
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.427-434
    • /
    • 2006
  • Broadband Convergence Network(BcN) is a critical infrastructure to provide wired-and-wireless high-quality multimedia services by converging communication and broadcasting systems, However, there exist possible danger to spread the damage of an intrusion incident within an individual network to the whole network due to the convergence and newly generated threats according to the advent of various services roaming vertically and horizontally. In order to cope with these new threats, we need to analyze the vulnerabilities of BcN in a system architecture aspect and classify them in a systematic way and to make the results to be utilized in preparing proper countermeasures, In this paper, we propose a new classification of vulnerabilities which has been extended from the ITU-T recommendation X.805, which defines the security related architectural elements. This new classification includes system elements to be protected for each service, possible attack strategies, resulting damage and its criticalness, and effective countermeasures. The new classification method is compared with the existing methods of CVE(Common Vulnerabilities and Exposures) and CERT/CC(Computer Emergency Response Team/Coordination Center), and the result of an application to one of typical services, VoIP(Voice over IP) and the development of vulnerability database and its management software tool are presented in the paper. The consequence of the research presented in the paper is expected to contribute to the integration of security knowledge and to the identification of newly required security techniques.

Implementation of User-friendly Intelligent Space for Ubiquitous Computing (유비쿼터스 컴퓨팅을 위한 사용자 친화적 지능형 공간 구현)

  • Choi, Jong-Moo;Baek, Chang-Woo;Koo, Ja-Kyoung;Choi, Yong-Suk;Cho, Seong-Je
    • The KIPS Transactions:PartD
    • /
    • v.11D no.2
    • /
    • pp.443-452
    • /
    • 2004
  • The paper presents an intelligent space management system for ubiquitous computing. The system is basically a home/office automation system that could control light, electronic key, and home appliances such as TV and audio. On top of these basic capabilities, there are four elegant features in the system. First, we can access the system using either a cellular Phone or using a browser on the PC connected to the Internet, so that we control the system at any time and any place. Second, to provide more human-oriented interface, we integrate voice recognition functionalities into the system. Third, the system supports not only reactive services but also proactive services, based on the regularities of user behavior. Finally, by exploiting embedded technologies, the system could be run on the hardware that has less-processing power and storage. We have implemented the system on the embedded board consisting of StrongARM CPU with 205MHz, 32MB SDRAM, 16MB NOR-type flash memory, and Relay box. Under these hardware platforms, software components such as embedded Linux, HTK voice recognition tools, GoAhead Web Server, and GPIO driver are cooperated to support user-friendly intelligent space.

A Study on the Evaluation of Service Quality Index for International Airport Using MCJ (MCJ를 이용한 공항서비스 품질지수 평가에 관한 연구)

  • Lee, Seung-Chang;Lee, Gang-Seok
    • Journal of Korean Society of Transportation
    • /
    • v.23 no.1
    • /
    • pp.45-54
    • /
    • 2005
  • The main purpose of this study is located at developing Ominibus Monitoring System(OMS) for the purpose of the internal management, which enable to establish job standards, find out matters to be improved, and appreciate for its treatment in a systematic way. It is through developing subjective or objective estimation tool with use of importance, perceived level, and complex index at international airport by each principal service items, The direction of this study came towards for the purpose of developing a metric analysis tool, utilizing the Quantitative Secondary Data, Analysing Perceived Data through airport user surveys, systemizing the data collection-input-analysis process, making data image according to the graph of results, planning service encounter and endowing control attribution, and ensuring competitiveness at the minimal international standards. It is much important to set up a pre-investigation plan on the base of existent foreign literature and actual inspection to international airport. Two tasks have been executed together on the base of this pre-investigation; one is developing subjective estimation standards for departing party, entering party, and airport residence and the other is developing objective standards as complementary methods. The study has processed for the monitoring services at airports regularly and irregularly through developing software system for operating standards after ensuring credibility and feasibility of estimation standards with substantial and statistical way.