• Title/Summary/Keyword: Thesis Management

Search Result 782, Processing Time 0.024 seconds

A Study on Three Steps for the Model Development and Process of Cooperative Instruction for Teacher-librarians (사서교사의 협동수업 모형 개발과 과정에 관한 3단계 연구)

  • 함명식
    • Journal of the Korean Society for information Management
    • /
    • v.20 no.1
    • /
    • pp.121-144
    • /
    • 2003
  • This thesis has a research focus in effectively Practicing cooperative instruction where teacher-librarians play a role. The cooperative Instruction means to practice cooperatively with the subject teachers and teacher-librarians, in teaching subject matters(Korean, English, Social studies. Science, History, and so forth), using the school library. This thesis presents three steps by theory-model-support for a practice method through developing a cooperative instruction model. This is based on curriculum which is an axis of school education and an instructional design theory which is a base theory for subject matters.

An Experimental study on the Method of Detection and Blocking against SIP Flooding (SIP 플러딩 탐지 차단 실험방법에 대한 연구)

  • Choi, Hee Sik;Park, Jae Pyo;Jun, Mun Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.2
    • /
    • pp.39-46
    • /
    • 2011
  • Privacy IP hacking problems such as invasion of privacy, password cracking, voice wiretapping and internet over charged occurred, because VoIP internet voice phone service gradually spread. This thesis attempted to attack the VoIP service network by application. First use application to spoof IP address then attempted wiretap the VoIP service and sends a lot of messages to disturb service movement. At this point, we connected VoIP soft terminal, so we can operate real-time filtering operator to block the SIP Flooding offence by monitor the traffic and detect the location where it got attacked. This thesis used experiment to prove it is possible to detect the offence and defend from SIP Flooding offence.

A Study on the Two-sided and Mixed Model Assembly Line Balancing Using Genetic Algorithm (유전알고리듬을 이용한 양면.혼합모델 조립라인 밸런싱)

  • 이내형;조남호
    • Journal of the Korea Safety Management & Science
    • /
    • v.4 no.2
    • /
    • pp.83-101
    • /
    • 2002
  • In this thesis presents line balancing problems of two-sided and mixed model assembly line widely used in practical fields using genetic algorithm for reducing throughput time, cost of tools and fixtures and improving flexibility of assembly lines. Two-sided and mixed model assembly line is a special type of production line where variety of product similar in product characteristics are assembled in both sides. This thesis proposes the genetic algorithm adequate to each step in tow-sided and mixed model assembly line with suitable presentation, individual, evaluation function, selection and genetic parameter. To confirm proposed genetic algorithm, we apply to increase the number of tasks in case study. And for evaluation the performance of proposed genetic algorithm, we compare to existing algorithm of one-sided and mixed model assembly line. The results show that the algorithm is outstanding in the problems with a larger number of stations or larger number of tasks.

A Study of The Layout of Boxes to the Cargo Loading Problems (화물 적재 문제에 있어서의 배치 형태에 관한 연구)

  • Kim, Young-Min;Lee, Jun-Hee
    • Journal of the Korea Safety Management & Science
    • /
    • v.8 no.3
    • /
    • pp.143-157
    • /
    • 2006
  • The purpose of this thesis is to develop a heuristic algorithm evaluating the layout to maximize number of boxes when a single-box-type is packed into a container. Actually because three-dimensional problems are involved in NP-complete, much study has been focused on heuristic algorithms. The basic concept of this study is as follows. The problem is solved as palletizing problems with each side of the container respectively. By using the height of boxes, the problem is extended to a three-dimensional problem. Consequently, through this thesis, we can get good solution and the result is displayed by three-dimensional computer graphic.

Research of method prevent to illegal use of Credit Card (신용카드 부정사용 거래 예방을 위한 대처 방안 연구)

  • Pu, Chang Hee;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.3
    • /
    • pp.147-156
    • /
    • 2012
  • Most people in our society use credit card instead of cash or check, so credit card is very important economic method. Credit card supposed to be safe, but hackers hack credit card for illegal deal. Also hackers make fake credit card and issue fake credit card to other people. In this thesis it will study and analyze damage case for safe credit card deal. It will use safe credit card system to insert variety of information and data of using pattern in artificial intelligence network, so print out the possibility of risk and monitor the risk of credit card user's deal pattern, so if one of user's pattern is different than normal pattern, it will pop up message in consultant's screen. This thesis will study and suggest way of prevent from illegal deal and user friendly credit card checking system.

Design of Median Control Chart for Unsymmetrical Weibull Distribution (비대칭(非對稱)와이블분포공정(分布工程)에서 메디안특수관리도(特殊管理圖)의 설계(設計))

  • Sin, Yong-Baek;Hwang, Ui-Mi
    • Journal of Korean Society for Quality Management
    • /
    • v.14 no.2
    • /
    • pp.2-8
    • /
    • 1986
  • This thesis is concerned with the design of control chart based on the sample median which is easy to use in practical situations and to analyze the properties for non-normally distributed Weibull process. In this cases are use to the quality characteristics of the process are not normally distributed but skewed due to the intermitted production, small lot size and sample size is small one n=3 or n=5, etc. And when it relates unsymmetrically distributed process, model designed median control chart is more effective than Shewhart $\bar{x}$-chart which assumed on normal distribution, when we exactly should be known Weibull distribution or estimated. The median control chart in this thesis is more robustness compared with other conventionally developed control chart.

  • PDF

The Study for Establishment of Security Threat Measures for Secure NFC Service (안전한 NFC 서비스 활용 활성화를 위한 보안 위협 대책 마련을 위한 고찰)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.4
    • /
    • pp.219-228
    • /
    • 2018
  • The utilization of NFC has been continuously increasing due to the spread of smart phones and the development of short-range wireless communication networks. However, it has been suggested that stability and security of convenient NFC short-range wireless communications can be unstable and problematic. The unstable causes for NFC are the lack of security technologies for NFC, the controversy about personal information infringement, and the lack of social awareness on security breach against data settlement. NFC service can be conveniently used by simply touching other NFC devices and NFC tags through the NFC device. This thesis analyzes that NFC authentication technology, which is convenient for user are one of the unstable causes of security of NFC. This thesis suggest that ministry should research countermeasures and promote how users can use NFC safely. It also suggests that users should have awareness when they use payment and authentication service through NFC to prevent from security threat.

An Exploratory Research for the Conceptualization Failure knowledge (실패지식의 개념화를 위한 탐색적 연구)

  • Shim, Hyungseok
    • Knowledge Management Research
    • /
    • v.12 no.4
    • /
    • pp.121-132
    • /
    • 2011
  • Failure, the research object, means situations when goals and their results are different, which has developed presenting various aspects from ancient times and modern times. Failure is a complex concept which essentially requires judgement, and also a relative concept which can be changed depending on how you set up time base and standard. There are four stages for failure study to have been developed from studying failure through historical facts to the approach of organizational theory and it has been studied by looking at the failure of an organization according to different categories such as a developmental stage, a type of business, a period and a course. Compared with success science, failure study has not been studied sufficiently and also the level of its analysis is low. Thus, since lessons of failure tend to repeat themselves instead of being didactically accumulated, there need more studies on this. This thesis identified the main cause of the failure through various studies regarding failure which have been conducted at home and abroad. What the main cause of the failure that more than three studies mentioned have in common was that it occurred because organizations concentrated on the inside without communicating with external environment. The key point of failure study is to analyze failure, utilize it as assets, and create a frame of failure management. This thesis focused on delivering fragmentary knowledge on failure study, but case studies regarding this subject should be done in the future.

  • PDF

A Study on the Air Traffic Control Rule and Optimal Capacity of Air Base (항공교통관제규칙과 비행장의 최적규모에 관한 연구)

  • Lee Ki-Hyun
    • Journal of the military operations research society of Korea
    • /
    • v.2 no.1
    • /
    • pp.177-184
    • /
    • 1976
  • As the organizational size of a military service or business increases and its management becomes complex, the success in its management depends less on static type of management but more on careful, dynamic type of management. In this thesis, an operations research technique is applied to the problems of determining optimal air traffic control rule and of optimal capacity of air base for a military air base. An airport runway is regarded as the service facility in a queueing mechanism, used by landing, low approach, and departing aircraft. The usual order of service gives priority different classes of aircraft such as landings, departures, and low approaches; here service disciplines are considered assigning priorities to different classes of aricraft grouped according to required runway time. Several such priority rules are compared by means of a steady-state queueing model with non-preemptive priorities. From the survey conducted for the thesis development, it was found that the flight pattern such as departure, law approach, and landing within a control zone, follows a Poisson distribution and the service time follows an Erlang distribution. In the problem of choosing the optimal air traffic control rule, the control rule of giving service priority to the aircraft with a minimum average waiting cost, regardless of flight patterns, was found to be the optimal one. Through a simulation with data collected at K-O O Air Base, the optimal take-off interval and the optimal capacity of aircraft to be employed were determined.

  • PDF

Requirement management program for the Development of the Avionics Operational Flight Program (항공전자장비 비행운용프로그램 개발을 위한 요구도 관리 시스템)

  • Park, Kyoung-Choon;Seo, Jung-Bae;Bae, Jong-Min;Kang, Hyun-Syug
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.9
    • /
    • pp.2050-2058
    • /
    • 2011
  • The objective of this thesis is to research the software requirement management system for the development of operational flight program (OFP) which is embedded in aircraft avionics. It offers the function to record the requirement revision log. In fact, the COTS (commercial off-the-shelf) program which has similar function already exists in the market. But this kind of software programs are too complicated and relatively expensive in acquisition. Furthermore, they require too expensive maintenance cost, medium sized business company, this thesis intended to provide the software requirement management system that can be simply installed and easily used.