• Title/Summary/Keyword: school administrator

Search Result 101, Processing Time 0.031 seconds

Design and Implementaion of Distributed Database System Prototype of Schools using CORBA (CORBA를 이용한 학교간 분산데이터베이스 프로토타입 시스템의 설계 및 구현)

  • Choi, Hyun-Jong;Chung, Sang-wook;Kim, Tae-Young
    • The Journal of Korean Association of Computer Education
    • /
    • v.4 no.1
    • /
    • pp.145-152
    • /
    • 2001
  • The development of distributed databases using a distributed object technology is more popular than ever before because the current computer system environment is adaptable for a use as well as the cost of the integration of legacy systems is cheaper than making a new application. In schools, development of an integrated system consisted of many stand-alone databases give a teacher and an administrator the convenience of managing the database in a school and the ease integration of data in it. Therefore, this research is to design and implement the 3-tier distributed database using CORBA, Java and JDBC.

  • PDF

A Study on the Analysis of the Fishing Villages Peoples' Demand for a Creative Plan for the Fisheries High Schools (수산고등학교(水產高等學校) 활성화방안(活性化方案) 모색(摸索)을 위한 어촌주민(漁村住民)의 의식분석(意識分析))

  • Lee, Kyung-June
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.3 no.2
    • /
    • pp.1-18
    • /
    • 1991
  • The study is an analysis of the responses to a questionare by members of various fishing communities in Korea regarding their opinion about the vocational value of the fishing industry and factors which are acting as obstacles to entrance into the Fisheries High Schools, etc. Subjects were 2,000 : fishermen, members of the fishermen's cooperative society, and teachers and students of the Fisheries High Schools. Results indicated as follows: (a) It would be desirable to have fisheries courses incorperated in middle schools on islands and in fishing villages to improve enthusiasm of middle school students for entrance into Fisheries High Schools. (b) It is desirable that the principal or the administrator of middle schools in fishing villages and on islands should be a person who has majored in fisheries field, and so would support fisheries courses in the middle schools. (c) The level of peoples' appreciation of the fishing industry should be enhanced.

  • PDF

Proposal Self-Assessment System of AI Experience Way Education

  • Lee, Kibbm;Moon, Seok-Jae;Lee, Jong-Yong
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.274-281
    • /
    • 2021
  • In the field of artificial intelligence education, discussions on the direction of artificial intelligence education are actively underway, and it is necessary to establish a foundation for future information education. It is necessary to design a creative convergence teaching-learning and evaluation method. Although AI experience coding education has been applied, the evaluation stage is insufficient. In this paper, we propose an evaluation system that can verify the validity of the proposed education model to find a way to supplement the existing learning module. The core components of this proposed system are Assessment-Factor, Self-Diagnosis, Item Bank, and Evaluation Result modules, which are designed to enable system access according to the roles of administrator, instructors and learners. This system enables individualized learning through online and offline connection.

A Study of Analysis of Hacking Attacks on Cyber Terrorism and Prognostic Analysis of Phenomena (사이버테러에 대한 해킹공격 분석과 전조 현상 분석)

  • Noh, Jung Ho;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.123-126
    • /
    • 2013
  • Access control system, when operating the infrastructure manager and the permissions for the user to clearly define the terminology that is. Various IT incidents still happening frequently occur, and these incidents in order to prevent the situation of access control is needed. In this study, the Copy command by hackers hacking incidents, such as walking dangerous limits for instructions attacks in advance, and also the internal administrator accident accidental limit command to walk off the risk in advance and even if the incident occurred access to the command history log and post it as evidence through the analysis techniques that can be utilized are described.

  • PDF

Design and Implementation of School Affairs Management System using PHP on the Internet (인터넷 상에서 PHP를 이용한 학사관리 시스템의 설계 및 구현)

  • Moon, Jin-Yong;Koo, Yong-Wan
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.10
    • /
    • pp.3148-3154
    • /
    • 2000
  • In this paper. the design and implementationof the on-line registration system for the school affairs is described. The environments for the system configurations include a PC server under Linux Iperating System. Apache Web-server, and MySQL as database engine. In addition, PHP, which becomes a popular Internet server-based script language lately, is used to implement a real-time database. In order to avoid overload problems during short-term registration period, which deconstraces the typical surge of traffics, the proposed system is designed to minimize the unnecessary interfacing tasks. On administrator side task, the sytem is designed to have environments by separating the dechcated server that restricts the scope of specific database thasks. In doing so, it become possibal to build an optical system by distributing, balancing the transaction load, maintainimg the security and efficient administrative tasks.

  • PDF

The Study on Forensic Techniques of Chromebook (크롬북 포렌식 기법에 관한 연구)

  • Yoon, Yeo-Kyung;Lee, Sang-Jin
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.55-70
    • /
    • 2018
  • With the diversification of mobile devices, the development of web technologies, and the popularization of the cloud, an internet-centric web OS that is not dependent on devices has become necessary. Chromebooks are mobile devices in the form of convertible laptops featuring a web OS developed by Google. These Web OS mobile devices have advantages of multi-user characteristics of the same device and storage and sharing of data through internet and cloud, but it is easy to collect and analyze evidence from the forensic point of view because of excellent security and easy destruction of evidence not. In this paper, we propose an evidence collection procedure and an analysis method considering the cloud environment by dividing the Chromebook, which is a web OS mobile device popularized in the future, into user and administrator modes.

MULTI-SENSOR INTEGRATION SYSTEM FOR FOREST FIRE PREVENTION

  • Kim Eun Hee;Chi Jeong Hee;Shon Ho Sun;Jung Doo Young;Lee Chung Ho;Ryu Keun Ho
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.450-453
    • /
    • 2005
  • A forest fire occurs mainly as natural factor such as wind, temperature or human factor such as light. Recently, the most of forest fire prevention is prediction or prevision against forest fire by using remote sensing technology. However in order to forest fire prevention, the remote sensing has many limitations such as high cost and advanced technologies and so on. Therefore, we need to multisensor integration system that utilize not only remote sensing but also in-situ sensing in order to reduce large damage of forest fire though analysis of happen cause and prediction routing of occurred forest fire. In this paper we propose a multisensor integration system that offers prediction information of factors and route of forest fire by integrates collected data from remote sensor and in-situ sensor for forest fire prevention. The proposed system is based on wireless sensor network for collect observed data from various sensors. The proposed system not only offers great quality information because firstly, raw data level fuse different format of collected data from remote and in-situ sensor but also accomplish information level fusion based on result of first stage. Offered information from our system can help early prevention of factor and early prevision against occurred forest fire which transfer to SMS service or alert service into monitoring interface of administrator.

  • PDF

MCUP: Multi-level Code Updata Protocol for Resource-constrained (MCUP: 자원 제약하의 센서 노드를 위한 다중 수준 코드 갱신 기법)

  • Yi, Sang-Ho;Min, Hong;Kim, Seok-Hyun;Cho, Yoo-Kun;Hong, Ji-Man
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10b
    • /
    • pp.435-440
    • /
    • 2007
  • Wireless sensor networks are sensing, computing, and communication infrastructures that allow us to sense events in the harsh environment. The networks consist of many deployed sensor nodes. Each sensor node senses and transmits the sensed data to the administrator or base station of the networks. The sensor nodes are generally remotely-deployed, and therefore, software update must be done at run-time via communication channel. The software code update protocol should be energy-efficient to maximize lifetime of the sensor nodes. In this paper, we present a MCUP, which is a multi-level code update protocol for resource-constrained sensor nodes. MCUP enables energy-efficient code update by supporting multi-level code management. Our simulation results show that MCUP can reduce energy consumption compared with the existing one-level code update schemes.

  • PDF

Design and Implementation of Cyber Attack Simulator based on Attack Techniques Modeling

  • Kang, Yong Goo;Yoo, Jeong Do;Park, Eunji;Kim, Dong Hwa;Kim, Huy Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.3
    • /
    • pp.65-72
    • /
    • 2020
  • With the development of information technology and the growth of the scale of system and network, cyber threats and crimes continue to increase. To cope with these threats, cybersecurity training based on actual attacks and defenses is required. However, cybersecurity training requires expert analysis and attack performance, which is inefficient in terms of cost and time. In this paper, we propose a cyber attack simulator that automatically executes attack techniques. This simulator generates attack scenarios by combining attack techniques modeled to be implemented and executes the attack by sequentially executing the derived scenarios. In order to verify the effectiveness of the proposed attack simulator, we experimented by setting an example attack goal and scenarios in a real environment. The attack simulator successfully performed five attack techniques to gain administrator privileges.

Development of Security Audit Agent for the Safety in School Network (학내전산망의 안전성 확보를 위한 보안진단 에이전트 개발)

  • Park, Jong-O;Lee, Chul-Hyun;Kim, Seong-Sik
    • The Journal of Korean Association of Computer Education
    • /
    • v.5 no.1
    • /
    • pp.27-34
    • /
    • 2002
  • Internet has being grown explosively in recent years, hence it becomes easy to search and access information. But it is happening frequently to access illegally into the systems and data, there are many damage caused by them. So, it is very important that we construct security plan for the systems and data. It is not exception on school network being diffused to all schools. But, we have weakness about security to manage server and network safely. So it is causing much anxieties. In this paper, we searched security points make sure of safety of school network, and developed security audit agent helping management of security. Through simple registration process, this agent is able to audit basic and important security problems about not only server systems but also pc systems, and notify to administrator automatically. It is expected to provide efficiency in managing school network.

  • PDF