http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
김보람(Bo-ram Kim),최명길(Myung-gil Choi) 한국경영교육학회 2011 한국경영교육학회 학술발표대회논문집 Vol.2011 No.12
창업관련 과목을 개설하는 학교와 과목의 수가 증가하고 있으나 아직 예술대학의 경우는 미미한 실정이다. 따라서 본 연구는 선행연구를 기반으로 설문지를 개발하여 포커스 그룹에 설문조사를 실시한다. 본 연구의 결과는 예술대학의 창업교육에서 필요한 교과내용, 교과목 등이 체계적으로 설계될 수 있는 기반을 제공한다. 또한 향후 예술대학에서 창업학 과목을 개설할 때 학교의 전략방향과 연계된 교육과정 설계에 실무적인 시사점을 제공해 줄 것이다. Due to the global financial crisis, youth unemployment solution through entrepreneurship has become an important subject of discussion. The unemployment rate of the Arts major students is especially serious. Keeping pace with these environmental changes, increasing number of universities are establishing entrepreneurship courses. However, the entrepreneurship education in Arts college have a limit to its systematic education. Therefore, this study proposes a model for developing details of entrepreneurship curriculums and subjects through mixed-methodology. Questionnaires based on preceding studies are used in this research, and the survey has been conducted after selecting a specific focus group. The result of this study provides a foundation of how curriculums and subjects required for the entrepreneurship education in Arts college can be systematically structured, as well as practical suggestions for the Arts colleges on designing entrepreneurship curriculums linked with the schools’ strategic directions in the future.
Misuse Case 모델을 이용한 CC기반의 보안요구사항 분석 및 명세 방법론
최상수(Sang-Soo Choi),장세진(Se-Jin Jang),최명길(Myung-Gil Choi),이강수(Gang-Soo Lee) 한국정보보호학회 2004 정보보호학회논문지 Vol.14 No.3
모든 정보시스템은 보안기능이 강화된 정보보호시스템이라 할 수 있으며, 정보보호시스템의 품질을 높이기 위해서는 초기 요구사항 분석 단계에서 보안요구사항을 정형적이며 일관적으로 분석 및 명세하여야 한다. 본 논문에서는 UML의 Use Case 모델을 확장한 Misuse Case 모델을 이용하여 보안요구사항을 분석 및 명세하는 모델과 프로세스를 제시하였으며, 도출된 보안기능요구사항들을 제품화한 비용효과적인 보안제품 선정 알고리즘을 제시하였다. 제시한 모델 및 프로세스를 통해 개발된 정보보호시스템의 품질을 제고할 수 있을 것이다. All information system is information security system that enforced security function. To improve quality of information security system, security requirement analysis and specification must be performed by consistently and typically at early requirement analysis step. In this paper, we propose a security requirements analysis and specification model and process by using Misuse Case Model that extends UML's Use Case Model. And, we propose a cost-effective security product selection algorithm that security product is sufficient of all constructed security functional requirements. It may raise quality of information security system that developed through proposed model and process.
김재훈(Jae-Hoon Kim),서형원(Hyung-Won Seo),전길호(Kil-Ho Jeon),최명길(Myung-Gil Choi) 한국마린엔지니어링학회 2010 한국마린엔지니어링학회 학술대회 논문집 Vol.2010 No.4
Sejong corpus is a Korean corpus annotated with various linguistic information. The corpus contains a raw corpus, a part-of-speech (POS) tagged corpus, a syntactic tree bank and so on, according to the annotated information. This paper is related to the POS-tagged corpus, which is annotated with the POS information and used to develop natural language processing (NLP) systems, such as information retrieval, information extract, etc. The Sejong POS-tagged corpus had been built by the National Institute of the Korean Language for 9 years and consists of 10.6 million words. However, it's hard to use the corpus for developing some NLP systems because of various types of errors in the corpus. We treat errors which original words mismatch the concatenation of tagged morphemes. In this paper, we represent a method for detecting the errors and correcting them, and also our results. First, the error detection is to find mismatches of strings between original words and the concatenation of their analyzed words. The mismatches is candidates of errors and contains some valid forms transformed by irregular or phoneme conjugations. We develop a program to filter the valid forms out. The remaining mismatches are modified according to error types as follows: 1) Unnecessarily inserted or deleted words had been corrected by regular expressions, which are made manually. 2) Some special symbols as errors didn't be recognized by annotators correctly and had been corrected manually. 3) Others as the remaining errors account for very small portion and had also been corrected manually. As the result of our effort, the Sejong POS-tagged corpus is improved as good as it is useful for some applications.