RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
          펼치기
        • 주제분류
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        ANP 모형을 이용한 SP 인증 핵심 평가항목 도출 연구

        허상무,김우제 한국IT서비스학회 2018 한국IT서비스학회지 Vol.17 No.1

        Software process (SP) authentication is a certification system designed in order to improve software process and ensure software reliability of the Korean small and medium enterprises (SMEs). It is composed of 3 grades, 17 evaluation items and 70 detailed evaluation items (software process). In order to certificate grade 2, 42 detailed evaluation items must be satisfied. In order to certificate grade 3, all 70 detailed evaluation items must be satisfied. SMEs are more vulnerable to manpower and material resources than the major company. Therefore, it is difficult for SMEs to invest in the long term to improve the software process. If we can provide the core evaluation items to SMEs, SMEs will be able to improve software quality more efficiently and effectively. It can be used as a short way to acquire SP authentication. The evaluation items of SP are defined as influencing each other. Therefore, the core evaluation items might be established using related techniques. Although we searched for previous researches and related informations, the associated study was insufficient. In this study, ANP (Analytic Network Process) technique was applied, and the core evaluation items of SP authentication were established. SMEs will be able to acquire SP authentication more easily using the core evaluation items. Finally, we expect that this study will be used as a basis material for creating the SP 2.0 version.

      • 0.18 μm CMOS 공정을 이용한 밀리미터파 대역 전력 증폭기 설계

        허상무,이종욱 경희-다반 ASIC 설계교육센터 2006 경희-다반 ASIC센터 논문집 Vol.7 No.-

        We investigated the design of 20 GHz-band power amplifier using 0.18 pm CMOS technology. Considering the output power requirement and number of gain stages, the size of device was chosen as 2X150 pm. Using electro-magnetic(EM) simulation, the insertion loss of the substrate-shielded microstrip line was compared with conventional transmission line structure. From the EM simulation, the dimensions of the microstrip line were determined given the characteristic impedance. By using cascode topology and substrate-shielded microstrip line, a 3-stage amplifier achieved a 19-dB small-signal gain and 14-dBm of output power at 20 GHz.

      • 0.18㎛ CMOS공정을 이용한 Ka대역 근거리 무선통신용 전력증폭기 설계

        허상무,이성권,이종욱 경희-다반 ASIC 설계교육센터 2007 경희-다반 ASIC센터 논문집 Vol.8 No.-

        0.18um CMOS공정을 이용하여 근거치 무선통신 (26.5GHz)세서 응용할 누 있는 전력증폭기를 설계하있다. 전송선로와 캐패시터(C)를 이을하여 소신호 이득이 최대가 되는 입력단과 출혈단의 정합회로를 구현하였다. 고주파통과필터(HPF)인 패시터(C)-인덕터(L) 구조로 inter-stage 정합회로를 구현하여 27GHz에서 3dB 이상의 대역폭을 획득했뜨며 전송 선로는 substrate-shielded co-planer wave guide (CPW)구초를 제안하여 40GHz까지 전송특성을 획보했다. 26.5GHz에서 측정된 CPW의 전송손실은 -2dB/mm이다. 3단 구소로 설계된 전력증폭기의 측정된 소신호 이득과 출력(Pour)은 27GHz에시 각각 12.5dB와 12.5dBm이다.

      • KCI등재

        DEMATEL 기법과 내용분석을 이용한 임베디드 소프트웨어 결함요소 간의 영향 관계 분석

        허상무(Sang-Moo Huh),김우제(Woo-Je Kim) 한국정보기술학회 2018 한국정보기술학회논문지 Vol.16 No.6

        Embedded software has a pure software area and a software area that controls hardware. Embedded software has defects to be inherent like pure software and can cause fatal accidents due to that. In the pure software field, eliciting and managing core defects is called efficient and effective development methodologies. Whereas, in embedded software fields, there are no studies that have developed embedded defects from a systematic and integrated perspective. Mainly, there are only biased studies that researchers examined for areas of their interest. If it is possible to calculate the significance of embedded software defects, it will be able to increase the quality of embedded software efficiently by intensively managing the core defects. To prove this, the DEMATEL method that estimate the causal relationship between elements was applied. Finally, the causal relationships between embedded software defects was derived and the core defects of embedded software was derived. However, we could not been to derive the weights for defects. And the future research, remains.

      • KCI등재

        ANP 모형을 이용한 ITIL v3 핵심 프로세스 도출 연구

        허상무(Sang Moo Huh),김우제(Woo Je Kim) 한국IT서비스학회 2017 한국IT서비스학회지 Vol.16 No.3

        IT services are provided by many public institutions and companies in order to satisfy various needs of customers. As the modern IT systems become larger and more complex, it becomes more difficult for IT organizations to provide IT services. So, the IT organizations have applied or are planning to apply ITIL (Information Technology Infrastructure Library) in order to provide IT services systematically. The ITIL v3 was revised on July 2011 and have 5 categories, 37 processes, and 113 sub-processes. Therefore, it is known that it is very difficult to satisfy all processes of ITIL v3. If we can concentrate on the core processes of ITIL v3, we will be able to provide IT services more efficiently. The processes of ITIL v3 are defined as some processes influences other processes. Therefore, the core processes can be established using related techniques. We searched for previous research and related information, but we could not find any related research. In this study, we had applied the ANP (Analytic Network Process) techniques to find the core processes of ITIL v3. We expect that IT services will be provided more efficiently because we can be concentrate on the core processes of ITIL v3, which are the results of this study.

      • KCI등재

        <강남스타일>과 <젠틀맨>을 성공하게 한 장면에 대한 주관적 수용인식 유형 연구

        허상무(Sang Moo Huh),이옥기(Ok Ki Lee),김우제(Woo Je Kim) 한국언론정보학회 2015 한국언론정보학보 Vol.73 No.5

        본 연구는 싸이의 <강남스타일>과 <젠틀맨>의 성공적 요인에 대하여 선행연구인 음악적인 관점, 정보통신 관점, 안무적인 관점 등과는 다른 관점으로 뮤직비디오에서 인기를 상승시킨 장면들은 어떤 유형이 있는가를 분석하였다. 이를 위해 Q 방법론을 적용하여 분석한 결과, <강남스타일>에서의 장면들에 대한 수용자 유형은 즐거움을 추구하는 유락유형, 전진 발전 유형, 피로해소 유형, 다양한 성인문화 유형으로 분류되었고, <젠틀맨>은 공동체적 군무 유형, 시건방진 춤 유형, 유쾌한 포장마차 유형, 괴롭힘 유형으로 장면들이 수용자들에게 인식되었다. <강남스타일>과 <젠틀맨>에서 발견된 공통적인 장면 유형은 안무유형과 한국에서 볼 수 있는 문화 유형이 발견되었다. 특히 <강남스타일>에서 발견된 장면 유형은 한국적인 문화유형이 많이 내포되어 있는 것으로 파악되었고, <젠틀맨>은 포장마차 유형만이 한국적인 문화유형으로 파악되었다. We found that world wide popularity was attracted by Korea culture aspects of Psy"s 〈Gangnam Style〉. The main factors that caused the syndrome, we noticed that the image of Korea. Expressly, we compared the Korea cultural scene that appeared in 〈Gangnam Style〉 and 〈Gentleman〉. So, we analyzed successful Korea cultural factors of 〈Gangnam Style〉. For the analysis, we applied the Q methodology. As a result, in 〈Gentleman〉, we found ‘Recreation Type’, ‘Advanced Development Type’, ‘Relieve fatigue type’ and ‘Adult Type’. Most of these factors have been recognized in Korea cultural factors. we found ‘Communal Dancing Type’, ‘Cheeky Dance Type’, ‘Pleasant Packing Carriage Type’, and ‘afflicting type’. However, the Korean factor of 〈Gentleman〉 were identified only ‘Packing Carriage Culture’.

      • KCI등재

        ANP 모형을 이용한 응용 소프트웨어 결함요소에 대한 중요도 가중치 설정 기법

        허상무(SangMoo Huh),김우제(WooJe Kim) 한국정보과학회 2015 정보과학회논문지 Vol.42 No.11

        소프트웨어 품질을 향상하기 위해서는 소스에 내재된 결함을 효율적, 효과적으로 제거해야 한다. 개발현장에서는 결함 심각도와 결함 제거율로 결함을 제거하고 있다. 결함을 이용하여 품질을 향상하기 위한 연구로는 결함 발생 빈도과 ISO 품질속성을 이용하여 품질을 향상하려는 연구가 있고, 프로젝트수행 시 결함을 심각도로 관리하여 품질을 향상시키는 연구가 있었다. 하지만, 결함 자체에 집중하여 결함을 유형화하여 결함 유형 간에는 어떤 영향력이 있는지, 그 영향력으로 인하여 어느 결함 유형이 더 중요한 지에 대한 연구는 미흡한 실정이었다. 이에 본 연구에서는 표준단체, 업체, 연구자들의 소프트웨어 결함유형을 수집, 분류하여 ANP로 모형화하였다. 또한, 구성된 ANP 모형을 이용하여 일반 응용 소프트웨어에 대하여 결함 유형별 중요도 가중치를 산정하였다. 일반 응용 소프트웨어를 개발할 때, 산정된 가중치를 적용하여 결함을 제거한다면, 좀 더 효율적이고 효과적으로 소프트웨어 품질을 향상할 수 있으리라 기대한다. In order to improve software quality, it is necessary to efficiently and effectively remove software defects in source codes. In the development field, defects are removed according to removal ratio or severity of defects. There are several studies on the removal of defects based on software quality attributes, and several other studies have been done to improve the software quality using classification of the severity of defects, when working on projects. These studies have thus far been insufficient in terms of identifying if there exists relationships between defects or whether any type of defect is more important than others. Therefore, in this study, we collected various types of software defects, standards organization, companies, and researchers. We modeled the defects types using an ANP model, and developed the weighted severities of the defects types, with respect to the general application software, using the ANP model. When general application software is developed, we will be able to use the weight for each severity of defect type, and we expect to be able to remove defects efficiently and effectively.

      • KCI등재

        사회연결망 분석과 자료포락분석 기법을 이용한 소프트웨어 함수 우선순위 분석 연구

        허상무(Sang Moo Huh),김우제(Woo Je Kim) 한국IT서비스학회 2018 한국IT서비스학회지 Vol.17 No.3

        To remove software defects and improve performance of software, many developers perform code inspections and use static analysis tools. A code inspection is an activity that is performed manually to detect software defects in the developed source. However, there is no clear criterion which source codes are inspected. A static analysis tool can automatically detect software defects by analyzing the source codes without running the source codes. However, it has disadvantage that analyzes only the codes in the functions without analyzing the relations among source functions. The functions in the source codes are interconnected and formed a social network. Functions that occupy critical locations in a network can be important enough to affect the overall quality. Whereas, a static analysis tool merely suggests which functions were called several times. In this study, the core functions will be elicited by using social network analysis and DEA (Data Envelopment Analysis) for CUBRID open database sources. In addition, we will suggest clear criteria for selecting the target sources for code inspection and will suggest ways to find core functions to minimize defects and improve performance

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼