• Title/Summary/Keyword: 계층 전이

Search Result 406, Processing Time 0.034 seconds

Conceptual Analysis of Cyber Electronic Warfare by OSI Reference Model (OSI 참조 모델에 의한 사이버전자전 개념 분석)

  • Lee, Minwoo;Lee, Jongkwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.600-601
    • /
    • 2021
  • The cyberspace, which is the fifth battle field, should be utilized for multi-domain maneuvering between the cyberspace and the physical space using an electromagnetic spectrum. This becomes a major concept of cyber electronic warfare that combines the characteristics of cyber warfare and electronic warfare. In this study, the concept of cyber electronic warfare is analyzed by using the OSI reference model and examining the threats of the two-layer data link layer.

  • PDF

A Study on the Safety Culture is in the Event of the Disaster Damage Reduction in Contributions (재난 시 피해 감소에 안전문화가 기여도에 미치는 연구)

  • Cha, Young-Shin
    • Proceedings of the Korean Society of Disaster Information Conference
    • /
    • 2022.10a
    • /
    • pp.217-218
    • /
    • 2022
  • 본 논문에서는 재난 시 보다 안전한 생활을 할 수 있을 것인가에 관심을 가지고 있다. 재난을 당하기 전에 재난에 대해 미리알고 몸으로 체득하는 다양한 형태의 안전교육이 활성화 되고 다양한 프로그램이 개발되어 모든 사람이 동일하고 신속한 대처를 통해 피해를 최소한으로 줄일 수 있는 방법의 모델을 찾아 보고 안전 취약계층인 어린이, 장애인, 노인세대에 대한 안전교육이 강화되어야 하고 또한 주민들이 자발적인 교육을 통해 실질적인 재난 상황에 대처할 수 있는 다양한 교육 내용도 개발하고 다양한 계층별 교육 프로그램도 개발이 이루어져야 한다. 전문화된 안전교육 인원의 확보 전략과 전문인력의 적재적소에 배치될 수 있도록 활용계획 등 내실 있고 효과적인 프로그램도 가져야 한다. 특히 재난에 대처하는 안전문화로 발전은 지역사회 시민, 지방자치단체, NGO, 기업 등이 다양한 행동 주체로 의사 결정을 공유하고 상호조정과 협력하는 형태의 장기적인 네트워크를 지속적으로 구축을 통해 안전문화가 정착할 수 있는 토대를 마련할 수 있다.

  • PDF

Hierarchical vulnerability detection technique robust against polymorphic Docker image attacks (다형성 도커 이미지 공격에 강인한 계층적 취약점 탐지 기법)

  • Jung-Hwa Ryu;Il-Gu Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.101-104
    • /
    • 2024
  • 최근 클라우드가 전 산업에 도입되면서 클라우드 네이티브 환경에 관한 관심이 증가하고 있다. 클라우드 서비스 개발자는 도커 (Docker) 이미지를 활용하여 개발 환경을 구축하고 배포한다. 그러나 종래의 이미지 스캐닝 도구들은 해시값 기반의 시그니처 탐지 방법론을 사용하기 때문에 제로데이 취약점을 탐지하지 못하거나, 이미 저장된 CVE DB에 있는 취약점만 탐지할 수 있었다. 본 논문은 도커 이미지의 계층성을 활용하여 다형성 도커 이미지 공격을 탐지할 수 있는 기법을 제안한다. 실험결과에 따르면 제안한 방법은 종래 방법 대비 다형성 도커 이미지 공격 탐지율을 28.6% 개선할 수 있었다.

A Study on the Revitalization of BIM in the Field of Architecture Using AHP Method (AHP 기법을 이용한 건축분야 BIM 활성화 방안 연구)

  • Kim, Jin-Ho;Hwang, Chan-Gyu;Kim, Ji-Hyung
    • Journal of the Korea Institute of Building Construction
    • /
    • v.22 no.5
    • /
    • pp.473-483
    • /
    • 2022
  • BIM(Building Information Modeling) is a technology that can manage information throughout the entire life cycle of the construction industry and serves as a platform for improving productivity and integrating the entire construction industry. Currently, BIM is actively applied in developed countries, and its use at various overseas construction sites is increasing This is unclear. due to air shortening and budget savings. However, there is still a lack of institutional basis and technical limitations in the domestic construction sector, which have led to the lack of utilization of BIM. Various activation measures and institutional frameworks will need to be established for the early establishment of these productive BIMs in Korea. Therefore, as part of the research for the domestic settlement and revitalization of BIM, this study derived a number of key factors necessary for the development of the construction industry through brainstorming and expert surveys using AHP techniques and analyzed the relative importance of each factor. In addition, prior surveys by a group of experts resulted in 1, 3 items in level, 2, 9 items in level, and 3, 27 items in level, and priorities analysis was performed through pairwise comparisons. As a result of the AHP analysis, it was found that the relative importance weight of policy aspects was highest in level 1, and the policy factors in level 2 and the cost-based and incentive system introduction factors were considered most important in level 3. These findings show that the importance of the policy guidance or institutions underlying the activation of BIM rather than research and development or corporate innovation is relatively high, and that the preparation of policy plans by public institutions should be the first priority. Therefore, it is considered that the development of a policy system or guideline must be prioritized before it can be advanced to the next activation stage. The use of BIM technologies will not only contribute to improving the productivity of the construction industry, but also to the overall development of the industry and the growth of the construction industry. It is expected that the results of this study can provide as useful information when establishing policies for activating BIM in central government, relevant local governments, and related public institutions.

Effect of Educational Attainment of Household Head on Eating-out Demand (가구주 학력이 외식수요에 미치는 효과)

  • Kim, Young-Sook;Chun, Soon-Sil
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.34 no.9
    • /
    • pp.1407-1413
    • /
    • 2005
  • Korean households' expenditures on the eating -out have been steadily increasing except for the foreign exchange crisis period. This paper aimed to examine the eating-out expenditures of salary and wage earners's households by educational attainment of household head. We modeled the demand function of eating-out in terms of income and price, examining the responsiveness of eating-out demand to changes in income and price using econometric methods such as regression, rolling regression and impulse response. This paper showed that coefficients of income and price tended to decrease as the income rises in the long-run. Specifically, the higher the educational attainment of household head is, the smaller the coefficients of income and price we. The impulse response analysis also indicated that while price shocks decreased the demand for eating-out, income shocks tended to increase tile demand for eating-out in all the educational attainments. Furthermore income shocks were much greater and last longer than price shocks at all educational attainments of household heads.

A Study of Computational Literature Analysis based Classification for a Pairwise Comparison by Contents Similarity in a section of Tokkijeon, 'Fish Tribe Conference' (컴퓨터 문헌 분석 기반의 토끼전 '어족회의' 대목 내용 유사도에 따른 이본 계통 분류 연구)

  • Kim, Dong-Keon;Jeong, Hwa-Young
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.5
    • /
    • pp.15-25
    • /
    • 2022
  • This study aims to identify the family and lineage of a part of a "Fish Tribe Conference" in the section Tokkijeon by utilizing computer literature analysis techniques. First of all, we encode the classification for a pairwise comparison's type of each paragraph to build a corpus, and based on this, we use the Hamming distance to calculate the distance matrix between each classification for a pairwise comparison's. We visualized classification for a pairwise comparison's clustering pattern by applying multidimensional scale method, and hierarchical clustering to explore the characteristics of the 'fish family' line and lineage compared to the existing cluster analysis study on entire paragraphs of "Tokkijeon". As a result, unlike the cluster analysis of the entire paragraph of "Tokkijeon", which consists of six categories, the "Fish Tribe Conference" section has five categories and some classification for a pairwise comparison's accesses. The results of this study are that the relative distance between Yibon was measured and systematic classification was performed in an objective and empirical way by calculation, and the characteristics of the line of the fish family were revealed compared to the analysis of the entire rabbit exhibition.

Analysis of Cryptography Technique on Application Layer based on WAP (WAP 기반의 Application Layer 암호화 기법 분석)

  • 황영철;최병선;이성현;이원구;이재광
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.748-751
    • /
    • 2004
  • In this paper, we discuss about wireless Internet security. The past few years have seen unprecedented growth in the number of wireless user, applications, and network access technologies. Wireless Internet is similar to wired internet, but it has some constrained wireless environment. So many internet technologies for wireless are developing now. There are WAP(Wireless Application Protocol) and WPKI. WAP(now version 2.0) is a protocol specification for wireless communication networks. it provides an application framework and network protocols for wireless devices such as mobile telephones, PDAs and internet technologies. In this paper some analysis of security(e.g. digital signature or encryption) for wireless internet are performed.

  • PDF

Symbolic Aspects Reappearance in Korean Family Films which Float between 'Stay' and 'Change' -Symbols Reproduced by the Films and - ('유지'와 '변화' 사이에 위치한 한국 가족영화의 상징적 재현 -영화 <하녀>, <마부>에 재현된 상징들에 대하여-)

  • Kim, Noh-Ik
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.10
    • /
    • pp.57-75
    • /
    • 2020
  • This study identifies the symbolism of cross symptoms of different classes during the modernization process based on the imagery of and , both of which are Korean films made in the same era of the 1960s. The study referred to a number of Korean family movie films in the 1960s, in particular and , which are notably different in ways of expression and in social class of the subject matter, and identifies how the films express the mixed aspects of the cross modernization period. The film uses a grotesque expressionist method to voyeuristically look into a newly emerging middle class family, and the deconstructive aspect of a family unit whose excessive desire leads to its own ruin; thus, the film presents a new perspective into the various social issues that emerge in the near future. In contrast, engages realistic depictions to describe in detail the deep conflict of pain and hope within the hardships of life from the urban poor through a deep family conflict. Ultimately, the two films expose the various social issues through the familiar and the unfamiliar that appear from the mixed aspects of the cross modernization period, in other words, the conflicting images of the traditional and the modern.

The Effect in Oral Health Promotion Program Based on Community Networking for Elementary School Students from Community Child Center (지역사회 협의체 중심의 지역아동센터 구강건강증진 프로그램의 효과)

  • Yum, Jong Hwa;Kim, Hye-Jin;Kwon, Myoung-Hwa;Shin, Sun-Jung
    • Journal of dental hygiene science
    • /
    • v.14 no.2
    • /
    • pp.214-222
    • /
    • 2014
  • This study measures the effect of oral health promotion program based on community networking for elementary school students in community child center. The community networking were constructed of community health center, headquarters for community child center and school of dental hygiene in community. First, we were educated the student and teacher of community child center, separately. Community health center planned and evaluated the program, and school of dental hygiene ran the maintenance program once a month for 3 months and evaluated the program. The teacher of community health center were supported and monitored the children. The comparison was done in independent t-test of awareness, knowledge and behavior of children of community child center in both lower grades and upper grades and paired t-test of patient hygiene performance (PHP) index was conducted before and after oral health promotion program. As a result, PHP index and oral health knowledge increased significantly after oral health program in lower grades and upper grades (p<0.001). The positive attitude for oral health about "Whatever I do, my tooth-will be decayed" increased more in upper grades better than lower grades after oral health promotion program (p<0.05). We suggest that oral health program based on community networking should be constructed for oral health promotion of elementary school students in community child center.

SLA Parameter Measurement Of Policy Routing Network (Policy Routing Network에서의 SLA 파라메터 측정)

  • Shim, Hoi-Jung;Nam, Ji-Seung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.1597-1600
    • /
    • 2001
  • In-Service-Monitoring을 통하여 네트웍 계층에서 성능저하와 전달되어지는 QOS의 영향을 감시하여 Pro-Active 매니지먼트가 가능하다. 그 결과로서 SLA 보증을 위반하기 전에 성능저하를 조기 발견하여 행동을 취한 수 있게 한다. 본 논문에서는 사용자의 요구조건을 만족하기 위한 네트웍의 구성과 SLA 측정의 제약조건들을 고려하고 Policy Based Routing이 적용되는 네트웍에서 Technology-Specific Parameter인 IP Packet Loss Ratio, IP 패킷전송지연, 패킷지터, 가용도등의 SLA Parameter를 측정하였다.

  • PDF