• Title/Summary/Keyword: 공격 분석

Search Result 3,036, Processing Time 0.031 seconds

Effect of the Spportive Project for the Priority Region of Educational Welfare Investment[SPPREWI] on School Children's Psychosocial and Cognitive Adjustment (교육복지투자우선지역 지원사업이 아동.청소년의 사회.정서 및 인지적 발달에 미치는 효과)

  • Jung, Yeon-Jung;Um, Mung-Yong
    • Korean Journal of Social Welfare
    • /
    • v.61 no.4
    • /
    • pp.5-33
    • /
    • 2009
  • This study attempted to evaluate the effectiveness of the Supportive Project for the Priority Region of Educational Welfare Investment(SPPREWI) which has been put into action in Korea as a part of national policies for poor school children. In so doing this study aimed to test SPPREWI's legitimacy as well as whether we have to continue this program or not. In order to fulfill this research purpose researchers identified several outcome indicators of SPPREWI, which represent psychosocial and cognitive adjustment. The variables pertaining to psychosocial adjustment domain are: self-concept; depression, anxiety, and suicidal impulse; inclination of assault and indignation; delinquency; school life adjustment; and change in social relations. The variables of cognitive adjustment include recognition of self-control in learning; control strategy of learning behavior; and preparedness for job hunting. In this study the quasi-experimental group contained students from schools which are under the SPPREWI. The control group was composed of students from schools which were free from SPPREWI but under the influence of deteriorating school environment. The quasi-experimental group and the control group were compared in terms of outcome indicators presented earlier. Within the quasi-experimental group both the students below poverty-line and the students above poverty-line were divided into two groups each by the level of service use, and were compared in terms of the outcome variables presented earlier. Study results supported the argument that SPPREWI was effective generally in improving students' school adjustment. Study results also showed that the variable of 'school nurturance' played a significant role in moderating the effect of SPPREWI on a couple of outcome variables specially when schools' overall educational environment was in poor condition. Implication as well as suggestion were presented on the basis of study findings.

  • PDF

Factors Affecting Social Adjustment of Childhood Cancer Survivors (소아암 치료 종료 아동의 사회적응에 영향을 미치는 요인)

  • Oh, Su-Mi;Lee, Hye-Jung;Kim, Gwang-Suk;Park, Kyung-Duk
    • Child Health Nursing Research
    • /
    • v.19 no.3
    • /
    • pp.238-245
    • /
    • 2013
  • Purpose: The purposes of this study were to assess social adjustment of childhood cancer survivors and to identify factors affecting social adjustment. Methods: Data were collected from 79 childhood cancer survivors and his/her parents. The survey consisted of questions related to characteristics, physical functioning, depression, self-esteem and coping strategies. The Social Competence Inventory was used to measure social adjustment in the children. Results: The level of social adjustment of childhood cancer survivors was 83.5 out of a possible 155. Physical functioning, depression, self-esteem, and aggressive or proactive coping strategies were associated with social adjustment. Only physical functioning independently affected social adjustment. Conclusion: The results of this study indicate that there are several factors influencing social adjustment of childhood cancer survivors, and therefore there is a need for programs that deal with all aspects of children's physical as well as emotional health in order to enhance their social adjustment.

Effects of Economic Strain and Family Conflict on Children's Adjustment : Focused on Interaction Effects of Children's Stress and Coping Strategies (경제적 곤란과 가족갈등이 아동의 적응에 미치는 영향: 아동의 스트레스와 스트레스 대처방식의 상호작용을 중심으로)

  • Yoon, Hye-Mee
    • Korean Journal of Social Welfare
    • /
    • v.57 no.3
    • /
    • pp.133-164
    • /
    • 2005
  • This study examined the effects of children's perceived stress of economic strain, resulting family conflict, and stress coping strategies on their adjustment. Dimensions of children's adjustment studied in this research were problem behaviors (aggression, delinquency, withdrawal and anxiety depression) and school adjustment. Interaction effects between children's stress variables and coping strategies on the adjustment were also explored. 1,115 fifth to eighth graders from Chungbuk regions participated in self-administered structured questionnaires. Data were processed with SPSS PC 10.0 statistical package. Results were: First, the level of children's problem behaviors and school adjustment indicated differences according to their academic achievement, gender, and their age. Middle schoolers with rather low grade average reported higher level of aggression, delinquency, withdrawal and that of depression/anxiety. Boys tended to be more prone to external problems while girls to internal problems. Second, stresses originated from children's perceived economic strain and family conflicts showed consistent meaningful explanatory power on adjustment. Boys' adjustment was influenced by stress from economic strain and family conflict while girls by family conflict and academic achievements. The support seeking coping strategy among others was the most popularly employed coping strategy of children followed by aggressive coping strategy. In boys' cases, interaction effects of stress and coping strategies were significant in all of the adjustment variables, the more frequent the use of support seeking coping strategies, the lower the problem behavior, while interaction effect of family conflict stress and support seeking coping strategies played the opposite significant role in girls' cases. Further research efforts are required. Research results suggest; when developing a program facilitating children's adjustment, training on stress coping strategies should be considered as a potent new arena of interest.

  • PDF

A Survivability Model of an Intrusion Tolerance System (침입감내시스템의 생존성 모델)

  • Park, Bum-Joo;Park, Kie-Jin;Kim, Sung-Soo
    • The KIPS Transactions:PartA
    • /
    • v.12A no.5 s.95
    • /
    • pp.395-404
    • /
    • 2005
  • There have been large concerns about survivability defined as the capability of a system to perform a mission-critical role, in a timely manner, in the presence of attacks, failures. In particular, One of the most important core technologies required for the design of the ITS(Intrusion Tolerance System) that performs continuously minimal essential services even when the computer system is partially compromised because of intrusions is the survivability one of In included the dependability analysis of a reliability and availability etc. quantitative dependability analysis of the In. In this Paper, we applied self-healing mechanism utilizing two factors of self-healing mechanism (fault model and system response), the core technology of autonomic computing to secure the protection power of the ITS and consisted of a state transition diagram of the ITS composed of a primary server and a backup server. We also defined the survivability, availability, and downtime cost of the ITS, and then performed studies on simulation experiments and two cases of vulnerability attack. Simulation results show that intrusion tolerance capability at the initial state is more important than coping capability at the attack state in terms of the dependability enhancement.

Pre-seasonal Physical Examination of Professional Soccer Team (프로 축구팀의 시즌 전 체력검사)

  • Lee, Kyung-Tai;Choi, Byung-Ok
    • Journal of Korean Orthopaedic Sports Medicine
    • /
    • v.5 no.2
    • /
    • pp.129-134
    • /
    • 2006
  • Purpose: In the professional soccer team, we performed pre-seasonal physical examination and analyzed the results to establish a standardization data in relation to their position. Materials and Methods: We performed physical examination to the professional soccer team, consisted 34 player's average age 24.9 years. The examination performed were questionnaire on history, musculoskeletal examination, muscle power test, physiologic test, functional test. Results: According to the relationship between player position and injury pattern,. Knee injuries are most frequent on history. Physical examination outcome was that forward were prone to flexor hallucis longus tendinitis, midfielder for chronic ankle instability, defender for achilles tendinitis. Isokinetic test was done at dominant side, Peak torque to body weight ratio was 55.1%. Physiologic test checked body fat percentage was midfielder was superior as 19.8 (SD 2.9). Functional test out-come was that back strength 125 N. sergeant jump 59.6 cm, reaction time 208.5 sec, flexibility 19.2 m/s, side step 39.9 cm. Conclusion: Pre-seasonal physical examination gave us the standardization data and preventive measurement could be advocated from this results.

  • PDF

Android App Birthmarking Technique Resilient to Code Obfuscation (난독화에 강인한 안드로이드 앱 버스마킹 기법)

  • Kim, Dongjin;Cho, Seong-Je;Chung, Youngki;Woo, Jinwoon;Ko, Jeonguk;Yang, Soo-Mi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.4
    • /
    • pp.700-708
    • /
    • 2015
  • A software birthmark is the set of characteristics of a program which can be used to identify the program. Many researchers have studied on detecting theft of java programs using some birthmarks. In case of Android apps, code obfuscation techniques are used to protect the apps against reverse-engineering and tampering. However, attackers can also use the obfuscation techniques in order to conceal a stolen program. A birthmark (feature) of an app can be alterable by code obfuscations. Therefore, it is necessary to detect Android app theft based on the birthmark which is resilient to code obfuscation. In this paper, we propose an effective Android app birthmark and app theft detection through the proposed birthmark. By analyzing some obfuscation tools, we have first selected parameter and the return types of methods as an adequate birthmark. Then, we have measured similarity of target apps using the birthmarks extracted from the apps, where some target apps are not obfuscated and the others obfuscated. The measurement results show that our proposed birthmark is effective for detecting Android app theft even though the apps are obfuscated.

A Study of the Future Terrorism : Its Patterns and Perspectives (미래 국제 테러 유형과 전망에 관한 연구)

  • Choi, Jin-Tai
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.337-358
    • /
    • 2008
  • With the Japanese attacks on Pearl Harbor in 1941, approximately 2,500 people were killed. The terrorist attack on World Trade Center in the United States resulted in the heavy loss of people's lives, 2,749 in all. The 9.11 demonstrated that terrorist attack could be more serious problem than the war in our modern life. In addition, terrorist armed with new and high technologies have become more dangerous elements to the international community. Especially, the fact that the weapons of mass destruction are used by terrorist organizations is a matter of great concern. The strength of terrorist arsenal gives terrorist a decided advantage over us. The chances of success for terrorist have been increased due to the terrorist friendly environments. Terrorism has evolved without stopping from its birth, which is imposing a great burden on the authorities concerned. The counter-terrorism strategy and tactics used in the past have been useless in the fighting against new terrorism. To cope with the fast changing terrorism, comprehensive countermeasures should be developed. The purpose of this study is to know the enemy. To achieve the goal, the current situation on international terrorism as a whole is examined. Based on the result of the research, this paper also tried to give a perspectives on the future terrorism. At the same time, it provides a guidelines of the direction in the fighting against terrorism.

  • PDF

Experimental Evaluation of Bi-directionally Unbonded Prestressed Concrete Panel Blast Resistance Behavior under Blast Loading Scenario (폭발하중 시나리오에 따른 2방향 비부착 프리스트레스트 콘크리트 패널부재의 폭발저항성능에 대한 실험적 거동 평가)

  • Choi, Ji-Hun;Choi, Seung-Jai;Cho, Chul-Min;Kim, Tae-Kyun;Kim, Jang-Ho Jay
    • Journal of the Korea Concrete Institute
    • /
    • v.28 no.6
    • /
    • pp.673-683
    • /
    • 2016
  • In recent years, frequent terror or military attack by explosion, impact, fire accidents have occurred. Particularly, World Trade Center collapse and US Department of Defense Pentagon attack on Sept. 11 of 2001. Also, nuclear power plant incident on Mar. 11 of 2011. These attacks and incidents were raised public concerns and anxiety of potential terrorist attacks on major infrastructures and structures. Therefore, the extreme loading researches were performed of prestressed concrete (PSC) member, which widely used for nuclear containment vessel and gas tank. In this paper, to evaluate the blast resistance capacity and its protective performance of bi-directional unbonded prestressed concrete member, blast tests were carried out on $1,400{\times}1,000{\times}300mm$ for reinforced concrete (RC), prestressed concrete without rebar (PSC), prestressed concrete with rebar (PSRC) specimens. The applied blast load was generated by the detonation of 55 lbs ANFO explosive charge at 1.0 m standoff distance. The data acquisitions not only included blast waves of incident pressure, reflected pressure, and impulse, but also included displacement, acceleration, and strains at steel, concrete, PS tendon. The results can be used as basic research references for related research areas, which include protective design and blast simulation under blast loading.

Comparative Efficacy of Mosquito Repellents against Aedes albopictus (Diptera: Culicidae) (흰줄숲모기에 대한 모기기피제의 효과비교)

  • Kang, Shin-Ho;Jang, Sun-Ah;Han, Jong-Been;Seo, Dong-Kyu;Song, Chi-Hun;Kim, Min-Ki;Kim, Young-Lim;Choi, Seon-Hee;Kim, In-Kyu;Kim, Gil-Hah
    • Korean journal of applied entomology
    • /
    • v.44 no.3 s.140
    • /
    • pp.243-249
    • /
    • 2005
  • We investigated the repellency of eight mosquito repellents against Culex pipiens pallens and Aedes albopictus, and the quantity of DEETs were analysed by using gas chromatography. Ae. albopictus showed higher bloodsucking efficacy than Cx. pipiens pallens of the two subjects mouse and human hands, and human hand was more efficacious method for mosquito bloodsucking efficacy than mouse. Among the eight repellents were tested with mouse as subjects for eight hours, product C, G, and H were high repellency than others. In the case of human hands as subject, product C was highly effective than above other products. The DEET quantities of eight repellants varied from 7.31 g to 38.9 g in 100 g contents and we ascertained that there was a correlation between mosquito repellency and the DEET quantities remained after the treatments. It was evidenced from the long term test with shirt piece, in this test the Ae. albopictus attack was increased when the DEET quantity decreased below 40%.

An Enhanced System of Group Key Management Based on MIPUF in IoT (IoT 환경의 MIPUF 기반 그룹키 관리 시스템 개선)

  • Tak, Geum Ji;Jeong, Ik Rae;Byun, Jin Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1243-1257
    • /
    • 2019
  • With the emergence of the IoT environment, various smart devices provide consumers with the convenience and various services. However, as security threats such as invasion of privacy have been reported, the importance of security issues in the IoT environment has emerged, and in particular, the security problem of key management has been discussed, and the PUF has been discussed as a countermeasure. In relation to the key management problem, a protocol using MIPUF has been proposed for the security problem of the group key management system. The system can be applied to lightweight IoT environments and the safety of the PUF ensures the safety of the entire system. However, in some processes, it shows vulnerabilities in terms of safety and efficiency of operation. This paper improves the existing protocol by adding authentication for members, ensuring data independence, reducing unnecessary operations, and increasing the efficiency of database searches. Safety analysis is performed for a specific attack and efficiency analysis results are presented by comparing the computational quantities. Through this, this paper shows that the reliability of data can be improved and our proposed method is lighter than existing protocol.