• Title/Summary/Keyword: 구성 수준

Search Result 5,110, Processing Time 0.036 seconds

A Study on the Social Exclusion Types of Middle-aged Single-person Households (중년1인가구의 사회적 배제 잠재집단 유형과 영향요인)

  • Chang, On Jeong
    • Journal of Family Resource Management and Policy Review
    • /
    • v.26 no.3
    • /
    • pp.1-17
    • /
    • 2022
  • This study focused on the heterogeneity of groups in single-person households, to identify how middle-aged single-person households is categorized by sub-groups and to come up with policy measures to overcome social exclusion by examining predictive factors for the type of social exclusion. Potential class analysis and multinomial logistic regression analysis were conducted on a total of 361 middle-aged single-person households using the 14th Korea Replication Panel data. The social exclusion index of these households was measured consisting of 10 six-dimensional indicators. The results showed that middle-aged single-person households had five different types: "non-exclusion"(29.6%), "health restriction"(14.3%), "interact restriction and middle-risk multiple-exclusion" (12.0%), "income and health exclusion"(14.1%), and "high-risk multiple-exclusion"(30.0%). More than 70% of the respondents experienced social exclusion, and most of the exclusion types were multiple exclusion. When examining the factors affecting each exclusion type, the 'subjective health level' was a common major predictor, and family interact, age and leisure activity satisfaction variables were significant predictors of the 'high-risk multiple exclusion type' and 'the interact restriction and middle-risk multiple-exclusion type'. Based on these results, a multidimensional intervention strategy is an effective measure to solve the social exclusion problem of middle-aged single-person households, and practical measures should be considered by strengthening 'health' and exchanges.

Preparation and Characterization of Tungsten Carbide Using Products of Hard Metal Sludge Recycling Process (초경합금 슬러지 재활용 공정 산물을 활용한 텅스텐 탄화물 제조 및 특성 평가)

  • Kwon, Hanjung;Shin, Jung-Min
    • Resources Recycling
    • /
    • v.31 no.4
    • /
    • pp.19-25
    • /
    • 2022
  • In this study, tungsten carbide (WC) powder was prepared using a novel recycling process for hard metal sludge that does not use ammonium paratungstate. Instead of ammonia, acid was used to remove the sodium and crystallized tungstate, resulting in the formation of tungstic acid (H2WO4). The WC powder was successfully synthesized by the carbothermal reduction of tungstic acid through H2O decomposition, reduction of WO3 to W, and formation of WC. The carbon content and holding time at the carbothermal reduction temperature were optimized to remove free carbon from the WC powder. As a result, most of the free carbon in the WC powder prepared from sludge was removed, and the content of free carbon in the synthesized WC powder was lower than that in commercial WC powder. Moreover, the crystallite size of WC prepared from H2WO4 was much smaller than that of commercial micron-sized WC powder produced from APT. The small crystallite size of WC induces grain growth during the sintering of the WC-Co composite; thus, a WC-Co composite with large WC grains was fabricated using the WC powder prepared from H2WO4. The large WC grains affected the mechanical properties of the WC-Co composite. Further, due to the large grain size, the WC-Co composite fabricated from H2WO4 exhibited a higher toughness than that of the WC-Co composite prepared from commercial WC powder.

Blocking Intelligent Dos Attack with SDN (SDN과 허니팟 기반 동적 파라미터 조절을 통한 지능적 서비스 거부 공격 차단)

  • Yun, Junhyeok;Mun, Sungsik;Kim, Mihui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.1
    • /
    • pp.23-34
    • /
    • 2022
  • With the development of network technology, the application area has also been diversified, and protocols for various purposes have been developed and the amount of traffic has exploded. Therefore, it is difficult for the network administrator to meet the stability and security standards of the network with the existing traditional switching and routing methods. Software Defined Networking (SDN) is a new networking paradigm proposed to solve this problem. SDN enables efficient network management by programming network operations. This has the advantage that network administrators can flexibly respond to various types of attacks. In this paper, we design a threat level management module, an attack detection module, a packet statistics module, and a flow rule generator that collects attack information through the controller and switch, which are components of SDN, and detects attacks based on these attributes of SDN. It proposes a method to block denial of service attacks (DoS) of advanced attackers by programming and applying honeypot. In the proposed system, the attack packet can be quickly delivered to the honeypot according to the modifiable flow rule, and the honeypot that received the attack packets analyzed the intelligent attack pattern based on this. According to the analysis results, the attack detection module and the threat level management module are adjusted to respond to intelligent attacks. The performance and feasibility of the proposed system was shown by actually implementing the proposed system, performing intelligent attacks with various attack patterns and attack levels, and checking the attack detection rate compared to the existing system.

Recent Research Trends in Thioredoxin Reductase-targeted Anticancer Therapy (Thioredoxin reductase를 표적으로 하는 항암 최신 연구 동향)

  • Hwangbo, Hyun;Lee, Hyesook;Cheong, JaeHun;Choi, Yung Hyun
    • Journal of Life Science
    • /
    • v.32 no.1
    • /
    • pp.63-69
    • /
    • 2022
  • The thioredoxin reductase (TrxR) system is essential for cell survival and function by playing a pivotal role in maintaining homeostasis of cellular redox and regulating signal transduction pathways. The TrxR system comprises thioredoxin (Trx), TrxR, and nicotinamide adenine dinucleotide phosphate. Trx reduced by the catalytic reaction of the TrxR enzyme reduces downstream proteins, resulting in protection against oxidative stress and regulation of cell differentiation, growth, and death. Cancer cells survive by improving their intracellular antioxidant capacity to eliminate excessively generated reactive oxygen species (ROS) due to infinite cell proliferation and a high metabolic rate. Therefore, cancer cells have high dependence and sensitivity to antioxidant systems, suggesting that focusing on TrxR, a representative antioxidant system, is a potential strategy for cancer therapy. Several studies have revealed that TrxR is expressed at high levels in various types of cancers, and research on anticancer activity targeting the TrxR system is increasing. In this review, we discuss the feasibility and value of the TrxR system as a strategy for anticancer activity research by examining the relationship between the function of the intracellular TrxR system and the development and progression of cancer, considering the anticancer activity and mechanism of TrxR inhibitors.

A study on the Influence of Enterprise Content Management System Success Factors and Task Characteristics on Intention to Use (기업콘텐츠관리시스템 성공 요인과 업무적 특성이 시스템 사용 의도에 미치는 영향)

  • Hwang, Inho
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.11
    • /
    • pp.333-349
    • /
    • 2021
  • As information is recognized as an important asset of an organization, organizations are increasing their resource input for knowledge management. In particular, the enterprise content management system(ECMS) is a solution for organization-oriented content management, and it has high utility by helping to achieve business performance through systematic utilization of content and improve the level of internal information security. The purpose of this study is to suggest a plan to improve the intention to use organizational employee's ECMS and to suggest the effect of the relationships between information system quality characteristics and work environment characteristics on intention to use. In this study, a research hypothesis was presented based on previous studies, a questionnaire was conducted on workers of organizations that adopted an ECMS, and the hypothesis was verified by applying structural equation modeling. As a result of the analysis, information and service quality of the ECMS and task interdependence increased the intention to use, but task conflict decreased the intention to use. In addition, task interdependence and task conflict moderated the positive relationship between the quality factors of the ECMS and the intention to use it. This study has implications in terms of suggesting the direction of the organization's behavior through factors that increase the use of ECMS.

Cyber Threats Analysis of AI Voice Recognition-based Services with Automatic Speaker Verification (화자식별 기반의 AI 음성인식 서비스에 대한 사이버 위협 분석)

  • Hong, Chunho;Cho, Youngho
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.33-40
    • /
    • 2021
  • Automatic Speech Recognition(ASR) is a technology that analyzes human speech sound into speech signals and then automatically converts them into character strings that can be understandable by human. Speech recognition technology has evolved from the basic level of recognizing a single word to the advanced level of recognizing sentences consisting of multiple words. In real-time voice conversation, the high recognition rate improves the convenience of natural information delivery and expands the scope of voice-based applications. On the other hand, with the active application of speech recognition technology, concerns about related cyber attacks and threats are also increasing. According to the existing studies, researches on the technology development itself, such as the design of the Automatic Speaker Verification(ASV) technique and improvement of accuracy, are being actively conducted. However, there are not many analysis studies of attacks and threats in depth and variety. In this study, we propose a cyber attack model that bypasses voice authentication by simply manipulating voice frequency and voice speed for AI voice recognition service equipped with automated identification technology and analyze cyber threats by conducting extensive experiments on the automated identification system of commercial smartphones. Through this, we intend to inform the seriousness of the related cyber threats and raise interests in research on effective countermeasures.

Development of High-Sensitivity and Entry-Level Radiation Measuring Sensor Module (고감도 보급형 방사선 측정센서 모듈 개발)

  • Oh, Seung-Jin;Lee, Joo-Hyun;Lee, Seung-Ho
    • Journal of IKEEE
    • /
    • v.26 no.3
    • /
    • pp.510-514
    • /
    • 2022
  • In this paper, we propose the development of high-sensitivity low-end radiation measuring sensor module. The proposed measurement sensor module is a scintillator + photomultiplier(SiPM) sensor optimization structure design, amplification and filter and control circuit design for sensor driver, control circuit design including short-distance communication, sensor mechanism design and manufacturing, and GUI development applied to prototypes consists of, etc. The scintillator + photomultiplier(SiPM) sensor optimization structure design is designed by checking the characteristics of the scintillator and the photomultiplier (SiPM) for the sensor structure design. Amplification, filter and control circuit design for sensor driver is designed to process fine scintillation signal generated by radiation with a scintillator using SiPM. Control circuit design including short-distance communication is designed to enable data transmission through MCU design to support short-range wireless communication function and wired communication support. The sensor mechanism design and manufacture is designed so that the glare generated by wrapping a reflective paper (mirroring) on the outside of the plastic scintillator is reflected to increase the efficiency in order to transmit the fine scintillation signal generated from the plastic scintillator to the photomultiplier(SiPM). The GUI development applied to the prototype expresses the date and time at the top according to each screen and allows the measurement unit and time, seconds, alarm level, communication status, battery capacity, etc. to be expressed. In order to evaluate the performance of the proposed system, the results of experiments conducted by an authorized testing institute showed that the radiation dose measurement range was 30 𝜇Sv/h ~ 10 mSv/h, so the results are the same as the highest level among products sold commercially at domestic and foreign. In addition, it was confirmed that the measurement uncertainty of ±7.4% was measured, and normal operation was performed under the international standard ±15%.

Protective Effect of Saponaria Extract Against UVB-Damage in Skin Fibroblasts (UVB로 산화적 손상을 유도한 피부섬유아세포에 Saponaria 추출물의 보호효과)

  • Kim, Bo-Ae
    • Journal of the Korean Applied Science and Technology
    • /
    • v.39 no.5
    • /
    • pp.644-651
    • /
    • 2022
  • The skin is the largest organ of the human body and protects the inside of the body. Ultraviolet rays cause various inflammatory reactions in the skin, including photoaging and oxidative damage. The purpose of this study is to investigate the protective effect of Saponaria extract by irradiating UVB on fibroblasts. In this study, the effectiveness of Saponaria showing protective activity against UVB-induced cytotoxicity, oxidative cell death, and NO and PGE2 production was evaluated. HS68 cells were irradiated with UVB(120 mJ/cm2) and treated with Saponaria extract at various concentrations of 100, 200, and 400 ㎍/mL for 24 hours. Intracellular reactive oxygen species (ROS) generated by ultraviolet B were detected using a spectrofluorometer after DCF-DA staining. Lipid peroxidation was also analyzed by measuring the level of 8-isoprostane secreted into the culture medium. As a result, treatment with Saponaria extract effectively inhibited UVB-induced cytotoxicity. Oxidative cell damage was mediated by PGE2 in UVB-induced HS68 fibroblasts, which was significantly inhibited by Saponaria extract treatment. In addition, it was evaluated that the protective effect of these extracts was mediated by the inhibition of intracellular ROS production and lipid peroxidation in a concentration-dependent manner. These results suggest that Saponaria extract can be used as an anti-aging functional material because it inhibits skin damage mediated by oxidative stress caused by UVB and exhibits a cellular protective effect.

The Subjectivity Study on 'The Corruption' of Our Society: Using the Q methodology of Hypothesis Abduction (우리사회 '부정부패'에 대한 주관성연구: 가설발견의 Q방법론을 활용하여)

  • Lee, Doh-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.9
    • /
    • pp.19-28
    • /
    • 2022
  • This study aimed at public officials who are most strongly demanded to tear up the corruption and diagnosed what they really think about 'the corruption'. So, a qualitative research method called 'subjectivity study' or 'Q methodology' was used to typing on the perception of corruption. In other words, 30 Q-samples related to corruption and P-samples composed of 30 public officials were investigated to derive the analysis results. As a result of the analysis, three types of perceptions of corruption were defined. That is, showed a high distribution of civil servants such as 'educational administration' and 'teacher', and and showed a high distribution of 'general administrative positions' civil servants. Also, among the respondents of , it was found that the distribution of 'high' was higher for the level of corruption in our society, and the distribution of 'medium' for and was found in the case of the respondents with high factor weight. The overall explanatory power was high at 62.11%, and based on the series of results, a hypothesis could be found that 'the perception of corruption differs according to the characteristics of the work of public officials'. By the results, the commonly recognized terms for 'corruption' were 'politician/politician' and 'solicitation'. Therefore, based on a series of results, this study is expected to be the 'Priming' for finding ways to move toward a more transparent society by diagnosing and reflecting on the thoughts of corruption in our society once again.

Improvement for Technology Readiness Assessment with Weighting Method for Defense Acquisition Project (가중치 산출방법을 활용한 획득방안 분석단계의 기술성숙도평가 개선방안)

  • Kim, Mi-Seon;Noh, Eun-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.4
    • /
    • pp.538-544
    • /
    • 2021
  • Technology readiness assessment is a procedure for managing defense project risk factors based on the preemptive identification of technical risks. Under current regulations, technology readiness is determined based on considerations of the ratings of factors itemized on a checklist, whether unsatisfied factors have a fatal impact on the project, and whether countermeasures for unsatisfied factors have been established. However, objective criteria for assessing the impact of unsatisfied factors have not been presented, and thus, at present, the results of technology readiness level determinations are largely subjective. In addition, the importance of questions on the checklist is dependent on individual project characteristics and this is not considered during the assessment process. In this paper, we propose an improved technology readiness assessment procedure that considers the characteristics of each project. Using the proposed procedure, we quantitatively determined the importance of each checklist item using a weighting method. We found the devised procedure improved the reliability and objectivity of technology readiness assessment results. A case analysis of a complex weapons system is presented to demonstrate these improvements.