• Title/Summary/Keyword: 내부 구성원

Search Result 402, Processing Time 0.027 seconds

Analysis of Mobility Models and Novel Inquirer Mobility in Wireless Sensor Networks (무선 센서 망에서의 이동성 환경 연구 및 새로운 정보 요구자 이동성 모델 제안)

  • Choi, Young-Hwan;Park, Soo-Chang;Lee, Eui-Sin;Yu, Fu-Cai;Kim, Sang-Ha
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10d
    • /
    • pp.166-170
    • /
    • 2007
  • 전형적인 무선 센서망은 센서들과 싱크로 구성된다. 그리고 사용자는 싱크로부터 원하는 정보를 요구 혹은 획득한다. 그 개체들은 무선 센서 망에서 이동성 환경을 각각 독립적으로 제공할 수 있다. 그에 비해, 기존 연구들은 센서 노드, 싱크, 그리고 이벤트 이동성만을 고려한다. 그러나, 또 하나의 이동성을 제공하는 가능한 개체로서 정보 요구자(사용자)가 있다. 정보 요구자 노드는 센서 망 내부에서 이동하면서 싱크에게 원하는 정보를 요구할 수 있다. 본 논문은 기존에 제안된 이동성 모델들을 분석하고, 새로운 이동성 모델인 정보 요구자 이동성 모델을 제안한다.

  • PDF

Correlation between Mineralogical and Chemical Compositions of the Micro-Textures in Manganese Nodules (망간단괴 미세조직에 따른 광물조성과 화학조성의 상관관계)

  • 최헌수;장세원;이성록
    • Journal of the Mineralogical Society of Korea
    • /
    • v.13 no.4
    • /
    • pp.205-220
    • /
    • 2000
  • 북동태평양 C-C지역의 우리나라 광구에서 산출되는 망간단괴의 내부조직을 크게 주상조직 층상대, 첨상조직 층상대, 첨상조직 괴상대, 첨상조직 다공질대 및 괴상조직 괴상대로 구분하였다. 주상조직 층상대에서는 버나다이트(vernadite)가 가장 우세하게 산출되며, 첨상조직 층상대에서는 부서라이크(buserite)가 함께 산출된다. 첨상조직 괴상대는 부서라이트의 산출이 두드러지며, 부분적으로 토도로카이트(todorokite)가 수반된다. 첨상조직 다공질대는 첨상체 또는 구상체로 이루어지며 부분적으로 괴상조직으로 교대되는데 주로 토도로카이트와 부서라이트로 구성되어 있다. 괴상조직을 갖는 괴상대에서는 토도로카이트와 버네사이트(birnessite)가 부서라이트와 함께 산출된다. 각 조직대별로 미세조직을 이루는 엽리들에 대해 전자현미분석을 실시하였다. 엽리의 화학조성을 구성하는 요인은 상관계수 군집분석에 의해 Mn-K의 Mn군, Cu-Ni-Zn-Mg(Ca-Na)의 Cu-Ni-Mg군 Fe-Co-Ti(Ca-P)의 Fe군과 Si-Al의 Si군 등 네 개군으로 구분된다. 각 조직대는 세 개 또는 네 개의 군으로 구성되며 이들 각군은 단괴에서 산출되는 광물과 밀접한 관계를 가진다. Mn군은 토도로카이트, Cu-Ni-Mg군은 부서라이트, Fe군은 함코발트수산화철광물, 그리고 Si군은 규산염광물에서 주로 기인하는 것으로 생각된다. 엽리의 화학조성은 이들 광물의 조합과 구성광물의 화학조성에 따라 지배되고 한 조직대내에서도 여러종류의 조합을 보이는데 이는 각 조직대의 엽리들의 성인과 밀접한 관련이 있는 것으로 생각된다.

  • PDF

A Study on Applying Zero Trust Architecture: Focusing on Implementing Remote Work System (제로 트러스트 아키텍처 적용 방안에 대한 연구: 재택근무 시스템 구성을 중심으로)

  • Jaewoo Do;Keumseok Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.1001-1020
    • /
    • 2023
  • As massive increase in remote work since COVID-19, the boundaries between the inside and outside of corporate networks have become blurred. As a result, traditional perimeter security has stagnated business productivity and made it difficult to manage risks such as information leakage. The zero trust architecture model has emerged, but it is difficult to apply to IT environments composed of various companies. Therefore, using the remote work system configuration as an example, we presented a configuration and methodology that can apply zero trust models even in various network environments such as on-premise, cloud, and network separation. Through this, we aim to contribute to the creation of a safe and convenient cyber environment by providing guidance to companies that want to apply zero trust architecture, an intelligent system that actively responds to cyber threats.

Internal Foundation on the 'of', 'for', 'from' Lifelong Education for the Disabled: Convergence of Developmental Disabilities and Schools (장애인평생교육'의', '을 위한', '으로부터' 내부 토대: 발달장애(developmental disabilities)-학교(schools) 융합)

  • Kim, Young-Jun;Kim, Wha-Soo;Kwon, Ryang-Hee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.67-74
    • /
    • 2021
  • The purpose of this study is to explore the internal foundation of lifelong education for the disabled. The composition system of the meaning of contents for this purpose is divided into three elements: 'of' which means subject based on lifelong education for the disabled, 'for' which means purpose, and 'from' which means practical main base. The research method was to discuss the academic basis, practical application model and plan, or to analyze the literature through the previous studies that were actualized in order to form the internal foundation of the support system for lifelong education for the disabled. Second, the expert meeting was conducted to improve the specificity of the research contents based on the basis of the literature analysis. The contents of this study are presented in two main ways: the foundation of developmental disabilities and the foundation of schools by synthesizing the main bases of subjects, purposes, and practical base required to form the internal foundation of lifelong education for the disabled. The above two factors first establish the internal universality of the support system for lifelong education for the disabled, and in connection with the types of sensory disabilities and the general lifelong education. As a result, the long-term stability of the overall support system for lifelong education for the disabled was analyzed.

The Geohistorical Interpretation of Hacienda in New Spain (스페인 식민지시대 멕시코의 아시엔다 연구)

  • Hong, Keum-Soo
    • Journal of the Korean association of regional geographers
    • /
    • v.11 no.2
    • /
    • pp.291-311
    • /
    • 2005
  • The great estate system of the Old World crossed the Atlantic Ocean in the 1500s along with the Spanish Royal Army, mission, merchants, crops and domestic arrivals, landing at the end of the journey in the Middle and South Americas. The latifundio of Spain's Middle Age combined with the environment of the New World to be regenerated in the name of hacienda which bad became tightly roared in the countryside landscape of New Spain by fin-de-colonial period of 1820s. The haciendas were distributed mainly over the central part of the present-dey Mexico, and the presence of water and towns determined the specific location of the large landed estates. Depending on the activities performed, the hacienda can be divided into several types such as grain hacienda, livestock hacienda, mining hacienda, henequen hacienda, and so forth. Consisting of landlords, estate managers and waged labor called peons, the hacienda as a semi-autarkic settlement played various roles as the home of church, the agrarian center and the hearth of cultural diffusion, as well as dwelling. Toward the end of the colonial period the hacienda experienced internal transformations driven by capitalism.

  • PDF

User based Smart Home Device Matching System (사용자 기반 스마트 홈 디바이스 매칭 시스템)

  • Lee, Hyeongseon;Yu, Donggyun;Lee, Jongwon;Chung, Jinmo;Jung, Hoekyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.617-618
    • /
    • 2017
  • Recently, IoT can provide a service considering user's convenience by configuring the inside of the home as a smart environment. However, the existing system can not change the configuration of the home smart environment by the user, and there is a problem in compatibility between the server and the heterogeneous device. In this paper, we propose a system to reconfigure the relationship between the device and the server in the smart home environment to solve that. In a smart home environment, The user can add and delete devices through the application. In addition, when a new device is added, the server searches the schema for the device and establishes an automatic relationship. This makes it possible for the user to easily change the configuration of the smart home environment.

  • PDF

Three-dimensional Numerical Analysis of Detonation Wave Structures in a Square Tube (정사각관 내 데토네이션 파 구조의 삼차원 수치 해석)

  • Cho, Deok-Rae;Won, Su-Hee;Shin, Jae-Ryul;Lee, Soo-Han;Choi, Jeong-Yeol
    • Journal of the Korean Society of Propulsion Engineers
    • /
    • v.11 no.1
    • /
    • pp.1-10
    • /
    • 2007
  • Three dimensional structures of detonation waves propagating in a square tube were investigated using a high resolution CFD code coupled with a conservation equation of reaction progress variable and an one-step irreversible reaction. The code were parallelized based on domain decomposition technique using MPI library. The computations were carried on an in-house Windows cluster with AMD processors. Three-dimensional unsteady analysis results in the smoked-foil records caused by the instabilities of the detonation waves, which showed the rectangular and diagonal modes of detonation instabilities depending on the initial condition of disturbances and the spinning detonation for case of small reaction constant.

A Critique on the Critical Communication Studies and Journalism Focused on the Neoliberalism in Korea (신자유주의에 대한 언론과 비판언론학 비판)

  • Sohn, Seok-Choon
    • Korean journal of communication and information
    • /
    • v.45
    • /
    • pp.49-76
    • /
    • 2009
  • The purpose of this essay explores a critical review of the critical communication studies and Journalism focused on the neoliberalism in Korea. The majority of social member in Korea does not know the concept of neoliberalism, and just recognize it as a 'global standard.' This essay is analyzing Korean journalism which causes this phenomenon primarily. Nonetheless, the critical communication studies was negligent in criticism on journalism. Any research paper in was not analyzed the connection between neoliberalism and journalism At last this essay proposed that the critical communication studies should establish their identity themselves to critically analyze the journalism trying to protect the neoliberalism in one way, and become more critical to the press itself to raise the relationship with journalism spot.

  • PDF

The Effect of Organization's Industrial Security Management on Employees' Security Policy Compliance Intention (조직의 산업보안 활동이 구성원의 보안 정책 준수 의도에 미치는 영향)

  • Donghwan Lee;Seungwook Park
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.57-68
    • /
    • 2022
  • As the importance and awareness of security have recently expanded, companies and governments are making continuous efforts and investments for security management. However, there are still many security threats in the organization, especially security incidents caused by internal staff. Therefore, it is very important for members to comply with security policies for organizational security management. Therefore, this study classified industrial security management into technical security, physical security, and managerial security, and applied the theory of planned behavior to investigate the impact relationship on the intention to comply with security policies. SPSS 25 and AMOS 25 were used for statistical analysis, and the study found that technical security had a positive(+) effect on subjective norms, physical security had a positive(+) effect on perceived behavior control, and attitude and perceived behavior control had a positive(+) effect on security policy compliance intention.

A Study on the Development Site Security for Embedded Software (임베디드 소프트웨어 개발현장보안에 관한 연구)

  • Yeo, Sang-Soo;Kim, Tai-Hoon;Cho, Sung-Eon;Kouich, Sakurai
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.3
    • /
    • pp.259-265
    • /
    • 2007
  • Systematic components for implementing ubiquitous computing, for example, electronic devices, electric home appliances, and controllers, etc, are consist of not only circuits but also softwares expected to do some special system-controlling functions, and these softwares used to be called like as embedded software. Because embedded software is a core component controlling systems, the codes or control flows should be protected from being opened to the public or modified. Embedded software security can be divided into 2 parts: first is the unauthorized access to development site and embedded software, second is the unauthorized disclosure or modification. And this research is related to the first aspect of them.This paper proposes some security check requirements related to embedded software development site by analyzing the ALC_DVS.1 of the ISO/IEC 15408 and Base Practices (BPs) of the ISO/IEC 21827. By applying this research, we expect to protect unauthorized modification of embedded software indirectly.

  • PDF