• Title/Summary/Keyword: 위해코드

Search Result 2,710, Processing Time 0.03 seconds

Intercultural Comparative Research on Korea-Turkey : Focused on Content Analysis of Turkish Remaking Film (한국 영화 <7번방의 선물> 리메이크를 통해 본 한국-터키 문화 비교 연구 - 터키판 <7번방의 기적>을 중심으로)

  • Lee, Eunbyul;Park, Soohyun
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.6
    • /
    • pp.175-183
    • /
    • 2022
  • This study comparatively analyzed the cultural codes of Korea and Turkey represented in the Turkish film remaking the Korean original film. Although both films follow the narrative of resisting the tyranny of public power based on fatherly love, similarities and differences were revealed depending on the socio-cultural contexts of Korea and Turkey. First of all, Korea and Turkey valued familialism under the influence of Confucianism and Islam respectively. This was represented as a fatherly love, willing to sacrifice himself for the sake of his daughter. Meanwhile, in the Turkish version, there was a difference in the interpretation of the Islamic identity that encompasses the lives of Turkish people and the consequent human sinfulness and death. In the film, the prisoners repented of their personal sinfulness under Islamic doctrine, and sought salvation by activating the muslim brotherhood. This contrasts with the original work, which uses religion as a humor element that highlights the genre characteristics of comedy films, along with the social atmosphere in Korea that allows for the coexistence of various religions. In addition, Turkish one draws on the realistic issues of the military dictatorship of Turkey in the 1980s and the abolition of the death penalty for EU membership, bringing out a film narrative as a drama genre.

Analysis of Musical Characteristics and Changes in Different Periods on Yoon-Sang's Music (윤상의 곡에 나타난 음악적 특징과 시대별 변화)

  • Park, Ji-Eun;Chung, Jae-Youn
    • Journal of Korea Entertainment Industry Association
    • /
    • v.15 no.1
    • /
    • pp.63-73
    • /
    • 2021
  • This study aims to analyze music of Yoon-sang, as a part of musical research, which is the most fundamental approach among academic studies on Korean popular music. Yoon-Sang is a representative composer, who has gone through the 1980s to the present. The result of analysis of 21 songs created by Yoon-Sang showed that his songs are mostly characterized by tonal music, in which chord relationships develop focusing on keynotes. The reason why his music does not sound uniform pursuing stability is he properly added the progression of chromatic chords, based on diatonic chords and melodies. Dominant 7th chord and diminished 7th chord are used the most among diverse techniques adding chromatic colors. Along with these chords, chromatic intervals are used not only in chord progression but also in melodies. The successive, ascending or descending movement of the base line is his common composition and arrangement technique revealed in every song. One of formal changes with the stream of the times is that the number of measured in the pre-chorus and interlude that were of great importance in his songs of the 1990s decreased over time. With regard to harmonic changes, whereas modulation between parts was applied to his 2 songs created in the 2010s. Yoon-Sang's music had one strong tonality overall, but his music began to have more than two tonalities starting the 2010s, and this is a big variation in his music.

A study on the predictability of acoustic power distribution of English speech for English academic achievement in a Science Academy (과학영재학교 재학생 영어발화 주파수 대역별 음향 에너지 분포의 영어 성취도 예측성 연구)

  • Park, Soon;Ahn, Hyunkee
    • Phonetics and Speech Sciences
    • /
    • v.14 no.3
    • /
    • pp.41-49
    • /
    • 2022
  • The average acoustic distribution of American English speakers was statistically compared with the English-speaking patterns of gifted students in a Science Academy in Korea. By analyzing speech recordings, the duration time of which is much longer than in previous studies, this research identified the degree of acoustic proximity between the two parties and the predictability of English academic achievement of gifted high school students. Long-term spectral acoustic power distribution vectors were obtained for 2,048 center frequencies in the range of 20 Hz to 20,000 Hz by applying an long-term average speech spectrum (LTASS) MATLAB code. Three more variables were statistically compared to discover additional indices that can predict future English academic achievement: the receptive vocabulary size test, the cumulative vocabulary scores of English formative assessment, and the English Speaking Proficiency Test scores. Linear regression and correlational analyses between the four variables showed that the receptive vocabulary size test and the low-frequency vocabulary formative assessments which require both lexical and domain-specific science background knowledge are relatively more significant variables than a basic suprasegmental level English fluency in the predictability of gifted students' academic achievement.

A Study on Next-Generation Data Protection Based on Non File System for Spreading Smart Factory (스마트팩토리 확산을 위한 비파일시스템(None File System) 기반의 차세대 데이터보호에 관한 연구)

  • Kim, Seungyong;Hwang, Incheol;Kim, Dongsik
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.1
    • /
    • pp.176-183
    • /
    • 2021
  • Purpose: The introduction of smart factories that reflect the 4th industrial revolution technologies such as AI, IoT, and VR, has been actively promoted in Korea. However, in order to solve various problems arising from existing file-based operating systems, this research will focus on identifying and verifying non-file system-based data protection technology. Method: The research will measure security storage that cannot be identified or controlled by the operating system. How to activate secure storage based on the input of digital key values. Establish a control unit that provides input and output information based on BIOS activation. Observe non-file-type structure so that mapping behavior using second meta-data can be performed according to the activation of the secure storage. Result: First, the creation of non-file system-based secure storage's data input/output were found to match the hash function value of the sample data with the hash function value of the normal storage and data. Second, the data protection performance experiments in secure storage were compared to the hash function value of the original file with the hash function value of the secure storage after ransomware activity to verify data protection performance against malicious ransomware. Conclusion: Smart factory technology is a nationally promoted technology that is being introduced to the public and this research implemented and experimented on a new concept of data protection technology to protect crucial data within the information system. In order to protect sensitive data, implementation of non-file-type secure storage technology that is non-dependent on file system is highly recommended. This research has proven the security and safety of such technology and verified its purpose.

Analysis of Failure Behavior of FRP Rebar Reinforced Concrete Slab based on FRP Reinforced Ratio (FRP 보강근비에 따른 FRP 보강 콘크리트 슬래브의 파괴거동 분석)

  • Jang, Nag-Seop;Kim, Young-Hwan;Oh, Hong-Seob
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.25 no.5
    • /
    • pp.173-181
    • /
    • 2021
  • Reinforced concrete structures are exposed to various environments, resulting in reinforcement corrosion due to moisture and ions penetration. Reinforced concrete corrosion causes a decrease in the durability performance of reinforced concrete structures. One solution to mitigate such issues is using FRP rebars, which offer several advantages such as high tensile strength, corrosion resistance, and light-weight than conventional rebars, in reinforced concrete instead of conventional steel rebars. The FRP rebar used should be examined at the limit state because FRP reinforced concrete has linear behavior until its fracture and can generate excessive deflection due to the low elastic modulus. It should be considered while designing FRP reinforced concrete for flexure. In the ultimate limit state, the flexural strength of FRP reinforced concrete as per ACI 440.1R is significantly lower than the flexural strength by applying both the environmental reduction and strength reduction factors accounting for the material uncertainty of FRP rebar. Therefore, in this study, the experimental results were compared with the deflection of the proposed effective moment of inertia referring to the local and international standards. The experimental results of GFRP and BFRP reinforced concrete were compared with the flexural strength as determined by ACI 440.1R and Fib bulletin 40. The flexural strength obtained by the experimental results was more similar to that obtained by Fib bulletin 40 than ACI 440.1R. The flexural strength of ACI 440.1R was conservatively evaluated in the tension-controlled section.

A Study on the Development of Intravenous Injection Management Application for EMR System Interworking (EMR 시스템 연동 정맥주사 관리 애플리케이션 개발에 대한 연구)

  • Jin-Hyoung, Jeong;Jae-Hyun, Jo;Seung-Hun, Kim;Won-yeop, Park;Sang-Sik, Lee
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.6
    • /
    • pp.506-514
    • /
    • 2022
  • This paper is about developing an intravenous injection management system that can provide nurses with information related to intravenous injection in real-time to compensate for possible instability factors during intravenous injection. The intravenous injection management system consists of an app-based user S/W and a web-based administrator S/W. User S/W is implemented to provide users with the ability to identify patients who need intravenous injection through smartphones, tablet PCs, and nursing PDAs, recognize information codes given to patients, and enter and share treatment contents and treatment items after intravenous injection. As a result of intravenous injection treatment uploaded through the user app, the manager S/W can check the records of intravenous injection treatment items, perform user management functions, emergency notification registration and management functions, and data upload functions. The implemented system has not yet been tested on the EMR system used in the actual hospital. Therefore, through further research, S/W will be optimized and actual environmental application tests will be conducted through cooperation with hospitals.

Development of a Korean-version Integrated Message Set to Provide Information on Traffic Safety Facilities for Autonomous Vehicles (자율주행 자동차 대응 교통안전시설의 정보 제공을 위한 한국형 통합 메시지 셋 설계 방안 연구)

  • Eunjeong Ko;Hyeokjun Jang;Eum Han;Kitae Jang
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.6
    • /
    • pp.284-298
    • /
    • 2022
  • It is necessary to acquire information on traffic safety facilities installed on the roadways specifically for the operation of autonomous vehicles. The purpose of this study is to prepare a Korean version of an integrated message-set design as a way to provide to autonomous vehicles standardized information on traffic safety facilities. In this study, necessary facilities are classified according to four criteria (no legal basis; not providing information to autonomous vehicles; providing duplicate information; not standardized, and too difficult to generalize) based on information that must be provided to operate autonomous vehicles. The priority of information delivery (gross negligence followed by behavior change) was classified according to the importance of the information to be provided during autonomous driving, and the form was defined for the classification code in the information delivered. Finally, the information location and delivery method of traffic facilities for compliance with SAE J2735 were identified. This study is meaningful in that it provides a plan for roadway operations by suggesting a method for providing information to autonomously driven vehicles.

Path Algorithm for Maximum Tax-Relief in Maximum Profit Tax Problem of Multinational Corporation (다국적기업 최대이익 세금트리 문제의 최대 세금경감 경로 알고리즘)

  • Sang-Un Lee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.4
    • /
    • pp.157-164
    • /
    • 2023
  • This paper suggests O(n2) polynomial time heuristic algorithm for corporate tax structure optimization problem that has been classified as NP-complete problem. The proposed algorithm constructs tax tree levels that the target holding company is located at root node of Level 1, and the tax code categories(Te) 1,4,3,2 are located in each level 2,3,4,5 sequentially. To find the maximum tax-relief path from source(S) to target(T), firstly we connect the minimum witholding tax rate minrw(u, v) arc of node u point of view for transfer the profit from u to v node. As a result we construct the spanning tree from all of the source nodes to a target node, and find the initial feasible solution. Nextly, we find the alternate path with minimum foreign tax rate minrfi(u, v) of v point of view. Finally we choose the minimum tax-relief path from of this two paths. The proposed heuristic algorithm performs better optimal results than linear programming and Tabu search method that is a kind of metaheuristic method.

A Forensic Methodology for Detecting Image Manipulations (이미지 조작 탐지를 위한 포렌식 방법론)

  • Jiwon Lee;Seungjae Jeon;Yunji Park;Jaehyun Chung;Doowon Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.4
    • /
    • pp.671-685
    • /
    • 2023
  • By applying artificial intelligence to image editing technology, it has become possible to generate high-quality images with minimal traces of manipulation. However, since these technologies can be misused for criminal activities such as dissemination of false information, destruction of evidence, and denial of facts, it is crucial to implement strong countermeasures. In this study, image file and mobile forensic artifacts analysis were conducted for detecting image manipulation. Image file analysis involves parsing the metadata of manipulated images and comparing them with a Reference DB to detect manipulation. The Reference DB is a database that collects manipulation-related traces left in image metadata, which serves as a criterion for detecting image manipulation. In the mobile forensic artifacts analysis, packages related to image editing tools were extracted and analyzed to aid the detection of image manipulation. The proposed methodology overcomes the limitations of existing graphic feature-based analysis and combines with image processing techniques, providing the advantage of reducing false positives. The research results demonstrate the significant role of such methodology in digital forensic investigation and analysis. Additionally, We provide the code for parsing image metadata and the Reference DB along with the dataset of manipulated images, aiming to contribute to related research.

Relative Importance Analysis of Management Level Diagnosis for Consignee's Personal Information Protection (수탁사 개인정보 관리 수준 점검 항목의 상대적 중요도 분석)

  • Im, DongSung;Lee, Sang-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.2
    • /
    • pp.1-11
    • /
    • 2018
  • Recently ICT, new technologies such as IoT, Cloud, and Artificial Intelligence are changing the information society explosively. But personal information leakage incidents of consignee's company are increasing more and more because of the expansion of consignment business and the latest threats such as Ransomware and APT. Therefore, in order to strengthen the security of consignee's company, this study derived the checklists through the analysis of the status such as the feature of consignment and the security standard management system and precedent research. It also analyzed laws related to consignment. Finally we found out the relative importance of checklists after it was applied to proposed AHP(Analytic Hierarchy Process) Model. Relative importance was ranked as establishment of an internal administration plan, privacy cryptography, life cycle, access authority management and so on. The purpose of this study is to reduce the risk of leakage of customer information and improve the level of personal information protection management of the consignee by deriving the check items required in handling personal information of consignee and demonstrating the model. If the inspection activities are performed considering the relative importance of the checklist items, the effectiveness of the input time and cost will be enhanced.