• Title/Summary/Keyword: 첨단기술 확보

Search Result 266, Processing Time 0.022 seconds

DEVELOPMENT OF A LYMAN-α IMAGING SOLAR TELESCOPE FOR THE SATELLITE (인공위성 탑재용 자외선 태양카메라(LIST) 개발)

  • Jang, M.;Oh, H.S.;Rim, C.S.;Park, J.S.;Kim, J.S.;Son, D.;Lee, H.S.;Kim, S.J.;Lee, D.H.;Kim, S.S.;Kim, K.H.
    • Journal of Astronomy and Space Sciences
    • /
    • v.22 no.3
    • /
    • pp.329-352
    • /
    • 2005
  • Long term observations of full-disk Lyman-o irradiance have been made by the instruments on various satellites. In addition, several sounding rockets dating back to the 1950s and up through the present have measured the $Lyman-{\alpha}$ irradiance. Previous full disk $Lyman-{\alpha}$ images of the sun have been very interesting and useful scientifically, but have been only five-minute 'snapshots' obtained on sounding rocket flights. All of these observations to date have been snapshots, with no time resolution to observe changes in the chromospheric structure as a result of the evolving magnetic field, and its effect on the Lyman-o intensity. The $Lyman-{\alpha}$ Imaging Solar Telescope(LIST) can provide a unique opportunity for the study of the sun in the $Lyman-{\alpha}$ region with the high time and spatial resolution for the first time. Up to the 2nd year development, the preliminary design of the optics, mechanical structure and electronics system has been completed. Also the mechanical structure analysis, thermal analysis were performed and the material for the structure was chosen as a result of these analyses. And the test plan and the verification matrix were decided. The operation systems, technical and scientific operation, were studied and finally decided. Those are the technical operation, mechanical working modes for the observation and safety, the scientific operation and the process of the acquired data. The basic techniques acquired through the development of satellite based solar telescope are essential for the construction of space environment forecast system in the future. The techniques which we developed through this study, like mechanical, optical and data processing techniques, could be applied extensively not only to the process of the future production of flight models of this kind, but also to the related industries. Also, we can utilize the scientific achievements which are obtained throughout the project And these can be utilized to build a high resolution photometric detectors for military and commercial purposes. It is also believed that we will be able to apply several acquired techniques for the development of the Korean satellite projects in the future.

A Study on the Profitability Enhancement of SI Business in Public and Finance Sector (공공(公共)/금융분야(金融分野) SI사업(事業)의 수익성(收益性) 향상(向上) 방안(方案)에 관한 연구(硏究))

  • Joo, Jeong-Soo;Jahng, Jung-Joo;Cho, Hurn-Jin
    • Information Systems Review
    • /
    • v.12 no.1
    • /
    • pp.165-188
    • /
    • 2010
  • Recently public and finance SI (system integration) industry is called as 4D (difficult, dangerous, dirty, dreamless) industry because of low profit, overtime works and poor motivation of employees. Even some people think at SI industry to be a labor intensive industry instead of a high technology industry. The current study considers outside environmental change of SI industry as well as inside capability enhancement of SI companies. The study adopted action research method with the author's expertise and experiences as a head of a major SI company in Korea. The current research framework suggests 5 areas of profitability enhancement that offers propositions and implications. 5 areas of profitability enhancement are (1) policy improvement, (2) business portfolio innovation (3) sales capability reinforcement, (4) delivery capability reinforcement, and (5) cost management innovation. The five areas include 11 propositional factors and 21 implementation plans which were chosen from the profitability perspectives of SI companies.In order to successfully execute propositions and implementation plans of the framework, 3 years is needed and after 3 years profitability are expected to increase 10% higher than the current level. The framework, propositions and suggestions in this study are expected to offer a real contribution for SI companies that want to enhance competitiveness and profitability. Future extension of the current study to benchmarking the competitiveness and profitability between local companies and global companieswill bring a solid attention from industry and academics.

Elementary Teachers' Perception in Using Smart-Technology in STEAM Class : Focus on Application Type, Difficulties and Support Required (STEAM 수업에서 스마트테크놀로지 적용에 대한 초등교사의 인식 -적용 유형과 어려움 및 지원을 중심으로-)

  • Han, Areum;Na, Jiyeon
    • Journal of The Korean Association For Science Education
    • /
    • v.39 no.6
    • /
    • pp.777-790
    • /
    • 2019
  • The purpose of this study is to investigate the experience of teachers who apply Smart-technology in elementary school STEAM class and the reasons, difficulties when applying the technology and required support. Semi-structured in-depth interviews were conducted with six elementary school teachers with specialized knowledge in STEAM education who have experienced STEAM lessons several times before. The research findings are as follows: First, research participants utilized a variety of Smart-technology in STEAM class, most of which were experiential or interactive technology. Among the STEAM learning criteria, the Smart-technology in 'Creative Design' course was most often applied. Second, they adopted Smart Technology in STEAM class to encourage students to feel interested, actively participate in the class, enjoy indirect experience, and nurture interest in state-of-the-art technology. They used it to prepare for future societies and organize classes that are suitable for STEAM learning criteria. They also used Smart-technology because it was easy to use. Third, they found it difficult to find, secure, and use suitable Smart-technology when applying Smart-technology in the STEAM class. They also had trouble restructuring the curriculum. In addition, there were difficulties in using Smart-technology in the class such as lack of class hours, increased level of activity, insufficient physical environment and unexpected malfunction of Smart-technology, thus interrupted the class. After the class, it was hard to manage Smart-technology and also, there were difficulties in assessment, record, and negative awareness of surrounding people. Fourth, they mentioned that's suggesting education guidelines, develop, and distribute educational materials are required to enable 'Creative Design,' reduce educational content, provide training, secure Smart-technology equipment and provide Wi-Fi, support teacher's club and communities and create an atmosphere to emotionally support teachers in order to activate using Smart-technology in STEAM class.

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF

Korea's Terrorist Environment and Crisis Management Plan (한국의 테러환경과 위기관리 방안)

  • Jang, Sung Jin;Kim, Young-Hyun;Shin, Seung-Cheol
    • Korean Security Journal
    • /
    • no.52
    • /
    • pp.73-91
    • /
    • 2017
  • This study is based on the political and economic standpoint of each country, Use advanced equipment to prevent new terrorism from causing widespread damage, In order to establish a countermeasures against terrorism in accordance with the reality of Korea, which is effective in responding to terrorist attacks, Korea conducted a SWOT analysis of the terrorist environment and terrorist environment through specialists. First, internal strengths of Korea 's terrorist environment include stable security situation, weakness of religious and ethnic conflicts, strong regulation and control of firearms, and counter terrorism capabilities and know - how accumulated during major international events. Second, the internal weaknesses of the terrorist environment in Korea include the insecurity of the people, the instability caused by the military confrontation with North Korea, the absence of anti-terrorism law system, the difficulty of terrorism control and management by the development of the Internet and IT technology. Third, the external opportunities for Korea 's terrorist environment are as follows: ease of supplementation and learning through cases of foreign terrorism failure, ease of increase of terrorist budget and support with higher terrorism issues, strengthening of counterterrorism through military cooperation with allied nationsRespectively. Fourth, the external threats to the terrorist environment in Korea are the increase of social dissatisfaction due to the continuous influx of defectors and foreign workers, the goal of terrorism from international terrorist organizations through alliance with the United States,Increased frequency of incidents, and increased IS coverage of terrorism around the world. In addition, the SWOT in - depth interviews on the terrorist environment of the expert group were conducted to diagnose and analyze the problems, terrorism awareness and legal system in the Korean terror environment. The results of the study are summarized as follows.First, the basic law on terrorism should be enacted.Second, the establishment of an integrated anti-terrorism organization.Third, securing and nurturing specialized personnel in response to terrorism.

  • PDF

The Cyber world of the Matrix as a typical type of 'Simulacre' (시뮬라크르의 전형(典型)으로서 매트릭스(Matrix)의 가상 세계)

  • 이종한
    • Archives of design research
    • /
    • v.17 no.1
    • /
    • pp.339-346
    • /
    • 2004
  • Matrix, produced by Larry & Andy Wachowski, was relatively precisely dealt with the cyber world. After the movie was released, it had a mania for the movie and was adopted into a various forms of cultural products. It was remade not only into the parodies of the other movies and TV programs, but also the clothes and miscellaneous items of the movie were reincarnated as an unique cultural trend. The cause of the popularity is the fresh storyline as well as the sophisticated visual effects and good-looking actors. The agony of the protagonist was connected with the people outside the movie who are yearning for the ideal world. He was confused at the fact that his circumstances which were believed as the real world were not tortally true, complicated between the sensually phisical truth and the spiritual truth and had an will for the freedom that would ransack the truth and save the other people from the fictitious world. Consequently, the movie has got sympathies with many audiences suggesting the situation that has no a firm belief of the reality, the difference between the real and the cyber world is meaningless and the faked images of the high-technology are overturned This thesis tries to study the present that the real images are excessly duplicated and consumed, related to the Jean Baudrillard's theory, 'Hyperreel'. Replaced the real objects by a technical programming in the Matrix world, there happens the image-violence that the true nature is slaughterred by images. In the world where the reproducts are more actual than the reality and pretends to be real, only semiotics are consumed and produced. That is to say, the tortally programmed images has no references and aims, therefore should be produced in an 'impediment-strategy' like a faked crisis. That is the step of 'Simulation' that artificially reincarnates the real. Based upon the Baudrillard's theory, 'Simulacre', this study tries to research today's post-modern situation that the boundary of the real world and the faked copy is vague and vanishing, through the analysis of the cyber world of the movie 'Matrix'.

  • PDF