• Title/Summary/Keyword: 통신교육

Search Result 2,633, Processing Time 0.033 seconds

The use and demand of incentives for family friendly certified companies (가족친화인증기업의 인센티브 활용 실태 및 인센티브 수요 분석)

  • Lee, Hyun Ah;An, Jaehee;Lee, Jae Chun
    • Journal of Family Resource Management and Policy Review
    • /
    • v.24 no.4
    • /
    • pp.1-20
    • /
    • 2020
  • This study aims to improve the family friendly certification system by analyzing the actual experience of family friendly certified companies with the certification's incentives and their demand for new incentives. We analyzed 2018 survey data of family friendly certified company incentives and interviewed representatives from 9 family friendly certified companies. First, the use of incentives differs according to the level of corporate classification, number of employees, industry, certification continuation training, and incentive impact. Current family friendly certification incentives indicate that the utilization rate of incentives is high when small and medium sized enterprises (SMEs) with less than 300 employees have newly received family friendly certification. Second, the use of the certification mark significantly differs by industry, certification duration, and incentive impact. Interviews with the companies' family friendly certification managers revealed that the incentives that companies use mainly are the Public Procurement Service bid points and priority immigration service. Large corporations hope for strong incentives, such as the National Tax Service's deferred tax investigation, interest rate cuts for bank loans, and corporate tax cuts. Lastly, the family friendly certification mark is a representative incentive used by 60% of family friendly certified companies. For the qualitative growth and stabilization of the family friendly certification system, the family friendly certification mark should be improved to become a more attractive incentive.

A Secure Routing Scheme for Wireless Sensor Network with a Mobile Sink (이동 싱크를 가진 무선 센서 네트워크의 안전한 라우팅 기법)

  • Kim Taekvun;Kim Sangjin;Lee Ik-Seob;Yoo Dongyoung;Oh Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.53-64
    • /
    • 2005
  • Previous secure routing protocols for wireless sensor networks assume that a sink is static. In many cases, however, a sink operated by man or vehicle is moving. A mobile sink creates a lot of technical problems such as reconfiguration of routing path exposure of sink location. and selection of secure access point node, which are not considered by many previous researches. In this paper, we propose a new secure routing scheme for solving such problems using hi-directional hash chain and delegation nodes of grid structure. This scheme provides a secure routing path and prevents attacker from recognizing the location of a mobile sink in sensor networks. This new method reduces the resource requirements compared to the cashed routing schemes. Simulation results also show that the system is secure and efficient enough.

A Group Key based Authentication Protocol Providing Fast Handoff in IEEE 802.11 (IEEE 802.11 환경에서 빠른 핸드오프를 제공하는 그룹키 기반의 인증 프로토콜)

  • Lee, Chang-Yong;Kim, Sang-Jin;Oh, Hee-Kuck;Park, Choon-Sik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.103-113
    • /
    • 2008
  • Reducing handoff latency is essential in providing seamless multimedia service in Wireless LAN based on the IEEE 802.11 standard. Reducing authentication delay is critical in reducing handoff latency. To this end, several authentication protocols for fBst handoff have been proposed. Mishra et al. used proactive key distribution to improve the authentication delay incurred in the current standard and Park et al. proposed a new authentication protocol based on Blom's key pre-distribution scheme. In this paper, we propose an enhanced authentication protocol based on Bresson et al.'s group key protocol. If a mobile node has previously access the network, our proposed protocol only requires simple hash operations in providing mutual authentication between a mobile node and access points. Our protocol is more efficient than Park et al.'s and Mishra et al.'s technique can be used in our protocol to further enhance our protocol.

Analysis of the Effect of The Internet Activation on Students in IoT Environment (사물인터넷 환경에서 인터넷 활성화가 학생에 미치는 영향 분석)

  • Lee, Dong-Woo;Cho, Kwangmoon;Lee, Seong-Hoon
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.1
    • /
    • pp.55-62
    • /
    • 2021
  • The world is changing rapidly as the Internet spreads and various smart devices appear. High-performance PCs and high-speed communication networks are rapidly spreading in every home, and all kinds of the internet sites are emerging. In particular, the high education enthusiasm of Korean parents adds to this, and the ratio of the internet users among teenagers is exploding every day. In the case of adolescents, most of them use the Internet for online games, indicating that online games are the main cause of the internet addiction. This study was conducted using a questionnaire for male and female high school students using the Internet, and demographic and sociological characteristics were used only as basic data. In this study, as much as parents, students and teachers think, the results of the internet addiction type analysis according to academic achievement in humanities high school students are to be investigated to determine whether internet use has an effect on academic achievement.

Curation Service Implementation using Machine Learning Algorithm (기계학습 알고리즘을 이용한 Curation 서비스 구현)

  • Lee, Hyung Ho;Lee, Hak Jae;Kim, Tae Su;Kim, Mi Hyun
    • Smart Media Journal
    • /
    • v.9 no.4
    • /
    • pp.118-125
    • /
    • 2020
  • This paper is conducted for automatically recommending and providing information services desired by users on websites of local governments and public institutions with vast amounts of information, In this system, we defined a method of collecting data based on the SiiRU CMS system that collects and preprocesses data, and a study that provides curation services (contents and menus) to users through a collaborative filtering algorithm based on machine learning. Also, the data used in the paper is conducted based on about 1 million data collected in 2019. The analyzed data can provide important information that cannot be easily accessed by providing a cloud tag service or recommended menu for users to conveniently view, and the environment configuration that can realize this service to local governments and public institutions is also provided.

A Precision Positioning Method of Drone Last-mile Delivery Technology in Urban Areas (도심에서의 드론 Last-mile 배송 기술의 정밀 측위 기법)

  • Kim, Kyuseok
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.1
    • /
    • pp.60-67
    • /
    • 2021
  • Countries around the world, including the U.S. are actively researching to commercialize the logistics services using drones. In Korea, telecommunications companies as well as logistics companies are researching and developing the logistics services using drones. However, there's an environmental difference for last-mile delivery between the U.S. and Korea. In Korea, more than 77% of the population lives in apartments and the population density is the 4th highest in the world. Accordingly, in terms of the logistics services using drones, it is necessary to research it with the Korean suitable environment. In this paper, a precision positioning method of drone last-mile delivery in urban areas using short-range wireless communication and barometer is proposed. The experiment results show that the proposed method can detect a window within 2.5 meters. It is expected that the proposed method will help improve the logistics services using drones in urban areas.

Design of Intelligent Intrusion Context-aware Inference System for Active Detection and Response (능동적 탐지 대응을 위한 지능적 침입 상황 인식 추론 시스템 설계)

  • Hwang, Yoon-Cheol;Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.4
    • /
    • pp.126-132
    • /
    • 2022
  • At present, due to the rapid spread of smartphones and activation of IoT, malicious codes are disseminated using SNS, or intelligent intrusions such as intelligent APT and ransomware are in progress. The damage caused by the intelligent intrusion is also becoming more consequential, threatening, and emergent than the previous intrusion. Therefore, in this paper, we propose an intelligent intrusion situation-aware reasoning system to detect transgression behavior made by such intelligent malicious code. The proposed system was used to detect and respond to various intelligent intrusions at an early stage. The anticipated system is composed of an event monitor, event manager, situation manager, response manager, and database, and through close interaction between each component, it identifies the previously recognized intrusive behavior and learns about the new invasive activities. It was detected through the function to improve the performance of the inference device. In addition, it was found that the proposed system detects and responds to intelligent intrusions through the state of detecting ransomware, which is an intelligent intrusion type.

A Case Study on the Application of Flipped Learning in Untact Online Classes: Focusing on Social and Engineering Subjects (비대면 온라인 수업에서의 플립러닝 적용 사례연구: 사회계열 교과목과 공학계열 교과목을 중심으로)

  • Sung, Miyoung;Park, Yonghan;Jung, Se-Youn
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.5
    • /
    • pp.310-323
    • /
    • 2021
  • In this study, we analyzed the application of flipped learning in the untact online classes, focusing on thr social and engineering subjects of universities. Due to the unprecedented situation of COVID-19, the professors and learners were unable to conduct the face-to-faceclasses, and the existing flipped learning classes were analyzed separately from the social and engineering subjects. In particular, the results of this study will provide the basic data on the direction of post-corona-era university classes in that it can increase the effectiveness of flipped learning if it is linked to the flexibility of the university's academic system such as intensive course.

Introduction and Analysis of Open Source Software Development Methodology (오픈소스 SW 개발 방법론 소개 및 분석)

  • Son, Kyung A;Yun, Young-Sun
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.163-172
    • /
    • 2020
  • Recently, concepts of the Fourth Industrial Revolution technologies such as artificial intelligence, big data, and cloud computing have been introduced and the limits of individual or team development policies are being reviewed. Also, a lot of latest technology source codes have been opened to the public, and related studies are being conducted based on them. Meanwhile, the company is applying the strengths of the open source software development methodology to proprietary software development, and publicly announcing support for open source development methodology. In this paper, we introduced several software development methodology such as open source model, inner source model, and the similar DevOps model, which have been actively discussed recently, and compared their characteristics and components. Rather than claiming the excellence of a specific model, we argue that if the software development policy of an individual or affiliated organization is established according to each benefit, they will be able to achieve software quality improvement while satisfying customer requirements.

Modeling on Policy Conflict for Managing Heterogeneous Security Systems in Distributed Network Environment (분산 환경에서 이종의 보안시스템 관리를 위한 정책 충돌 모델링)

  • Lee, Dong-Young;Seo, Hee-Suk;Kim, Tae-Kyung
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.2
    • /
    • pp.1-8
    • /
    • 2009
  • Enterprise security management system proposed to properly manage heterogeneous security products is the security management infrastructure designed to avoid needless duplications of management tasks and inter-operate those security products effectively. In this paper, we defined the security policies using Z-Notation and the detection algorithm of policy conflict for managing heterogeneous firewall systems. It is designed to help security management build invulnerable security policies that can unify various existing management infrastructures of security policies. Its goal is not only to improve security strength and increase the management efficiency and convenience but also to make it possible to include different security management infrastructures while building security policies. With the process of the detection and resolution for policy conflict, it is possible to integrate heterogeneous security policies and guarantee the integrity of them by avoiding conflicts or duplications among security policies. And further, it provides convenience to manage many security products existing in large networks.