• Title/Summary/Keyword: 행위주

Search Result 1,310, Processing Time 0.027 seconds

A Context Recognition System for Various Food Intake using Mobile and Wearable Sensor Data (모바일 및 웨어러블 센서 데이터를 이용한 다양한 식사상황 인식 시스템)

  • Kim, Kee-Hoon;Cho, Sung-Bae
    • Journal of KIISE
    • /
    • v.43 no.5
    • /
    • pp.531-540
    • /
    • 2016
  • Development of various sensors attached to mobile and wearable devices has led to increasing recognition of current context-based service to the user. In this study, we proposed a probabilistic model for recognizing user's food intake context, which can occur in a great variety of contexts. The model uses low-level sensor data from mobile and wrist-wearable devices that can be widely available in daily life. To cope with innate complexity and fuzziness in high-level activities like food intake, a context model represents the relevant contexts systematically based on 4 components of activity theory and 5 W's, and tree-structured Bayesian network recognizes the probabilistic state. To verify the proposed method, we collected 383 minutes of data from 4 people in a week and found that the proposed method outperforms the conventional machine learning methods in accuracy (93.21%). Also, we conducted a scenario-based test and investigated the effect contribution of individual components for recognition.

Anomaly Detection Using Visualization-based Network Forensics (비정상행위 탐지를 위한 시각화 기반 네트워크 포렌식)

  • Jo, Woo-yeon;Kim, Myung-jong;Park, Keun-ho;Hong, Man-pyo;Kwak, Jin;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.25-38
    • /
    • 2017
  • Many security threats are occurring around the world due to the characteristics of industrial control systems that can cause serious damage in the event of a security incident including major national infrastructure. Therefore, the industrial control system network traffic should be analyzed so that it can identify the attack in advance or perform incident response after the accident. In this paper, we research the visualization technique as network forensics to enable reasonable suspicion of all possible attacks on DNP3 control system protocol, and define normal action based rules and derive visualization requirements. As a result, we developed a visualization tool that can detect sudden network traffic changes such as DDoS and attacks that contain anormal behavior from captured packet files on industrial control system network. The suspicious behavior in the industrial control system network can be found using visualization tool with Digital Bond packet.

The Effect of the Health Education Program for Mothers with Developmental Disabled Children on Health Care Behavior and Parenting Stress (발달장애 아동을 위한 어머니 건강교육프로그램이 자녀 건강관리행위와 양육스트레스에 미치는 효과)

  • Kim, Hye-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.6
    • /
    • pp.338-346
    • /
    • 2016
  • This study was conducted to develop a health education program to help mother's cope with developmentally disabled children's health, and to test the effects of the program. The contents of the health education program were based on the results of a discussion with experts and previous studies. The program consisted of two parts, physical health and psychosocial health, which were measured over 4 weeks. The results of the study showed that the program helped mothers improve the level of health care and reduce parenting stress level. These findings suggest that studies for handicapped children's health should be conducted in the future using an interdisciplinary approach.

Opening of Cultural Market, International Norms, and Global Governance (문화시장개방, 국제규범, 글로벌 거버넌스)

  • Kim, Eun-Gyoo
    • Korean journal of communication and information
    • /
    • v.35
    • /
    • pp.7-35
    • /
    • 2006
  • As neoliberal Globalization is reinforced, the debating of international stage about cultural market is heated up. People who insist market opening claim that cultural product has to be handled in condition such as other goods. However, the dissenter of cultural market-opening assert 'cultural exception' in goods trade because culture affects in individual and community consciousness and identity. The dispute encompassing cultural market raise the concept of Global Governance which presents theoretical frame about international society's decision-making and administration. Thus, this article explore international norms which encompass cultural market and its stakeholder through Global Governance frame. Specifically, first, this article review the theory of Global Governance. Second, this article examine international norms such as WTO, GATT, GATS, and also study its opponent who advocate 'cultural diversity'. Consequently, this article argue that the debating and conflict about cultural market should be resolved, not by hegemony state, by Global Governance frame which all stakeholder take part in.

  • PDF

The Effects of the change in Telecommunication Regulation on Advanced Network Investment (규제정책의 변화가 고도 통신망 투자유인에 미치는 영향분석)

  • Jung, Choong-Young;Jung, Song-Min
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.7
    • /
    • pp.1405-1414
    • /
    • 2011
  • This paper analyzes the impact of the change in telecommunication regulation on network investment such as the integration of telecommunication service. The integration of telecommunication service plays a role of separating the behavior regulation from entrance regulation and reducing a entrance constraints. Therefore, it is expected that the market spill over effect is high through the improvement of behavior regulation such as interconnection regulation, facilities provisions, retail price regulation, bundling, number portability of VoIP. This paper discusses the critical factor affecting the decision making process in respect of the firm level and analyzes the impact path guiding investment and innovation. Finally, the paper proposes the guideline for telecommunications policy.

A Study on the Shoplifting Behavior and Its Influencing Factors in the Retail Shop (소매점내 상점절도 행위와 그 영향요인에 관한 연구)

  • Noh, Jung-Koo
    • Management & Information Systems Review
    • /
    • v.32 no.2
    • /
    • pp.315-338
    • /
    • 2013
  • Recently as the economic circumstances have been getting worse, livelihood crimes like shoplifting have occurred considerably frequently. Shoplifting is the stealing behavior occurred in the retail shop such as department store, discount store, supermarket. Though there is economic and social risk of shoplifting, academic research of shoplifting has implemented scarcely. This study analyzes the shoplifting behavior in the retail store and its influencing factors, and aims to provide background of academic research of this field. So this study will give practical implication to reduce or prevent shoplifting behavior. As a result of this study, friend relationship and compulsive buying disposition influence the attitude of shoplifting behavior. But economic motive, stimulus pursuit disposition, and experience motive do not influence the attitude of shoplifting behavior. Finally to reduce or prevent shoplifting behavior, this study suggests the implications of this study and further research agenda.

  • PDF

The Convergence effects of oral health education of kindergarteners (유치원 아동들의 구강보건교육 융합 효과)

  • Kim, Ji-Hwa;Kim, Gi-Ug
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.6
    • /
    • pp.131-137
    • /
    • 2015
  • To study the effects of oral health education on children, weekly education sessions and surveys were held for 214 preschoolers, 6-7 years of age, in 2 K-area kindergartens for 4 weeks in July 2015. Statistics on oral health behaviors such as children with regular dental checkups(p<0.05), children who underwent fluoride application(p<0.05), children without dental caries diagnosis(p<0.001), children with mothers who underwent oral health education(p<0.05) showed significant difference. Oral health knowledge scores(6 being perfect) increased from pre-education scores of 4.96 to post-education score of 5.54. oral health behavior scores(11 being perfect) also increased from pre-education scores of 7.18 to post-education score of 7.75(p<0.001). Therefore, it is the author's opinion that the development of oral health education programs with relatively short cycles, alongside systematic, practical, and repeated education would be beneficial.

A Study on Factors Influencing Youth Drinking Using Binomial Logistic Regression

  • Kim, Eun-ju;Bang, Sung-a;Seo, Eun-sug
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.12
    • /
    • pp.167-174
    • /
    • 2019
  • The purpose of this study was to analyze the factors affecting the drinking behavior of adolescents. Based on this, it aims to suggest the practical and policy measures to prevent the drinking behavior of adolescents and to mediate / reduce them. We used binomial logistic analysis as an analysis method.As a result of this study, the individual factors affecting alcohol drinking were gender, smoking experience over the past year, sexual satisfaction, cyber delinquency, self-esteem, parental abuse, peer as family factors. Peer trust was significantly associated with attachment factors, and school adaptation factors were not found to be associated with alcohol drinking in adolescents. This suggests that multilateral efforts such as individuals, families, and communities are needed to mediate and reduce the drinking behavior of adolescents.

An Email Vaccine Cloud System for Detecting Malcode-Bearing Documents (악성코드 은닉 문서파일 탐지를 위한 이메일 백신 클라우드 시스템)

  • Park, Choon-Sik
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.5
    • /
    • pp.754-762
    • /
    • 2010
  • Nowadays, email-based targeted attacks using malcode-bearing documents have been steadily increased. To improve the success rate of the attack and avoid anti-viruses, attackers mainly employ zero-day exploits and relevant social engineering techniques. In this paper, we propose an architecture of the email vaccine cloud system to prevent targeted attacks using malcode-bearing documents. The system extracts attached document files from email messages, performs behavior analysis as well as signature-based detection in the virtual machine environment, and completely removes malicious documents from the messages. In the process of behavior analysis, the documents are regarded as malicious ones in cases of creating executable files, launching new processes, accessing critical registry entries, connecting to the Internet. The email vaccine cloud system will help prevent various cyber terrors such as information leakages by preventing email based targeted attacks.

The Relationship between Metabolic Syndrome Risk Factors and Health Promotion Behavior in General Hospital Nurses (간호사의 대사증후군 유발 위험요인과 건강증진행위간의 관계)

  • Park, Hyun-Hee;Lee, Kwang-Ok
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.6
    • /
    • pp.314-325
    • /
    • 2015
  • The goal of this study was to evaluate the relationship between metabolic syndrome risk factors and health promotion behavior in general hospital nurses. Data were conducted using a structured questionnaire survey with 450 registered nurses in a general hospital in Gyeonggido. Data were collected from October 6 to October 31, 2014. The data were analyzed using SPSS/WIN 21.0. version. The overall prevalence of metabolic syndrome was 8.0% for nurses at a general hospital. The mean score of Health promotion lifestyle profile was 2.53( range: 1.22~3.44). The high prevalence risk groups for metabolic syndrome was between 26 and 30 yr of age, ICU nurses and drinking one or two times/1wk. The study indicates that hospital administrators should focus on job circumstances of nurses(especially nurses classified as high prevalence risk for metabolic syndrome) for improvement and prevention of MS prevalence risk.