• 제목/요약/키워드: Analysts

Search Result 387, Processing Time 0.022 seconds

Research on the Necessity of Building the Second Space Rocket Launching Sites for Breakthrough Development of R.O.K National Space Power (도약적 국가 우주력 발전을 선도할 제2 우주센터 구축 필요성 연구)

  • Park, Ki-tae
    • Journal of Space Technology and Applications
    • /
    • v.2 no.2
    • /
    • pp.146-168
    • /
    • 2022
  • Witnessing current military conflicts in South China Sea and Eastern Europe, most defense analysts evaluate one of the most serious security threat toward the US is coming from the superpower competitions with Russia and China. The main means for such super power hegemonic competitions is military power and space power is a key enabler to maximize the efficiency and effectiveness of military employment. Reflecting above circumstances, the space hegemonic competition between the Unites States and China is spreading into all aspects of national powers. Under such an environment, R.O.K needs to significantly develop national space power to preserve life and assets of people in space. On the other hand, the R.O.K has a lot of limitations in launching space assets into orbits by land-based space rockets due to its geographic locations. The limitation of rocket launching direction, the failure to secure a significant area enough to secure safety and the limitation to secure open area enough to build associated facilities are among them. On this paper, I will suggest the need to build the 2nd space rocket launching site after analyzing a lot of short-falls the current 'Naro' space center face, compared to those of advanced space powers around the world.

Degree Programs in Data Science at the School of Information in the States (미국 정보 대학의 데이터사이언스 학위 현황 연구)

  • Park, Hyoungjoo
    • Journal of Korean Library and Information Science Society
    • /
    • v.53 no.2
    • /
    • pp.305-332
    • /
    • 2022
  • This preliminary study examined the degree programs in data science at the School of Information in the States. The focus of this study was the data science degrees offered at the School of Information awarded by the 64 Library and Information Science (LIS) programs accredited by the American Library Association (ALA) in 2022. In addition, this study examined the degrees, majors, minors, specialized tracks, and certificates in data science, as well as the potential careers after earning a data science degree. Overall, eight Schools of Information (iSchools) offered 12 data science degrees. Data science courses at the School of Information focus on topics such as introduction to data science, information retrieval, data mining, database, data and humanities, machine learning, metadata, research methods, data analysis and visualization, internship/capstone, ethics and security, user, policy, and curation and management. Most schools did not offer traditional LIS courses. After earning the data science degree in the School of Information, the potential careers included data scientists, data engineers and data analysts. The researcher hopes the findings of this study can be used as a starting point to discuss the directions of data science programs from the perspectives of the information field, specifically the degrees, majors, minors, specialized tracks and certificates in data science.

The Role of Cyber in Kim Jong Un's Byungjin Line: North Korea's Political Culture, Hackers, and Maritime Tactics (김정은의 병진노선에서 사이버의 역할: 북한의 정치문화, 해커, 해양전술)

  • Young, Benjamin R.
    • Maritime Security
    • /
    • v.3 no.1
    • /
    • pp.45-72
    • /
    • 2021
  • North Korea's cyber capabilities represent a relatively new threat to global financial institutions and foreign governments, particularly the U.S and South Korean governments. Based primarily on publicly available sources, such as journalistic accounts and scholarly publications, this qualitative paper analyzes the ways in which North Korean leader Kim Jong Un has bolstered his country's asymmetric power and advanced his line of byungjin (dual development in the economy and military). Particularly by merging the cyber and maritime domains, North Korean operatives generate more revenue for the regime and helps keep the heavily sanctioned leadership in power. Despite the increased international attention to North Korean hackers, few analysts have examined the important role of cyber in the DPRK's internal political culture, specifically in advancing Kim Jong Un's byungjin line. Cyber fits into the DPRK's longstanding tradition of irregular warfare and guerilla-based armed struggle. Cyber also further advances Kim's personal reputation in the DPRK as an economic innovator and military strategist. This paper pays particular attention to the role of the DPRK's cyber operations in both ideological and maritime contexts. Recently, North Korean hackers have targeted South Korean shipbuilding industries and developed a blockchain scam, known as Marine Chain. North Korean cyber agents have increasingly paid attention to the nexus of cyber and maritime domains in their activities.

  • PDF

SIEM System Performance Enhancement Mechanism Using Active Model Improvement Feedback Technology (능동형 모델 개선 피드백 기술을 활용한 보안관제 시스템 성능 개선 방안)

  • Shin, Youn-Sup;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.12
    • /
    • pp.896-905
    • /
    • 2021
  • In the field of SIEM(Security information and event management), many studies try to use a feedback system to solve lack of completeness of training data and false positives of new attack events that occur in the actual operation. However, the current feedback system requires too much human inputs to improve the running model and even so, those feedback from inexperienced analysts can affect the model performance negatively. Therefore, we propose "active model improving feedback technology" to solve the shortage of security analyst manpower, increasing false positive rates and degrading model performance. First, we cluster similar predicted events during the operation, calculate feedback priorities for those clusters and select and provide representative events from those highly prioritized clusters using XAI (eXplainable AI)-based event visualization. Once these events are feedbacked, we exclude less analogous events and then propagate the feedback throughout the clusters. Finally, these events are incrementally trained by an existing model. To verify the effectiveness of our proposal, we compared three distinct scenarios using PKDD2007 and CSIC2012. As a result, our proposal confirmed a 30% higher performance in all indicators compared to that of the model with no feedback and the current feedback system.

A Comparative Analysis between High and Low Groups on Concerns About Privacy Infringement in Consumer Innovation Patterns According to Internet Media Activities (인터넷 미디어 활동에 따른 소비자 혁신성 유형이 프라이버시 침해 우려성에 대한 고(High)집단과 저(Low)집단 간의 비교 분석)

  • Lee, Ji-Hun;Kang, Jun-Mo;Lee, Jeong-Suk
    • Journal of Korea Entertainment Industry Association
    • /
    • v.14 no.7
    • /
    • pp.193-202
    • /
    • 2020
  • This study was intended to present the magnitude of privacy infringement concerns and their relationship to consumer innovation (functional innovation, hedonistic innovation, social innovation, cognitive innovation), to identify differences among groups and to suggest implications for marketing strategies for the spread of new products. The implications of this study are as follows. First, functional innovation has shown that differences exist between groups. Analysts say that sensitive groups are buying products that can simplify their work immediately after release despite concerns over privacy violations. Second, hedonistic innovation has shown that differences exist between groups. These findings suggest that sensitive groups prefer novel products, products that give excitement and excitement about products, and products that give new enjoyment and fun that they have never known before. Third, social innovation has been shown that there is no difference between groups. These analyses show that the self-esteem of using products that others have never experienced before, and the curiosity that anyone envies, are purchased or used first. Finally, cognitive innovation showed that differences existed between groups. These analyses show that new products are purchased when they meet the functions, design, and innovation that consumers want.

Crisis in Venezuela, Solitude of Latin America, the Old Future (베네수엘라 위기와 라틴아메리카의 고독 그 오래된 미래)

  • Choi, Myoung-Ho
    • Iberoamérica
    • /
    • v.21 no.2
    • /
    • pp.83-114
    • /
    • 2019
  • Now Venezuela is the most attentional country in Latin America not only in our country but also all world. Unfortunately, the current crisis is a danger that threatening the venezuelan people's right to live, so most of the news is negative. Some analysts in Korea insist that everything is the result of invasion by US imperialism, others say it is a state of default due to excessive populism. The others also described as a power game of the powers of the world by the new Cold War. But most essential thing is that Sovereign of Venezuela, Venezuelan people are marginalized in this process. Venezuela's crisis seems to have been both a combination of internal and external factors, but internal factors been a main cause. The internal factors are the dictatorship and corruption of crony capitalism of nepotism which are considered historical ailments in Latin America. Chávez criticized the oligarchy, but paradoxically, the Chávezian or current ruling forces became another oligarchy. Unfortunately, Western powers such as the United States and the EU and Venezuela's current ruling powers are at an extreme confrontation, so can be seen using cliff-edge tactics. The best solution is the free and peaceful reelection of the president. After the patriarchal winter, which spring will come the Venezuelan people must decide.

Exploring the Job Competencies of Data Scientists Using Online Job Posting (온라인 채용정보를 이용한 데이터 과학자 요구 역량 탐색)

  • Jin, Xiangdan;Baek, Seung Ik
    • The Journal of Society for e-Business Studies
    • /
    • v.27 no.2
    • /
    • pp.1-20
    • /
    • 2022
  • As the global business environment is rapidly changing due to the 4th industrial revolution, new jobs that did not exist before are emerging. Among them, the job that companies are most interested in is 'Data Scientist'. As information and communication technologies take up most of our lives, data on not only online activities but also offline activities are stored in computers every hour to generate big data. Companies put a lot of effort into discovering new opportunities from such big data. The new job that emerged along with the efforts of these companies is data scientist. The demand for data scientist, a promising job that leads the big data era, is constantly increasing, but its supply is not still enough. Although data analysis technologies and tools that anyone can easily use are introduced, companies still have great difficulty in finding proper experts. One of the main reasons that makes the data scientist's shortage problem serious is the lack of understanding of the data scientist's job. Therefore, in this study, we explore the job competencies of a data scientist by qualitatively analyzing the actual job posting information of the company. This study finds that data scientists need not only the technical and system skills required of software engineers and system analysts in the past, but also business-related and interpersonal skills required of business consultants and project managers. The results of this study are expected to provide basic guidelines to people who are interested in the data scientist profession and to companies that want to hire data scientists.

Free-vibration and buckling of Mindlin plates using SGN-FEM models and effects of parasitic shear in models performance

  • Leilson J. Araujo;Joao E. Abdalla Filho
    • Structural Engineering and Mechanics
    • /
    • v.87 no.3
    • /
    • pp.283-296
    • /
    • 2023
  • Free-vibration and buckling analyses of plate problems are investigated with the aid of the strain gradient notation finite element method (SGN-FEM). As SGN-FEM employs physically interpretable polynomials in developing finite elements, parasitic shear sources, which are the cause of shear locking, can be precisely identified and subsequently eliminated. This allows two mutually complementary objectives to be defined in this work, namely, evaluate the efficiency of free-vibration and buckling results provided by corrected models, and study the severity of parasitic shear effects on plate models performance. Parasitic shear are flexural terms erroneously present in shear strain polynomials. It is reviewed here that six parasitic shear terms arise during the formulation of the four-node Mindlin plate element. Two parasitic shear terms have been identified in the in-plane shear strain polynomial while other two have been identified in each of the transverse shear strain polynomials. The element is corrected a-priori, i.e., during development, by simply removing the spurious terms from the shear strain polynomials. The computational implementation of the element in its two versions, namely, containing the parasitic shear terms (PS) and corrected for parasitic shear (SG), allows for assessments of the accuracy of results and of the deleterious effects of parasitic shear in free vibration and buckling analyses. This assessment of the parasitic shear effects is a novelty of this work. Validation of the SG model is done comparing its results with analytical results and results provided by other numerical procedures. Analyses are performed for square plates with different thickness-to-length ratios and boundary conditions. Results for thin plates provided by the PS model do not converge to the correct solutions, which indicates that parasitic shear must be eliminated. That is, analysts should not rely on refinement alone. For thick plates, PS model results can be considered acceptable as deleterious effects are really critical in thin plates. On the other hand, results provided by the SG model converge well for both thin and thick plates. The effectiveness of the SG model is established via high-accuracy results obtained in several examples. It is concluded that corrected SGN-FEM models are efficient alternatives for free-vibration and buckling analysis of Mindlin plate problems, and that precise elimination of parasitic shear is a requirement for sound analyses.

A Design of Timestamp Manipulation Detection Method using Storage Performance in NTFS (NTFS에서 저장장치 성능을 활용한 타임스탬프 변조 탐지 기법 설계)

  • Jong-Hwa Song;Hyun-Seob Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.6
    • /
    • pp.23-28
    • /
    • 2023
  • Windows operating system generates various logs with timestamps. Timestamp tampering is an act of anti-forensics in which a suspect manipulates the timestamps of data related to a crime to conceal traces, making it difficult for analysts to reconstruct the situation of the incident. This can delay investigations or lead to the failure of obtaining crucial digital evidence. Therefore, various techniques have been developed to detect timestamp tampering. However, there is a limitation in detection if a suspect is aware of timestamp patterns and manipulates timestamps skillfully or alters system artifacts used in timestamp tampering detection. In this paper, a method is designed to detect changes in timestamps, even if a suspect alters the timestamp of a file on a storage device, it is challenging to do so with precision beyond millisecond order. In the proposed detection method, the first step involves verifying the timestamp of a file suspected of tampering to determine its write time. Subsequently, the confirmed time is compared with the file size recorded within that time, taking into consideration the performance of the storage device. Finally, the total capacity of files written at a specific time is calculated, and this is compared with the maximum input and output performance of the storage device to detect any potential file tampering.

A Study on A Study on the University Education Plan Using ChatGPTfor University Students (ChatGPT를 활용한 대학 교육 방안 연구)

  • Hyun-ju Kim;Jinyoung Lee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.1
    • /
    • pp.71-79
    • /
    • 2024
  • ChatGPT, an interactive artificial intelligence (AI) chatbot developed by Open AI in the U.S., gaining popularity with great repercussions around the world. Some academia are concerned that ChatGPT can be used by students for plagiarism, but ChatGPT is also widely used in a positive direction, such as being used to write marketing phrases or website phrases. There is also an opinion that ChatGPT could be a new future for "search," and some analysts say that the focus should be on fostering rather than excessive regulation. This study analyzed consciousness about ChatGPT for college students through a survey of their perception of ChatGPT. And, plagiarism inspection systems were prepared to establish an education support model using ChatGPT and ChatGPT. Based on this, a university education support model using ChatGPT was constructed. The education model using ChatGPT established an education model based on text, digital, and art, and then composed of detailed strategies necessary for the era of the 4th industrial revolution below it. In addition, it was configured to guide students to use ChatGPT within the permitted range by using the ChatGPT detection function provided by the plagiarism inspection system, after the instructor of the class determined the allowable range of content generated by ChatGPT according to the learning goal. By linking and utilizing ChatGPT and the plagiarism inspection system in this way, it is expected to prevent situations in which ChatGPT's excellent ability is abused in education.