• Title/Summary/Keyword: Cyber Target

Search Result 162, Processing Time 0.025 seconds

A Study of Internet Marketing for Family Restaurant In Korea -Incent of Hompage- (패밀리 레스토랑의 인터넷 마케팅에 관한 연구 -홈페이지를 중심으로-)

  • Lee, Jae-Ryun
    • Culinary science and hospitality research
    • /
    • v.7 no.1
    • /
    • pp.203-227
    • /
    • 2001
  • The purpose of this study is to be groped promotion plan of internet marketing of Family Restaurant to get the motive, which is target market of Family Restaurant in Korea, and segment market of Internet users shows identity. Internet is observed as new marketing tool to understand customized needs of customer and to provide service to them in form of the customization. Based on the case study of Homepage of Family Restaurant in Korea, I would propose promotion plan as follow. First, enhance the function of the database marketing through the two-way communication. Second, enforce the e-commerce through the corporate-marketing in which same target market in cyber space. Third, develop the management skill for the Internet marketing in homepage as like specialty of contents.

  • PDF

A new approach for the saccadic eye movement system simulation (Saccade 안구운동계의 시뮬레이션)

  • 박상희;남문현
    • 전기의세계
    • /
    • v.26 no.1
    • /
    • pp.87-90
    • /
    • 1977
  • Various simulation techniques were developed in the modeling of biological system during the last decades. Mostly analog and hybrid simulation techniques have been used. The authors chose the Digital Analog Simulation (DAS) technique by using the MIMIC language to simulate the saccadic eye movement system performances on the digital computer. There have been various models presented by many investigators after Young & Stark's sampled-data model. The eye movement model chosen by the authors is Robinson's model III which shows the parallel information processing characteristics clearly to the double-step input stimuli. In the process of simulation, the parameter and constants used were based on the neurophysiological data of the human and animals. The analog model blocks were converted to the corresponding MIMIC block diagrams and programmed into the MIMIC statements. The program was run on the CDC Cyber 72-14 computer. The essential input stimulus was double-step of 5 and 10 degrees, and target durations chosen were 50,100 and 150 msec. The results obtained by the DAS technqiue were in good agreement with analog simulation carried out by other investigators as well as with the experimental human saccadic eye movement responses to double-step target movements.

  • PDF

Learning a Second Culture through Interactive Practices: A Study-Abroad Language Learners' Experiences

  • Lee, Eun-Sil
    • English Language & Literature Teaching
    • /
    • v.15 no.4
    • /
    • pp.137-156
    • /
    • 2009
  • This case study examines language learners' oral interactive practices and what they learn along with these practices. Language learners who study abroad take on the challenge of living in a foreign place and undergo difficulties in communicating and interacting with people in their new country. These difficulties, caused by cultural differences, are experienced most particularly in their daily interactions. Language learners' trials and efforts to learn English while dealing with a different culture and the difficulties are mainly observed for this paper. The process of learning a second culture is closely related to the process of learning a second language. Oral interactive practices can give the study abroad language learners opportunities to learn their target culture. Therefore, the purpose of this paper is to discuss how participating in interactive practices assists the learners in understanding their target culture while they deal with their difficulties inherent in studying abroad. This study adds weight to the notion that culture is an essential and major factor in learning a language, and that only active participation in interactions can be effective in learning both a language and its culture.

  • PDF

Estimation of CyberKnife Respiratory Tracking System Using Moving Phantom (동적 팬톰을 이용한 사이버나이프 호흡동기 추적장치의 위치 정확성 평가)

  • Seo, Jae-Hyuk;Kang, Young-Nam;Jang, Ji-Sun;Shin, Hun-Joo;Jung, Ji-Young;Choi, Byong-Ock;Choi, Ihl-Bohng;Lee, Dong-Joon;Kwon, Soo-Il;Lim, Jong-Soo
    • Progress in Medical Physics
    • /
    • v.20 no.4
    • /
    • pp.324-330
    • /
    • 2009
  • In this study, we evaluated accuracy and usefulness of CyberKnife Respiratory Tracking System ($Synchrony^{TM}$, Accuray, USA) about a moving during stereotactic radiosurgery. For this study, we used moving phantom that can move the target. We also used Respiratory Tracking System called Synchrony of the Cyberknife in order to track the moving target. For treatment planning of the moving target, we obtained an image using 4D-CT. To measure dose distribution and point dose at the moving target, ion chamber (0.62 cc) and gafchromic EBT film were used. We compared dose distribution (80% isodose line of prescription dose) of static target to that of moving target in order to evaluate the accuracy of Respiratory Tracking System. We also measured the point dose at the target. The mean difference of synchronization for TLS (target localization system) and Synchrony were $11.5{\pm}3.09\;mm$ for desynchronization and $0.14{\pm}0.08\;mm$ for synchronization. The mean difference between static target plan and moving target plan using 4D CT images was $0.18{\pm}0.06\;mm$. And, the accuracy of Respiratory Tracking System was less 1 mm. Estimation of usefulness in Respiratory Tracking System was $17.39{\pm}0.14\;mm$ for inactivity and $1.37{\pm}0.11\;mm$ for activity. The mean difference of absolute dose was $0.68{\pm}0.38%$ in static target and $1.31{\pm}0.81%$ in moving target. As a conclusion, when we treat about the moving target, we consider that it is important to use 4D-CT and the Respiratory Tracking System. In this study, we confirmed the accuracy and usefulness of Respiratory Tracking System in the Cyberknife.

  • PDF

Influence of Beauty Major Students' Motivation for Major Selection and Sense of Belonging on Learning Persistence Intention : A Comparison between General and Cyber Universities (미용전공자의 전공선택동기와 소속감에 따른 학업지속의도 : 일반대학과 원격대학 비교)

  • Hyun-Sook Kim
    • Journal of the Korean Applied Science and Technology
    • /
    • v.40 no.3
    • /
    • pp.374-384
    • /
    • 2023
  • Universities that previously targeted in 20s have recently diversified their operation methods, founding purposes, and target. With a significant decrease in the school-age population relative to the number of universities, universities are making their best efforts to secure new students and minimize student attrition. In this study, an online survey was conducted to empirically examine the effects of motivation for major selection and sense of belonging on learning persistence intention among students in beauty-related departments at 2-year and 4-year general universities and cyber universities. The collected data from 119 students at general universities and 113 students at cyber universities were analyzed using SPSS 28. The key findings can be summarized as follows: For general universities, motivation for major selection did not have a significant effect on learning persistence intention, but sense of belonging had a significant positive effect. Additionally, an interaction effect was observed, indicating that as the sense of belonging increased, extrinsic motivation significantly increased learning persistence intention. For cyber universities, intrinsic motivation and sense of belonging among motivations for major selection had a significant positive effect on learning persistence intention, while the moderating effect of sense of belonging in the relationship between motivation for major selection and learning persistence intention was not significant. In summary, for general universities, the factor that influenced students' learning persistence intention was a sense of belonging to the university, while for cyber universities, intrinsic motivation played a significant role. These findings are expected to provide meaningful insights and data for universities to develop effective policies for preventing student attrition.

A pioneer scheme in the detection and defense of DrDoS attack involving spoofed flooding packets

  • Kavisankar, L.;Chellappan, C.;Sivasankar, P.;Karthi, Ashwin;Srinivas, Avireddy
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.5
    • /
    • pp.1726-1743
    • /
    • 2014
  • DDoS (Distributed Denial of Service) has been a continuous threat to the cyber world with the growth in cyber technology. This technical evolution has given rise to a number of ultra-sophisticated ways for the attackers to perform their DDoS attack. In general, the attackers who generate the denial of service, use the vulnerabilities of the TCP. Some of the vulnerabilities like SYN (synchronization) flooding, and IP spoofing are used by the attacker to create these Distributed Reflected Denial of Service (DrDoS) attacks. An attacker, with the assistance of IP spoofing creates a number of attack packets, which reflects the flooded packets to an attacker's intended victim system, known as the primary target. The proposed scheme, Efficient Spoofed Flooding Defense (ESFD) provides two level checks which, consist of probing and non-repudiation, before allocating a service to the clients. The probing is used to determine the availability of the requested client. Non-repudiation is taken care of by the timestamp enabled in the packet, which is our major contribution. The real time experimental results showed the efficiency of our proposed ESFD scheme, by increasing the performance of the CPU up to 40%, the memory up to 52% and the network bandwidth up to 67%. This proves the fact that the proposed ESFD scheme is fast and efficient, negating the impact on the network, victim and primary target.

Useful evaluation of 3D target location correction by using Xsight spine tracking system in CyberKnife (사이버나이프에서 Xsight spine tracking system을 이용한 3D 표적위치보정의 유용성 평가)

  • Jeong, Young-Joon;Kim, Sang-Hyun
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.331-339
    • /
    • 2015
  • The purpose of this study is to evaluate utility of rotating adjustment using Xsight spine tracking system in 3D DOF location adjusting method, to minimize error between 6D DOF and 3D DOF in fiducial tracking system. In this study, the result of 6D DOF target location error is $0.124{\pm}0.058mm$, using fiducial inside tumor 3D DOF $0.673{\pm}0.142mm$, outside tumor $1.126{\pm}0.253mm$, apply with Xsight spine tracking system 3D DOF $0.542{\pm}0.103mm$. As the experiment shows, it was demonstrated that rotating adjustment through Xsight spine tracking system is valuable in case of treatment in 3D DOF location error that makes increasing accuracy and dose distribution each approximately 48% and 3%. In accordance with result of this study is useful rotation.

Intelligent & Predictive Security Deployment in IOT Environments

  • Abdul ghani, ansari;Irfana, Memon;Fayyaz, Ahmed;Majid Hussain, Memon;Kelash, Kanwar;fareed, Jokhio
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.185-196
    • /
    • 2022
  • The Internet of Things (IoT) has become more and more widespread in recent years, thus attackers are placing greater emphasis on IoT environments. The IoT connects a large number of smart devices via wired and wireless networks that incorporate sensors or actuators in order to produce and share meaningful information. Attackers employed IoT devices as bots to assault the target server; however, because of their resource limitations, these devices are easily infected with IoT malware. The Distributed Denial of Service (DDoS) is one of the many security problems that might arise in an IoT context. DDOS attempt involves flooding a target server with irrelevant requests in an effort to disrupt it fully or partially. This worst practice blocks the legitimate user requests from being processed. We explored an intelligent intrusion detection system (IIDS) using a particular sort of machine learning, such as Artificial Neural Networks, (ANN) in order to handle and mitigate this type of cyber-attacks. In this research paper Feed-Forward Neural Network (FNN) is tested for detecting the DDOS attacks using a modified version of the KDD Cup 99 dataset. The aim of this paper is to determine the performance of the most effective and efficient Back-propagation algorithms among several algorithms and check the potential capability of ANN- based network model as a classifier to counteract the cyber-attacks in IoT environments. We have found that except Gradient Descent with Momentum Algorithm, the success rate obtained by the other three optimized and effective Back- Propagation algorithms is above 99.00%. The experimental findings showed that the accuracy rate of the proposed method using ANN is satisfactory.

Secure Coding guide support tools design for SW individual developers (SW 개인 개발자를 위한 Secure_Coding 가이드 지원 도구 설계)

  • Son, Seung-wan;Kim, Kwang-seok;Choi, Jeong-won;Lee, Gang-soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.595-598
    • /
    • 2014
  • The cyber attacks of recent attacks that target zero-day exploit security vulnerabilities before the security patch is released (Zero Day) attack, the web site is without the Lord. These attacks, those that use the vulnerability of security that is built into the software itself is in most cases, cyber attacks that use the vulnerability of the security of the source code, in particular, has a characteristic response that are difficult to security equipment. Therefore, it is necessary to eliminate the security vulnerability from step to implement the software to prevent these attacks. In this paper, we try to design a Secure Coding Guide support tool to eliminate the threat of security from the stage of implementation.

  • PDF

A Study on Major Countries's Level of Cybersecurity for Critical Infrastructure (주요기반시설에 대한 주요국 사이버보안 수준 비교·분석 연구)

  • Park, Hyang-mi;Yoo, Ji-yeon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.163-176
    • /
    • 2017
  • Recently, the critical infrastructure is changing from the existing closed environment to an open environment, and it is becoming a new target of cyber-threats by expanding into cyberspace. In addition, due to the development of information and communications technology(ICT), the interdependence among critical infrastructure is increasing. Previous studies ranged from trend investigation and policy discussions to protection, but separate studies on the diagnosis of the current status and appropriateness judgment for efficient policy implementation were not performed. Therefore, this study compares and analyzes three international indicators that measure the level of cyber security in each country in order to build a new index to measure the level of cyber security of critical infrastructure in the USA, Japan, UK, Germany, Norway, and Korea. It is hoped that this study will serve as a basis for expanding Korean influence and building trust among countries in future cyberspace.