• Title/Summary/Keyword: Future internet

Search Result 2,243, Processing Time 0.025 seconds

A Study on the Trend in Korean Medicine Research of Irritable Bowel Syndrome in Korea, Japan and China (한국, 일본, 중국 3국의 과민성 대장 증후군에 대한 한의학적 연구동향 분석)

  • Geoncheol, Jo;Byung Joo, Kim
    • Herbal Formula Science
    • /
    • v.30 no.4
    • /
    • pp.305-317
    • /
    • 2022
  • Objectives : The purpose of this study was to analyze the papers from 2011 to 2020 to study on the trends of irritable bowel syndrome (IBS) in Korea, Japan and China. Methods : In order to analyze the research trends on IBS in Korea, Japan and China, domestic and foreign databases were selected to provide academic resources to the common use of telecommunication lines represented by the Internet. The latest research trends were determined by limiting the 10-year period from January 2011 to December 2020. Results : In the past decade, six IBS-related papers have been searched in Korea, six in Japan and 458 in China. Although not many studies have been found in Korea and Japan to understand the research trends, there have been many clinical reports, and researchers are more interested in herbal medicine than acupuncture treatment. In China, where many papers were searched, there were more papers related to herbal medicine than acupuncture treatment. Acupuncture treatment was highly interested by researchers in certain acupoints and stimulation methods, and herbal medicine was found to seek diversity in drug prescription and use. Conclusions : In this study, we were able to understand the research trends of Korea, Japan, and China, and provided information that could be useful as a basic data for establishing the direction of Korean medical research on IBS in the future.

Data Security on Cloud by Cryptographic Methods Using Machine Learning Techniques

  • Gadde, Swetha;Amutharaj, J.;Usha, S.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.342-347
    • /
    • 2022
  • On Cloud, the important data of the user that is protected on remote servers can be accessed via internet. Due to rapid shift in technology nowadays, there is a swift increase in the confidential and pivotal data. This comes up with the requirement of data security of the user's data. Data is of different type and each need discrete degree of conservation. The idea of data security data science permits building the computing procedure more applicable and bright as compared to conventional ones in the estate of data security. Our focus with this paper is to enhance the safety of data on the cloud and also to obliterate the problems associated with the data security. In our suggested plan, some basic solutions of security like cryptographic techniques and authentication are allotted in cloud computing world. This paper put your heads together about how machine learning techniques is used in data security in both offensive and defensive ventures, including analysis on cyber-attacks focused at machine learning techniques. The machine learning technique is based on the Supervised, UnSupervised, Semi-Supervised and Reinforcement Learning. Although numerous research has been done on this topic but in reference with the future scope a lot more investigation is required to be carried out in this field to determine how the data can be secured more firmly on cloud in respect with the Machine Learning Techniques and cryptographic methods.

Training Techniques for Data Bias Problem on Deep Learning Text Summarization (딥러닝 텍스트 요약 모델의 데이터 편향 문제 해결을 위한 학습 기법)

  • Cho, Jun Hee;Oh, Hayoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.7
    • /
    • pp.949-955
    • /
    • 2022
  • Deep learning-based text summarization models are not free from datasets. For example, a summarization model trained with a news summarization dataset is not good at summarizing other types of texts such as internet posts and papers. In this study, we define this phenomenon as Data Bias Problem (DBP) and propose two training methods for solving it. The first is the 'proper nouns masking' that masks proper nouns. The second is the 'length variation' that randomly inflates or deflates the length of text. As a result, experiments show that our methods are efficient for solving DBP. In addition, we analyze the results of the experiments and present future development directions. Our contributions are as follows: (1) We discovered DBP and defined it for the first time. (2) We proposed two efficient training methods and conducted actual experiments. (3) Our methods can be applied to all summarization models and are easy to implement, so highly practical.

Electronic Media and New Configurations of the Content of Modern Educational Practices

  • Skurativskyi, Vadym;Shyrman, Roman;Sharolapova, Nina;Nehreskul, Ihor;Molokanova, Olha
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.401-407
    • /
    • 2022
  • Electronic media are an integral part of modern civilization; educational practices are no exception, which should change the content orientations, structures and methodological approaches in accordance with the requirements of the educational market. This makes it relevant to find effective and successful configurations in the process of implementing modern educational practices. The purpose of the research lies in determining the basic principles of electronic media and their place in modern education, identifying the effectiveness of teaching disciplines with application of electronic media, as well as establishing the level of assessment by students of the need to involve different types of electronic media in the educational process and professional practice. The research methodology is complex; the descriptive method and methods of observation, analysis and synthesis have been used in the academic paper. The method of pedagogical experiment has become the principal one; the method of questionnaires and statistical methods have been also used. The hypothesis of the academic paper lies in the fact that the involvement of electronic media in the educational process makes it more effective and requires conceptual changes in educational practices. The result of the research manifests in the identification of new opportunities for the use of electronic media, leading to conceptual shifts in the framework of modern educational policies. In the future, it will be appropriate to consider the theoretical aspects of changing worldview models in education and the use of new media in the educational process, their effectiveness and relevance.

A Study on the Value of Kanga as an Ethos of the Swahili Culture (스와힐리 문화의 기풍으로써 캉가의 가치)

  • Lee, Hyojin
    • Fashion & Textile Research Journal
    • /
    • v.24 no.1
    • /
    • pp.42-52
    • /
    • 2022
  • The goal of this study is to analyze the value of Kanga as an ethos of the Swahili culture. The theoretical background of the research method was the analysis of the domestic and foreign literature, journals, and research data from various internet sites related to the subject, and the conclusion was drawn based on these studies. With the spread Pan-Africanism, the interest in African ethos has become a source of inspiration for contemporary fashion. Moreover, as a symbol of Swahili culture in East Africa, Kanga has been developed by embracing its own diverse cultures, The unique feature of Kanga is that it can easily be transformed created ceaselessly and creatively. Consequently, the following results were obtained based on the theoretical content. Firstly, as a representative of Women's Voice, Kanga serves as an outlet for the voices of women coming from a poor social status under the political background in East Africa. Secondly, as a Reliable Advocate, Kanga performs the positive functions as a medium of communication through its traditional usage and distinctive arrangement of clothes. Thirdly, as a Versatile Messenger, the uniqueness of Kanga with the external elements in most interestingly and active mannerly, and it has become the value of communication channel which clearly inspired the fashion designers. I believe that it will be interesting and meaningful to study the strategies on the social role of Kanga in the future which has started receiving more attention in the 21st century. And it can be said that Kanga's unique identity lies in the attraction and value which influences contemporary fashion.

Blockchain (A-PBFT) Based Authentication Method for Secure Lora Network (안전한 Lora 네트워크를 위한 블록체인(A-PBFT) 기반 인증 기법)

  • Kim, Sang-Geun
    • Journal of Industrial Convergence
    • /
    • v.20 no.10
    • /
    • pp.17-24
    • /
    • 2022
  • Lora, a non-band network technology of the long-distance wireless standard LPWAN standard, uses ABP and OTTA methods and AES-128-based encryption algorithm (shared key) for internal terminal authentication and integrity verification. Lora's recent firmware tampering vulnerability and shared-key encryption algorithm structure make it difficult to defend against MITM attacks. In this study, the consensus algorithm(PBFT) is applied to the Lora network to enhance safety. It performs authentication and PBFT block chain creation by searching for node groups using the GPS module. As a result of the performance analysis, we established a new Lora trust network and proved that the latency of the consensus algorithm was improved. This study is a 4th industry convergence study and is intended to help improve the security technology of Lora devices in the future.

A Survey on Patient's Experience and Perception on Health Care Utilization for Developing of a Korean Medicine Clinical Practice Guideline for Puerperal Wind Disorder (산후풍 한의표준임상진료지침을 위한 환자의 의료 이용 경험 및 인식도 조사)

  • Kwon, Na-Yoen;Kim, Dong-Il;Yoon, Young-Jin;Park, Jang-Kyung
    • The Journal of Korean Obstetrics and Gynecology
    • /
    • v.35 no.2
    • /
    • pp.54-69
    • /
    • 2022
  • Objectives: The purpose of this study is to reflect the patient's perspective in the process of developing Korean medicine clinical practice guideline (CPG) of puerperal wind disorder by survey. Methods: Five hundred fifty patients were surveyed from November 3rd, 2021 to November 8th, 2021 by internet. This study is an exploratory cross-sectional survey study, and descriptive statistics and frequency analysis were conducted on respondents' general characteristics, postpartum symptoms, the history of using treatment institution for puerperal wind disorder, satisfaction of medical institutions and perception of postpartum care. Results: Survey results showed that 92.0% of respondents experienced symptoms after childbirth, and 56.2% of the symptoms were arthralgia, followed by obesity with 41.8%. Among puerperal wind disorder patients, 34.2% had treatment history, and 54.3% received Korean medical treatment. Treatment satisfaction was confirmed to be higher in Korean medical treatment. The necessity of postpartum care was recognized at 95.7% of respondents, and the performance rate of traditional Korean postpartum care was also high. Conclusions: Based on a realistic patient-centered basis, it is a study that can lay the foundation for standardizing Korean medicine treatment and strengthening coverage in the future.

A Novel Mobility Management Scheme for Time Sensitive Communications in 5G-TSN

  • Kim, Jae-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.10
    • /
    • pp.105-113
    • /
    • 2022
  • In this paper, we present and analyze 5G system and IEEE time-sensitive networking(TSN) and propose a novel mobility management scheme for time sensitive communications in 5G-TSN to support ultra-low latency networks. Time-sensitive networking(TSN) has a promising future in the Industrial Automation and Industrial Internet of Things(IIoT), as a key technology that is able to provide low-latency, high-reliable and deterministic communications over the Ethernet. When a TSN capable UE moves the TSN service coverage from the non-TSN service coverage, the UE cannot get the TSN service promptly because the related mobility management is not performed appropriately. For the mobility situation with the TSN service coverage, the proposed scheme reports TSN capability to the network and triggers the initial registration in order to be provided the TSN service immediately and ultra-low latency communications compared to existing schemes in 5G mobile networks.

Relationship between Humans and Social Media Explored in Literature: From the Perspectives of Users, Industries, and Society (문헌 연구를 통해 본 소셜 미디어와 인간의 관계: 사용자, 산업, 사회의 관점에서)

  • Min, Jin-Young
    • Informatization Policy
    • /
    • v.29 no.3
    • /
    • pp.3-25
    • /
    • 2022
  • Since social media's introduction, it has reached a point where almost all Internet users, or more than half of the world's population, use social media. As its use became a common activity for many people, social media inevitably induced a range of social phenomena, and numerous researchers have examined them from diverse perspectives. In order to understand the social media phenomenon and related studies better, this study incorporates and analyzes 1,038 articles of social media literature, explores their focuses, and provides an integrative knowledge of the social media phenomenon and research trend. Furthermore, by applying Ihde (1990)'s theories on human-technology relationships to social media literature, this study also investigates how the relationship between people and social media has changed. This study interprets the approaches used in literature in light of human-technology relationships and offers suggestions for future research.

N-WPA2: Practical WPA2 Without Key Exchange of 4-way Handshake Using NFT Authentication (NFT를 이용한 4-방향 핸드셰이크의 키 교환이 없는 실용적인 WPA2)

  • Tae-Young Eun;Alshihri Saad;Soo-Yong Park
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.6
    • /
    • pp.197-208
    • /
    • 2023
  • In the coming future, anyone using the Internet will have more than one NFT. Unlike FT, NFT can specify the owner, and tracking management is easier than FT. Even in the 2022 survey, WPA2 is the most widely used wireless protocol worldwide to date. As it is a protocol that came out in 2006, it is a protocol with various vulnerabilities at this time. In order to use WPA2-EAP or WPA3 (2018), which were released to compensate for the vulnerabilities of WPA2, additional equipment upgrades are required for STA (station) and AP (access point, router), which are connected devices. The use of expensive router equipment solves the security part, but it is economically inefficient to be introduced in Small Office Home Office (SOHO). This paper uses NFT as a means of authentication and uses the existing WPA2 as it is without equipment upgrade, defend crack tools of WPA2 that have been widely used so far and compared to the existing WPA2, it was shown that it was not difficult to actually use them in SOHO.