• Title/Summary/Keyword: IT security

Search Result 11,284, Processing Time 0.037 seconds

Analysis of Labor Market Activation Policy and Its Employment Outcomes: the Effects of Employment and Tailored Social Service Provision (한국의 노동시장 활성화 정책 특성과 취업 성과: 취업지원서비스와 맞춤형 사회서비스 중심 정책의 비교)

  • Ryu, Kirak
    • 한국사회정책
    • /
    • v.19 no.3
    • /
    • pp.149-183
    • /
    • 2012
  • This article aims to analyze main features of activation policy and compare major programmes in terms of their impact on employment performances in Korea. Since the introduction of National Basic Living Security Act in 2000, a series of activation policies have been in place for social assistance recipients, low-income employees, and youth unemployed by means of providing tailored employment and social services via in-depth counselling and case management. These activation policies carry both enabling and demanding elements: requiring programme participation in exchange for public assistance benefit receipts on the one hand, and providing various social services to remove barriers to employment through case management on the other hand. Therefore, it merits attention to analyze how various features of activation programmes affect employment outcomes, the effectiveness of delivery system and policy instruments as well. In analyzing employment outcomes of activation policy of which main characteristics lie in provision of employment and social services, this article points out the features and policy instruments of the activation policy that contribute to labor market entry of public assistance recipients and low income employees. In addition, it also delineates the determinants of exit from benefit receipts. Results from statistical analysis show that activation policy with intense employment service helps both benefit recipients and low income employees enter into the labor market at a faster rate. However, tailored social service provision enables social assistance recipients to exit from benefit receipts. These results suggest theoretical and policy relevant implication in regards to redesigning the delivery mechanisms and service instruments of activation policy.

A Study on the Delivery Pattern of Korean letters during 1900-1945 (한국 우편 전달의 정착 양상 고찰)

  • Jeon, Byeong Yong
    • (The)Study of the Eastern Classic
    • /
    • no.73
    • /
    • pp.415-444
    • /
    • 2018
  • This study was designed to analyze the delivery patterns of early(1900-1945) letters from the beginning of the postal service in order to examine the process of establishing the modern postal system after the constitution of the Postal Service(1884). In Chapter 2, we examined the 'change of the way letters are delivered', Chapter 3 is about the 'change of expression' and Chapter 4 is about 'double-faced of the post'. In the examination of aspects of changing the way letters were delivered, the phase of postal delivery by personal delivery to postal delivery were divided into three phases: [the period of personal delivery delivery] > [the coexistence period of personal delivery and postal deliveryy] > [the period of postal delivery]. In particular, it was interesting to see that the same sender and receiver mixed up postal delivery and personal delivery by the case in the second period. In addition, the functional differences between the express, telegram and particular post were found in the examination fo contents of the letter. In the examination of aspects of changing in expression, a change of common expression in 'greeting, ending, and receiving expressions' were confirmed. Also, it was confirmed that 'woo-pyeon' was not used as the basic term, but instead replaced with various terms, and that 'woo' was used independently and productively. In the double-faced aspects of post, there were disadvantages of the postal delivery such as 'discontent of the lost' and 'security of confidentiality', despite the advantages of 'economic, rapid, and long-distance delivery'. Because the disadvantage of postal delivery could be supplemented by personal delivery, postal delivery and personal delivery could coexist for a considerable period of time.

Comparison of 'Militarism' and 'Normal state' through the Concept of Regional Hegemony: Focus on Imperial Japan before and after the Navy Disarmament Treaty and Modern Japan after Abe Shinzo's 2nd Cabinet (지역 패권 개념을 통한 '군국주의'와 '보통국가' 비교: 해군 군축조약 전·후 일본제국과 아베 2기 내각 이후 현대 일본의 사례를 중심으로)

  • Kim, Dong-eun
    • Maritime Security
    • /
    • v.1 no.1
    • /
    • pp.1-30
    • /
    • 2020
  • The study started with the question, "Is Japan's normalization of nationalization a return to militarism?" Therefore, in order to analyze this, the characteristics of the international system after the inauguration of the Japanese Empire during World War I and World War II and the Abe's 2nd Cabinet in contemporary Japan were compared. Through this, there were some differences in the characteristics of the international system of the two periods, and as a result, it was intended to derive the differences between the two examples. During the prewar period of World War I, the militaristic Japanese Empire suffered great damage from the national pride of being the only power in Asia through the Paris Enhancement Conference, the Washington Navy Treaty, and the London Navy Treaty. However, the Western powers with colonies in Asia still existed in the region, so it was not possible to turn them into immediate power expansion. Meanwhile, World War II broke out in Europe. As a result, the Western powers had to focus on the whole of Europe, and the militaristic Japanese empire became a regional hegemony without missing the international system characteristic of "the hegemony." Unlike in the past militarism, Japan's case of pursuing common nationalization since 2012 has been carried out in the order of Northeast Asia in the composition of the "cold war" new cold war. In particular, Japan is attempting to transform itself into a normal state to strengthen the US-Japan alliance on a self-reliant level due to the lack of quantitative military power compared to the neighboring countries.

  • PDF

A Study on the Practice Model for Practical Education for Health and Medical Information Management (보건의료정보관리 실습교육을 위한 실습모델 연구)

  • Choi, Joon-Young
    • Journal of the Health Care and Life Science
    • /
    • v.8 no.2
    • /
    • pp.83-93
    • /
    • 2020
  • In this study, a practical model for health information management education using the EMR education system at universities for nurturing health care information managers was studied. Currently, there is no practical training course for health care information management in the standards for evaluation and certification of health care information management education introduced to strengthen the job competency of health care information managers. Accordingly, the program was constructed so that the practice program suggested as an educational environment in the Health and Medical Information Management Education Evaluation and Certification Manual can be practiced in the EMR education system. In addition, a practical model that can be performed according to the on-site practice guidelines for health and medical information management for each program was studied. Using the health care information management education EMR system, master data management, patient registration, doctor prescription, medical cost calculation, health insurance claim management, form management, discharge registration, cancer registration, unrecorded management, health care data management, health care statistics, A practice model was studied so that practice on information protection/security management can be performed. It will be possible to play a role as a health care information management expert by raising the quality level of health care information management education through systematic and standardized health care information management practice courses at universities. Accordingly, it is necessary to cultivate health care information management experts who develop and manage medical services based on medical data analysis through practical training of health care information managers.

A Study on the Safety Management Standards and Safety Indicators Private Lodging in Farming and Fishing Villages in Rural Area (농어촌민박의 안전관리 기준 및 안전지표에 관한 연구)

  • Suh, hey-sung;Lee, Yong-soo;Kim, Youna-ah
    • Journal of the Korea Institute of Construction Safety
    • /
    • v.3 no.1
    • /
    • pp.1-8
    • /
    • 2020
  • Various support is provided for the increase in the number of private lodging users in farming and fishing villages and related government policies. However, the bed-and-breakfast accommodation in rural areas lack safety standards or safety indicators for the service pension Gangneung, carbon monoxide leak accident in December 2018, 2020 East Sea in January, Pension. Large gas explosion, accident and is threatening the security of their citizens. Unlike lodging facilities, private lodging in farming and fishing villages is allowed to operate with certain requirements such as fire extinguishers and fire alarms. The purpose of this study is to present safety standards and safety indicators for lodging facilities in farming and fishing villages, which are necessary for the operation management and inspection of local governments and the government related to lodging in farming and fishing villages. Through the study, safety management areas of private lodging in farming and fishing villages were divided into facility safety, fire safety, food safety and living safety, and detailed inspection indicators were presented. There is an academic implication that research on safety management of lodging facilities has been expanded through safety research in areas related to private lodging in farming and fishing villages. It has practical implications in that it provides management standards and indicators that can be used for safety management of private lodging in farming and fishing villages. The limitations of this study are that more studies on private lodging in farming and fishing villages are expected to be conducted through the results of this study, and the lack of research on accommodation safety has prevented more detailed indicators from being derived.

Zoning Permanent Basic Farmland Based on Artificial Immune System coupling with spatial constraints

  • Hua, Wang;Mengyu, Wang;Yuxin, Zhu;Jiqiang, Niu;Xueye, Chen;Yang, Zhang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.5
    • /
    • pp.1666-1689
    • /
    • 2021
  • The red line of Permanent Basic Farmland is the most important part in the "three-line" demarcation of China's national territorial development plan. The scientific and reasonable delineation of the red line is a major strategic measure being taken by China to improve its ability to safeguard the practical interests of farmers and guarantee national food security. The delineation of Permanent Basic Farmland zoning (DPBFZ) is essentially a multi-objective optimization problem. However, the traditional method of demarcation does not take into account the synergistic development goals of conservation of cultivated land utilization, ecological conservation, or urban expansion. Therefore, this research introduces the idea of artificial immune optimization and proposes a multi-objective model of DPBFZ red line delineation based on a clone selection algorithm. This research proposes an objective functional system consisting of these three sub-objectives: optimal quality of cropland, spatially concentrated distribution, and stability of cropland. It also takes into consideration constraints such as the red line of ecological protection, topography, and space for major development projects. The mathematical formal expressions for the objectives and constraints are given in the paper, and a multi-objective optimal decision model with multiple constraints for the DPBFZ problem is constructed based on the clone selection algorithm. An antibody coding scheme was designed according to the spatial pattern of DPBFZ zoning. In addition, the antibody-antigen affinity function, the clone mechanism, and mutation strategy were constructed and improved to solve the DPBFZ problem with a spatial optimization feature. Finally, Tongxu County in Henan province was selected as the study area, and a controlled experiment was set up according to different target preferences. The results show that the model proposed in this paper is operational in the work of delineating DPBFZ. It not only avoids the adverse effects of subjective factors in the delineation process but also provides multiple scenarios DPBFZ layouts for decision makers by adjusting the weighting of the objective function.

A Comparative Study of Machine Learning Algorithms Using LID-DS DataSet (LID-DS 데이터 세트를 사용한 기계학습 알고리즘 비교 연구)

  • Park, DaeKyeong;Ryu, KyungJoon;Shin, DongIl;Shin, DongKyoo;Park, JeongChan;Kim, JinGoog
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.3
    • /
    • pp.91-98
    • /
    • 2021
  • Today's information and communication technology is rapidly developing, the security of IT infrastructure is becoming more important, and at the same time, cyber attacks of various forms are becoming more advanced and sophisticated like intelligent persistent attacks (Advanced Persistent Threat). Early defense or prediction of increasingly sophisticated cyber attacks is extremely important, and in many cases, the analysis of network-based intrusion detection systems (NIDS) related data alone cannot prevent rapidly changing cyber attacks. Therefore, we are currently using data generated by intrusion detection systems to protect against cyber attacks described above through Host-based Intrusion Detection System (HIDS) data analysis. In this paper, we conducted a comparative study on machine learning algorithms using LID-DS (Leipzig Intrusion Detection-Data Set) host-based intrusion detection data including thread information, metadata, and buffer data missing from previously used data sets. The algorithms used were Decision Tree, Naive Bayes, MLP (Multi-Layer Perceptron), Logistic Regression, LSTM (Long Short-Term Memory model), and RNN (Recurrent Neural Network). Accuracy, accuracy, recall, F1-Score indicators and error rates were measured for evaluation. As a result, the LSTM algorithm had the highest accuracy.

Analysis of influential factors of cyanobacteria in the mainstream of Nakdong river using random forest (랜덤포레스트를 이용한 낙동강 본류의 남조류 발생 영향인자 분석)

  • Jung, Woo Suk;Kim, Sung Eun;Kim, Young Do
    • Journal of Wetlands Research
    • /
    • v.23 no.1
    • /
    • pp.27-34
    • /
    • 2021
  • In this study, the main influencing factors of the occurrence of cyanobacteria at each of the eight Multifunctional weirs were derived using a random forest, and a categorical prediction model based on a Algal bloom warning system was developed. As a result of examining the importance of variables in the random forest, it was found that the upstream points were directly affected by weir operation during the occurrence of cyanobacteria. This means that cyanobacteria can be managed through efficient security management. DO and E.C were indicated as major influencers in midstream. The midstream section is a section where large-scale industrial complexes such as Gumi and Gimcheon are concentrated as well as the emissions of basic environmental facilities have a great influence. During the period of heatwave and drought, E.C increases along with the discharge of environmental facilities discharged from the basin, which promotes the outbreak of cyanobacteria. Those monitoring sites located in the middle and lower streams are areas that are most affected by heat waves and droughts, and therefore require preemptive management in preparation for the outbreak of cyanobacteria caused by drought in summer. Through this study, the characteristics of cyanobacteria at each point were analyzed. It can provide basic data for policy decision-making for customized cyanobacteria management.

Design of FMCW Radar Signal Processor for Human and Objects Classification Based on Respiration Measurement (호흡 기반 사람과 사물 구분 가능한 FMCW 레이다 신호처리 프로세서의 설계)

  • Lee, Yungu;Yun, Hyeongseok;Kim, Suyeon;Heo, Seongwook;Jung, Yunho
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.4
    • /
    • pp.305-312
    • /
    • 2021
  • Even though various types of sensors are being used for security applications, radar sensors are being suggested as an alternative due to the privacy issues. Among those radar sensors, PD radar has high-complexity receiver, but, FMCW radar requires fewer resources. However, FMCW has disadvantage from the use of 2D-FFT which increases the complexity, and it is difficult to distinguish people from objects those are stationary. In this paper, we present the design and the implementation results of the radar signal processor (RSP) that can distinguish between people and object by respiration measurement using phase estimation without 2D-FFT. The proposed RSP is designed with Verilog-HDL and is implemented on FPGA device. It was confirmed that the proposed RSP includes 6,425 LUT, 4,243 register, and 12,288 memory bits with 92.1% accuracy for target's breathing status.

A Study on the Difference between Balanced and Dominant Learning Styles and Learning Strategies by Learning Factors of College Students

  • Kim, Ji Sim;Kim, Kyong Ah;Park, Mi Soon;Ahn, You Jung;Oh, Suk;Jin, Myung Sook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.8
    • /
    • pp.65-73
    • /
    • 2021
  • This study investigated differences in learning styles and learning strategies according to learning factors: major fields, achievements, and grades and differences in learning strategies according to learning styles for college students. Unlike previous studies that analyzed differences focused on the dominant learning style, the learning style was subdivided into a balanced and dominant learning style. In the analysis of the 179 participants in M colleges, it was found that the difference between the learning style and the learning strategy according to the learning factors was not significant. But, there was a significant difference in the use of cognitive strategies according to the learning style in the dimension of information input, and in the use of all strategies according to the information processing style. It was analyzed that active learners had a high level of using cognitive strategies, visual learners had a high level of using external strategies, and balanced learners had a high level of using internal strategies. Based on the results, the training strategies to understand the learning style and to improve the level of use of the learning strategy in the learning competency improvement program was proposed.