• Title/Summary/Keyword: Security Level

Search Result 2,730, Processing Time 0.027 seconds

Design and Implementation of IoT based Low cost, Effective Learning Mechanism for Empowering STEM Education in India

  • Simmi Chawla;Parul Tomar;Sapna Gambhir
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.163-169
    • /
    • 2024
  • India is a developing nation and has come with comprehensive way in modernizing its reducing poverty, economy and rising living standards for an outsized fragment of its residents. The STEM (Science, Technology, Engineering, and Mathematics) education plays an important role in it. STEM is an educational curriculum that emphasis on the subjects of "science, technology, engineering, and mathematics". In traditional education scenario, these subjects are taught independently, but according to the educational philosophy of STEM that teaches these subjects together in project-based lessons. STEM helps the students in his holistic development. Youth unemployment is the biggest concern due to lack of adequate skills. There is a huge skill gap behind jobless engineers and the question arises how we can prepare engineers for a better tomorrow? Now a day's Industry 4.0 is a new fourth industrial revolution which is an intelligent networking of machines and processes for industry through ICT. It is based upon the usage of cyber-physical systems and Internet of Things (IoT). Industrial revolution does not influence only production but also educational system as well. IoT in academics is a new revolution to the Internet technology, which introduced "Smartness" in the entire IT infrastructure. To improve socio-economic status of the India students must equipped with 21st century digital skills and Universities, colleges must provide individual learning kits to their students which can help them in enhancing their productivity and learning outcomes. The major goal of this paper is to present a low cost, effective learning mechanism for STEM implementation using Raspberry Pi 3+ model (Single board computer) and Node Red open source visual programming tool which is developed by IBM for wiring hardware devices together. These tools are broadly used to provide hands on experience on IoT fundamentals during teaching and learning. This paper elaborates the appropriateness and the practicality of these concepts via an example by implementing a user interface (UI) and Dashboard in Node-RED where dashboard palette is used for demonstration with switch, slider, gauge and Raspberry pi palette is used to connect with GPIO pins present on Raspberry pi board. An LED light is connected with a GPIO pin as an output pin. In this experiment, it is shown that the Node-Red dashboard is accessing on Raspberry pi and via Smartphone as well. In the final step results are shown in an elaborate manner. Conversely, inadequate Programming skills in students are the biggest challenge because without good programming skills there would be no pioneers in engineering, robotics and other areas. Coding plays an important role to increase the level of knowledge on a wide scale and to encourage the interest of students in coding. Today Python language which is Open source and most demanding languages in the industry in order to know data science and algorithms, understanding computer science would not be possible without science, technology, engineering and math. In this paper a small experiment is also done with an LED light via writing source code in python. These tiny experiments are really helpful to encourage the students and give play way to learn these advance technologies. The cost estimation is presented in tabular form for per learning kit provided to the students for Hands on experiments. Some Popular In addition, some Open source tools for experimenting with IoT Technology are described. Students can enrich their knowledge by doing lots of experiments with these freely available software's and this low cost hardware in labs or learning kits provided to them.

A Study on the Operation Plan of the Gangwon-do Disaster Management Resources Integrated Management Center (강원도 재난관리자원 통합관리센터 운영방안에 관한 연구)

  • Hang-Il Jo;Sang-Beom Park;Kye-Won Jun
    • Journal of Korean Society of Disaster and Security
    • /
    • v.17 no.1
    • /
    • pp.9-16
    • /
    • 2024
  • In Korea, as disasters become larger and more complex, there is a trend of shifting from a focus on response and recovery to a focus on prevention and preparedness. In order to prevent and prepare for disasters, each local government manages disaster management resources by stockpiling them. However, although disaster management resources are stored in individual warehouses, they are managed by department rather than by warehouse, resulting in insufficient management of disaster management resources due to the heavy workload of those in charge. In order to intensively manage these disaster management resources, an integrated disaster management resource management center is established and managed at the metropolitan/provincial level. In the case of Gangwon-do, the subject of this study, a warehouse is rented and operated as an integrated disaster management resource management center. When leasing an integrated management center, there is the inconvenience of having to move the location every 1 to 2 years, so it is deemed necessary to build a dedicated facility in an available site. To select a location candidate, network analysis was used to measure access to and use of facilities along interconnected routes of networks such as roads and railways. During network analysis, the Location-Allocation method, which was widely used in the past to determine the location of multiple facilities, was applied. As a result, Hoengseong-gun in Gangwon-do was identified as a suitable candidate site. In addition, if the integrated management center uses our country's logistics system to stockpile disaster management resources, local governments can mobilize disaster management resources in 3 days, and it is said that it takes 3 days to return to normal life after a disaster occurs. Each city's disaster management resource stockpile is 3 days' worth per week, and the integrated management center stores 3 times the maximum of the city's 4-day stockpile.

A Study on the Change of Cyber Attacks in North Korea (북한의 사이버 공격 변화 양상에 대한 연구)

  • Chanyoung Park;Hyeonsik Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.175-181
    • /
    • 2024
  • The U.N. Security Council's North Korea Sanctions Committee estimated that the amount of North Korea's cyberattacks on virtual asset-related companies from 2017 to 2023 was about 4 trillion won. North Korea's cyberattacks have secured funds through cryptocurrency hacking as it has been restricted from securing foreign currency due to economic sanctions by the international community, and it also shows the form of technology theft against defense companies, and illegal assets are being used to maintain the Kim Jong-un regime and develop nuclear and missile development. When North Korea conducted its sixth nuclear test on September 3, 2017, and declared the completion of its national nuclear armament following the launch of an intercontinental ballistic missile on November 29 of the same year, the U.N. imposed sanctions on North Korea, which are considered the strongest economic sanctions in history. In these difficult economic situations, North Korea tried to overcome the crisis through cyberattacks, but as a result of analyzing the changes through the North's cyber attack cases, the strategic goal from the first period from 2009 to 2016 was to verify and show off North Korea's cyber capabilities through the neutralization of the national network and the takeover of information, and was seen as an intention to create social chaos in South Korea. When foreign currency earnings were limited due to sanctions against North Korea in 2016, the second stage seized virtual currency and secured funds to maintain the Kim Jong-un regime and advance nuclear and missile development. The third stage is a technology hacking of domestic and foreign defense companies, focusing on taking over key technologies to achieve the five strategic weapons tasks proposed by Chairman Kim Jong-un at the 8th Party Congress in 2021. At the national level, security measures for private companies as well as state agencies should be established against North Korea's cyberattacks, and measures for legal systems, technical problems, and budgets related to science are urgently needed. It is also necessary to establish a system and manpower to respond to the ever-developing cyberattacks by focusing on cultivating and securing professional manpower such as white hackers.

A Recognition for community Based Rehabilitation by Public Health Center Physical Therapists in Seoul Province (서울시 보건소 물리치료사들의 지역사회중심재활에 대한 인식)

  • Kim, Chan-Mun;Hong, Wan-Sung;Bae, Sung-Il
    • Journal of Korean Physical Therapy Science
    • /
    • v.5 no.1
    • /
    • pp.549-556
    • /
    • 1998
  • To survey the recognition of Community Based Rehabilitation(CBR) by Public Health Center(PHC) Physical Therapists in Seoul Province. This study analysed general characteristic of Physical Therapists and cognition, participation, education, problems and requirements for CBR. The subjects of this study were 31 therapists who work at PHC in Seoul Province and Seoul City Childerns Municipal Hospital. Data was collected for 18 days from April 13 to 31, 1998 and results computed from 25 responses. First, Female therapists outnumber males. The age category 30 to 35 old represented 44.0% of the total number studied. 48.0% of therapists had worked more than 7 years and therapists usually 84.0% worked from 3 to 4 years at the PHC. Junior colleage graduates were 72.0%, and respondents with family responsibility were 52.0%. Second, Recently pain control and therapeutic exercises has become the major requirement of patients at PHC(56.0%). If the offered expanded services, a rehabilitation programe at PHC(36.0%) was highly. When asked about a working guide book, nobody had one. Third, 64.0% of therapists were aware of the present level of CBR, 28.0% of them had gotten an information from newspaper and mass media. Fourth, For CBR, 72.0% had positive ideas in which they could participate. 56.0% wished to compose a team of various rehabilitation specialists. 52.0% wished for the meeting day to be flexible and 64.0% desired to meet once or twice a week. Fifth, Almost all(92.0%) desired more educational opportunity about CBR. Example, once or twice a year(48.0%) and training period of 4 to 7 day(44.0%). They wanted to learn theory and parctice together(88.0%) and 48.0% wanted national mutirehabilitation center as a educational managing organization. Sixth, The most important requirement for accomplishing CBR by Physical Therapists was job security and adequate number of therapists(48.0%). Required number of physical therapists in the PHC was 3(52.0%). The cooperative agency should be the distict govement(32.0%) and community welfare center of the disabled persons(32.0%). Factors inhibiting the execution of CBR were lack of physical therapists(56.0%), and equipments for pain control and for therapeutic exercises(68.0%).

  • PDF

A Study on Touchless Finger Vein Recognition Robust to the Alignment and Rotation of Finger (손가락 정렬과 회전에 강인한 비 접촉식 손가락 정맥 인식 연구)

  • Park, Kang-Ryoung;Jang, Young-Kyoon;Kang, Byung-Jun
    • The KIPS Transactions:PartB
    • /
    • v.15B no.4
    • /
    • pp.275-284
    • /
    • 2008
  • With increases in recent security requirements, biometric technology such as fingerprints, faces and iris recognitions have been widely used in many applications including door access control, personal authentication for computers, internet banking, automatic teller machines and border-crossing controls. Finger vein recognition uses the unique patterns of finger veins in order to identify individuals at a high level of accuracy. This paper proposes new device and methods for touchless finger vein recognition. This research presents the following five advantages compared to previous works. First, by using a minimal guiding structure for the finger tip, side and the back of finger, we were able to obtain touchless finger vein images without causing much inconvenience to user. Second, by using a hot mirror, which was slanted at the angle of 45 degrees in front of the camera, we were able to reduce the depth of the capturing device. Consequently, it would be possible to use the device in many applications having size limitations such as mobile phones. Third, we used the holistic texture information of the finger veins based on a LBP (Local Binary Pattern) without needing to extract accurate finger vein regions. By using this method, we were able to reduce the effect of non-uniform illumination including shaded and highly saturated areas. Fourth, we enhanced recognition performance by excluding non-finger vein regions. Fifth, when matching the extracted finger vein code with the enrolled one, by using the bit-shift in both the horizontal and vertical directions, we could reduce the authentic variations caused by the translation and rotation of finger. Experimental results showed that the EER (Equal Error Rate) was 0.07423% and the total processing time was 91.4ms.

Methodology of Identifying Crime Vulnerable Road and Intersection Using Digital Map Version 2.0 (수치지도 2.0을 이용한 범죄 취약도로 및 교차점 식별기법)

  • Kim, Eui Myoung
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.22 no.4
    • /
    • pp.135-142
    • /
    • 2014
  • As interest in social safety has recently increased at the national level, the various activities which can effectively prevent crimes are being carried out. Because the existing maps related to crimes provide the information about the present condition of crimes by administrative district for users, women and pedestrians who go by night could not actually grasp safe roads in advance. Therefore, this study developed the methodology that can easily extract dangerous areas due to crimes by the digital map 2.0. In the digital map 2.0, location and attribute information of center-lines of roads and building layers were used to find dangerous areas of crimes in these layers. Pavement materials and road width which are already built by the attribute information were used in the center-lines of roads. Crossing angles that roads and roads cross each other were additionally extracted and utilized. The attribute information about building types were input in the building layers of the digital map 2.0. The areas that are more the threshold values set by totaling up all the risk scores when considering pavement materials, road width, crossing angles of road, and building types in the center-lines of roads and road crossings were extracted as the dangerous areas that crimes can occur. Verification of the developed methodology was done by experiment. In the spatial apsect, the dangerous areas of crimes could be found by using the digital 2.0, roads, and building layers only through the experiment. In the administrative aspect to prevent crimes, additional installation of safety facilities such as street lights and security lights in the identified areas which are vulnerable for crimes is thought to be increasing safety of dangerous areas.

An Analysis on the Impacts of High-Tech Complex on Neighborhood Housing Price (첨단산업단지가 주변지역 주택가격에 미치는 영향요인 분석)

  • Park, Dong-Wong;Lee, Joo-Hyung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.10
    • /
    • pp.4543-4550
    • /
    • 2012
  • The purpose of this paper is to suggest the improvement method to achieve the interactive development effect between high-tech industrial complex and its surrounding areas. For this reason, this paper has conducted an empirical analysis to find out relevant comprehensive factors, affecting nearby housing prices from such plans, especially by reviewing 'Seoul Digital Industrial Complex.' This paper is truly differentiated from previous research by adding a new perspective 'diverse location characteristics', as it focuses not only on 'high-tech facility' characteristics, but also on 'urban function facilities', including 'transportation facilities', 'amenity facilities', 'security facilities', etc. Then, SPSS Version 18.0 was utilized to conduct the multiple regression analysis with the accumulated relevant data and several results were drawn out as following: Firstly, 'deterioration level', 'brand of apartment', etc. are found to be major influencing factors. Secondly, 'educational facilities', 'transportation facilities', 'Cultural & Sports facilities', 'Amenity facilities', etc. are found in the sector of 'location characteristic'. Lastly, 'leading companies within the industrial complex', were also found, affecting nearby housing prices. Therefore, when a housing development project is planned to grant the interactive development effect to high-tech industrial complex and its surrounding housing areas, it is necessary to consider variety factors, such as comprehensive location characteristics and housing complex characteristics, and also proper housing policy measures should be devised in accordance with the actual demand of employees and their dependant family members.

Analysis of Status and Demand of Participation in Lifelong Education of Low-Income Class (저소득층의 평생교육 참여 실태와 요구 분석)

  • Kim, Hyeon Seong;Kim, Jin Sook
    • The Journal of the Convergence on Culture Technology
    • /
    • v.4 no.2
    • /
    • pp.89-96
    • /
    • 2018
  • This study analyzed status and demand of participation in lifelong education for 218 residents of low-income class according to National Basic Livelihood Security Act. The results of the study are as follows. First, among the statuses of participation in lifelong education, the abilities to study of the low-income class were reviewed. They showed 95.3% of foreign language ability, 66.1% of ICT utilization capacity and 75.7% of computer literacy ability. And the lifelong education participation rate of low-income people was 75.7% It was considered as passive participation in education. Voluntary participation was identified and analyzed. The the actual participation rate in lifelong education was very low at 22.9%. Social participation and awareness according to participation in lifelong education was 43.3% higher than that of respondents who had no participation experience. Especially, voluntary participants showed 73.3% higher than those who did not participate. Second, as a result of analyzing lifelong education of low income class, 74.8% of the respondents answered that there is wished education program. And 50.0% of them could not participate because they did not have enough time. The programs that they wanted to participate in were the programs that could help their real lives such as home life, health and medical courses, professional qualification obtaining process, etc. This indicates that the income level plays a significant role in participation in lifelong education. As a result of analyzing the results of this study above, Korean lifelong education is emphasized and the participation rate is increasing rapidly. However, participation of low-income class in lifelong education seems low.

An Analysis of Contribution Rates of Irrigation Water and Investment for Farmland Base Development Project to Rice Production (농업용수(農業用水)와 농업생산기반조성사업투자(農業生産基盤造成事業投資)의 미곡생산기여도(米穀生産寄與度) 분석(分析))

  • Lim, Jae-Hwan
    • Korean Journal of Agricultural Science
    • /
    • v.31 no.2
    • /
    • pp.135-148
    • /
    • 2004
  • Rice is not only main food but also key farm income source of Korean farmers. In spite of the above facts, rice productivity was decreased on account of drought in every 2 or 3 years interval owing to the vulnerability of irrigation facilities throughout Korea in the past decades. As an context of the first five year economic development plan, all weather farming programme including 4 big river basin comprehensive development projects and large and medium sized irrigation water development projects were carried out successfully. Therefore the area of irrigated paddy were increased from 58% in 1970 to 76.2% in 1999. In the past decades, the Government had invested heavy financial funds to develop irrigation water but as an factor share analysis, the contribution rates of irrigation water and investment for farmland base development project have not been identified yet in national agricultural economic level. It is very scarce to find out the papers concerned to macro-economic factor share analysis or contribution rates of water and investment cost to rice production value in Korea considering the production function of the quantity of irrigation water and investment cost as independent variables. Accordingly this paper covered and aimed at identifying (1) derivation of rice production function with the time serial data from 1965 to 1999 and the contribution rates of irrigation water and total investment cost for farmland base development project. The analytical model of the contribution rates was adapted the famous Cobb-Douglass production function. According to the model analysis, the contribution rate of irrigation water to rice production in Korea was shown 37.8% which was equivalent to 0.28 of the production elasticity of water. The contribution rate of farmland base development project cost was revealed 22% and direct production cost of rice was contributed 60% in the growth of rice production and farm mechanization costs contributed to 18% of it respectively. The two contribution rates comparing with the direct production cost were small but without irrigation water and farmland base development, application of high-pay off inputs and farm mechanization might be impossible. Considering the food security and to cope with the frequent drought, rice farming and investment for the irrigation water development should be continued even in WTO system.

  • PDF

Ieodo Issue and the evolution of People's Liberation Army Navy Strategy (이어도 쟁점과 중국 해군전략의 변화)

  • Kang, Byeong-Cheol
    • Strategy21
    • /
    • s.31
    • /
    • pp.142-163
    • /
    • 2013
  • Ieodo is a submerged rock within a Korea's Exclusive Economic Zone(EEZ) in the East China Sea with its most shallow part about 4.6m below the sea level which has no specific rights for the EEZ delimitation. The United Nations Convention on the Law of the Sea (UNCLOS) stipulates that any coastal state has the rights to claim an EEZ that stretches up to 200 nautical miles from its shore, except where there is an overlap with a neighboring country's claims. Korea claims that Ieodo is within its EEZ as it sits on the Korean side of the equidistant line and the reef is located on the Korea section of the continental shelf. China does not recognize Korea's application of the equidistance principle and insists that Ieodo lies on its continental shelf. According to UNCLOS, Ieodo is located in international waters, rather than one country's EEZ as the two countries have failed to reach a final agreement over the delimitation of the maritime border. This study seeks to understand the evolution of the People's Liberation Army Navy(PLAN) strategy as main obstacles for the EEZ delimitation between Korea and China. PLAN's Strategy evolves from "coastal defense" to "offshore defence", since the late 1980s from a "coastal defence" strategy to an "offshore defence" strategy which would extend the perimeter of defence to between 200 nm and 400 nm from the coast. China's economic power has increased It's dependence on open trade routes for energy supplies and for its own imports and exports. China want secure Sea Lane. PLAN's "offshore defence" strategy combines the concept of active defence with the deployment of its military forces beyond its borders. China's navy try to forward base its units and to achieve an ocean going capability. China's navy expects to have a 'Blue Water' capability by 2050. China insists that coastal states do have a right under UNCLOS to regulate the activities of foreign military forces in their EEZs. China protests several times against US military forces operating within It's EEZ. The U.S. position is that EEZs should be consistent with customary international law of the sea, as reflected in UNCLOS. U.S. has a national interest in the preservation of freedom of navigation as recognized in customary international law of the sea and reflected in UNCLOS. U.S. insists that coastal states under UNCLOS do not have the right to regulate foreign military activities in their EEZs. To be consistent with its demand that the U.S. cease performing military operations in china's EEZ, China would not be able to undertake any military operations in the waters of South Korea's EEZ. As such, to preserve its own security interests, China prefers a status quo policy and used strategic ambiguity on the Ieodo issue. PLAN's strategy of coastal defence has been transformed into offensive defence, Korea's EEZ can be a serious limitation to PLAN's operational plan of activities. Considering China'a view of EEZs, China do not want make EEZ delimitation agreement between Korea and China. China argues that the overlapping areas between EEZs should be handled through negotiations and neither side can take unilateral actions before an agreement is reached. China would prefer Ieodo sea zone as a international waters, rather than one country's EEZ.

  • PDF