The importance of sensor networks as a base of ubiquitous computing realization is being highlighted, and espicially the security is recognized as an important research isuue, because of their characteristics.Several efforts are underway to provide security services in sensor networks, but most of them are preventive approaches based on cryptography. However, sensor nodes are extremely vulnerable to capture or key compromise. To ensure the security of the network, it is critical to develop security Intrusion Detection System (IDS) that can survive malicious attacks from "insiders" who have access to keying materials or the full control of some nodes, taking their charateristics into consideration. In this perper, we design a distributed and adaptive IDS architecture on sensor networks, respecting both of energy efficiency and IDS efficiency. Utilizing a modified HEED algorithm, a clustering algorithm, distributed IDS nodes (dIDS) are selected according to node's residual energy and degree. Then the monitoring results of dIDSswith detection codes are transferred to dIDSs in next round, in order to perform consecutive and integrated IDS process and urgent report are sent through high priority messages. With the simulation we show that the superiorities of our architecture in the the efficiency, overhead, and detection capability view, in comparison with a recent existent research, adaptive IDS.
Journal of the Earthquake Engineering Society of Korea
/
v.6
no.4
/
pp.65-73
/
2002
It has been recognized that the damage control must become a more explicit design consideration. In an effort to develop design methods based on performance it is clear that the evaluation of the nonlinear response is required. The methods available to the design engineer today are nonlinear time history analyses, monotonic static nonlinear analyses, or equivalent static analyses with simulated nonlinear influences. Some building codes propose the capacity spectrum method based on the nonlinear static analysis(pushover analysis) to determine the earthquake-induced demand given by the structure pushover curve. These procedures are conceptually simple but iterative and time consuming with some errors. This paper presents a nonlinear direct spectrum method(NDSM) to evaluate seismic performance of structures, without iterative computations, given by the structural initial elastic period and yield strength from the pushover analysis, especially for MDF(multi degree of freedom) systems. The purpose of this paper is to investigate the accuracy and confidence of this method from a point of view of various earthquakes and unloading stiffness degradation parameters. The conclusions of this study are as follows; 1) NDSM is considered as practical method because the peak deformations of nonlinear system of MDF by NDSM are almost equal to the results of nonlinear time history analysis(NTHA) for various ground motions. 2) When the results of NDSM are compared with those of NTHA. mean of errors is the smallest in case of post-yielding stiffness factor 0.1, static force by MAD(modal adaptive distribution) and unloading stiffness degradation factor 0.2~0.3.
In Korea, historical plays took an epoch-making turn from the previous historical plays in terms of approaches to topic and material and methods of rewriting history in the 1990s. Historical plays became dehistoricized with individual, everyday life, and faction emerging as major codes of historical plays according to mistrust in history and grand narrative as the original and disappearance of trust in the growth and totality of history. A new trend became dominant of presenting fictionality prominent instead of reproduction of history and freely playing with history outside the context. While modern historical plays were subject to the content of history, post-modern historical plays sought after new history writing to tell a new story on history within a framework of fiction. Focusing on some of the trends in post-modern historical plays since the 1990s, which include play with history, daily life-style history writing, and reproduction patterns of colonial modernity, this study examined the goals, representations, and text strategies of new history writing in three historical plays, Generation After Generation(2000) by Park Geunhyung, The Mercenaries(2000) by Park Sujin, and Chosun Detective Hong Yunshik(2007) by Sung Giwoong. In Generation After Generation, the author adopts a plot of starting with the present and tracing back to the past, breaking down the myth of racially homogeneous nation. At the same time, he discloses that the colonial history is not just by the oppressive force of Japan but also by the voluntary cooperation of Korean people. That is, we are also accountable for the colonial history of the nation. The Mercenaries contrasts the independence movement during the colonial period against the modern history developed after Liberation, thus highlighting the still continuing coloniality, namely post-colonial present. The past is presented as the "phantom of history" making its appearance according to the request of the present hoping for salvation. The author politicizes history and grants political wishes to history by summoning the history by personal memories such as fictional diaries and letters with Messiah-like images opposed to the present of collapse and catastrophe. In Chosun Detective Hong Yunshik, the author makes an attempt at the microscopic reproduction of daily life by approaching the 1930s as the modern period when capitalist daily life started to take root. The lists of signs comprising daily life in colonial Gyeongseong are divided between civilization and savagery and between modern and premodern. With the progress of narrative, however, they become mixed together and reversed in the representation system in which the latter overwhelms the former.
The Journal of The Korea Institute of Intelligent Transport Systems
/
v.18
no.1
/
pp.43-55
/
2019
Smart phone based navigation applications are very useful in everyday life. Cost-effective and user friendly navigation can be provided to the user by many applications available in market. Using the Smart phone these navigation applications provide accurate navigation for outdoor locations. But providing an accurate navigation underground space such as subway station is still a challenge. It is hence more convenient and appropriate for mobility services if the visitors could simply view the guidance of the subway station on their mobile phone, wherever and whenever it is needed. This study develops a algorithm for indoor navigation with the help of Augmented Reality(AR) and QR marker code from the entrance to the train platform for users. This indoor navigation uses AR and QR maker codes for two purposes: to provide the user link to the subway station location and to provide the current guidance details to the user. This Smart phone algorithm that uses a smart phone optical tool to decode the QR marker to determine the location information and provide guidance to the AR without indoor Maps. This algorithm also provides a module to guide mobility vulnerable to the Barrier Free route to destination.
Kim, Yong-Won;Lee, Byung-Jin;Lee, Byung-Hoon;Lee, Min-Jung;Kim, Kyung-Seok
The Journal of the Institute of Internet, Broadcasting and Communication
/
v.18
no.6
/
pp.169-180
/
2018
White light-emitting diodes (LEDs) are more economical than fluorescent lights, and provide high brightness, a high lifetime expectancy, and greater durability. As LEDs are closely connected with people's daily lives, dimming control of LED is an important component in providing energy savings and improving quality of life. In visible light communications systems using these LEDs, multiple input multiple output (MIMO) technology has attracted a lot of attention, in that it can attain the channel capacity in proportion to the number of antennas. This paper analyzes the power performance of three kinds of modulation in visible light communications (VLC) systems applied space-time block code (STBC) techniques. The modulation schemes are return-to-zero on-off keying (RZ-OOK), variable pulse position modulation (VPPM), and overlapping pulse position modulation (OPPM), and dimming control was applied. The power requirements and power consumption were used as metrics to compare the power efficiency in $2{\times}2$ STBC-VLC environments under the three kinds of modulation. We confirm that dimming control affects the communications performance of each modulation scheme. VPPM showed greater consumption among the three modulations, and OPPM showed energy savings comparable to VPPM.
A Collection Policy provides a direction to an archive, but also provides a foundation for developing practical measures of planning and collecting process. In terms of a Collection Policy, it enables detail collection as regulations or codes cannot be as defined as the level of collection, thus, it allows systematic and strategic approaches in collecting former presidents' records. In the case of United States, where the same presidential system exists as South Korea, although the individual Presidential Libraries and Museums have different periods of collections, the Collection Policy was implement a half century ago that is used as a foundation data for record collection. However, the Presidential Archives in South Korea do not have a Collection Policy implemented that the collection is based on 'collection regulations' and 'collection plans.' In the comparison of the Collection Policy at the Presidential Libraries and Museums in the United States and the "collection regulation" and "collection plan" at the Presidential Archives in South Korea, it shows that while the Presidential Libraries and Museums' Collection Policy applies the characteristics of individual presidents that the collection comprises the records from more than the appointed period that it includes various personal records of relating figures, events, regions, and even personal interest; the records are written in detail to the detailed scale and procedure. On the other hand, the Presidential Archives in South Korea, the records collected based on 'collection regulations' and 'collection plans' do not sufficiently apply the individual features of the former presidents that the collections remain as general and unclear. This is due to the absence of a Collection Policy that systemizes and sustains professionalism and consistency of collection plans and procedures. Hence, this study is conducted to propose collection policy implementation measures by analyzing the Collection Policy of the Presidential Libraries and Museums in the United States and identifying implications for applying individual president characteristics.
Journal of the Korean Society of Fisheries and Ocean Technology
/
v.55
no.1
/
pp.29-38
/
2019
In order to investigate the behavioral characteristics of Pacific cod (Gadus macrocephalus) released at the entrance of Jinhae Bay, Korea, the direction and range of movement, swimming speed of the fish were measured with an acoustic telemetry techniques in winter, 2015. Three wild Pacific codes WC1 to WC3 (total length 66.0, 75.0, 76.0 cm; body weight 2.84, 2.79, 3.47 kg, respectively) were tagged with the acoustic transmitter. WC1 tagged with an acoustic transmitter internally by surgical method, WC2 and WC3, externally with the acoustic data logger and a micro data logger for recording audible sound waves including timer release unit. The movement routes of the tagged fish were measured more than five hours using VR100 receiver and a directional hydrophone. The directionality of the fish movement was tested by Rayleigh's z-Test, the statistical analysis, and a statistical program SPSS. Three tagged fishes were individually released on the sea surface around the entrance to the Jinhae Bay on 10 to 24 January 2015. WC1 moved about 13.32 km with average swimming speed of 0.63 m/s for six hours. The average swimming depth and water depth of the seabed on the route of WC1 were 7.2 and 32.9 m, respectively. The movement range of WC2 and WC3 were 7.95 and 11.06 km, approximately, with average swimming speed of 0.44 and 0.58 m/s for 5.1 and 5.3 hours, respectively. The average swimming depth of WC2 and WC3 were 18.7 and 5.0 m, and the water depth on the route, 34.4 and 29.8 m, respectively. Three fishes WC1 to WC3 were shown significant directionality in the movement (p < 0.05). Movement mean angles of WC1 to WC3 were 77.7, 76.3 and $88.1^{\circ}$, respectively. There was no significant correlation between the movement direction of fish (WC1 and WC2) and the tidal currents during the experimental period (p >= 0.05). Consequently, three tagged fishes were commonly moved toward outside of the entrance and headed for eastward of the Korean Peninsula, approximately, after release. It may estimate positively that the tidal current speed may affect to the swimming speed of the Pacific cod during the spring tide than the neap tide.
Kim, Dong-Chule;Yea, Gue-Guwen;Kim, Hong-Yeon;Kim, Sun-Bin;Choi, Han-Lim
Journal of Coastal Disaster Prevention
/
v.5
no.4
/
pp.163-172
/
2018
To propose the design technique and the execution manual of the LWFS(Lightweight Foamed Soil) method using dredged soil, the operation system for the test-bed integrated management, and to establish an amendment for the domestic quantity per unit and specifications, and a strategy for its internationalization. In order to utilize the dredged soil from the coastal area as a construction material, we constructed the embankment with LWFS on soft ground and monitored its behavior. As a result, it can be expected that the use of LWFS as an embankment material on the soft ground can improve the economic efficiency by reducing the depth and period of soil improvement as well as the uses of nearby dredged soil. To verify the utilization of the dredged soil as a material for light-weighted roadbed, soft ground and foundation ground, and surface processing, perform an experimental construction for practical structures and analyze the behavior. It is expected to be able to improve the soft ground with dredged soil and develop technique codes and manuals of the dredged soil reclamation by constructing a test-bed in the same size of the fields, and establish the criteria and manual of effective dredged soil reclamation for practical use. The application technology of the dredged soil reclamation during harbor constructions and dredged soil reclamation constructions can be reflected during the working design stage. By using the materials immediately that occur from the reclamation during harbor and background land developments, the development time will decrease and an increase of economic feasibility will happen. It is expected to be able to apply the improved soil at dredged soil reclamation, harbor and shore protection construction, dredged soil purification projects etc. Future-work for develop the design criteria and guideline for the technology of field application of dredged soil reclamation is that review the proposed test-bed sites, consult with the institutions relevant with the test-bed, establish the space planning of the test-bed, licensing from the institutions relevant with the test-bed, select a test-bed for the dredged soil disposal area.
Hackers' cyber attack techniques are becoming more sophisticated and diversified, with a form of attack that has never been seen before. In terms of information security vulnerability standard code (CVE), about 90,000 new codes were registered from 2015 to 2020. This indicates that security threats are increasing rapidly. When new security vulnerabilities occur, damage should be minimized by preparing countermeasures for them, but in many cases, companies are insufficient to cover the security management level and response system with a limited security IT budget. The reason is that it takes about a month for analysts to discover vulnerabilities through manual analysis, prepare countermeasures through security equipment, and patch security vulnerabilities. In the case of the public sector, the National Cyber Safety Center distributes and manages security operation policies in a batch. However, it is not easy to accept the security policy according to the characteristics of the manufacturer, and it takes about 3 weeks or more to verify the traffic for each section. In addition, when abnormal traffic inflow occurs, countermeasures such as detection and detection of infringement attacks through vulnerability analysis must be prepared, but there are limitations in response due to the absence of specialized security experts. In this paper, we proposed a method of using the security policy information sharing site "snort.org" to prepare effective countermeasures against new security vulnerability attacks.
The purpose of this study was to determine the change trend of emergency department visits among elderly patients with chronic diseases. Using the National Emergency Department Information System data, from January 1, 2014 to December 31, 2019, the selected patient data were evaluated for the emergency department discharge main diagnosis codes for eight chronic diseases. The incidence of elderly chronic diseases, emergency department visits, and admission rates were analyzed. Since 2014, there has been a consistent increase in the number of elderly patients visiting the emergency department, especially among those aged over 85 years. The number of emergency department visits among the elderly chronically ill patients also increased, with a significant increase in ischemic heart disease and arthrosis cases. Furthermore, there was a significant difference in the number of chronically ill patients in each year from 2014-2019 (P<0.001). With respect to the trend of admission rates to the emergency department by chronic disease, most diseases showed an increasing trend (P<0.001). however, hyperlipidemia showed a continuous decreasing trend in all age groups since 2014 (P<0.001). Among the elderly chronically ill patients, a greater increase in the admission rate following emergency department visits was noted in those over 85 years of age, with a significant difference in all diseases, except for hyperlipidemia, hypertension, and tuberculosis (P<0.001). As the aging population grows, the emergency department admission rates among the elderly chronically ill patients will rise rapidly. This could create issues with respect to the use and consumption of emergency medical resources. Hence, it is necessary to manage chronic diseases effectively in the elderly.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.