• Title/Summary/Keyword: Technology Sharing

Search Result 2,060, Processing Time 0.029 seconds

Social Media Analysis Based on Keyword Related to Educational Policy Using Topic Modeling (토픽모델링을 이용한 교육정책 키워드 기반 소셜미디어 분석)

  • Chung, Jin-myeong;Park, Young-ho;Kim, Woo-ju
    • Journal of Internet Computing and Services
    • /
    • v.19 no.4
    • /
    • pp.53-63
    • /
    • 2018
  • The traditional mass media function of conveying information and forming public opinion has rapidly changed into an environment in which information and opinions are shared through social media with the development of ICT technology, and such social media further strengthens its influence. In other words, it has been confirmed that the influence of the public opinion through the production and sharing of public opinion on political, social and economic changes is increasing, and this change is already in use on the political campaign. In addition, efforts to grasp and reflect the opinions of the public by utilizing social media are being actively carried out not only in the political area but also in the public area. The purpose of this study is to explore the possibility of using social media based public opinion in educational policy. We collected media data, analyzed the main topic and probability of occurrence of each topic, and topic trends. As a result, we were able to catch the main interest of the public(the 'Domestic Computer Education Time' accounted for 43.99%, and 'Prime Project Selection' topics was 36.81% and 'Artificial Intelligence Program' topics was 7.94%). In addition, we could get a suggestion that flexible policies should be established according to the timing of the curriculum and the subject of the policy even if the category of the policy is same.

Design of Multimode Block Cryptosystem for Network Security (네트워크 보안을 위한 다중모드 블록암호시스템의 설계)

  • 서영호;박성호;최성수;정용진;김동욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.11C
    • /
    • pp.1077-1087
    • /
    • 2003
  • In this paper, we proposed an architecture of a cryptosystem with various operating modes for the network security and implemented in hardware using the ASIC library. For configuring a cryptosystem, the standard block ciphers such as AES, SEED and 3DES were included. And the implemented cryptosystem can encrypt and decrypt the data in real time through the wired/wireless network with the minimum latency time (minimum 64 clocks, maximum 256 clocks). It can support CTR mode which is widely used recently as well as the conventional block cipher modes such as ECB, CBC and OFB, and operates in the multi-bit mode (64, 128, 192, and 256 bits). The implemented hardware has the expansion possibility for the other algorithms according to the network security protocol such as IPsec and the included ciphering blocks can be operated simultaneously. The self-ciphering mode and various ciphering mode can be supported by the hardware sharing and the programmable data-path. The global operation is programmed by the serial communication port and the operation is decided by the control signals decoded from the instruction by the host. The designed hardware using VHDL was synthesized with Hynix 0.25$\mu\textrm{m}$ CMOS technology and it used the about 100,000 gates. Also we could assure the stable operation in the timing simulation over 100㎒ using NC-verilog.

Design and Implementation of an Analysis System for Diseases and Protein Based on Components (컴포넌트 기반의 질병 및 단백질 분석 시스템의 설계 및 구현)

  • Park, Jun-Ho;Yeo, Myung-Ho;Lee, Ji-Hee;He, Li;Kang, Gwang-Goo;Kwon, Hyun-Ho;Lee, Jin-Ju;Lee, Hyo-Joon;Lim, Jong-Tae;Jang, Yong-Jin;WeiWei, Bao;Kim, Mi-Kyoung;Ryu, Jae-Woon;Kang, Tae-Ho;Kim, Hak-Yong;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.12
    • /
    • pp.59-69
    • /
    • 2010
  • The research on protein for the diseases analysis and the new medicines development is one of the most important themes in biotechnology. Since the analysis on diseases and protein needs to handle a large scale of data, we don't use the way to approach it by the experiments anymore. In recent, we have accelerated the research on diseases and protein analysis by sharing and connecting the various experimental data by combining the biotechnology with the IT technology. However, many biotechnology researchers have difficulty in handling the protein analysis tools based on the IT knowledge. In order to solve such problems, data analysis tools through the cooperation between IT researchers and biologists have been developed. However, the existing data analysis tools still have the problems that it is very hard for biologists to extend their functions and to use them. In this paper, we design and implement an effective analysis system for diseases and protein based on components that alleviates the problems of the existing data analysis systems.

The Utilization of Big Data's Disaster Management in Korea (국내 재난관리 분야의 빅 데이터 활용 정책방안)

  • Shin, Dong-Hee;Kim, Yong-Moon
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.2
    • /
    • pp.377-392
    • /
    • 2015
  • In today's data-driven society, we've been hearing a great deal about the power of Big Data over the last couple of years. At the same time, it has become the most important issue that the problems is caused by the data collection, management and utilization. Moreover, Big Data has a wide applications ranging from situation awareness, decision-making to the area to enable for the foreseeable future with man-made and analysis of data. It is necessary to process data into meaningful information given that the huge amount of structured and unstructured data being created in the private and the public sector, even in disaster management. This data should be public and private sector at the same time for the appropriate linkage analysis for effective disaster management. In this paper, we conducted a literature review and case study efficient Big Data to derive the revitalization of national disaster management. The study obtained data on the role and responsibility of the public sector and the private sector to leverage Big Data for promotion of national disaster management plan. Both public and private sectors should promote common development challenges related to the openness and sharing of Big Data, technology and expansion of infrastructure, legal and institutional maintenance. The implications of the finding were discussed.

Forward/Reverse Engineering Approaches of Java Source Code using JML (JML을 이용한 Java 원시 코드의 역공학/순공학적 접근)

  • 장근실;유철중;장옥배
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.1_2
    • /
    • pp.19-30
    • /
    • 2003
  • Based upon XML, a standard document format on the web, there have been many active studies on e-Commerce, wireless communication, multimedia technology and so forth. JML is an XML application suitable for understanding and reusing the source code written using JAVA for various purposes. And it is a DTD which can effectively express various information related to hierarchical class structures, class/method relationships and so on. This paper describes a tool which generates JML document by extracting a comment information from Java source code and information helpful for reusing and understanding by JML in terms of the reverse engineering and a tool which generates a skeleton code of Java application program from the document information included in the automatically or manually generated JML document in terms of the forward engineering. By using the result of this study, the information useful and necessary for understanding, analyzing or maintaining the source code can be easily acquired and the document of XML format makes it easy for developers and team members to share and to modify the information among them. And also, the Java skeleton coed generated form JML documents is a reliable robust code, which helps for developing a complete source code and reduces the cost and time of a project.

A Study on the MOOC Development and Utilization Strategies based on Recognitions of University Members (대학 구성원 인식에 기초한 MOOC 개발 활용 전략 연구)

  • Kang, Kyunghee
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.7
    • /
    • pp.151-158
    • /
    • 2017
  • This study explored the development and utilization strategies based on the recognition of Massive Open Online Courses(MOOC) of students and professors who are the subjects of university teaching and learning. All members of the university recognized the basic concepts of MOOC as openness, sharing, and participation positively. In the understanding and recognition level of MOOC, undergraduate and graduate students were very low but professors were relatively high. They wanted the MOOC to develop courses in the humanities, natural sciences, social sciences, technology engineering and the arts and sciences, aiming at innovation in college curricula and diffusion of unique contents. The undergraduates wanted MOOC to be able to complete the liberal arts curriculum, basic learning in other areas and extra-curriculum and the graduate students who were lifelong learners wanted MOOC to be developed and utilized for strengthening lifelong education of local citizens. Professors who are providers of high quality education and lifelong learners wanted MOOC to be used for the deepening of their major courses in order to innovate the university education and to spread unique contents. The university should support the development of various MOOCs, establish the completion system, and provide advanced and high quality online education service.

IAM Architecture and Access Token Transmission Protocol in Inter-Cloud Environment (Inter-Cloud 환경에서의 IAM 구조 및 액세스 토큰 전송 프로토콜)

  • Kim, Jinouk;Park, Jungsoo;Yoon, Kwonjin;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.573-586
    • /
    • 2016
  • With the adoption of cloud computing, the number of companies that take advantage of cloud computing has increased. Additionally, various of existing service providers have moved their service onto the cloud and provided user with various cloud-based service. The management of user authentication and authorization in cloud-based service technology has become an important issue. This paper introduce a new technique for providing authentication and authorization with other inter-cloud IAM (Identity and Access Management). It is an essential and easy method for data sharing and communication between other cloud users. The proposed system uses the credentials of a user that has already joined an organization who would like to use other cloud services. When users of a cloud provider try to obtain access to the data of another cloud provider, part of credentials from IAM server will be forwarded to the cloud provider. Before the transaction, Access Agreement must be set for granting access to the resource of other Organization. a user can access the resource of other organization based on the control access configuration of the system. Using the above method, we could provide an effective and secure authentication system on the cloud.

A 12b 1kS/s 65uA 0.35um CMOS Algorithmic ADC for Sensor Interface in Ubiquitous Environments (유비쿼터스 환경에서의 센서 인터페이스를 위한 12비트 1kS/s 65uA 0.35um CMOS 알고리즈믹 A/D 변환기)

  • Lee, Myung-Hwan;Kim, Yong-Woo;Lee, Seung-Hoon
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.45 no.3
    • /
    • pp.69-76
    • /
    • 2008
  • This work proposes a 12b 1kS/s 65uA 0.35um CMOS algorithmic ADC for sensor interface applications such as accelerometers and gyro sensors requiring high resolution, ultra-low power, and small size simultaneously. The proposed ADC is based on an algorithmic architecture with recycling techniques to optimize sampling rate, resolution, chip area, and power consumption. Two versions of ADCs are fabricated with a conventional open-loop sampling scheme and a closed-loop sampling scheme to investigate the effects of offset and 1/f noise during dynamic operation. Switched bias power-reduction techniques and bias circuit sharing reduce the power consumption of amplifiers in the SHA and MDAC. The current and voltage references are implemented on chip with optional of-chip voltage references for low-power SoC applications. The prototype ADC in a 0.35um 2P4M CMOS technology demonstrates a measured DNL and INL within 0.78LSB and 2.24LSB, and shows a maximum SNDR and SFDR of 60dB and 70dB in versionl, and 63dB and 75dB in version2 at 1kS/s. The versionl and version2 ADCs with an active die area of $0.78mm^2$ and $0.81mm^2$ consume 0.163mW and 0.176mW at 1kS/s and 2.5V, respectively.

Perception of Privacy and Sensitivity of Personal Information among University Students (대학생들의 개인정보보호의 인식과 개인정보의 민감도에 대한 연구)

  • Boo, Yoo-Kyung;Noh, Jin-Won;Kim, Yun-Mi;Kim, Sung-Soo;Rha, Young-Ah
    • Culinary science and hospitality research
    • /
    • v.21 no.5
    • /
    • pp.25-37
    • /
    • 2015
  • By studying the awareness level of students, for the need to protect personal information, and also by studying students' level of perception as to which information needs protection, this study aims to show that increased education is beneficial, and necessary, across all university majors. This increased education is necessary to improve information security, and increase the responsible sharing of private data which has many benefits, specifically in the Healthcare field. Utilizing student volunteers across multiple majors at a university in South Korea. These questionnaires measured the students' awareness of private information, their perception of private information and also the students' experience in receiving university level education regarding private information and the need for its protection. This study shows that, when compared to students in other fields, students in the field of public health had a higher level of awareness regarding the consequences of personal information disclosure for both public purposes and medical research. Within the parameters of this study, this outcome can be explained as the result of exposure to educational curriculum which contained information related to personal information protection. This increased education raised the student's awareness of which information is considered private, as well as, which information is valuable when responsibly shared. As a result, this study shows that an increase in education regarding information privacy, should be included in all university majors, and gives us evidence to support that this additional education is valuable to students at all levels and should be encouraged.

Genetic Structure and Phylogenetic Relationship of Red Spotted Grouper (Epinephelus akaara) Based on the Haplotypes and Polymorphisms of Mitochondrial COI Gene Sequences (미토콘드리아 COI 유전자 서열의 다형성과 반수체형에 근거한 한국산 붉바리(Epinephelus akaara)의 유전적 구조와 계통 유연관계)

  • Han, Sang-Hyun;Lee, Young-Don;Baek, Hae-Ja;Oh, Hong-Shik;Noh, Choong Hwan
    • Journal of Life Science
    • /
    • v.24 no.6
    • /
    • pp.626-632
    • /
    • 2014
  • The genetic structure and phylogenetic relationship were investigated in Korean red spotted grouper populations using the nucleotide sequence polymorphisms of the mitochondrial DNA (mtDNA) cytochrome c oxidase subunit I (COI) gene. The COI gene was sequenced showed 99.1-99.8% identity with the EF607565 sequence previously reported. A total of twenty haplotypes were found, and the Korean population showed nineteen haplotypes. Among those, Hap_03 and Hap_08 showed Jeju-do and China-specific COI sequences, respectively. However, Hap_07 had twelve COI sequences from South Korea and records from Hong Kong and Taiwan. Neighbor-joining (NJ) trees constructed from the phylogenetic analyses based on the polymorphisms of the COI haplotypes showed a monophyletic branching pattern within the genus Epinephelus. This indicated that the red spotted grouper populations had evolved from common maternal ancestors. In addition, the Hap_08, which had the COI sequence recorded only from China Sea, was found in the middle of the NJ tree nearby Hap_07 and showed a close relationship with Hap_07. This indicates that Chinese red spotted grouper is also maternally related to other populations in East Asia. Consequently, East Asian red spotted grouper populations are maternally related, as well as sharing the same evolutionary history, and are still affected by the East Asian ocean current (Kuroshio). These findings help to explain the genetic structure and phylogenetic relationship of red spotted grouper and also contribute to research on artificial breeding and industrialization.