• Title/Summary/Keyword: Technology and Education

Search Result 13,616, Processing Time 0.05 seconds

Multi-group Information Management Techniques to efficiently Protect User Privacy in Heterogeneous Environments of 5G (5G의 이질적인 환경에서 사용자 프라이버시를 효율적으로 보호하기 위한 다중 그룹 정보 관리 기법)

  • Kim, Kyoum-Sun;Yon, Yong-Ho;Jeong, Yoon-Su
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.7
    • /
    • pp.1-7
    • /
    • 2019
  • With the recent commercialization of the next generation of wireless 5G in everyday life, many changes have been made to organizations, industries and businesses of various sizes in various fields. However, although the improved speed and latency of 5G has improved, improvements in encryption, authentication and privacy are still required. In this paper, multiple groups of information management techniques are proposed to efficiently protect users' privacy in the heterogeneous environment of 5G. The proposed technique aims to allow distributed management of users' privacy links by clouding the privacy information generated by different heterogeneous devices to efficiently interface with different groups. Suggestion techniques process user-specific privacy information independently in a virtual space so that users can periodically synchronize their privacy information.

Convergence of Smartphone Motivation, Stress, and Interpersonal Satisfaction on the Dependence of Dental Hygiene Students (치위생 학생의 스마트폰 이용동기, 스트레스, 대인관계만족도가 과의존에 미치는 융합 연구)

  • Kim, Da-Hui;Lee, Hye-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.9
    • /
    • pp.237-244
    • /
    • 2019
  • This study aimed to investigate the effects of motive of use, stress and interpersonal satisfaction on smartphone overdependence in dental hygiene undergraduates. A questionnaire survey was conducted on 216 dental hygiene students in colleges in Dajeon and Chungnam regions. The results showed that motive of use(3-4hours/>4hours)(${\beta}=-0.178$), weekday usage (<3hours/3-4hours)(${\beta}=0.163$), and weekday usage (${\beta}=0.196$) had a high impact on smartphone overdependence in dental hygiene students. Weekday usage dummy 1 was the factor with the greatest impact, with an explanatory power of 25.6%. Additional studies on various factors that affect smartphone overdependence as well as education programs for preventing smartphone overdependence in dental hygiene students are needed.

Convergence Study on the Effects of Stress and Gambling Change Motivation on Gambling Abstinence Self-Efficacy among College Students Using Gambling (대학생 도박경험자의 스트레스 및 도박변화동기가 단도박 자기효능감에 미치는 융복합 영향 연구)

  • Choi, Jung-Hyun;Kim, Jeong-Suk;Kim, Seong-Ui
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.6
    • /
    • pp.19-25
    • /
    • 2019
  • This study was attempted to identify the convergence factors that affected the gambling abstinence self-efficacy among college students using gambling. The participants were 134 students with gambling experience at two universities in C city and G city. The results of this study are as follows. Stress(r=-.314, p<.001) and gambling change motivation(r=.272, p=.001) showed a significant correlation with gambling abstinence self-efficacy in correlation analysis. The greatest influence on gambling abstinence self-efficacy in multiple regression analysis was identified in order of stress(${\beta}=-.29$, p<.001), gambling change motivation (${\beta}=.25$, p=.003). The results of this study suggest that a gambling prevention education program which can manage stress and strengthen the gambling change motivation of college students using gambling is needed to improve the gambling abstinence self-efficacy.

Perception Difference on the Accounting Officer Competence among Accounting Educators, Accounting Officers and CEOs (회계교육자, 회계담당자 및 경영자의 회계담당자 역량에 대한 인식차이)

  • Lee, Seong-Hyo;Kim, Kyung-Ihl;Lee, Ji-Young
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.6
    • /
    • pp.75-82
    • /
    • 2019
  • In the era of the 4th Industrial Revolution when ICT and convergence are emphasized, companies want talented people with a wide range of complex problem solving competencies, system competencies as well as major knowledge. This study examined the difference in perceived competency needed for future accounting officers using 166 valid questionaries prepared with 4 factors based on previous researches. The result shows that the workers, who majored in accounting and have more than 5 years of company experience, and the CEOs think the social competence is the most important while the accounting professors think the major competence is the most important qualification. These results indicate that, in order to reflect the industrial needs, the colleges should change their accounting major curriculums to provide various competences such as the social competence in addition to the basic major competence.

Authenticated Identity-based Key Agreement Protocols in a Multiple Independent PKG Environment (다중 독립 PKG환경에서 인증된 신원기반 키 동의 프로토콜)

  • Lee Hoonjung;Kim Hyunsook;Kim Sangjin;Oh Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.4
    • /
    • pp.11-27
    • /
    • 2005
  • To date, most identity-based key agreement protocols are based on a single PKG (Private Key Generator) environment. In 2002, Chen and Kudla proposed an identity-based key agreement protocol for a multiple PKG environment, where each PKG shares identical system parameters but possesses distinct master key. However, it is more realistic to assume that each PKG uses different system parameters including the PKG's master key. In this paper, we propose a new two party key agreement protocol between users belonging to different PKGs that do not share system parameters. We also extend this protocol to two types of tripartite key agreement protocols. We show that our two party protocol requires minimal amount of pairing computation for a multiple PKG environment and our tripartite protocol is more efficient than existing protocols. We also show that the proposed key agreement protocols satisfy every security requirements of key agreement protocol.

Practical Secure E-mail Protocols Providing Perfect Forward Secrecy (완전한 전방향 안전성을 제공하는 실용적인 전자우편 프로토콜)

  • Lee, Chang-Yong;Kim, Dae-Young;Shim, Dong-Ho;Kim, Sang-Jin;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.27-38
    • /
    • 2007
  • One of the most important security issues of e-mail service is user privacy. Currently, various security protocols, like PGP(pretty Good Privacy), S/MIME(Secure/Multipurpose Internet Mail Extension), have been proposed. These protocols, however, do not provide forward secrecy. Recently, some security protocols that provide forward secrecy were proposed. But all of them require changes to the current e-mail infrastructure. Moreover, contrary to authors' intention, some of them do not actually provide perfect forward secrecy. In this paper, we propose a new practical e-mail security protocol. The proposed protocol provides perfect forward secrecy and uses a practical e-mail model that dose not require any changes to existing e-mail servers. It encrypts and authenticates messages efficiently using elliptic curve based signcryption scheme. In addition, we provide a way to send secure group e-mails.

Application of the Recursive Contract Net Protocol for the Threshold Value Determination in Wireless Sensor Networks (무선 센서 네트워크에서 경계값 결정을 위한 재귀적 계약망 프로토콜의 적용)

  • Seo, Hee-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.4
    • /
    • pp.41-49
    • /
    • 2009
  • In ubiquitous sensor networks, sensor nodes can be compromised by an adversary since they are deployed in hostile environments. False sensing reports can be injected into the network through these compromised nodes, which may cause not only false alarms but also the depletion of limited energy resource in the network. In the security solutions for the filtering of false reports, the choice of a security threshold value which determines the security level is important. In the existing adaptive solutions, a newly determined threshold value is broadcasted to the whole nodes, so that extra energy resource may be consumed unnecessarily. In this paper, we propose an application of the recursive contract net protocol to determine the threshold value which can provide both energy efficiency and sufficient security level. To manage the network more efficiently, the network is hierarchically grouped, and the contract net protocol is applied to each group. Through the protocol, the threshold value determined by the base station using a fuzzy logic is applied only where the security attack occurs on.

Women's Welfare and Social Welfare Policy in Korea (한국의 여성복지와 사회복지정책)

  • Dong-Hwa, Aan
    • Journal of Advanced Technology Convergence
    • /
    • v.1 no.2
    • /
    • pp.49-55
    • /
    • 2022
  • Women's welfare needs to claim a women-centered and independent welfare implementation line rather than simply staying within the framework of overall social welfare. A significant number of existing women's welfare programs have shown a tendency to protect women under the patriarchal premise. However, women's welfare in the future should go in the direction of helping women to improve the quality of life as an individual out of the limited frame of family. Providing compensation for protecting dependent families is also an important aspect of women's welfare. In other words, it is necessary to study how the government provides economic direct and indirect compensation to women who have lost the opportunity to participate in labor because they have to take care of children, the disabled, or the elderly. In addition, it is expected that welfare can be improved by inducing men's participation in reproductive activities through social education and relieving women's obligations to their families.

Perceptions of Information Technology Competencies among Gifted and Non-gifted High School Students (영재와 평재 고등학생의 IT 역량에 대한 인식)

  • Shin, Min;Ahn, Doehee
    • Journal of Gifted/Talented Education
    • /
    • v.25 no.2
    • /
    • pp.339-358
    • /
    • 2015
  • This study was to examine perceptions of information technology(IT) competencies among gifted and non-gifted students(i.e., information science high school students and technical high school students). Of the 370 high school students surveyed from 3 high schools(i.e., gifted academy, information science high school, and technical high school) in three metropolitan cities, Korea, 351 students completed and returned the questionnaires yielding a total response rate of 94.86%. High school students recognized the IT professional competence as being most important when recruiting IT employees. And they considered that practice-oriented education was the most importantly needed to improve their IT skills. In addition, the most important sub-factors of IT core competencies among gifted academy students and information science high school students were basic software skills. Also Technical high school students responded that the main network and security capabilities were the most importantly needed to do so. Finally, the most appropriate training courses for enhancing IT competencies were recognized differently among gifted and non-gifted students. Gifted academy students responded that the 'algorithm' was the mostly needed for enhancing IT competencies, whereas information science high school students responded that 'data structures' and 'computer architecture' were mostly needed to do. For technical high school students, they responded that a 'programming language' course was the most needed to do so. Results are discussed in relations to IT corporate and school settings.

Effects of PTO gear face width on safety factors

  • Jang, Jeong-Hoon;Chung, Sun-Ok;Choi, Chang-Hyun;Park, Young-Jun;Chun, Won-Ki;Kim, Seon-Il;Kwon, Oh-Won;Kim, Chang-Won;Hong, Soon-Jung;Kim, Yong-Joo
    • Korean Journal of Agricultural Science
    • /
    • v.43 no.4
    • /
    • pp.650-655
    • /
    • 2016
  • Gears are components of transmission which transmit the power of an engine to a machine and offer numerous speed ratios, a compact structure, and high efficiency of power transmission. Gear train design in the automotive industry uses simulation software. However, PTO (Power Take-Off) gear design for agricultural applications uses the empirical method because of the wide range of load fluctuations in agricultural fields. The PTO is an important part of agricultural tractors which transmits the power to various tractor implements. Therefore, a simulation was essential to the optimal design of the PTO. When the PTO gear is optimally designed, there are many advantages such as low cost, reduced size, and light weight. In this study, we conducted the bending and contact safety factor simulation for the PTO gear of an agricultural tractor. The bending and contact safety factors were calculated on ISO 6336 : 2006 by decreasing the face widths of the PTO pinion and wheel gear from 18 mm at an interval of 1 mm. The safety factor of the PTO gear decreased as the face width decreased. The contact safety factors of the pinion and wheel gear were 1.45 and 1.53, respectively, when the face width was 18 mm. The simulation results showed that the face width of the PTO gear should be greater than 9 mm to maintain the bending and contact safety factors higher than 1. It would be possible to reduce the weight of the PTO gear for different uses and working conditions. This study suggests that the possibility of designing an optimal PTO gear decreases as its face width decreases.