• Title/Summary/Keyword: cloud theory

Search Result 102, Processing Time 0.033 seconds

Development of Competency Model for Police' Digital Forensic Examiner (경찰 디지털증거분석관 역량모델 개발)

  • Oh SoJung;Jeong JunSeon;Cho EunByul;Kim GiBum
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.4
    • /
    • pp.647-659
    • /
    • 2023
  • As digital evidence becomes more important in criminal investigations, disputes are increasing in court. As media diversifies and the scope of analysis expands, the level of expertise in digital forensics is also increasing. However, no competency model has been developed to define the capabilities of digital evidence examiners or to judge their expertise. There have been some studies that have derived the capabilities necessary for digital evidence examiner, but they are still insufficient. Therefore, in this study, 25 competency evaluation factors in a total of 9 competency groups were defined using methodologies such as expert FGI and Delphi survey. Specifically, it was defined as Digital Forensics Theory, Digital Evidence Collection&Management, Disk Forensics, Mobile Forensics, Video Forensics, infringement forensics, DB Forensics, Embedded(IoT) Forensics, and Cloud Forensics. The digital evidence examiner competency model is expected to be used in various fields such as recruitment, education and training, and performance evaluation in the future.

Awareness and attitudes regarding oral care intervention program based on community care for older adults at home : focusing on the grounded theory (커뮤니티케어 기반의 방문구강건강관리 중재 수혜자의 프로그램 운영 관련 인식 및 태도: 근거이론적 접근)

  • Myeong-Hwa Park;Ji-Won Park;Seul-Ah Lee;Jong-Hwa Jang
    • Journal of Korean society of Dental Hygiene
    • /
    • v.23 no.5
    • /
    • pp.351-360
    • /
    • 2023
  • Objectives: This study is based on a visiting oral health care intervention program in the community care. This qualitative study was conducted through in-depth interviews to identify awareness and attitudes regarding intervention program among older adults. Methods: The research team visited the homes of the target older adults and conducted in-depth interviews for approximately an hour using a semi-structured questionnaire. The collected voice recordings were transcribed using Clova Note, and AI program by Naver. Using the 'Word Cloud Generator 3.7' program, words of high importance and interest from interview answers were extracted, visualized, and analyzed. Results: Participating older adults acknowledged that their quality of life related to oral health could be improved by increasing the level of oral health awareness and oral health knowledge through the intervention program. In addition, the older adults indicated that their oral hygiene management ability improved compared to before the intervention through expert oral hygiene management and oral health education. Further, as the level of oral health knowledge increased, so too did satisfaction with the intervention program increase. Conclusions: The intervention program for visiting oral health care showed a positive effect on the awareness and attitude of older adults. Thus, it is suggested that education for continuous competency enhancement of dental hygienists and multidisciplinary education for the improvement of general health and quality of life of older adults should be promoted.

Study on Influencing Factors of Traffic Accidents in Urban Tunnel Using Quantification Theory (In Busan Metropolitan City) (수량화 이론을 이용한 도시부 터널 내 교통사고 영향요인에 관한 연구 - 부산광역시를 중심으로 -)

  • Lim, Chang Sik;Choi, Yang Won
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.35 no.1
    • /
    • pp.173-185
    • /
    • 2015
  • This study aims to investigate the characteristics and types of car accidents and establish a prediction model by analyzing 456 car accidents having occurred in the 11 tunnels in Busan, through statistical analysis techniques. The results of this study can be summarized as below. As a result of analyzing the characteristics of car accidents, it was found that 64.9% of all the car accidents took place in the tunnels between 08:00 and 18:00, which was higher than 45.8 to 46.1% of the car accidents in common roads. As a result of analyzing the types of car accidents, the car-to-car accident type was the majority, and the sole-car accident type in the tunnels was relatively high, compared to that in common roads. Besides, people at the age between 21 and 40 were most involved in car accidents, and in the vehicle type of the first party to car accidents, trucks showed a high proportion, and in the cloud cover, rainy days or cloudy days showed a high proportion unlike clear days. As a result of analyzing the principal components of car accident influence factors, it was found that the first principal components were road, tunnel structure and traffic flow-related factors, the second principal components lighting facility and road structure-related factors, the third principal factors stand-by and lighting facility-related factors, the fourth principal components human and time series-related factors, the fifth principal components human-related factors, the sixth principal components vehicle and traffic flow-related factors, and the seventh principal components meteorological factors. As a result of classifying car accident spots, there were 5 optimized groups classified, and as a result of analyzing each group based on Quantification Theory Type I, it was found that the first group showed low explanation power for the prediction model, while the fourth group showed a middle explanation power and the second, third and fifth groups showed high explanation power for the prediction model. Out of all the items(principal components) over 0.2(a weak correlation) in the partial correlation coefficient absolute value of the prediction model, this study analyzed variables including road environment variables. As a result, main examination items were summarized as proper traffic flow processing, cross-section composition(the width of a road), tunnel structure(the length of a tunnel), the lineal of a road, ventilation facilities and lighting facilities.

The study of narrative of cartoon Focusing on prerequisites for narrative in the Theory of 『Story and Discourse』 by S. Chatman (카툰의 서사 연구 (S.채트먼의 『이야기와 담론』 이론의 서사의 전제조건을 중심으로))

  • Ahn, So Ra;Lee, Won Soek
    • Cartoon and Animation Studies
    • /
    • s.33
    • /
    • pp.223-246
    • /
    • 2013
  • Even though cartoons and narration comics were born from different origin, they have been called by names such as 'cartoons' or 'comics'. The reason can be found in the similarity of cartoons and narration comics. The similarity of cartoons and narration comics is the genre consisting of writing and drawing. Writing can be the format of expression and it can represent the story. Such story is present as a component of 'narration'. Sub genre of comics includes cartoons and narration comics. It includes animation in a broad range. In cases of narration comics and animation, it is thought that narration is present with continuity of time. However, in case of cartoon, because one or two cuts without continuity of writing are frequently expressed, it is being asked whether narration is present. It is easy to be reminded of epic or chanson de geste whenever you hear 'narration'. Since it deals with a biography of the character, we think the concept of 'narration' with temporality. However, narration provides a certain event in a broad range. Thus, cartoons presenting one event with the image may have the existence of narration, because description of multiple scenes of narrative comics can be implicitly represented in cartoons. As such implications leave a space, the empty space can be filled by active reasoning of recipients. However, nevertheless, it is very difficult to find studies as well as mentions of narration in cartoons. Thus, in this paper, we investigate the concept and structure of narration and demonstrate the presence of narration in cartoons. First of all, we looked at the narration theory in literature before studying narration in cartoons. The reason is that we thought the approach to the literary theory was required in order to investigate the basic elements, since cartoons are a collection of writing and drawing. We were focused on the prerequisites of narration presented in "story and discourse" of s. Chatman. If the prerequisites of narration are present, we can assume that the narration is present. The prerequisites are 'narration reasoning', 'screening', 'consistency', 'process statements' and 'stasis statement'. As s. Chatman described them as prerequisites of narration, he analyzed the narration structures of films and novels. In addition, we revealed that the narrations were present in cartoons as we identified how prerequisites of narration presented by Chatman were presented and expressed through "vocabulary of comics", "Timeframe" and "life in the line" described in "understanding comics" by Scott McCloud.

The Posthuman Queer Body in Ghost in the Shell (1995) (<공각기동대>의 현재성과 포스트휴먼 퀴어 연구)

  • Kim, Soo-Yeon
    • Cross-Cultural Studies
    • /
    • v.40
    • /
    • pp.111-131
    • /
    • 2015
  • An unusual success engendering loyalty among cult fans in the United States, Mamoru Oshii's 1995 cyberpunk anime, Ghost in the Shell (GITS) revolves around a female cyborg assassin named Motoko Kusanagi, a.k.a. "the Major." When the news came out last year that Scarlett Johansson was offered 10 million dollars for the role of the Major in the live action remake of GITS, the frustrated fans accused DreamWorks of "whitewashing" the classic Japanimation and turning it into a PG-13 film. While it would be premature to judge a film yet to be released, it appears timely to revisit the core achievement of Oshii's film untranslatable into the Hollywood formula. That is, unlike ultimately heteronormative and humanist sci-fi films produced in Hollywood, such as the Matrix trilogy or Cloud Atlas, GITS defies a Hollywoodization by evoking much bafflement in relation to its queer, posthuman characters and settings. This essay homes in on Major Kusanagi's body in order to update prior criticism from the perspectives of posthumanism and queer theory. If the Major's voluptuous cyborg body has been read as a liberating or as a commodified feminine body, latest critical work of posthumanism and queer theory causes us to move beyond the moralistic binaries of human/non-human and male/female. This deconstruction of binaries leads to a radical rethinking of "reality" and "identity" in an image-saturated, hypermediated age. Viewed from this perspective, Major Kusanagi's body can be better understood less as a reflection of "real" women than as an embodiment of our anxieties on the loss of self and interiority in the SNS-dominated society. As is warned by many posthumanist and queer critics, queer and posthuman components are too often used to reinforce the human. I argue that the Major's hybrid body is neither a mere amalgam of human and machine nor a superficial postmodern blurring of boundaries. Rather, the compelling combination of individuality, animality, and technology embodied in the Major redefines the human as always, already posthuman. This ethical act of revision-its shifting focus from oppressive humanism to a queer coexistence-evinces the lasting power of GITS.

Dynamic Behavior Study Using Videomicroscopy in Systems Containing Polar Oils and Nonionic Surfactant (극성 오일, 비이온성 계면활성제를 포함한 계에서의 Videomicroscopy를 이용한 동적 거동에 관한 연구)

  • Lim, Jong-Choo
    • Applied Chemistry for Engineering
    • /
    • v.8 no.3
    • /
    • pp.473-481
    • /
    • 1997
  • Enhanced videomicroscopy was used to observe the dynamic behavior which occurred when water containing pure nonionic surfactant was carefully contacted with equal volumes of polar oils such as oleyl alcohol and oleic acid at various temperatures. A key component of the system is a vertical-stage microscope which provides for stable interfaces by locating the oil above the denser aqueous phase. This arrangement allowed intermediate phases formed at the surface of contact to be clearly observed, as well as any spontaneous emulsification which developed. Contacting experiments with $C_{12}E_5$ as the surfactant and with pure oleyl alcohol and oleic acid soils showed little activity below the cloud point but vigorous activity at higher temperatures including formation of an intermediate lamellar liquid crystalline phase. Diffusion path theory, which allows prediction of spontaneous emulsification resulting from diffusion and of intermediate phase formation during contacting processes, was used to understand the dynamic behavior seen during contacting experiments. Tentative diffusion paths for the contacting experiments with pure oleyl alcohol were presented with the aid of a partial phase diagram of the oleyl alcohol-water-$C_{12}E_5$ system.

  • PDF

The study on the diagnosis and measurement of post-information society by ANP (ANP를 활용한 후기정보사회의 수준진단과 측정에 관한 연구)

  • Song, Young-Jo;Kwak, Jeong-Ho
    • Informatization Policy
    • /
    • v.23 no.2
    • /
    • pp.73-97
    • /
    • 2016
  • Social changes due to ICT like Big Data, IoT, Cloud and Mobile is progressing rapidly. Now, we get out of the old-fashioned frame was measured at the level of the information society through the introduction of PC, Internet speed and Internet subscribers etc and there is a need for a new type of diagnostic information society framework. This study is the study for the framework established to diagnose and measure post-information society. The framework and indicators were chosen in accordance with the technological society coevolution theory and information society-related indicators presented from authoritative international organizations. Empirical results utilizing the indicators and framework developed in this study were as follows: First, the three sectors, six clusters (items), 25 nodes (indicators) that make up the information society showed that all strongly connected. Second, it was diagnosed as information society development (50.34%), technology-based expansion (25.03%) and ICT effect (24.63%) through a network analysis (ANP) for the measurement of importance of the information society. Third, the result of calculating the relative importance of the cluster and nodes showed us (1)social development potential (26.04%), (2)competitiveness (15.9%), (3)ICT literacy (15.5%) (4) (social)capital (24.3 %), (5)ICT acceptance(9.54%), (6)quality of life(8.7%). Consequently, We should take into account the effect of the economy and quality of life beyond ICT infrastructure-centric when we measure the post-information society. By applying the weighting we should performs a comparison between countries and we should diagnose the level of Korea and provide policy implications for the preparation of post-information society.

A Study on Business Types of IoT-based Smarthome: Based on the Theory of Platform Typology (IoT 기반 스마트홈 비즈니스 유형 연구: 플랫폼유형론을 근간으로)

  • Song, Minzheong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.2
    • /
    • pp.27-40
    • /
    • 2016
  • This paper aims to analyze the business types of 237 IoT based smart home companies in the world (launched during 1999~2014) which got global investment last few years. For this, the previous literatures trying to analze technology and service types of smart home are searched and the typology of the platform is discussed. Based on it, this research conceptualizes an analysis framework that includes three areas of smart home like home automation, home security, and energy efficiency with the three platform types like product, software, and service. This study concludes that the development of business type for IoT based smart home ecosystem is from the product to software and it can be a platform or not. In current status, there are a few platforms of product and software, but in the device management (16%) and thermostat (11%), companies are persuing more platform like. It is difficult to find the service platform in overall areas, for application based service has a few attractions in the investment market due to the lack of cloud infrastructure and data analytics. The following three are the implication to domestic market: 1) More active offering of API and SDK, 2) more active introduction of wireless Intenet network protocols, and 3) more active interoperability efforts and alliance activities are needed.

Method of ChatBot Implementation Using Bot Framework (봇 프레임워크를 활용한 챗봇 구현 방안)

  • Kim, Ki-Young
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.1
    • /
    • pp.56-61
    • /
    • 2022
  • In this paper, we classify and present AI algorithms and natural language processing methods used in chatbots. A framework that can be used to implement a chatbot is also described. A chatbot is a system with a structure that interprets the input string by constructing the user interface in a conversational manner and selects an appropriate answer to the input string from the learned data and outputs it. However, training is required to generate an appropriate set of answers to a question and hardware with considerable computational power is required. Therefore, there is a limit to the practice of not only developing companies but also students learning AI development. Currently, chatbots are replacing the existing traditional tasks, and a practice course to understand and implement the system is required. RNN and Char-CNN are used to increase the accuracy of answering questions by learning unstructured data by applying technologies such as deep learning beyond the level of responding only to standardized data. In order to implement a chatbot, it is necessary to understand such a theory. In addition, the students presented examples of implementation of the entire system by utilizing the methods that can be used for coding education and the platform where existing developers and students can implement chatbots.

Game Theoretic Optimization of Investment Portfolio Considering the Performance of Information Security Countermeasure (정보보호 대책의 성능을 고려한 투자 포트폴리오의 게임 이론적 최적화)

  • Lee, Sang-Hoon;Kim, Tae-Sung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.37-50
    • /
    • 2020
  • Information security has become an important issue in the world. Various information and communication technologies, such as the Internet of Things, big data, cloud, and artificial intelligence, are developing, and the need for information security is increasing. Although the necessity of information security is expanding according to the development of information and communication technology, interest in information security investment is insufficient. In general, measuring the effect of information security investment is difficult, so appropriate investment is not being practice, and organizations are decreasing their information security investment. In addition, since the types and specification of information security measures are diverse, it is difficult to compare and evaluate the information security countermeasures objectively, and there is a lack of decision-making methods about information security investment. To develop the organization, policies and decisions related to information security are essential, and measuring the effect of information security investment is necessary. Therefore, this study proposes a method of constructing an investment portfolio for information security measures using game theory and derives an optimal defence probability. Using the two-person game model, the information security manager and the attacker are assumed to be the game players, and the information security countermeasures and information security threats are assumed as the strategy of the players, respectively. A zero-sum game that the sum of the players' payoffs is zero is assumed, and we derive a solution of a mixed strategy game in which a strategy is selected according to probability distribution among strategies. In the real world, there are various types of information security threats exist, so multiple information security measures should be considered to maintain the appropriate information security level of information systems. We assume that the defence ratio of the information security countermeasures is known, and we derive the optimal solution of the mixed strategy game using linear programming. The contributions of this study are as follows. First, we conduct analysis using real performance data of information security measures. Information security managers of organizations can use the methodology suggested in this study to make practical decisions when establishing investment portfolio for information security countermeasures. Second, the investment weight of information security countermeasures is derived. Since we derive the weight of each information security measure, not just whether or not information security measures have been invested, it is easy to construct an information security investment portfolio in a situation where investment decisions need to be made in consideration of a number of information security countermeasures. Finally, it is possible to find the optimal defence probability after constructing an investment portfolio of information security countermeasures. The information security managers of organizations can measure the specific investment effect by drawing out information security countermeasures that fit the organization's information security investment budget. Also, numerical examples are presented and computational results are analyzed. Based on the performance of various information security countermeasures: Firewall, IPS, and Antivirus, data related to information security measures are collected to construct a portfolio of information security countermeasures. The defence ratio of the information security countermeasures is created using a uniform distribution, and a coverage of performance is derived based on the report of each information security countermeasure. According to numerical examples that considered Firewall, IPS, and Antivirus as information security countermeasures, the investment weights of Firewall, IPS, and Antivirus are optimized to 60.74%, 39.26%, and 0%, respectively. The result shows that the defence probability of the organization is maximized to 83.87%. When the methodology and examples of this study are used in practice, information security managers can consider various types of information security measures, and the appropriate investment level of each measure can be reflected in the organization's budget.