• Title/Summary/Keyword: cyber communication

Search Result 787, Processing Time 0.03 seconds

Diadochokinetic Skills in Typically developing Children Aged 4-6 Years : Pilot Study (학령전기 정상발달 아동의 자모음 교대운동특성 : 예비연구)

  • Jeong, Han-Jin;Lee, Ok-Bun;Sehr, Kyeung-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.7
    • /
    • pp.3149-3155
    • /
    • 2011
  • The purpose of this study was to know the characteristics of DDK performance between CV(e.g. 'pa') and VV(e.g., 'ai') syllables in typically developing children aged 4 to 6 years old. 12 TD children performed DDK with CV structure(/pʰə/, /tʰə/, /kʰə/, /pʰətʰə/, /tʰəkʰə?/, /pʰətʰəkʰə/) and with VV structure(/ai/, /ɔi/, /ɑɔi/). Spoken syllables were counted in one second, and all spoken DDK were measured by PC-quirer. The results showed that all spoken DDK became faster as the age of children were increased. This trend was also appeared in both CV and VV syllables repetition. In addition, there was no differences in DDK rate with CV and VV syllables. The frequency of articulatory error during DDK performance was very high in the age of 3, and there was no pattern in the frequency of articulatory error according to the developmental age.

Relationship Between Conversation Skills, Working Memory and Naming Ability in Aging Adults (노인의 대화기능과 작업기억력 및 이름대기 능력 간의 관련성 연구)

  • Mun, Jiyun;Son, Eunnam;Lee, Okbun
    • 재활복지
    • /
    • v.22 no.4
    • /
    • pp.103-121
    • /
    • 2018
  • For knowing the effects of aging on conversational skills in daily communication, this paper studied for the conversational turn-taking skills, working memory and naming ability on healthy elderly adults over 65 ages. 85 elderly adults participated in this study, which divided into four groups by ages. Speech samples were collected in natural conversation. Memorization of numbers, mental calculation, repetition of words were administered for working memory test. K-BNT was used for the naming ability. One-way ANOVA analysis was used for the comparison of conversational turn-taking skills among four groups. We analyzed the correlation between conversational skills, working memory and naming ability. The results were as follows: first, there were a significant difference in conversational turn-taking skills by age, but not by gender. There was a significant difference in 'Turn-Taking Frequency' and 'Total Utterance Frequency' among four groups. The same results were shown in the scores of females within three groups(exclude groups over 85D)(p<.01). Second, there was a significant correlation between 'rates of maintenance' and 'naming ability'. In addition, it was found that the naming test predicted 'rates of maintenance' skills. The results of this study suggest that word-retrieval ability will be helpful to enhance functional communication skills in aging old adults.

Why Won't the Field Wall Collapse in the Typhoon? : Mathematical Approach to Non-orthogonal Symmetric Weighted Hadamard Matrix I (밭담은 태풍에 왜 안 무너지나?: 비직교 대칭 하중 아다마르 행렬에 의한 수학적 접근 I)

  • Lee, Moon-Ho;Kim, Jeong-Su
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.211-217
    • /
    • 2019
  • The three major inventions of Jeju include the field wall of Kim Koo Pan Gwan in 1234, Jeongnang in the custom of grazing the people of Jeju, and Olleh in the tomb of Munbang-gui in 1406. Field wall, Oedam from the stone and the stone of numerical play, made Koendang, a friendship society. Even with a typhoon that is more than 30m/s, the Koendang which is about 1.5m high, will not collapse. Similarly, the main family networks of Jeju society do not collapse under any difficulties situation. When building a field wall, two stones, which are under the ground, are placed side by side, and the upper left stone is placed on top and the upper right stone is attached regularly. One stone or two stone is attached from the bottom to the top, and when a stone is small or large, a flat field is formed in one space. The Family networks is close to the grandfather, grandmother, father, mother, and me, and the distant kin represents a horizontal relationship. The field wall is a vertical relationship that builds up from bottom to top of the vertical relation, while the Koendang is a horizontal relationship where blood is distributed to the grandson of his upper grandparents. This paper proves by a non-orthogonal symmetric weighted Hadamard matrix of whether the stone in the middle of a field wall has large stones (small).

A Study on the Actual Use of Mobile Electronic Notification Service (모바일 전자고지서비스의 사용실태에 대한 조사 연구)

  • Kim, Jong-Bae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.5
    • /
    • pp.167-180
    • /
    • 2021
  • Due to the development of IT technology and the spread of infectious diseases, online non-face-to-face services are rapidly expanding. In particular, the information delivery process is also changing from the past postal branch-based to an information delivery system using mobile devices. This change is due to the change from the information delivery using the telephone line to the information delivery system using the Internet. Mobile notification service is a service that sends electronic notices to mobile devices held by users to deliver information and is validated for delivery, which has the advantage of reducing the benefits of unnecessary mail production, exposure to personal information, and misdelivery. However, user identification information must be provided to operators that provide mobile electronic notification services. In this paper, the current state of use of the mobile electronic notice service, which has been in effect since 2019, is investigated and analyzed, and the current mobile electronic notice service is to be safely provided and to take appropriate protection measures for personal information. In providing the mobile electronic notification service to users, it is possible to identify the service standards required by the sending agency, and based on this, prepare the technical standards for the mobile electronic notification service that the sending agency must comply with in advance and use it for the mobile electronic notification service.

Efficient RSA-Based PAKE Procotol for Low-Power Devices (저전력 장비에 적합한 효율적인 RSA 기반의 PAKE 프로토콜)

  • Lee, Se-Won;Youn, Taek-Young;Park, Yung-Ho;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.23-35
    • /
    • 2009
  • Password-Authenticated Key Exchange (PAKE) Protocol is a useful tool for secure communication conducted over open networks without sharing a common secret key or assuming the existence of the public key infrastructure (PKI). It seems difficult to design efficient PAKE protocols using RSA, and thus many PAKE protocols are designed based on the Diffie-Hellman key exchange (DH-PAKE). Therefore it is important to design an efficient PAKE based on RSA function since the function is suitable for designing a PAKE protocol for imbalanced communication environment. In this paper, we propose a computationally-efficient key exchange protocol based on the RSA function that is suitable for low-power devices in imbalanced environment. Our protocol is more efficient than previous RSA-PAKE protocols, required theoretical computation and experiment time in the same environment. Our protocol can provide that it is more 84% efficiency key exchange than secure and the most efficient RSA-PAKE protocol CEPEK. We can improve the performance of our protocol by computing some costly operations in offline step. We prove the security of our protocol under firmly formalized security model in the random oracle model.

A Study on Biometric Model for Information Security (정보보안을 위한 생체 인식 모델에 관한 연구)

  • Jun-Yeong Kim;Se-Hoon Jung;Chun-Bo Sim
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.1
    • /
    • pp.317-326
    • /
    • 2024
  • Biometric recognition is a technology that determines whether a person is identified by extracting information on a person's biometric and behavioral characteristics with a specific device. Cyber threats such as forgery, duplication, and hacking of biometric characteristics are increasing in the field of biometrics. In response, the security system is strengthened and complex, and it is becoming difficult for individuals to use. To this end, multiple biometric models are being studied. Existing studies have suggested feature fusion methods, but comparisons between feature fusion methods are insufficient. Therefore, in this paper, we compared and evaluated the fusion method of multiple biometric models using fingerprint, face, and iris images. VGG-16, ResNet-50, EfficientNet-B1, EfficientNet-B4, EfficientNet-B7, and Inception-v3 were used for feature extraction, and the fusion methods of 'Sensor-Level', 'Feature-Level', 'Score-Level', and 'Rank-Level' were compared and evaluated for feature fusion. As a result of the comparative evaluation, the EfficientNet-B7 model showed 98.51% accuracy and high stability in the 'Feature-Level' fusion method. However, because the EfficietnNet-B7 model is large in size, model lightweight studies are needed for biocharacteristic fusion.

Design of Comprehensive Security Vulnerability Analysis System through Efficient Inspection Method according to Necessity of Upgrading System Vulnerability (시스템 취약점 개선의 필요성에 따른 효율적인 점검 방법을 통한 종합 보안 취약성 분석 시스템 설계)

  • Min, So-Yeon;Jung, Chan-Suk;Lee, Kwang-Hyong;Cho, Eun-Sook;Yoon, Tae-Bok;You, Seung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.7
    • /
    • pp.1-8
    • /
    • 2017
  • As the IT environment becomes more sophisticated, various threats and their associated serious risks are increasing. Threats such as DDoS attacks, malware, worms, and APT attacks can be a very serious risk to enterprises and must be efficiently managed in a timely manner. Therefore, the government has designated the important system as the main information communication infrastructure in consideration of the impact on the national security and the economic society according to the 'Information and Communication Infrastructure Protection Act', which, in particular, protects the main information communication infrastructure from cyber infringement. In addition, it conducts management supervision such as analysis and evaluation of vulnerability, establishment of protection measures, implementation of protection measures, and distribution of technology guides. Even now, security consulting is proceeding on the basis of 'Guidance for Evaluation of Technical Vulnerability Analysis of Major IT Infrastructure Facilities'. There are neglected inspection items in the applied items, and the vulnerability of APT attack, malicious code, and risk are present issues that are neglected. In order to eliminate the actual security risk, the security manager has arranged the inspection and ordered the special company. In other words, it is difficult to check against current hacking or vulnerability through current system vulnerability checking method. In this paper, we propose an efficient method for extracting diagnostic data regarding the necessity of upgrading system vulnerability check, a check item that does not reflect recent trends, a technical check case for latest intrusion technique, a related study on security threats and requirements. Based on this, we investigate the security vulnerability management system and vulnerability list of domestic and foreign countries, propose effective security vulnerability management system, and propose further study to improve overseas vulnerability diagnosis items so that they can be related to domestic vulnerability items.

Redesign and Performance Analysis of RTP(Real-time Transport Protocol) for Encryption of VoIP Media Information between Different Communication Networks (이종의 통신망 간에 VoIP 미디어 암호화를 위한 RTP(Real-time Transport Protocol)의 재설계 및 성능 분석)

  • Oh, Hyung-Jun;Park, Jae-Kyoung;Won, Yoo-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.4
    • /
    • pp.87-96
    • /
    • 2013
  • In this paper, we suggest redesigned RTP protocol that is able to perform encryption of VoIP media information for single private network and between the different private networks. And we conduct a test for performance analysis. Such as SRTP or ZRTP methods have been used for VoIP media encryption. But, the existing encryption techniques have problem that can not perform end-to-end encryption between different private networks. In order to solve this problem, in this paper, we redesign RTP protocol. Redesigned RTP includes all information for encryption of VoIP media. Therefore the encryption is not affected by modification of SIP and SDP information that occurred in gateway. Also, redesigned RTP includes code for whether or not to apply encryption. By using the code, modification of RTP header from gateway prevents. As a result, redesigned RTP maintain the integrity and the RTP is able to perform encryption between the different private networks. Also, we conduct a test for performance analysis of SRTP, ZRTP and redesigned RTP.

Domestic Research Trends in IT Fashion (IT 패션에 대한 국내 연구 동향)

  • Choo, Ho-Jung;Nam, Yun-Ja;Lee, Yu-Ri;Lee, Ha-Kyung;Lee, Sung-Ji;Lee, Sae-Eun;Jang, Jae-Im;Park, Jin-Hee;Choi, Jin-Woo;Kim, Do-Yuon
    • Fashion & Textile Research Journal
    • /
    • v.14 no.4
    • /
    • pp.614-628
    • /
    • 2012
  • The purpose of this study was to analyze research trends and make suggestions regarding the future of information technology (IT) in the fashion industry. In this study, 437 papers written regarding IT fashion from five major journals published between 2000 and 2011 were examined. The research areas were then organized by subject and keyword, and divided into 16 high-context categories. Two IT fashion maps were constructed, one from a fashion consumer's perspective, and the other based on the fashion industry's supply chain. This study identified important trends in IT fashion such as: 3D scanners, 3D digital renderings of the human form, 3D digital garments, smart garments, mass customization, production automation, online shopping, home shopping, online communities, e-commerce, digital media, virtual reality, e-tail, the digital generation, E-CRM, and education. Data from body scans was collected and applied to production, and research on smart textiles was also carried out. As for IT fashion's service areas, the majority of the research focused on online shopping or online communication. Additionally, research done on avatars and cyber space, and studies on social networking services are shown. The results of this study indicated that a new field of research has opened and that current research has been developing. Also, this study showed what is needed to expand and strengthen IT fashion.

The effects and related factors of public service announcement on hand-washing (국민 손씻기 홍보사업 효과 및 관련요인)

  • Kim, Hyun-Soo;Lee, Moo-Sik;Kim, Byung-Hee;Yang, Nam-Young;Hwang, Hae-Jung;Hong, Jee-Young;Hong, Soo-Jin;Kim, Eun-Young;Kim, Young-Tek;Park, Youn-Jin;Lim, Go-Un
    • Korean Journal of Health Education and Promotion
    • /
    • v.32 no.2
    • /
    • pp.1-13
    • /
    • 2015
  • Objectives: This study was conducted to investigate derived factors associated with a public service announcement on handwashing to evaluate the effect of this announcement. Methods: In early september, 1,000 persons over 19 years old was investigated by Computer Aided Telephone Interview, at last 993 persons for analysis. Outcomes were the exposure to the public service announcements on handwashing, the comprehension of this announcements, the intention of behavioral change and the practice of handwashing. Results: In particular, the proportion of exposure is more women and highly educated. The comprehension of the announcement was no statistically significant difference. The intention of behavior change showed higher in workers and understanding of the announcements. The practice of handwashing is higher in women and lower in student/unemployed. There was no difference in practice in accordance with the exposure, the comprehension and the intention of behavioral change. Conclusions: About the comprehension of the announcements and the intention of behavioral change, the effects of the public service announcements on handwashing can be very positive. But it does not affect the actual practice of hand washing. The handwashing promotion programs will have to devise a strategy and structure, operation method considering realistic and scalable platform.