• Title/Summary/Keyword: internet program

Search Result 1,648, Processing Time 0.029 seconds

Custom Metadata Storage Method Using XMP (XMP를 이용한 커스텀 메타데이터 저장 방법)

  • Hyun, Chang-Jong;Kim, Dong-Ho
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.2
    • /
    • pp.323-330
    • /
    • 2019
  • Recently, as the growth of the Internet has led to a rapid increase in the consumption of multimedia such as photographs and moving images, the importance of metadata has been emphasized. In the case of existing metadata, only limited information such as GPS value or focal length according to the format is stored. However, with the development of mobile devices and multimedia acquisition devices, various sensors can be used in the devices. Therefore, this paper describes a method that can store not only the existing metadata format information at the time of multimedia acquisition but also another existing format of metadata such as information of various sensors which is the gyroscope and acceleration sensor of the device. We propose an application program that provides moving location information. The proposed method is expected to provide various applications such as image matching and effective image classification.

A Comparative Study of Men and Women on the Preparation of Retirement Life

  • Lim, Ahn Na
    • International journal of advanced smart convergence
    • /
    • v.10 no.3
    • /
    • pp.113-121
    • /
    • 2021
  • This study was conducted on 1,174 retirees in their 50s and 60s nationwide using the 7th data of the National Pension Service's National Elderly Security Panel Survey. We were able to confirm the following results through the SPSS WIN 18.0 program.. First, men showed a higher level of education than women. From these results, it is expected that men will be better prepared for retirement. Second, men had spouses and two or more household members than women. According to previous studies showing that men are better prepared for retirement if they have a spouse, it is expected that men are better prepared for retirement. Second, 38% of men and 62% of women were voluntary retirees. Third, both men and women responded that their own and spouses should play the main role in preparing for retirement. Fourth, both men and women had very low rates of preparation for old age, economic independence, and public and private pensions. Among them, women were lower than men. Fifth, economic problem solving, health, and medical care were the priority as parts to be done for retirement in oneself and society. Based on these results, the directions for preparing retirees for retirement are as follows. First, education on wage peak system, retirement age extension and financial management for involuntary retirees is required, and guidance and management methods on health care and disease should be provided to address needs for health and health care. Women had more voluntary retirees than men, and they need to know why. Second, when both men and women are very poor at preparing for retirement, there should be job creation measures to ensure that they and their spouses are fully prepared for retirement.

Current Status and Development Direction of Digital Literacy Education in Elementary Schools (초등학교에서의 디지털 리터러시 교육의 현황과 발전 방향)

  • Yang, Ji-Hye;Hyun, Yong-Chan;Park, Jung-Hwan
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.5
    • /
    • pp.138-149
    • /
    • 2021
  • Our society is developing exponentially, but schools are not keeping up with the pace of society's development, and they are not providing digital literacy education suitable for the growth and development of students. Thus, this study identified the actual conditions and problems of digital literacy education at school sites and sought the direction of development of digital literacy education. By identifying the current state of schools in which the 2015 curriculum is operated, we sought the direction of the development of digital literacy education for our school. First, old digital devices should be replaced, laptops or smart devices should be provided for each student, and internet access should be available throughout the school. Second, digital literacy education should be provided to teachers by providing various training opportunities.Third, coding education where you can express what you think as logical thinking, Software training should increase the level of the algorithmic domain that shows the computational thinking process of discovering problems and automating a given problem into a computer programming language, there is enough robot that can be seen operating the program, digital parish will need to be delivered.

A Study on Development of Standard Modeling Education Program in Information Security : Focusing on Domestic University Cases (정보보호 교육과정 표준화모델 개발 연구 : 국내 대학 사례를 중심으로)

  • Yang, Jeongmo
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.99-104
    • /
    • 2018
  • Modern society has entered the era of the fourth industrial revolution beyond the information age. In other words, technology innovations such as life science, unmanned automobiles, drone, artificial intelligence, big data, robot technology, Internet of things, and nano-technology are leading the change of the world. In these technologies use and delivery of information is playing a key role, and the field of information security for the safe use of information has become an indispensable discipline. In this sense, it is necessary to standardize the curriculum of universities to foster security manpower to meet the needs of the era. In this paper, we develop and present a model to standardize the curriculum in the field of information security. Using this model, each educational institution will be able to select the necessary track or field to guide the students and cultivate information security manpower effectively.

  • PDF

Survey Research for Evaluation of Real-time Non-face-to-face Medical Education in Clinical Korean Medicine (임상한의학 실시간 비대면교육의 평가를 위한 설문조사 연구)

  • Yang, Seung-Bo
    • The Journal of Internal Korean Medicine
    • /
    • v.41 no.6
    • /
    • pp.984-992
    • /
    • 2020
  • Objectives: This survey research was conducted to evaluate real-time non-face-to-face education in clinical Korean medicine conducted during the COVID-19 outbreak. Methods: This study was conducted with all 3rd and 4th grade students of the Department of Korean Medicine, Gachon University. The Korean Internal Medicine (Pulmonary) lecture course was held from April 1st to July 1st, 2020 for one semester. The lectures were conducted through real-time non-face-to-face education using the Cisco Webex program, and the lectures were mainly conducted by sharing a PowerPoint summarizing textbook. The questionnaire consisted of 3 parts and a total of 18 questions. The survey was conducted anonymously to ensure the confidentiality of all responses. Results: The overall score for real-time non-face-to-face education was 74.69±18.15 points. The efficiency of real-time non-face-to-face education was 2.12±0.78 points, and opinions on the expansion of future use were 2.08±0.91 points and were generally positive. The ratio of non-face-to-face education and face-to-face education in future clinical Korean medicine theory lectures was about 63:27, with a higher proportion of non-face-to-face education. Conclusions: Promoting clinical Korean medicine as a non-face-to-face education has generally been positively evaluated in terms of efficiency and overall, and its use should be expanded in the future. In particular, it will be necessary to use non-face-to-face education in the theory classes of clinical Korean medicine. However, technical problems involving internet, video, equipment, and communication tools will need to be improved in the future.

Cognitive Approach to Anti-Phishing and Anti-Pharming (피싱 및 파밍 방지를 위한 인지 기반의 접근 방법)

  • Kim, Ju-Hyun;Maeng, Young-Jae;Nyang, Dae-Hun;Lee, Kyung-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.113-124
    • /
    • 2009
  • Recently, lots of anti-phishing schemes have been developed. Several products identify phishing sites and show the results on the address bar of the internet browser, but they determine only by domain names or IP addresses. Although this kind of method is effective against recent DNS pharming attacks, there is still a possibility that hidden attacks which modifies HTML codes could incapacitate those anti-phishing programs. In this paper, the cognitive approach which compares images to decide phishing or pharming is presented, using system tray and balloon tips that are hard to fake with pop-ups or flash in order for users to compare pictures from connecting sites and system tray. It differs from an old method that a program analyzes IP or domains to judge if it is phishing or pharming, but observes if there were HTML code changing between plug-ins and a server.

A Study on the Multiplexing of a Communication Line for the Physical Load Balancing-Based Prevention of Infringement (물리적 부하 균형(Load-balancing) 기반의 침해방지를 위한 통신라인 다중화에 관한 연구)

  • Choi, Hee-Sik;Seo, Woo-Seok;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.81-91
    • /
    • 2012
  • Presently in 2011, there are countless attacking tools oriented to invading security on the internet. And most of the tools are possible to conduct the actual invasion. Also, as the program sources attacking the weaknesses of PS3 were released in 2010 and also various sources for attacking agents and attacking tools such as Stuxnet Source Code were released in 2011, the part for defense has the greatest burden; however, it can be also a chance for the defensive part to suggest and develop methods to defense identical or similar patterned attacking by analyzing attacking sources. As a way to cope with such attacking, this study divides the network areas targeted for attack based on load balancing by the approach gateways and communication lines according to the defensive policies by attacking types and also suggests methods to multiply communication lines. The result of this paper will be provided as practical data to realize defensive policies based on high hardware performances through enhancing the price competitiveness of hardware infrastructure with 2010 as a start.

A Study of Priority for Policy Implement of Personal Information Security in Public Sector: Focused on Personal Information Security Index (공공분야 개인정보보호 정책 집행과제의 우선순위 분석: 개인정보보호 수준진단 지표의 선정 및 중요도를 중심으로)

  • Shin, Young-Jin;Jeong, Hyeong-Chul;Kang, Won-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.379-390
    • /
    • 2012
  • This study is to consider political implication of indicators to measure personal information security in public sector studied by Ministry of Public Adminstration and Security from 2008 to 2011. The study analyzed the priority of personal information security policy dividing into personal information security infrastructure, personal information management with life cycle, correspondence of information infringement by scholars, experts, and chargers. As the results, to progress personal information security policy is important to management of personal identification information on web site; specially institutional infrastructure as responsible organization, exclusive manpower, and security budget; personal information security infrastructure. As like the results, it would be reflected in the progress of personal information security policy and tried to provide systematic management program with improving safe information distribution and usefulness.

The Influence of Knowledge and Health Beliefs about Gestational Diabetes on Breastfeeding Intention of Women with Gestational Diabetes (임신성 당뇨 여성의 임신성 당뇨 지식과 건강신념이 모유수유 의도에 미치는 영향)

  • Seungmi, Park;Deulle, Min;Jiyeon, Park
    • Research in Community and Public Health Nursing
    • /
    • v.31 no.4
    • /
    • pp.427-435
    • /
    • 2020
  • Purpose: The purpose of this study was to assess the knowledge and health beliefs about gestational diabetes and to identify the influence on breastfeeding intention of women those who have been diagnosed with gestational diabetes. Methods: A cross-sectional descriptive study was designed. A questionnaire survey was conducted on 270 women who were pregnant and currently diagnosed with gestational diabetes. Data collection was conducted at Internet cafes and breastfeeding clinics where pregnant women were able to participate actively. The data collection period was from November 5 to November 27, 2019 and analyzed using descriptive statistics, independent t-test, χ2 test and multiple logistic regression. Results: The average age of the participants was 34.21±3.73 years. There were 221 women who had breastfeeding intention, and 49 women who did not intend to breastfeed. The higher the perceived susceptibility (OR=2.49, p=.032), benefits (OR=2.62 p=.009), and the self-efficacy, the higher the intention to perform breastfeeding (OR=2.97, p=.004). On the other hand, the higher the perceived severity, the lower the intention to perform breastfeeding (OR=0.35, p=.007). Conclusion: Health beliefs such as perceived susceptibility, perceived benefits, self-efficacy and perceived severity have been shown to affect the breastfeeding intention. Based on these results, we suggest developing a breastfeeding promotion intervention program that improves self-efficacy in gestational diabetics.

Design and Implementation of High-Speed Software Cryptographic Modules Using GPU (GPU를 활용한 고속 소프트웨어 암호모듈 설계 및 구현)

  • Song, JinGyo;An, SangWoo;Seo, Seog Chung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1279-1289
    • /
    • 2020
  • To securely protect users' sensitive information and national secrets, the importance of cryptographic modules has been emphasized. Currently, many companies and national organizations are actively using cryptographic modules. In Korea, To ensure the security of these cryptographic modules, the cryptographic module has been verified through the Korea Certificate Module Validation Program(KCMVP). Most of the domestic cryptographic modules are CPU-based software (S/W). However, CPU-based cryptographic modules are difficult to use in servers that need to process large amounts of data. In this paper, we propose an S/W cryptographic module that provides a high-speed operation using GPU. We describe the configuration and operation of the S/W cryptographic module using GPU and present the changes in the cryptographic module security requirements by using GPU. In addition, we present the performance improvement compared to the existing CPU S/W cryptographic module. The results of this paper can be used for cryptographic modules that provide cryptography in servers that manage IoT (Internet of Things) or provide cloud computing.