• Title/Summary/Keyword: 修辭

Search Result 822, Processing Time 0.03 seconds

남해군 동갈화항을 활용한 어촌지역의 특화 발전 방안 연구

  • Sin, Dong-Hyeong;An, Ung-Hui
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2019.05a
    • /
    • pp.249-251
    • /
    • 2019
  • 본 연구는 수산자원, 어항기반시설을 바탕으로 어촌뉴딜300사업 수산특화형 사업의 모델을 제시하였음. 수사자원이 풍부하고 어민들의 참여가 높은 갈화마을에서 수산특화형 사업의 성공 가능성을 발견할 수 있었음.

  • PDF

On A Hybrid Binary Sequence Generator (혼합형 이진 수열 발생기)

  • 이훈재
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.4
    • /
    • pp.81-90
    • /
    • 1997
  • 키 수열 발생기는 함수 조합 형태에 따라 여러 가지로 분류될 수 있으며, 비도 기본 요소(랜덤 특성, 주기, 선형 복잡도, 상관 면역도, 키 수열의 수 등)는 비선형 함수에 따라 달라진다. 모든 기본 요소를 잘 만족하는 키 수열 발생기는 설계가 어렵지만, 각 요소별로 특성이 뛰어난 발생기를 잘 조합하면 고비도 시스템을 설계할 수 있다. 본 논문에서는 선형 복잡도와 상관 면역도 측면에서 강한 개선된 합산 수열 발생기와 키 수열 수사 많은 일반화된 메모리 다수열 발생기를 조합하여 혼합형 수열 발생기를 제안하고, 비도 수준을 분석하였다.

The development and present state of water service facilities (수도시설의 전개와 현황)

  • 한상태;황원택;김경록
    • The Magazine of the Society of Air-Conditioning and Refrigerating Engineers of Korea
    • /
    • v.27 no.5
    • /
    • pp.435-443
    • /
    • 1998
  • 물은 인체 조직의 70%를 점유하고 있으며 만일 5%정도의 수분을 상실하게 되면 인간은 혼수상태가 되며, 12%정도를 잃으면 생명을 유지할 수 없다. 따라서 물은 신체의 유지는 물론 인간생활에 있어서 없어서는 안될 중요한 자원으로서 그 사용량과 수질은 문화 생활의 정도를 가늠하는 척도로 여겨져 왔다. 기존의 풍부한 물은 단순히 자유재로 생각되어 왔으나, 최근 들면서 귀중한 자원이며 경제재라는 인식이 확산되고 있으며 물을 수자원이라고 부르는 것이 세계적 추세이다.

  • PDF

The Development of Gait Cycle Identification Algorithm (보행주기내의 발 뒷굽닿기와 발가락떼기 행동 판별 알고리즘 개발)

  • Yoo, Hyungjin;Choi, Sangil
    • Annual Conference of KIPS
    • /
    • 2021.11a
    • /
    • pp.375-378
    • /
    • 2021
  • 인간의 보행에는 다양한 분야에서 유용하게 사용할 수 있는 정보를 가지고 있어 의료분야와 수사기관에서 사용되고 있다. 보행 데이터로부터 유용한 정보를 얻어내기 위해 선행되어야 하는 작업은 보행주기를 판별하는 것이다. 본 연구에서는 보행주기 판별을 위하여 발 뒷굽 닿기와 발가락 떼기 행동을 가속도 값과 각속도 값을 사용하여 알아내고, 정확도를 분석하는 알고리즘에 대해 논한다.

Establishment of 2D and 3D Replay Test System for the Cause Analysis of Ship Collision Accident (2차원 및 3차원 선박충돌재현시스템 구축)

  • Joon-Hong Kwon;Suck-Won Yang;Hye-Moon Kim;Nam-Sun Son
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2022.11a
    • /
    • pp.176-177
    • /
    • 2022
  • 수사기관에서 선박 충돌사고 발생 시 사고 재현 및 분석에 활용 또는 사고 예방 교육용으로 사용이 가능한 시스템을 개발 및 구축 하였다.

  • PDF

A Study on the equipment of police's gambling criminal investigation system - Focus on active gambling crime information acquisition - (경찰의 도박범죄수사체제 정비방안에 관한 연구 -적극적인 도박범죄정보 획득 활동을 중심으로-)

  • Kim, Jeong-Gyou;Lee, Hyo-Min
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.438-442
    • /
    • 2006
  • Korea society is known as gambling republic. It is very dishonorable name, but do not deny this if know the real condition. Gambling had spread gradually in our society and these trend caused much problems. It is true that confrontation was insufficient extremely in reply than gravity of gambling. Tend to recognize gambling by one of leisure life by effect of lawful gambling so-called such as horse racing, casino. While pernicious evil of gambling to our society, police's confrontation system is not effective. The police does technique investigation to look for and arrest criminal using criminal's fixed means and method and habit. Crime who correspond to technique investigation is prescribing to crime technique mutual assistance data administration rule. Gambling is excepted in technique crime's subject despite is very repeatable and is crime who have habit. The police must improve in gambling criminal investigation system for society public order.

  • PDF

The Analyst of Inavi Navigation user Information by Digital Forensic (디지털 포렌식 관점에서의 아이나비 내비게이션 사용정보 분석)

  • Choi, Yong-Seok;Seo, Ki-Min;Lim, Kyung-Soo;Lee, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.17C no.4
    • /
    • pp.327-334
    • /
    • 2010
  • The operated type of navigation is composed of hardware or software. The navigation based on software is stored and ran in the external storage(e.g. SD card). For the convenience of users, Many car navigation systems store user information such as frequently visited place, route, and so on. Those can be used to proving the alibi of users as well as their relationship between the actual owner of the vehicle through data and time information analysis. Therefore, if it is analyzed datas of navigation, we can get a lot of information such as user's movement, route of car. There are important implications in the digital forensics because it's available for investigating the various crimes. This paper demonstrates the necessary information in the digital investigation through the analysis of stored data in the navigation.

The Actual Condition of the Arson and Countermeasure (방화범죄의 실태와 대책방안)

  • Jung Gi-Sung
    • Fire Science and Engineering
    • /
    • v.19 no.2 s.58
    • /
    • pp.93-104
    • /
    • 2005
  • Nowadays, the arson is not common interest happening. the arson has been handled with a crime of violence along with murder, robbery and rape. because of being detrimental to the public clam. but the arson a has not been made award of a serious social problem. There is a rise in the control possibility according to a level of national concern. we have known that the last fire accident of the Deagu underground It took a heavy toll of lives and the property due to our no interest in arson. The government and regional self governing community have fully aware of the serious of the arson so that we can make arrangement for overall measures. The government should not only make up for legislation and systematize to correct a defect but also there is uniting the countermeasure system of the organs. The government establish particular research institution of the arson to consider a useful countermeasure. The investigation authorities should develop the investigation technique to arrest an arsonist. The relevant post strengthen the public relation to bring up a private organization of fire prevention in order to prevent the arson to try the government best.

Study on Recovery Techniques for the Deleted or Damaged Event Log(EVTX) Files (삭제되거나 손상된 이벤트 로그(EVTX) 파일 복구 기술에 대한 연구)

  • Shin, Yonghak;Cheon, Junyoung;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.387-396
    • /
    • 2016
  • As the number of people using digital devices has increased, the digital forensic, which aims at finding clues for crimes in digital data, has been developed and become more important especially in court. Together with the development of the digital forensic, the anti-forensic which aims at thwarting the digital forensic has also been developed. As an example, with anti-forensic technology the criminal would delete an digital evidence without which the investigator would be hard to find any clue for crimes. In such a case, recovery techniques on deleted or damaged information will be very important in the field of digital forensic. Until now, even though EVTX(event log)-based recovery techniques on deleted files have been presented, but there has been no study to retrieve event log data itself, In this paper, we propose some recovery algorithms on deleted or damaged event log file and show that our recovery algorithms have high success rate through experiments.

Study on SNS Application Data Decryption and Artifact (SNS 애플리케이션의 데이터 복호화 및 아티팩트 연구)

  • Shin, Sumin;Kang, Soojin;Kim, Giyoon;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.583-592
    • /
    • 2020
  • With the popularization of smartphones, Social Networking Service (SNS) has become the means of communication for modern people. Due to the nature of the means of communication, SNS generates a variety of archive and preservation evidence. Therefore, it is a major analysis target in terms of digital forensic investigation. An application that provides SNS stores data in a central server or database in a smartphone inside for user convenience. Some applications provide encryption for privacy, which can be anti-forensic in terms of digital forensic investigation. Therefore, the study of the encryption method should be continuously preceded. In this paper, we analyzed two applications that provide SQLite-based database encryption through SQLCipher module. Each database was decrypted and key data was identified.