The Journal of The Korea Institute of Intelligent Transport Systems
/
v.11
no.4
/
pp.19-33
/
2012
Ministry of Land, Transport and Maritime Affairs prepared the method to update traffic connection system by amending "National Transport System Efficiency Act(hereinafter Act)". The key is a development of Intermodal Transfer Center. The law and guideline related with Intermodal Transfer Center requires the installation and operation of transfer information guide facility to improve user's convenience. However, there are no sufficient studies that can be used as references for the method to construct transfer support information system related with user's preference. The study performed the research about user's service satisfaction in relation with transfer support information service, which was embodied in model operation process, on the basis of transfer support information system of Intermodal Transfer Center applied to Gimpo Airport. The analysis result about service preference, importance of each supplied information, service satisfaction and consideration for service embodiment can be used as a guideline to embody the user information service of Intermodal Transfer Center. In addition, through CVM, the study estimated and proposed the service valuation of smart intermodal transfer service that provides customized information to cope with user's situation and traffic means operation status among transfer support information service. It is determined that the study will measure the benefit of Intermodal Transfer Center user by using monetary value when smart intermodal transfer service is supplied and provide the ground to expand high-tech transfer information service with high usefulness and convenience.
The Journal of Sustainable Design and Educational Environment Research
/
v.18
no.1
/
pp.1-16
/
2019
The purpose of this study is to diagnose the problems of an elementary school care classroom in terms of facilities and physical environment and to suggest an improvement plan for building safer and more pleasant facilities and environment in further proceeding the policies of a whole-day care classroom. To this end, we analyzed the main contents of the domestic policies for elementary school care classes and the related spatial standards amongst the management plans of provincial education offices nationwide. In addition, we analyzed the relevant care facility standards of advanced countries such as the U.S., Australia, and Singapore and diagnosed the physical environmental level of Korean care classes in comparison to the international standards. Afterwards, we conducted a case study of elementary school care classes in order to examine the key issues with the environment of care classes, the causes of these issues and the user recognition and demand. The key results of this research are as follows. First, it is necessary to elaborate and refine the guidelines on elementary school care classrooms. Second, in order to provide high-quality elementary care services, it is important to have a combined classroom that can be operated at the level equivalent to or similar to a dedicated care classroom. Third, it is necessary to regularly check the facilities and environment of the elementary school care classroom.
Journal of the Korea Institute of Information Security & Cryptology
/
v.16
no.4
/
pp.33-41
/
2006
RSA cryptosystem is of great use in systems such as IC card, mobile system, WPKI, electronic cash, SET, SSL and so on. RSA is performed through modular exponentiation. It is well known that the Montgomery multiplier is efficient in general. The critical path delay of the Montgomery multiplier depends on an addition of three operands, the problem that is taken over carry-propagation makes big influence at an efficiency of Montgomery Multiplier. Recently, the use of the Carry Save Adder(CSA) which has no carry propagation has worked McIvor et al. proposed a couple of Montgomery multiplication for an ideal exponentiation, the one and the other are made of 3 steps and 2 steps of CSA respectively. The latter one is more efficient than the first one in terms of the time complexity. In this paper, for faster operation than the latter one we use binary signed-digit(SD) number system which has no carry-propagation. We propose a new redundant binary adder(RBA) that performs the addition between two binary SD numbers and apply to Montgomery multiplier. Instead of the binary SD addition rule using in existing RBAs, we propose a new addition rule. And, we construct and simulate to the proposed adder using gates provided from SAMSUNG STD130 $0.18{\mu}m$ 1.8V CMOS Standard Cell Library. The result is faster by a minimum 12.46% in terms of the time complexity than McIvor's 2 method and existing RBAs.
The high-tech industry, a leader in the national economy, has a larger investment cost compared to general buildings, a shorter construction period, and requires continuous investment. Therefore, accurate construction cost prediction and quick decision-making are important factors for efficient cost and process management. Overseas, the construction information classification system has been standardized since 1980 and has been continuously developed, improving construction productivity by systematically collecting and utilizing project life cycle information. At domestic construction sites, attempts have been made to standardize the classification system of construction information, but it is difficult to achieve continuous standardization and systematization due to the absence of a standardization body and differences in cost and process management methods for each construction company. Particular, in the case of the high-tech industry, the standardization and systematization level of the construction information classification system for high-tech facility construction is very low due to problems such as large scale, numerous types of work, complex construction and security. Therefore, the purpose of this study is to construct a construction information classification system suitable for high-tech facility construction through collection, classification, and analysis of related project data constructed in Korea. Based on the WBS (Work Breakdown Structure) and CBS (Cost Breakdown Structure) classified and analyzed through this study, a code system through hierarchical classification was proposed, and the cost model of buildings by linking WBS and CBS was three-dimensionalized and the utilized method was presented. Through this, an information classification system based on inter-relationships can be developed beyond the one-way tree structure, which is a general construction information classification system, and effects such as shortening of construction period and cost reduction will be maximized.
In Korea, punitive damages were introduced in the 2011 Fair Transactions in Subcontracting Act(FTSA), and in 2019 the Patent Act, Trade Secret Protection Act(TSPA), Industrial Technology Protection Act(ITPA), and Mutually Beneficial Cooperation Act(MBCA). In punitive damages, the judgment of 'intentional' is especially important, and it is necessary to refer to US precedents since there is no accumulated case. Major Company can avoid intentional counseling through the advice of lawyers, but SMEs may have to punish punitive damages due to a lack of awareness of the system. In the case of TSPA, ITPA, FTSA, and MBCA, except for Patent Act, the provisions related to proof of damage have not been well maintained yet. Therefore, the data submission order system of these laws needs to be revised to the level of patent Act need to be. TSPA needs to be amended in the future to estimate the amount of the royalties in estimating the amount of damages so that it can receive the 'reasonably' estimated amount rather than the usual amount. On the other hand, ITPA, FTSA, and MBCA do not have any provisions for the estimation of damages. Besides, it is difficult to evaluate the technology value in the case of leakage or deodorization of new technologies. Therefore, valuation needs to be carried out by a credible institution along with the development of a model for calculating damages.
As the information and communication environment develops, the environment of military facilities is also development remarkably. In proportion to this, cyber threats are also increasing, and in particular, APT attacks, which are difficult to prevent with existing signature-based cyber defense systems, are frequently targeting military and national infrastructure. It is important to identify attack groups for appropriate response, but it is very difficult to identify them due to the nature of cyber attacks conducted in secret using methods such as anti-forensics. In the past, after an attack was detected, a security expert had to perform high-level analysis for a long time based on the large amount of evidence collected to get a clue about the attack group. To solve this problem, in this paper, we proposed an automation technique that can classify an attack group within a short time after detection. In case of APT attacks, compared to general cyber attacks, the number of attacks is small, there is not much known data, and it is designed to bypass signature-based cyber defense techniques. As an attack model, we used MITRE ATT&CK® which modeled many parts of cyber attacks. We design an impact score considering the versatility of the attack techniques and proposed a group similarity score based on this. Experimental results show that the proposed method classified the attack group with a 72.62% probability based on Top-5 accuracy.
In-Chan Kim;Jong-Hoon Kim;Jun-Hak Sim;Kang-Hee Lee;Sang-Keun Cho;Sang-Hyuk Park;Myung-Sook Hong
The Journal of the Convergence on Culture Technology
/
v.9
no.5
/
pp.269-273
/
2023
After participating in the Second Boer War in 1899, the Australian Army participated in world wars such as World War I, World War II, the Korean War, and the Vietnam War. To overcome the decline in the social recognition of soldiers and the continuous shortage of troops caused by the protracted war, the status and role of female personnel were expanded. The use of female manpower, which started as medical support during the Second Boer War, expanded to combat support missions such as communications, maintenance, driving, secret document management, and radar surveillance during World War II. After the Vietnam War, the Chiefs of Staff of the Australian Army, Navy and Air Force established a committee to expand women's participation in the military, improved service conditions for female personnel and supplemented regulations so that they were treated as soldiers, not women, and reached a turning point in expanding the role of female personnel in the Australian military. As a result, all combat positions, including special forces, were opened to women in 2014, and a plan was established to increase the proportion of women in each service by 2030. As a result, all combat positions, including special forces, were opened to women in 2014, and the Australian Armed Forces set a plan to increase the proportion of women by 2030. Like the Australian military, South Korea is also experiencing a demographic cliff and shortage of troops due to the continuing low birthrate problem. Through the history and current state of the use of female personnel in the Australian military, we would like to draw implications for the direction our military should go.
By virtue of diverse advantages derived from digital media, eBook is getting started to use. And many market research agencies have predicted that its market will be greatly expanded soon. But against those expectations, copyright-related problems and the difficulties of its accessing inherited from various eBook content formats become an obstacle to its diffusion. The first problems can be solved by DRM technology. And to solve the second problems, each nation has published its own content standard format. But the domestic standards are useful only the domestic level, they still leave the problems in the national level. The variety of content formats has created a demand for mechanisms that allow the exchange of eBook contents. Therefore we study the mapping relations between eBook contents for conversion. To define the mapping relations, first we extract the mapping both between eBook contents and between normal XML documents. From those mappings, we define seven mapping relations and classify them by cardinality. And we analyze the classified relations, which can be generated by automatic, or not. Using these results, we also classify the eBook content conversion as automatic, semi-automatic, and manual. Besides, we provide the conversion templates for mapping relations for automatic generation of conversion scripts. To show the feasibility of conversion templates, we apply them to the eBook content conversion. Experiment shows that our conversion templates generate the conversion scripts properly. We expected that defined mapping relations and conversion templates can be used not only in eBook content conversion , but also in normal XML document conversion.
Nowadays the world is threatened because of terrors that take aim at Soft-Targets available and easy to access to the people rather than more secured Hard-Targets. The inspection department of the Presidential Security Service develops and acts a perfect safety plan wherever the President stays so that it is possible to get immediate actions for various contingencies. Some events, in which the President take part, could be held in a lower or higher store in a tall building. Additional to the routine work at this case it is to emphasize on a plan of fire precaution to check the spot and respond to a real fire situation, so that the damage could be minimized. First, the agents of the President Security Service should possess basic knowledge concerning to the fire accidents and be trained on their manuals, even in a busy events plan. An organization, whatever it is, could be improved in that it tries to develop not only the personal abilities, but also education programs of the organization continually. And enhanced abilities of the members lead to the driving force for the advance. The knowledge of fire accident should be able to adapt to the real situation. Second, related to the event, it should be cooperated with the relevant departments, so that it is possible to conduct and control the system. It is urgently required to know that the security event could not be done perfectly with only one part or department. Third, from the time of recognizing of the event it is necessary for the fire department to get an action plan with fire fighting measures, evacuation measures based of the instructions given by the Security Service. Fourth, on the knowledge of the action plan of the fire department the Security Service should inspect the safety activities of the spot and establish the practical operation plan through the fire fighting and evacuation plan. Fifth, the Security Service should share final informations and plan of fire fighting in a high-rise building with the other relevant departments. If not, it could cause a great confusion that could lead to a great damage.
It is required to expand area of inter-Korean economic cooperation, being limited to non-military field, to military field and then, to positively promote arms control in order to establish foundation for peaceful reunification in Korean peninsula. Reasons why arms control has not been promoted between South and North Korea in the meantime were such original factors as follows; (1) limit of confidence building between the South and the North, (2) functional limit of arms control itself, (3) institutional structural limit between the South and the North, (4) environmental limit at home and abroad. It is necessary to get out from existing frame and to seek a new paradigm in order to overcome above factors and to realize arms control between the South and the North. First, it is required to have prior political dialog at the South-North high-level talks in order to promote arms control and to exercise 'strategic flexibility' during negotiation and promotion process. For this, 'flexible reciprocity' has to be adopted in compliance with situation and conditions. Second, it is necessary to get out from existing principle of 'confidence building in advance and arms reduction later' but to seek the 'simultaneous driving principle of confidence building and arms reduction' as an eclectic approach. Namely, based on reasonable sufficiency, it is required to promote military confidence building and limited arms reduction in parallel, which is a lower level of arms control. Third, as an advisory body of Prime Minister's Office, it is necessary to install an organization exclusively responsible for arms control and to positively handle arms control issue from the standpoint of national policy strategy. If the South-North high-level talks take place, it is necessary to organize and operate 'South-North Joint Arms Control Promotion Board (tentative name)'. Fourth, it is required to exercise more active diplomatic competence in order to create national consensus on necessity of arms control for peaceful reunification and to form more favorable international environment. Especially, it is necessary to think about how to solve nuclear issue of North Korea together in collaboration with international society and how to maintain balance between ROK-US alliance and Sino-Korean cooperation relations.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.