• Title/Summary/Keyword: 대응 방안

Search Result 5,278, Processing Time 0.035 seconds

The Educational Acceptance of Religion in Multicultural Society: Focused on Cooperative Religious Education (다문화사회에서 종교의 교육적 수용 - 협력 종교 교육을 중심으로 -)

  • Kim Jin-young
    • Journal of the Daesoon Academy of Sciences
    • /
    • v.45
    • /
    • pp.153-186
    • /
    • 2023
  • Since the 2000s, Korean society has been transitioning into a multicultural society with a sharp increase in the influx of various non-Koreans including immigrant workers, immigrant spouses, international students, and refugees. As a result, Korea, which had maintained religious peace and coexistence as a multi-religious society, is showing signs of increased risks of social problems such as the surfacing of conflicts between religions. Religion can contribute to the integration and safety of communities in the process of becoming a multicultural society, but at the same time, it requires discussion from an educational perspective because of its ambivalence in potentially causing conflict within communities. Considering that one of the main functions of religion is social integration, religious education is required for the stable settlement of multicultural societies. In recognition of this, discussion regarding a new perspective on religious education is needed to respond to religious diversity and to understand the current society and the means of becoming a global citizen. This new discussion would be a 'general religious education' model that provides an education covering various religious and non-religious worldviews in order to cultivate 'religious literacy.' However, in a multicultural society, while general religious education may be useful in reducing prejudice and discrimination among students in an integrated environment, it should also be recognized that a 'special religious education' would be needed to acknowledge the unique values of each human group. This would be the most effective approach to multiculturalism. Therefore, this study proposes a form of 'cooperative religious education,' which combines general religious education and special religious education as a direction for religious education. In providing readers with background context, this study will review Korean religious policies and religious education, and then present realistic methods that can be implemented in schools.

A Study on Effective Adversarial Attack Creation for Robustness Improvement of AI Models (AI 모델의 Robustness 향상을 위한 효율적인 Adversarial Attack 생성 방안 연구)

  • Si-on Jeong;Tae-hyun Han;Seung-bum Lim;Tae-jin Lee
    • Journal of Internet Computing and Services
    • /
    • v.24 no.4
    • /
    • pp.25-36
    • /
    • 2023
  • Today, as AI (Artificial Intelligence) technology is introduced in various fields, including security, the development of technology is accelerating. However, with the development of AI technology, attack techniques that cleverly bypass malicious behavior detection are also developing. In the classification process of AI models, an Adversarial attack has emerged that induces misclassification and a decrease in reliability through fine adjustment of input values. The attacks that will appear in the future are not new attacks created by an attacker but rather a method of avoiding the detection system by slightly modifying existing attacks, such as Adversarial attacks. Developing a robust model that can respond to these malware variants is necessary. In this paper, we propose two methods of generating Adversarial attacks as efficient Adversarial attack generation techniques for improving Robustness in AI models. The proposed technique is the XAI-based attack technique using the XAI technique and the Reference based attack through the model's decision boundary search. After that, a classification model was constructed through a malicious code dataset to compare performance with the PGD attack, one of the existing Adversarial attacks. In terms of generation speed, XAI-based attack, and reference-based attack take 0.35 seconds and 0.47 seconds, respectively, compared to the existing PGD attack, which takes 20 minutes, showing a very high speed, especially in the case of reference-based attack, 97.7%, which is higher than the existing PGD attack's generation rate of 75.5%. Therefore, the proposed technique enables more efficient Adversarial attacks and is expected to contribute to research to build a robust AI model in the future.

The Effect of Ethical Propensity of Dental Hygienists on Ethical Values (치과위생사의 윤리적 성향이 윤리적 가치관에 미치는 영향)

  • Jun-yeong Kwon;Hyoung-Joo Kim;Na-yeon Tak;Hee-jung Lim
    • Journal of Korean Dental Hygiene Science
    • /
    • v.6 no.1
    • /
    • pp.1-12
    • /
    • 2023
  • Background: Dental hygienists emphasize the ethics of healthcare workers. To effectively cope with various ethical conflicts, it is necessary to establish a reasonable ethical value system. Therefore, this study intends to use basic data to develop ethics education programs and ethical value evaluation tools. Methods: We conducted a questionnaire survey targeting dental hygienists between January 1 and 15, 2023. A total of 251 people's responses were analyzed with SPSS Win 25.0, to perform frequency, t-test, one-way ANOVA, and multiple regression analysis. Results: The idealistic propensity (3.82 points) was higher than the relativistic propensity (3.42 points), and the absolutists showed a deontological position in the partnership area and dental hygiene work relationship area(P < 0.001). Regression analysis of factors affecting ethical values revealed that idealism (β=,444, p=0.000), marital status (β=-0.123, P = 0.035), and position (β=-0.154, P = 0.009) were significantly related to ethical propensity. Conclusion: It is necessary to develop an ethics education program that considers the ethical propensity of dental hygienists and establish firm ethical values by implementing situation-oriented ethics education that can respond to many changes and conflicts.

A Forensic Methodology for Detecting Image Manipulations (이미지 조작 탐지를 위한 포렌식 방법론)

  • Jiwon Lee;Seungjae Jeon;Yunji Park;Jaehyun Chung;Doowon Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.4
    • /
    • pp.671-685
    • /
    • 2023
  • By applying artificial intelligence to image editing technology, it has become possible to generate high-quality images with minimal traces of manipulation. However, since these technologies can be misused for criminal activities such as dissemination of false information, destruction of evidence, and denial of facts, it is crucial to implement strong countermeasures. In this study, image file and mobile forensic artifacts analysis were conducted for detecting image manipulation. Image file analysis involves parsing the metadata of manipulated images and comparing them with a Reference DB to detect manipulation. The Reference DB is a database that collects manipulation-related traces left in image metadata, which serves as a criterion for detecting image manipulation. In the mobile forensic artifacts analysis, packages related to image editing tools were extracted and analyzed to aid the detection of image manipulation. The proposed methodology overcomes the limitations of existing graphic feature-based analysis and combines with image processing techniques, providing the advantage of reducing false positives. The research results demonstrate the significant role of such methodology in digital forensic investigation and analysis. Additionally, We provide the code for parsing image metadata and the Reference DB along with the dataset of manipulated images, aiming to contribute to related research.

The effect of urban conditions, external influences, and O&M efficiency on urban water system from the perspective of water-energy nexus (도시 여건, 외부 영향 및 운영관리 효율이 넥서스 관점에서 도시 물순환 시스템에 미치는 영향)

  • Choi, Seo Hyung;Shin, Bongwoo;Shin, Eunher
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2022.05a
    • /
    • pp.31-31
    • /
    • 2022
  • 기후변화, 물 부족, 인구 증가와 도시화로 인한 물 수요 증가, 수질 악화, 노후화된 인프라와 같은 세계적인 물문제의 증가로 인해, 도시 물순환 시스템 관리는 더 큰 어려움을 겪고 있다. 취수, 도·송수, 정수처리, 배·급수, 용수 사용, 하수 집수, 하수 처리, 재이용 및 배출 과정을 포함하는 도시 물순환 시스템의 과정은 매우 에너지 집약적인 활동이며, 이와 같은 에너지 소비는 탄소 배출과 양의 직접적인 상관관계가 있다. 따라서 자원 관리 및 데이터 관리를 최적화하기 위해 넥서스 관점의 접근법이 도시 물순환 시스템에 점차적으로 도입되고 있는 추세이다. 도시 물순환 시스템 넥서스에서는 일반적으로 에너지 인텐시티로 표현되는 물을 위한 에너지를 이해하는 것이 중요하다. 에너지 인텐시티의 차이는 기후(연평균 강수량, 단기 기후 변동성, 기후패턴 등), 지리적 특징(표고차, 평지비, 위치 등), 시스템 특성(총급수량, 인구, 인구밀도, 관로 연장 등) 및 운영관리 효율(수압, 누수율, 에너지 효율 등)과 밀접한 관계가 있다. 그리고 도시 물순환 시스템에서 에너지 관리를 증진시킨 방안은 유지관리 효율 개선(물·에너지 관리전략, 물손실 관리, 수요 관리 및 수요 대응 등), 신기술 도입, 그리고 에너지 회수로 나누어진다. 본 연구에서는 기존 문헌의 자료를 분석하여 도시 물순환 시스템의 각 공정별 에너지 인텐시티를 분석하였으며, 시스템 다이나믹스를 적용하여 다양한 도시 여건(인구, lpcd, 누수율, 취수원, 에너지 인텐시티)에서 외부영향(기후변화, 도시화)과 운영효율 변동(운영효율 향상, 신시술 도입)에 따른 도시 물순환 시스템 내 자원 사용 및 이동을 분석하였다. 에너지 인텐시티는 전체 도시 물순환 시스템, 상수 시스템, 하수시스템에서 각각 2.334 kWh/m3, 1.029 kWh/m3, 1.024 kWh/m3를 나타내었으며, 용수사용, 담수화, 재이용 과정에서는 매우 높은 값이 나타났다. 에너지 인틴시티의 값은 외부 영향에 크게 좌우되는 것으로 분석되었으며, 운영효율의 변동에 따라서 물 및 에너지 사용량은 변화하였지만 에너지 인텐시티의 변동은 크지 않았다. 이에 따라 도시 물순환 시스템을 넥서스 관점에서 관리하기 위해서는 에너지 인텐시티 이외에 물 및 에너지 사용량, 유수수량 관점 에너지 인텐시티, 사용수량 관점 에너지 인텐시티를 종합적으로 고려하는 것이 필요하다.

  • PDF

Prospects of cross-strait relaions after the 20th National Congress of the Communist Party of China (중국공산당 제20차 전국대표대회 이후 양안관계 전망)

  • Wonkon Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.1
    • /
    • pp.161-168
    • /
    • 2023
  • Recently, China-Taiwan relations are facing a crisis, and at the same time, the U.S.-China relationship and the structure of Northeast Asia are greatly shaken, so we should pay attention to changes in cross-strait relations. This study aims to predict how cross-strait relations will change after the party convention by analyzing Xi Jinping's Taiwan policy, focusing on the "Political Report" of the 20th party convention and the content analysis of leadership personnel. The results of the study are as follows. First, as the amendment to the party constitution announced after the closing of the party convention stipulates the possibility of armed invasion, Xi Jinping will implement a tough Taiwan policy emphasizing unification. Second, strategic competition with the United States will continue to intensify in the future when analyzing the contents of Chapters 2, 11, 13, and 14 of the "Political Reporting" and the personnel management of diplomatic and security leadership. As a result, cross-strait relations are expected to show instability for a considerable period of time. Third, at a time when Taiwan rejects the unification plan of "one country, two systems" and the tendency to de-Chineseize is strengthening, there is a possibility that legislation or specific enforcement ordinances will be enacted to strengthen the existing "Anti-Secession Law." Fourth, it is expected that strong and warm two-sided strategies will be used together, such as taking a strong response to external forces interfering with the Taiwan issue and Taiwan independence forces, and using incentives for the Kuomintang(KMT) and Taiwanese who are friendly to unification.

A Preemptive Detection Method for Unknown IoT Botnet Based on Darknet Traffic (다크넷 트래픽 기반의 알려지지 않은 IoT 봇넷 선제탐지 방안)

  • Gunyang Park;Jungsuk Song;Heejun Roh
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.267-280
    • /
    • 2023
  • With development of computing and communications technologies, IoT environments based on high-speed networks have been extending rapidly. Especially, from home to an office or a factory, applications of IoT devices with sensing environment and performing computations are increasing. Unfortunately, IoT devices which have limited hardware resources can be vulnerable to cyber attacks. Hence, there is a concern that an IoT botnet can give rise to information leakage as a national cyber security crisis arising from abuse as a malicious waypoint or propagation through connected networks. In order to response in advance from unknown cyber threats in IoT networks, in this paper, We firstly define four types of We firstly define four types of characteristics by analyzing darknet traffic accessed from an IoT botnet. Using the characteristic, a suspicious IP address is filtered quickly. Secondly, the filtered address is identified by Cyber Threat Intelligence (CTI) or Open Source INTelligence (OSINT) in terms of an unknown suspicious host. The identified IP address is finally fingerprinted to determine whether the IP is a malicious host or not. To verify a validation of the proposed method, we apply to a Darknet on real-world SOC. As a result, about 1,000 hosts who are detected and blocked preemptively by the proposed method are confirmed as real IoT botnets.

The Impact of National Forest Trails on Quality of Life of Migrants from Urban to Mountain Villages: Focused on Jirisan Dullegil Trail (국가숲길이 귀산촌인의 삶의 질에 미치는 영향: 지리산둘레길을 중심으로)

  • Juyeon We;Sugwang Lee;Jeonghee Lee;Somin Kim
    • Journal of Korean Society of Forest Science
    • /
    • v.112 no.2
    • /
    • pp.230-247
    • /
    • 2023
  • This study was conducted on migrants in 5 cities and counties near the Jirisan Dulle-gil Trail, designated as a National Forest Trail, to find out how the National Forest Trail affects the quality of life after migrants from urban to mountain villages. The group that used the Jirisan Dulle-gil Trail before and/or after the migration showed higher levels of impact on the migration decision, life satisfaction, and behavioral intention than the group that did not use the trail. The group that was affected by the Jirisan Dulle-gil Trail in deciding on the migration also showed higher usage satisfaction with the Jirisan Dulle-gil Trail, life satisfaction, satisfaction with the migration, and behavioral intention than the unaffected group. There were also significant differences in the quality of life according to the migration area, location satisfaction among the migration satisfaction levels, and behavioral intention. In conclusion, it was confirmed that the Jirisan Dulle-gil Trail plays an important role in the decision to migrate to mountain villages and the quality of life after the migration. The results of this study are expected to be used as basic data to present policies related to National Forest Trails that can contribute to the development of mountain villages and countermeasures against population extinction in mountain villages.

Assessing habitat suitability for timber species in South Korea under SSP scenarios (SSP 시나리오에 따른 국내 용재수종의 서식지 적합도 평가)

  • Hyeon-Gwan Ahn;Chul-Hee Lim
    • Korean Journal of Environmental Biology
    • /
    • v.40 no.4
    • /
    • pp.567-578
    • /
    • 2022
  • Various social and environmental problems have recently emerged due to global climate change. In South Korea, coniferous forests in the highlands are decreasing due to climate change whereas the distribution of subtropical species is gradually increasing. This study aims to respond to changes in the distribution of forest species in South Korea due to climate change. This study predicts changes in future suitable areas for Pinus koraiensis, Cryptomeria japonica, and Chamaecyparis obtusa cultivated as timber species based on climate, topography, and environment. Appearance coordinates were collected only for natural forests in consideration of climate suitability in the National Forest Inventory. Future climate data used the SSP scenario by KMA. Species distribution models were ensembled to predict future suitable habitat areas for the base year(2000-2019), near future(2041-2060), and distant future(2081-2100). In the baseline period, the highly suitable habitat for Pinus koraiensis accounted for approximately 13.87% of the country. However, in the distant future(2081-2100), it decreased to approximately 0.11% under SSP5-8.5. For Cryptomeria japonica, the habitat for the base year was approximately 7.08%. It increased to approximately 18.21% under SSP5-8.5 in the distant future. In the case of Chamaecyparis obtusa, the habitat for the base year was approximately 19.32%. It increased to approximately 90.93% under SSP5-8.5 in the distant future. Pinus koraiensis, which had been planted nationwide, gradually moved north due to climate change with suitable habitats in South Korea decreased significantly. After the near future, Pinus koraiensis was not suitable for the afforestation as timber species in South Korea. Chamaecyparis obtusa can be replaced in most areas. In the case of Cryptomeria japonica, it was assessed that it could replace part of the south and central region.

A Study on the Optimal Operating Conditions for an Unreacted Hydrogen Oxidation-Heat Recovery System for the Safety of the Hydrogen Utilization Process (수소 활용공정 안전성 확보를 위한 미반응 수소 산화-열 회수 시스템의 운전 조건 최적화 연구)

  • Younghee Jang;Sung Su Kim
    • Applied Chemistry for Engineering
    • /
    • v.34 no.3
    • /
    • pp.307-312
    • /
    • 2023
  • In this study, a catalytic oxidation-heat recovery system was designed that can remove unreacted with a concentration of about 1% to 6% in the exhaust gas of hydrogen fuel cells and recover heat to ensure safety in the hydrogen economy. The safety system was devised by filling hydrogen oxidation catalysts at room temperature that can remove unreacted hydrogen without any energy source, and an exhaust-heat recovery device was integrated to efficiently recover the heat released from the oxidation reaction. Through CFD analysis, variations in pressure and fluid within the system were shown depending on the filling conditions of the hydrogen oxidation system. In addition, it was found that waste heat could be recovered by optimizing the temperature of the exhaust gas, flow rate, and pressure conditions within the heat recovery system and securing hot water above 40 ℃ by utilizing the exhaust gas oxidation heat source above 300 ℃. Through this study, it was possible to confirm the potential of utilizing hydrogen processes, which are applied in small to medium-sized systems such as hydrogen fuel cells, as a safety system by evaluating them at a pilot scale. Additionally, it could be a safety guideline for responding to unexpected hydrogen safety accidents through further pilot-scale studies.