• Title/Summary/Keyword: 무선 점

Search Result 917, Processing Time 0.025 seconds

A Study on the Conflict Between the Call for Journalists' Phone Records and the Shield Law: Focusing on the Review of Paragraph 2, Article 13 of the Act of Protection of the Secrecy of Correspondence (기자의 통화내역 조회와 취재원 보호 간의 갈등: 통신비밀보호법 제13조 제2항 논의를 중심으로)

  • Lee, Seung-Sun
    • Korean journal of communication and information
    • /
    • v.25
    • /
    • pp.103-133
    • /
    • 2004
  • Korean citizens enjoy not only the freedom of communication but also the secrecy of electronic communication. Article 18 of the Constitution of the Republic of Korea prescribes that the secrecy of correspondence should not be infringed. Namely, all citizens enjoy guaranteed privacy of correspondence. But many people have been experiencing the infringement of those rights. The purpose of this paper is to evaluate whether Paragraph 2, Article 13 of the Act on Protection of the Secrecy of Correspondence infringes on the constitutional rights of privacy of electronic communication. The results of this study indicate that the law violates the Constitution. Paragraph 3, Article 12 (Personal Liberty, Personal Integrity) of the constitution stipulates that "Warrants issued by a judge through due process (upon the request of a prosecutor) have to be presented in case of arrest, detention, seizure, or search." However, prosecutors, the police, and National Intelligence Service have made numerous inquiries calling for the journalists' telephone records without warrants issued by a judge. So, this study suggests that the paragraph should be amended to be compatible with the Constitution. Meanwhile, journalists should make a more concerted effort to protect their news sources in exercising constitutionally protected freedom of the press.

  • PDF

A Secure AIS Protocol Suggestion with Analyses of the Standard AIS Protocol (표준 AIS 프로토콜 분석을 통한 보안 AIS 프로토콜 제안)

  • Lee, Jung-Su;Heo, Ouk;Kim, Jae-Hwan;Chung, Sung-Wook
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.1
    • /
    • pp.49-57
    • /
    • 2016
  • Recently, marine accidents such as the sinking accident Mongol freighter ship and the sinking accident of Sewol ferry in Jindo continuously happen. In order to decrease the number of these marine accidents, Korean ships are obliged to follow the AIS(Automatic Identification System) system. The AIS protocol includes all information for sailing ships. However, the standard AIS protocol does not provide any security function, In addition, it is possible to hijack the standard AIS protocol in case of using a satellite communication device called FUNcuve Dongle Pro+. Therefore, this paper analyzes weak points of the security in the standard AIS protocol. Furthermore, this paper ensures reliability by marking the MAC Address of sender and receiver for secure communication and suggests the protocol that can securely send data, using the VPN Tunnelling method. Therefore, the suggested AIS protocol provides the secure communication to the AIS protocol and protect the messages in the AIS protocol, which can serve safe voyages by decreasing the marine accidents.

Secure and Efficient Protocol for Vehicular Communication with Privacy Preservation (프라이버시를 보호하며 안전하고 효율적인 차량간 통신 프로토콜)

  • Kim, In-Hwan;Choi, Hyoung-Kee;Kim, Jung-Yoon
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.6
    • /
    • pp.420-430
    • /
    • 2010
  • Due to increasing demand for improving road safety and optimizing road traffic, Vehicular Ad-Hoc Networks (VANET) have been subject to extensive attentions from all aspects of commercial industry and academic community. Security and user privacy are fundamental issues for all possible promising applications in VANET. Most of the existing security proposals for secure VANET concentrate authentication with privacy preservation in vehicle-to-vehicle (V2V) and vehicle-to-roadside infrastructure (V2I) communications and require huge storage and network capacity for management of revocation list. Motivated by the fact, we propose a new scheme with security and privacy preservation which combines V2V and V2I communication. With our proposed scheme, the communication and computational delay for authentication and overhead for management of revocation list can be significantly reduced due to mutual authentication between a vehicle and a Roadside Unit (RSU) requires only two messages, and the RSU issues the anonymous certificate for the vehicle on behalf of the Trust Authority (TA). We demonstrate that the proposed protocol cannot only guarantee the requirements of security and privacy but can also provide efficiency of authentication and management of revocation list.

A terms learning strategy for improving learned capabilities of the subject, industry introduction (공업 입문 교과의 학습력 제고를 위한 용어 학습 전략)

  • Lee, Youngmin
    • 대한공업교육학회지
    • /
    • v.31 no.2
    • /
    • pp.41-63
    • /
    • 2006
  • The purpose of this study was to establish and apply 'term learning strategy' for learners whose basic skill, interest, and motivation for learning is lower, and to increase the learned capabilities of subjects' 'industry introduction', required for industrial technical high school students. Another purpose was to identify when the learning strategy established was applied, its affect on how well learners understood terms in a particular unit of material, and, after instruction presented in accordance with 'term learning strategy,' evaluate the ease with which subjects understood the teacher's explanation of the unit of subject, how well they understand the main concepts of the unit of subject, and to what extent the presentation interested and motivated the subjects. The researcher established 'term learning strategy' based on the principles of Garg's "Nine Steps for Events of Instruction." The study included 35 first grade participants purposely selected from 33 classes at 1155 students in K industrial technical highschool. Data was collected via tests and surveys. Results indicated that 'term learning strategy' facilitated thorough understanding of terms and concepts related to the unit of subject, as well as a better understanding of the teacher's explanation and increased interest and motivation in learning. In addition, the "term learning strategy" increased interaction among learners in the instruction setting. Finally, implications of this study and implementation recommendations for this instructional strategy were presented.

Analysis of Acceleration and Deceleration on High Performance Train for A Metropolitan Rapid Transit System (대피선 최소화를 고려한 광역·도시철도 급행화를 위한 고성능 열차 가감속도 분석)

  • KO, Kyeong Jun;KIM, Jung Tai;KIM, Moo Sun;JANG, Dong Uk;HONG, Jae Sung;RYU, Sang Hwan;JUNG, Jong Deok
    • Journal of Korean Society of Transportation
    • /
    • v.33 no.6
    • /
    • pp.564-574
    • /
    • 2015
  • As shown by the popularity of the rapid train in the Seoul Metro Line No. 9, the demand for the rapidization of the metro transit has been continuously increased. However, it needs tremendous cost to construct new additional infrastructures to the existing line for the rapidization. In order to overcome the problem, utilizing the existing infrastructures such as crossing tracks as railroad sidetracks can be considered to be a good method of reducing the cost. In this case, there is a way exploiting the existing train as an express train and the advanced train, which increases both acceleration and deceleration, as a local train, but achievable acceleration and deceleration have not been analyzed rigorously. In this paper, we analyze feasible ranges and optimal values of both acceleration and deceleration of the advanced train analytically when we consider the rapidization of the metro transit utilizing the existing infrastructures and verify the results in Seoul Metro Line No. 3. Simulation results show ranges and optimal values of achievable acceleration and deceleration exist when minimum gap between an express train and a local train is smaller than 40 seconds.

Mixed Mobile Education System using SIFT Algorithm (SIFT 알고리즘을 이용한 혼합형 모바일 교육 시스템)

  • Hong, Kwang-Jin;Jung, Kee-Chul;Han, Eun-Jung;Yang, Jong-Yeol
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.2
    • /
    • pp.69-79
    • /
    • 2008
  • Due to popularization of the wireless Internet and mobile devices the infrastructure of the ubiquitous environment, where users can get information whatever they want anytime and anywhere, is created. Therefore, a variety of fields including the education studies methods for efficiency of information transmission using on-line and off-line contents. In this paper, we propose the Mixed Mobile Education system(MME) that improves educational efficiency using on-line and off-line contents on mobile devices. Because it is hard to input new data and cannot use similar off-line contents in systems used additional tags, the proposed system does not use additional tags but recognizes of-line contents as we extract feature points in the input image using the mobile camera. We use the Scale Invariant Feature Transform(SIFT) algorithm to extract feature points which are not affected by noise, color distortion, size and rotation in the input image captured by the low resolution camera. And we use the client-server architecture for solving the limited storage size of the mobile devices and for easily registration and modification of data. Experimental results show that compared with previous work, the proposed system has some advantages and disadvantages and that the proposed system has good efficiency on various environments.

  • PDF

Tag Trajectory Generation Scheme for RFID Tag Tracing in Ubiquitous Computing (유비쿼터스 컴퓨팅에서 RFID 태그 추적을 위한 태그 궤적 생성 기법)

  • Kim, Jong-Wan;Oh, Duk-Shin;Kim, Kee-Cheon
    • The KIPS Transactions:PartD
    • /
    • v.16D no.1
    • /
    • pp.1-10
    • /
    • 2009
  • One of major purposes of a RFID system is to track moving objects using tags attached to the objects. Because a tagged object has both location and time information expressed as the location of the reader, we can index the trajectory of the object like existing spatiotemporal objects. More efficient tracking may be possible if a spatiotemporal trajectory can be formed of a tag, but there has not been much research on tag trajectory indexes. A characteristic that distinguishes tags from existing spatiotemporal objects is that a tag creates a separate trajectory in each reader by entering and then leaving the reader. As a result, there is a trajectory interruption interval between readers, in which the tag cannot be located, and this makes it difficult to track the tag. In addition, the point tags that only enter and don't leave readers do not create trajectories, so cannot be tracked. To solve this problem, we propose a tag trajectory index called TR-tree (tag trajectory R-tree in RFID system) that can track a tag by combining separate trajectories among readers into one trajectory. The results show that TR-tree, which overcomes the trajectory interruption superior performance than TPIR-tree and R-tree.

Studies of the possibility of external threats of the automotive ECU through simulation test environment (자동차용 ECU의 CAN 메시지를 통한 자동차 공격 방법 연구)

  • Lee, Hye-Ryun;Kim, Kyoung-Jin;Jung, Gi-Hyun;Choi, Kyung-Hee;Park, Seung-Kyu;Kwon, Do-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.39-49
    • /
    • 2013
  • In this paper, security mechanism of internal network(CAN) of vehicle is a very incomplete state and the possibility of external threats as a way to build a test environment that you can easily buy from the market by the vehicle's ECU(Electric Control Unit) to verify and obtain a CAN message. Then, by applying it to ECU of the real car to try to attack is proposed. A recent study, Anyone can see plain-text status of the CAN message in the vehicle. so that in order to verify the information is vulnerable to attack from outside, analyze the data in a vehicle has had a successful attack, but attack to reverse engineering in the stationary state and buying a car should attempt has disadvantages that spatial, financial, and time costs occurs. Found through the car's ECU CAN message is applied to a real car for Potential threats outside of the car to perform an experiment to verify and equipped with a wireless network environment, the experimental results, proposed method through in the car to make sure the attack is possible. As a result, reduce the costs incurred in previous studies and in the information absence state of the car, potential of vehicle's ECU attack looks.

Development and Effect of HTE-STEAM Program: Focused on Case Study Application for Free-Learning Semester (HTE-STEAM(융합인재교육) 프로그램 개발 및 효과 : 자유학기제 수업 활용 사례를 중심으로)

  • Kim, Yonggi;Kim, Hyoungbum;Cho, Kyu-Dohng;Han, Shin
    • Journal of the Korean Society of Earth Science Education
    • /
    • v.11 no.3
    • /
    • pp.224-236
    • /
    • 2018
  • The purpose of this study was to develop a reasoning-based HTE-STEAM program for the development of the cognitive capacity of middle school students and enhancement of their STEAM literacy, and to investigate the effectiveness of this study in the school setting. The subjects of this study were the students of two middle schools located in the central region of Korea. The students participated in the HTE-STEAM program during their free-learning semesters and 202 of them were selected by random sampling method. Main findings were as follows: First, pre- and post-HTE-STEAM program has shown a significant value in statistical verification (p<.05) and the level of logical thinking ability of the research participants improved after the class compared to before the class. Second, the paired samples t-test comparing the difference between the pre and post scores of the STEAM attitude test has shown a significant value in statistical verification (p<.05), and the HTE-STEAM program has turned out to have a positive effect on the STEAM literacy of the research participants. Third, in the HTE-STEAM satisfaction scale test, the mean value of the sub-construct stood at 3.27~4.12, showing a positive overall response. Therefore, the HTE-STEAM program under the topic of earth science of 'Disaster and Safety' developed at the final stage of this study has proven to have a positive influence on the research participants in terms of the development of cognitive capacity by reasoning and collaborative learning, an important quality of communication and consideration necessary for STEAM literacy.

Effect of text and image presenting method on Chinese college students' learning flow, learning satisfaction and learning outcome in video learning environment (중국대학생 동영상 학습에서 텍스트 제시방식과 이미지 제시방식이 학습몰입, 학습만족, 학업성취에 미치는 효과)

  • Zhang, Jing;Zhu, Hui-Qin;Kim, Bo-Kyeong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.1
    • /
    • pp.633-640
    • /
    • 2021
  • This study analyzes the effects of text and image presenting methods in video lectures on students' learning flow, learning satisfaction and learning outcomes. The text presenting methods include forming short sentences of 2 or 3 words or using key words, while image presenting methods include images featuring both detailed and related information as well as images containing only related information. 167 first year students from Xingtai University were selected as experimental participants. Groups of participants were randomly assigned to engage in four types of video. The research results are as follows. First, it was found that learning flow, learning satisfaction and learning outcomes of group presented with video forms of short sentences had higher statistical significance compared to the group experiencing the key word method. Second, learning flow, learning satisfaction and learning outcomes of group presented with video forms of only related information had higher statistical significance compared to the group experiencing the presenting method of both detailed and related information. That is, the mean values of dependent variables for groups of short form text and only related information were highest. In contrast, the mean values of dependent variables for groups of key words and both detailed and related information were the lowest.