• Title/Summary/Keyword: 문형 정보

Search Result 179, Processing Time 0.023 seconds

A Study on Trend Analysis in Convergence Research Applying Word Cloud in Korea (워드 클라우드 기법을 이용한 국내 융복합 학술연구 트렌드 분석)

  • Kim, Joon-Hwan;Mun, Hyung-Jin;Lee, Hang
    • Journal of Digital Convergence
    • /
    • v.19 no.2
    • /
    • pp.33-38
    • /
    • 2021
  • The convergence trend is the core of the 4th industrial revolution, and due to such expectations and possibilities, various countermeasures are being sought in diverse fields. This study conducted a quantitative analysis to identify the trend of convergence research over the past 10 years. Specifically, major research keywords were extracted, word cloud techniques were applied, and visualized to identify trends in academic research on convergence. To this end, research papers from 2012 to 2020 published in journal of digital convergence were investigated. The analysis period was divided into two periods: the former 4 years(2012-2015) and the latter 4 years(2016-2019) to confirm the difference in research trends. In addition, the research papers of 2020 were analyzed in order to more clearly understand the changes in the research trend of the last year due to the COVID-19. The results of this study are significant in that they can be used as useful basic data for future research and to understand research trends as keywords in the field of convergence.

Spatio-Temporal Summer Rainfall Pattern in 2020 from a Rainfall Frequency Perspective (2020년 여름철 강우의 시공간적 특성 분석: 빈도해석을 중심으로)

  • Kim, Yong-Tak;Park, Moonhyung;Kwon, Hyun-Han
    • Journal of Korean Society of Disaster and Security
    • /
    • v.13 no.4
    • /
    • pp.93-104
    • /
    • 2020
  • Climate change has emerged as a social issue, and efforts have been made to overcome it in various ways. However, climate change due to global warming is likely to accelerate further than we expected, and the associated damage is also likely to increase. This tendency is expected to continue in the future, leading to difficulties for the existing water resource management system based on historical data. The precipitation in 2020 caused property damage and loss of life due to the extreme rainfall exceeding the design rainfall with the very unusual prolonged rainy days. With this 2020 flood, we should no longer be passive in managing flood risk due to uncertainties in climate change.

Study For Silver Generation System Furniture (고령세대의 시스템가구 방향성 고찰에 관한 연구)

  • Moon, Hyungjoon;Kim, Sung Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.3
    • /
    • pp.114-120
    • /
    • 2021
  • Furniture is an essential element in the area of human residence, and the necessity of system furniture suitable for the pursuit of unity in design, which clearly distinguishes the various and flexible arrangements and characteristics of space, is gradually expanding. The elderly population in Korea currently exceeds 15%, and is expected to be close to 40% by 2050. An increasing number of elderly generations are showing different behavioral patterns, such as sharing information, health care, and seeking independence from children. In order to maintain an independent daily life, a stable living environment has become essential, but as a result of a study that safety accidents caused by households increase due to a decrease in cognitive ability and physical ability, the need for a suitable household has increased. Therefore, the biological changes and characteristics of the elderly were investigated, and the concept definition, scope and limitations of system households were studied. In addition, by grasping the changes in the home appliance market and trends in the home appliance market, the design direction of system furniture required by the elderly was presented.

1.5-factor Authentication Method using Secure Keypads and Biometric Authentication in the Fintech (핀테크 환경에서 보안 키패드와 생체인증을 이용한 1.5-factor 인증 기법)

  • Mun, Hyung-Jin
    • Journal of Industrial Convergence
    • /
    • v.20 no.11
    • /
    • pp.191-196
    • /
    • 2022
  • In the fintech field, financial transactions with smart phones are actively conducted. User authentication technology is essential for safe financial transactions. PIN authentication through the existing security keypads is convenient to input but has weaknesses in security and others. The biometric authentication technique is secure, but there is a possibility of false positive and false negative authentication. To compensate for this, two-factor authentication is used. In this paper, we propose the 1.5-factor authentication that can increase convenience and security through PIN input with biometric authentication. It provides the stability of fingerprint authentication and convenience of two or three PIN inputs, and this makes safe financial transaction possible. Since biometric authentication is performed at the same time when entering PIN, while security is required by applying fingerprint authentication to the area touched while entering PIN. The User authentication is performed while ensuring convenience to input through additional PIN input in situations where high safety is required, and Safe financial transactions are possible.

Design of an Enhanced Group Keypad to Prevent Shoulder-Surfing Attacks and Enable User Convenience (어깨 너머 공격을 차단하고 사용 편의성이 가능한 개선된 그룹 키패드 설계)

  • Hyung-Jin Mun
    • Journal of Practical Engineering Education
    • /
    • v.15 no.3
    • /
    • pp.641-647
    • /
    • 2023
  • In the fintech environment, ensuring secure financial transactions with smartphones requires authenticating the device owner. Smartphone authentication techniques encompass a variety of approaches, such as passwords, biometrics, SMS authentication, and more. Among these, password-based authentication is commonly used and highly convenient for user authentication. Although it is a simple authentication mechanism, it is susceptible to eavesdropping and keylogging attacks, alongside other threats. Security keypads have been proposed to address vulnerabilities in password input on smartphones. One such innovation is a group keypad, resistant to attacks that guess characters based on touch location. However, improvements are needed for user convenience. In this study, we aim to propose a method that enhances convenience while being resistant to eavesdropping and recording attacks on the existing group keypad. The proposed method uses new signs to allow users to verify instead of the last character confirmation easily and employs dragging-to-touch for blocking recording attacks. We suggest diverse positioning methods tailored for domestic users, improving efficiency and security in password input compared to existing methods.

A Real-Time and Statistical Visualization Methodology of Cyber Threats Based on IP Addresses (IP 주소 기반 사이버공격 실시간 및 통계적 가시화 방법)

  • Moon, Hyeongwoo;Kwon, Taewoong;Lee, Jun;Ryou, Jaecheol;Song, Jungsuk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.465-479
    • /
    • 2020
  • Regardless of the domestic and foreign governments/companies, SOC (Security Operation Center) has operated 24 hours a day for the entire year to ensure the security for their IT infrastructures. However, almost all SOCs have a critical limitation by nature, caused from heavily depending on the manual analysis of human agents with the text-based monitoring architecture. Even though, in order to overcome the drawback, technologies for a comprehensive visualization against complex cyber threats have been studying, most of them are inappropriate for the security monitoring in large-scale networks. In this paper, to solve the problem, we propose a novel visual approach for intuitive threats monitoring b detecting suspicious IP address, which is an ultimate challenge in cyber security monitoring. The approach particularly makes it possible to detect, trace and analysis of suspicious IPs statistically in real-time manner. As a result, the system implemented by the proposed method is suitably applied and utilized to the real-would environment. Moreover, the usability of the approach is verified by successful detecting and analyzing various attack IPs.

Analyzing Changes in Consumers' Interest Areas Related to Skin under the Pandemic: Focusing on Structural Topic Modeling (팬데믹에 따른 소비자의 피부 관련 관심 영역 변화 분석: 구조적 토픽모델링을 중심으로)

  • Nakyung Kim;Jiwon Park;HyungBin Moon
    • Knowledge Management Research
    • /
    • v.25 no.1
    • /
    • pp.173-192
    • /
    • 2024
  • This study aims to understand the changes in the beauty industry due to the pandemic from the consumer's perspective based on consumers' opinions about their skin online before and after the pandemic. Furthermore, this study tries to derive strategies for companies and governments to support sustainable growth and innovation in the beauty industry. To this end, posts on social media from 2017 to 2022 that contained the keyword 'skin concerns' are collected, and after data preprocessing, 96,908 posts are used for the structural topic model. To examine whether consumers' interest areas related to skin change according to the pandemic situation, the analysis period is divided into 7 periods, and the variables that distinguish each stage are used as meta-variables for the structural topic model. As a result, it is found that consumers' interests can be divided into 22 topics, which can be categorized into four main categories: beauty manufacturing, beauty services, skin concerns, and other. The results of this study are expected to be utilized in construction of product development and marketing strategies of related companies and the establishment of economic support policies by the government in response to changes in demand in the beauty industry due to the pandemic.

The Effect of Technical Characteristics of Smart Farm on Acceptance Intention by Mediating Effect of Effort Expectation (스마트팜의 기술적 특성이 노력기대를 매개로 수용의도에 미치는 영향)

  • Ahn, Mun Hyoung;Heo, Chul-Moo
    • Journal of Digital Convergence
    • /
    • v.17 no.6
    • /
    • pp.145-157
    • /
    • 2019
  • This study is to look at the influential factors associated with the acceptance intention of smart farm and suggest a proposal for spreading adoption of smart farms. The research questionnaire distributed to the farmers were used for the research analysis by statistical program SPSS v22.0 and Process macro v3.0. The technical characteristics of smart farm, which are availability, reliability and economic efficiency were selected as independent variables to analyze the influential factors on acceptance intention of smart farm and the mediating effect of effort expectation was observed. As a result, availability and economic efficiency have a positive(+) influence on acceptance intention and reliability have no influence on acceptance intention. And availability, reliability and economic efficiency have a positive(+) influence on effort expectation. Effort expectation mediates the relationship between the technical characteristics of smart farm and acceptance intention. The results of the study are expected to be utilized at the seeking direction of policy for potential adopters of smart farm, the training and consulting in actual field of smart farm.

Acute Adverse Reactions to Gadolinium-based Intravenous Contrast Agents for MRI : Retrospective Analysis Using Computed Reporting System (자기공명영상검사용 가돌리늄 경정맥 조영제의 급성 부작용: 부작용 전산 체계를 이용한 후향적 분석)

  • Choi, Moon-Hyung;Choi, Joon-Il;Jung, Seung-Eun;Ahn, Kook-Jin;Lee, Hae-Giu
    • Investigative Magnetic Resonance Imaging
    • /
    • v.15 no.2
    • /
    • pp.139-145
    • /
    • 2011
  • Purpose : To assess the frequency and severity of acute adverse reactions to intravenous administration of gadolinium-based contrast agents using computerized reporting system at a single large academic institution. Materials and Methods : We assessed data from electronic hospital information system from October 2008 to December 2010. Reactions were classified as mild, moderate, or severe. We compared the frequency of adverse reactions among three contrast agents (Gd-BT-DO3A, Gd-DTPA and Gd-EOB-DTPA). Results : The total number of administrated contrast agents was 33,600, and the number of administration of Gd-BT-DO3A, Gd-DTPA and Gd-EOB-DTPA were 20,824 (62%), 10,417 (31%) and 2,359 (7%), respectively. Total 39 adverse reactions were reported accounting for 0.1161% of all administrations. The incidences of adverse reactions were 0.1248% (26/39, 67%) for Gd-BT-DO3A, 0.0768% (8/39, 21%) for Gd-DTPA, and 0.2120% (5/39, 13%) for Gd-EOB-DTPA. The difference of frequencies of adverse reaction among three contrast agents was not significant. Most cases of the adverse effect were mild (35/39, 89.7%). Moderate and severe adverse reactions were encountered in two patients, respectively. Conclusion : Among Koreans, adverse effects were rare, and especially, moderate to severe adverse reactions were much rarer. There was no difference among the frequencies of adverse reactions caused by three different contrast agents.

A Threat Assessment Algorithm for Multiple Ground Targets (다수의 대지표적을 위한 위협 평가 알고리즘)

  • Yoon, Moonhyung;Park, Junho;Yi, JeongHoon
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.7
    • /
    • pp.590-599
    • /
    • 2018
  • As a basic information to implement the fire plan that dominates multiple targets effectively under the battle environment with limited resources, such a process is mandatory that gives a priority order to a target with the high level of threat by quantitatively computing the threat level of an individual target through the analysis on the target. However, the study has still remained in the initial level on an evaluation algorithm for the threat level of the ground target. Considering this fact, the present paper proposes the evaluation algorithm for the threat by multiple ground targets. The proposed algorithm has a core point to consider the type of target and protected asset to implement the computation of proximity; set the additional value based on the weights indicating the significance of weapon and protected asset; and compute the threat level of a target that considers the characteristics of the target. The evaluation and verification of performances have been implemented through the simulation and visualization of an algorithm proposed in the present paper. From the performance result, as the proposed algorithm has been able to perform effectively the threat assessment according to the weights indicating the significance of weapons and protected assets under diverse environments where weapons and protected assets are located, high utility and effect are expected when applied to an actual ground weapon system.