• Title/Summary/Keyword: 사관(寺觀)

Search Result 499, Processing Time 0.03 seconds

A Study on the Development Direction of Education and Training System based on AR/VR Technology (가상현실 및 증강현실 기술을 기반 한 교육·훈련 체계 개발 방향 설정에 관한 연구)

  • Park, Myunghwan;Lee, Sangsoo;Jeon, Ki Seok;Seol, Hyeonju
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.22 no.4
    • /
    • pp.545-554
    • /
    • 2019
  • The purpose of this study is to develop a method of applying AR(Augmented Reality)/VR(Virtual Reality) to educational and training systems from a comprehensive perspective, rather than applying AR/VR technology to specific education and training systems. We suggested whether to apply AR or VR technology to education and training system, the level of application of technology when constructing using AR/VR technology, and the criteria of priority among many education and training systems. To do this, we presented the framework of application of AR/VR technology, the evaluation criteria for selecting priority of education and training system applying AR/VR, and the systematic procedure for utilization of developed method. This study is significant in that it has developed a method to determine the direction of systematic AR/VR technology application for all education and training systems operated by the military or organization. This is expected to contribute to the overall efficiency of the organization in terms of economical utilization of the limited budget as well as the various benefits of utilizing basic AR/VR technology.

SaaS Platform Structure Design for Authentication and Accounting based on Trusted Computing Technology (신뢰 컴퓨팅기술 기반 SaaS 인증 및 과금 플랫폼 구조 설계)

  • Lee, Sang Hwan;Kim, Jane Chungyoon;Jun, Sungik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.991-994
    • /
    • 2007
  • 최근 컴퓨터 기술의 발전과 네트워크의 개방화 그리고 무선 모바일 통신 기술의 비약적인 보급으로 인하여 컴퓨팅 환경을 이루고 있는 각종 장치(PC, 모바일 단말, 저장장치, 네트워크 기기 등)가 다양한 형태의 보안 위협에 노출되어 데이터의 유실, 조작, 유출되어 금전적인 피해를 입거나 프라이버시 침해를 받고 있다. 이러한 문제를 근본적으로 해소하기 위하여 설립된 TCG(Trusted Computing Group)는 세계적인 IT 핵심기업들을 중심으로 구성된 비영리 단체로서 PC 혹은 모바일 기기 등의 단말과 서버 장비 그리고 저장 장치 및 네트워크로 구성된 컴퓨팅 환경에서 보안성 향상 및 데이터의 신뢰성을 제고하기 위하여 TPM(Trusted Platform Module)이라는 반도체 칩을 신뢰의 기반(root of trust)으로 한 신뢰 플랫폼을 제안하고 있다. 한편 SaaS(Software as a Service)는 패키지 형태의 소프트웨어를 네트워크 서비스 형태로 바꾸어 사용량에 비례한 요금제로 과금하는 방식을 채택하고 사용자가 온디맨드로 요청한 서비스를 적시에 제공하는 기술로 최근 전세계적으로 각광을 받고 있다. 이때 다양한 컴퓨팅 환경 안의 사용자에게 높은 신뢰성과 보안성 그리고 연속성을 갖는 SaaS 서비스를 제공하고 데이터의 무결성 및 비밀유지와 정확한 서비스 사용시간을 기록하고 업로드하는 기능들을 제공하는 SaaS 플랫폼은 TPM기반의 신뢰컴퓨팅 기술을 통하여 쉽게 구현될 수 있다. 본 논문에서는 일시적으로 네트워크와 차단된 상태의 PC 혹은 모바일 단말에서도 위의 조건들을 만족하는 SaaS 서비스를 지원하는 신뢰 플랫폼이 가져야 할 기능들에 대하여 분석-도출한 후 그러한 기능들을 제공하는 컴포넌트로 구성된 신뢰형 SaaS 사용자 플랫폼을 설계하였다.

  • PDF

A DOM-Based Fuzzing Method for Analyzing Seogwang Document Processing System in North Korea (북한 서광문서처리체계 분석을 위한 Document Object Model(DOM) 기반 퍼징 기법)

  • Park, Chanju;Kang, Dongsu
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.5
    • /
    • pp.119-126
    • /
    • 2019
  • Typical software developed and used by North Korea is Red Star and internal application software. However, most of the existing research on the North Korean software is the software installation method and general execution screen analysis. One of the ways to identify software vulnerabilities is file fuzzing, which is a typical method for identifying security vulnerabilities. In this paper, we use file fuzzing to analyze the security vulnerability of the software used in North Korea's Seogwang Document Processing System. At this time, we propose the analysis of open document text (ODT) file produced by Seogwang Document Processing System, extraction of node based on Document Object Mode (DOM) to determine test target, and generation of mutation file through insertion and substitution, this increases the number of crash detections at the same testing time.

A Study on the Optimal Number of Air Tanker for Patrol Operations (초계작전을 위한 공중급유기 적정 대수 산정 연구)

  • Park, Sehoon;Chung, Ui-Chang;Chung, Je-Hoon
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.1
    • /
    • pp.57-65
    • /
    • 2019
  • Air refueling is expected to increase the efficiency of the air force operations. This follows from the introduction of air refueling aircraft, which should to increase operational time by increasing the range and duration of fighter jets. Despite the effectiveness of the air refueling air crafts, the astronomical costs of adapting the air tankers call for careful discussions on whether to acquire any air craft and if so, how many. However there is no academic study on the subject to our knowledge. Thus, we use the ABM(Agent Based Modeling) technique to calculate the optimal number of air tankers during patrol operation. We have enhanced the reliability of the simulation by entering the specifications of the current aircraft operated by the Korean Air Force. As an optimization tool for determining the optimal number of counts, we use OptQuest built into the simulation tools and show that the optimal number of air tanker is 4.

Person-centered Approach to Organizational Commitment: Analyses of Korean Employees' Commitment Profiles (조직몰입에 대한 사람중심 접근: 국내 직장인들의 조직몰입 프로파일 분석)

  • Oh, Hyun-Sung;Jung, Yongsuhk;Kim, Woo-Seok
    • Journal of the Korean Data Analysis Society
    • /
    • v.20 no.6
    • /
    • pp.3049-3067
    • /
    • 2018
  • Although there is a growing body of research on organizational commitment profiles based on a person-centered approach, it is not widely applied to the commitment research conducted by Korean organizational scholars yet. Therefore, in this paper, we introduced the concept and analytical methods, such as cluster analysis and latent profile analysis (LPA), of the person-centered approach. In addition, we also performed both cluster analysis and LPA to identify types of organizational commitment profiles of Korean employees based on the combination of affective, continuance and normative commitment on the sample from a range of different fields in South Korea (n = 349). Both analyses extracted two comparable sets of 6 commitment profiles. These six profiles were then contrasted with employee turnover intention. Finally, implications for commitment theory, practices and future research issues were discussed.

Analysis of Homomorphic Authenticated Encryption (Encrypt with Authenticate Construction) (결합 준동형 인증 암호의 안전성 분석)

  • Kim, Jinsu
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.33-44
    • /
    • 2021
  • Data outsourcing utilizing the Cloud faces a problem of the third-party exposure, modulation, and reliability for the provided computational delegation results. In order to solve those problematic security issues, homomorphic encryption(HE) which executes calculation and analysis on encrypted data becomes popular. By extension, a new type of HE with a authentication functionality, homomorphic authenticated encryption(HAE) is suggested. However, a research on the HAE is on the initial stage. Furthermore, based on a message authenticated scheme with HE, the method and analysis to design is still absent. This paper aims to analyze an HAE, with a generic combination of a message authenticated scheme and a HE, known as "Encrypt with Authentication". Following a series of analysis, we show that by adopting a unforgeable message authenticated scheme, the generically constructed HAE demonstrated an unforgeability as well. Though, a strong unforgeability is not the case. This paper concludes that although indistinguishable HE can be applied to design the HAE, a security issue on the possibility of indistinguishability is still not satisfied.

Obligated Involuntary Officer's Employment Support Plan Research After Discharge (군(軍) 단기복무장교의 전역 후 취업지원 방안 연구)

  • Kim, Ji Deok
    • Convergence Security Journal
    • /
    • v.18 no.5_2
    • /
    • pp.11-19
    • /
    • 2018
  • Because Korean military promotes employment support policy which give priority to the middle service officer who served more than 5 but less than 10 years and long term service officer who served more than 10 years, the support policy for obligated involuntary officer is relatively deficient. To make matters worse, national youth unemploy ment makes obligated involuntary officers suffer from serious unemployment crisis after discharge. These problems have bad effect on gaining ROTC KAOCS cadets who constitute about 80% of first appointment officers and because they are mostly discharged after just taking a short service, it's time to find a measure to solve the problem. Thus, this study is investigated to improve competitive rate of entry of ROTC KAOCS for securing outstanding manpower by deducing MR about legislation and system which are related to employment support for obligated involuntary officers and suggesting stable job secure plan for employment support, supplement system, and after discharge, model way of career management during military service of an obligated involuntary officers who are suitable for qualificated men who are needed for a company. Also, it will lead to combat power development of the military consequently.

  • PDF

A Study on the Impacts of the 1741 Tsunami Recorded in the Annals of Joseon Dynasty (조선왕조실록에 기록된 1741년 쓰나미 영향 연구)

  • Byun, Sang-Shin;Kim, Kyeong Ok
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.33 no.1
    • /
    • pp.30-37
    • /
    • 2021
  • The Annals of Joseon Dynasity record a significant damage of tsunami in the east coast of Gangwon Province on August 29, 1741. The tsunami occurred near Oshima-Oshima island off the southwestern coast of Hokkaido, Japan, and this study conducted simulations of a ray-tracing model to analyze the effects of the tsunami on the East coast of Korean Peninsula at that time. Model results were calculated using four different depth dataset (ETOPO2m, ETOPO1m, SKKU1m, and GEBCO15c), and results using the highest resolution GEBCO15c showed the best description of the damage recorded in the Annals of the Joseon Dynasty. Based on such, the travel time and paths of the tsunami that reached the main regions of Gangwon Province are presented in detail.

A Study on the Expansion and Revitalization Plan when Conceiving Civil and Military Sharing Facilities - Factor Analysis and Analytic Hierarchy Process - (민군 시설공용 확대 및 활성화 방안에 관한 연구 - 요인 분석과 AHP분석 기법으로 -)

  • Gong, Keum Rok;Park, Young Jun
    • Journal of the Architectural Institute of Korea Structure & Construction
    • /
    • v.34 no.5
    • /
    • pp.19-26
    • /
    • 2018
  • A civil-military facility sharing project is a part of mutual cooperative efforts, which enables the military to use any civilian (local government or company) or a civilian to use any military facility. Such facility sharing project may reduce or clear possible conflicts with the local residents in the surrounding area of a military facility while being available to save budgets for new construction or maintenance of a defense or military facility. Various measures have been proposed for institutional resolutions on conflicts with the local residents in the surrounding area of a military facility. This study collects and organizes previous cases of the civilian-military facility sharing projects, and analyzes the characteristics of such cases based on the project types. In addition, by organizing and proposing the project characteristics, plans (ideas) and determination criteria to expand and vitalize are presented regarding the project types having restrictions. AHP technique is employed to research on the matrix for the project feasibility determination. Also, the opinions organized through the cause analysis are categorized and presented as a project for the expansion and vitalization of future project. According to the rearch result, Type I, II and III are determined to be projects that can be implemented without difficulties. Type IV, on the other hands, is determined as not illegal, yet inadequate so that some legal and institutional complements are required to expand and vitaliza this facility sharing project.

A divide-oversampling and conquer algorithm based support vector machine for massive and highly imbalanced data (불균형의 대용량 범주형 자료에 대한 분할-과대추출 정복 서포트 벡터 머신)

  • Bang, Sungwan;Kim, Jaeoh
    • The Korean Journal of Applied Statistics
    • /
    • v.35 no.2
    • /
    • pp.177-188
    • /
    • 2022
  • The support vector machine (SVM) has been successfully applied to various classification areas with a high level of classification accuracy. However, it is infeasible to use the SVM in analyzing massive data because of its significant computational problems. When analyzing imbalanced data with different class sizes, furthermore, the classification accuracy of SVM in minority class may drop significantly because its classifier could be biased toward the majority class. To overcome such a problem, we propose the DOC-SVM method, which uses divide-oversampling and conquers techniques. The proposed DOC-SVM divides the majority class into a few subsets and applies an oversampling technique to the minority class in order to produce the balanced subsets. And then the DOC-SVM obtains the final classifier by aggregating all SVM classifiers obtained from the balanced subsets. Simulation studies are presented to demonstrate the satisfactory performance of the proposed method.