• Title/Summary/Keyword: 실생활

Search Result 1,098, Processing Time 0.028 seconds

Role Based Access Control Mechanism Using Role Attributes (역할 속성을 이용한 역할기반 접근통제 매커니즘)

  • 이철원
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.8 no.4
    • /
    • pp.83-94
    • /
    • 1998
  • 약할기반 접근통제는 현재 가장 많이 사용외는 임의적 겁근통제 및 강제적 접근통제에 비하여 유연성을 제공하며 접근통제 기법이 정교하다. 따라서, 역할기반 접근통제는 금융 및 기업 등과 같은 상업적 분야 및 행정적인 분야에서 많이 사용될 것으로 예측된다. 본 논문에서는 기존에 제안된 역할기반 접건통제 메커니즘에 역할의 속성을 정의하여 새로운 형태의 역할기반 접근통제 메커니즘을 제안하였다. 제안된 역할기반 메커니즘은 기존의 역할기반 메커니즘이 실생활에 잘 적용되지 않는 단점을 극복하였으며, 특히 살라미 공격, 내부자의 부정행위 방지에 효과적으로 적용 가능하다. 또한 역할을 부여받는 사용자의 역할 중복 방지를 위하여 차이 연산자를 정의하였다.

Design and Implementation of Augmented Reality User Interface using Cricket Sensor (크리켓(Cricket) 센서를 이용한 증강현실 기반의 사용자 인터페이스)

  • Hur, Kyung-Woo;Kim, Byung-Ki;Ko, Young-Woong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.901-904
    • /
    • 2009
  • 센서 네트워크의 발달과 보급으로 유비쿼터스 센서 네트워크(USN: Ubiquitous Sensor Network)를 이용해 실생활에서 다양하게 활용되고 있다. 이런 방법 중 하나로 본 논 문에서는 크리켓 센서를 통하여 사용자가 직접 컴퓨터와 상호작용 할 수 있는 새로운 시스템을 개발하였고 그 결과를 기술하였다. 이 시스템 구축 과정을 통해 증강현실이 요구하는 인간 친화적이고 직관적인 인터페이스를 제시하였다.

A Study of Traditional Oriental Medicine Chart using WPF Technology (WPF 기술을 활용한 한방차트에 관한 연구)

  • Park, Su Hyun;Lee, Il kwan;Yun, Kyung Suk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.323-324
    • /
    • 2009
  • .Net Framework 3.0 부터는 WPF 기술을 활용하여 시각효과 극대화하는 응용프로그램 개발이 가능해졌다. 하지만 신기술에 대한 불안감과 확장성에 대한 불신 등으로 실생활에 활용하기 위한 프로젝트로 개발하는 팀이 거의 없다시피 하는 현실이다. 본 논문에서는 WPF를 기반으로 개발된 한방차트를 실제 업무에 적용하여 보고 장단점을 살펴보았다.

A Study on U-Health S/W security estimation model (u-Health S/W의 보안성 품질평가모델 연구)

  • Kang, Bae-Keun;Lee, Ha-Yong;Yang, Hae-Sool
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.1329-1330
    • /
    • 2011
  • u-Health 서비스의 시작으로 병원에서 단발성 치료에 국한되었던 기존 서비스가 이제는 가정 등 실생활 전 영역에서 평생에 걸쳐 제공되어 시 공간적으로 확대되었다. 본 연구에서는 ISO/IEC 9126과 ISO/IEC 12119를 기반으로 하여 보안성 평가모델을 제시하고 평가 과정에서 활용할 수 있는 품질검사표를 개발하였다.

A Study on the Development of AI Presentation Automation Service Base on AWS (AWS 기반 AI 프레젠테이션 자동화 서비스 개발에 관한 연구)

  • Taein Kang;Juyeon Kim;Gayeon Park
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.943-944
    • /
    • 2023
  • 본 프로젝트는 AWS 에서 제공되는 AI/ML 플랫폼과 LLM 모델을 기반으로 문서 및 텍스트와 ppt 를 자동 변환하는 서비스로, 실생활 및 업무에서 활용이 가능하며 별도 사용자 조작 없이 사용가능한 발표자료 및 대본 제작 도구를 통해 일의 효율성을 향상시키고자 한다.

A Study on Meaning in Solving of Mathematical Modeling Problem (수학적 모델링문제 해결에서의 의미에 관한 연구)

  • Kim, Chang Su
    • Journal of the Korean School Mathematics Society
    • /
    • v.16 no.3
    • /
    • pp.561-582
    • /
    • 2013
  • Meanwhile, the meaning has been emphasized in mathematics. But the meaning of meaning had not been clearly defined and the meaning classification had not been reported. In this respect, the meaning was classified as expressive and cognitive. Furthermore, it was reclassified as mathematical situation and real situation. Based on this classification, we investigated how student recognizes the meaning when solving mathematical modeling problem. As a result, we found that the understanding of cognitive meaning in real situation is more difficult than that of the other meaning. And we knew that understanding the meaning in solving of equation, has more difficulty than in expression of equation. Thus, to help students understanding the meaning in the whole process of mathematical modeling, we have to connect real situation with mathematical situation. And this teaching method through unit and measurement, will be an alternative method for connecting real situation and mathematical situation.

  • PDF

A Comparative Analysis of the Middle School Mathematics Curriculum in Korea and Australian (우리나라와 호주 중학교 수학과 교육과정 비교 분석)

  • Ko, Ho Kyoung;Chang, Kyung-Yoon;Lee, Gang Cheon
    • Journal of Educational Research in Mathematics
    • /
    • v.26 no.2
    • /
    • pp.309-331
    • /
    • 2016
  • Australian Curriculum Assessment and Reporting Authority(ACARA) was founded by Australian federal government in 2009. Leading under ACARA, national education curriculum development was propelled. Also from 2014 they gradually extended enforcement of new curriculum by a Reminder about new syllabus implementation (2013.01.29.). The research result of Australia's curriculum, and textbook shows that students repeat, and advance the same contents under spiral curriculum as they move to higher grade. They actively use digital technology, and also puts emphasis on practical context such as Money & financial mathematics. On the level of difficulty, or quantity aspect, Korea handles relatively advanced contents of 'number and operation' or 'Letters and Algebraic Expressions' domain than Australia. However on statistics domain, Australia not only puts more focus on practical stats than Korea, but also concerns as much on both various and qualitative terms Australia doesn't deal with formal concept of 'function'. However, they learn the wide concept of function by handling various graphs. This shows Australia has a point of similarity, and also difference to Korea on various angles.

An Anonymity-Preserving User Authentication and Authorization Model for Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경을 위한 익명성을 보장하는 사용자 인증 및 접근제어 모델)

  • Kang Myung-Hee;Ryou Hwang-Bin
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.4 s.304
    • /
    • pp.25-32
    • /
    • 2005
  • The spread of mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical spaces into 'Smart space' augmented with intelligence and enhanced with services. However, the deployment of this computing paradigm in real-life is disturbed by poor security, particularly, the lack of proper authentication and authorization techniques. Also, it is very important not only to find security measures but also to preserve user privacy in ubiquitous computing environments. In this Paper, we propose efficient user authentication and authorization model with anonymity for the privacy-preserving for ubiquitous computing environments. Our model is suitable for distributed environments with the computational constrained devices by using MAC-based anonymous certificate and security association token instead of using Public key encryption technique. And our Proposed Protocol is better than Kerberos system in sense of cryptographic computation processing.

A Study on The Effect Financial Performance of Convergence Factors on Corporate (기업의 융합요인이 재무적 성과에 미치는 영향)

  • Choi, Seung-Il;Song, Seong-Bin
    • Journal of Digital Convergence
    • /
    • v.13 no.8
    • /
    • pp.123-131
    • /
    • 2015
  • Modern is the era of convergence. In the complex position of the company to survive in the rapid environmental changes it can not be a mandatory fusion rather than choice. Wind convergence also in the art can be said to castration. This phenomenon can be found in many real life. Most real-life contact with the service sector is no exception. Due to a number of banks and insurance combined Banca named fusion of French banking and insurance business are integrated. Even recently, the situation has been provided by Investment consulting, equity trading services within bank branches. In this study, based on the need for convergence of corporate businesses convergence factors examined through regression analysis on whether any impact on the financial aptitude. External environmental factors that make up the fusion research factors internal environmental factors, both core competencies were factors to affect financial performance.

An Analysis on Teaching Quadrilaterals in Elementary School Mathematics Textbooks (초등학교 수학 교과서에 나타난 사각형 지도 방법에 대한 분석)

  • Kim, Hyun-Jeong;Kang, Wan
    • Education of Primary School Mathematics
    • /
    • v.11 no.2
    • /
    • pp.141-159
    • /
    • 2008
  • The purpose of this study id to delve into how elementary mathematics textbook deal with the quadrilaterals from a view of Didactic Transposition Theory. Concerning the instruction period and order, we have concluded the following: First, the instruction period and order of quadrilaterals were systemized when the system of Euclidian geometry was introduced, and have been modified a little bit since then, considering the psychological condition of students. Concerning the definition and presentation methods of quadrangles, we have concluded the following: First, starting from a mere introduction of shape, the definition have gradually formed academic system, as the requirements and systemicity were taken into consideration. Second, when presenting and introducing the definition, quadrilaterals were connected to real life. Concerning the contents and methods of instruction, we have concluded the following: First, the subject of learning has changed from textbook and teachers to students. Second, when presenting and introducing the definition, quadrilaterals were connected to real life. Third, when instructing the characteristics and inclusive relation, students could build up their knowledge by themselves, by questions and concrete operational activities. Fourth, constructions were aimed at understanding of the definition and characteristics of the figures, rather than at itself.

  • PDF