• Title/Summary/Keyword: 중요정보

Search Result 21,605, Processing Time 0.05 seconds

국가 안보와 방위산업 육성

  • Kim, Hyung-Seon
    • Defense and Technology
    • /
    • no.1 s.227
    • /
    • pp.48-59
    • /
    • 1998
  • 한반도 안보상황이 어떠한 상태가 되던간에 가장 중요한 것은 우리의 안보역량 확보 여부에 달려있다. 우리의 생존을 지키고 국가위상에 걸맞는 군사력의 유지는 필수적인 것이다. 과학기술과 첨단 무기체계가 주도할 미래의 정보전쟁에 대비하기 위해서는 군사기술의 자립이 매우 중요한 과제이다.

  • PDF

생활습관병 예방 프로젝트 2 바로알기 - 물 어떻게 마시는 게 좋을까?

  • Kim, Seung-Dong
    • 건강소식
    • /
    • v.37 no.7
    • /
    • pp.8-11
    • /
    • 2013
  • 바르게 아는 것이 중요하다 말한다. 당연히 우리가 무심코 마셔왔던 '물'에 관해서도 올바른 정보를 아는 것이 중요하다. 세 살 버릇이 여든까지 간다는 말이 있다. 물 마시는 일에도 바른 습관을 들이는 것이 좋다. 물 바르게 마시고 건강한 삶을 실천해보자.

  • PDF

케이블의 방재대책

  • 유상봉
    • Electric Engineers Magazine
    • /
    • v.182 no.10
    • /
    • pp.31-38
    • /
    • 1997
  • 최근 전선 및 케이블은 전력, 정보의 전달 경로로서 그 중요도를 더해가고 있으며 만일 이러한 케이블이 어떠한 원인으로 착화, 연소하는 경우 절연재, 피복재는 발열량이 많을 뿐 아니라 진한 연기와 유독 가스가 발생하고 피난, 유도, 소화할동 등이 곤란해지며 많은 인명이나 중요한 기기에 큰 손해를 초래하게 된다.

  • PDF

An Exploratory Study on the Importance and Performance Analysis of Health Message Design Principles (건강증진 메시지 디자인 원리의 중요도와 실행도에 관한 탐색적 연구)

  • Choi, Hyoseon;Cho, Young Hoan;You, Myoung Soon
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.6
    • /
    • pp.307-318
    • /
    • 2014
  • This study investigated how people perceived the importance of health message design principles including gist presentation, usefulness of content, format, and intuitive design and how well a webzine article published by Korean Ministry of Food and Drug Safety was designed in terms of the four design principles. This study also explored what individual characteristics influenced the perceptions of health message design principles. A total of 294 adults participated in the survey, and their responses were analyzed with the Importance-Performance Analysis method. Participants perceived that usefulness of content was most important in the text design; gist presentation was most important in the visual design; and format was well designed in both text and visual messages. This study showed that it is crucial to improve the quality of visual health messages particularly in terms of gist presentation and intuitive design. We also found that individuals' interest in health played a significant role in the perceptions of health messages. These results were discussed in regards to principles and strategies for the effective design of health messages.

Weighting of XML Tag using User's Query (사용자 질의를 이용한 XML 태그의 가중치 결정)

  • Woo Seon-Mi;Yoo Chun-Sik;Kim Yong-Sung
    • The KIPS Transactions:PartD
    • /
    • v.12D no.3 s.99
    • /
    • pp.439-446
    • /
    • 2005
  • XML is the standard that can manage systematically WWW documents and increase retrieval efficiency. Because XML documents have the information of contents and that of structure in single document, users can get more suitable retrieval result by retrieving the information of content as well as that of logical structure. In this paper, we will propose a method to calculate the weights of XML tags so that the information of XML tag is used to index decision. A proposed method creates term vector and weight vector for XML tags, and calculates weight of tag by reflecting user's retrieval behavior (user's query). And it decides the weights of index terms of XML document by reflecting the weights of tags. And we will perform an evaluation of proposed method by comparison with existing researches using weights of paragraphs.

A Design Secure QR-Login User Authentication Protocol and Assurance Methods for the Safety of Critical Data Using Smart Device (스마트 기기를 이용한 안전한 QR-Login 사용자 인증 프로토콜의 설계 및 중요 정보의 안전성 보증을 위한 방법)

  • Lee, Jae-Sik;You, Han-Na;Cho, Chang-Hyun;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.10
    • /
    • pp.949-964
    • /
    • 2012
  • Our PC have been under constant threat of malicious codes and viruses today. As many new ways of cyber attacks are being developed, such as zero-day-attack, nobody's PC is guaranteed to be safe from the attacks. In case where a user uses the existing verification protocol on a unsecured PC, the user's verification information may well be threatened by sniffing or man-in-the-middle attack. Especially, deadly attacks like memory hacking would give hard time for users to even recognize any symptom of virus infection. Therefore, this paper designs secured QR-Login user verification protocol for smart devices that are ready to communicate with QR-Code and proposes a way to keep critical data safe when using the internet. This way, user would be able to safeguard his/her critical data even when under attack by unknown attacks and safely carry out extremely sensitive task, like financial trading, on the device.

How to Protect Critical Nodes of Megacities in Preparation for the Digitization of Spatial Information (공간정보 디지털화에 대비한 메가시티 핵심노드 방호 대책)

  • Sim, Jun Hak;Cho, Sang Keun;Park, Sung Jun;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.4
    • /
    • pp.121-125
    • /
    • 2022
  • As the technologies of the 4th industrial revolution develops, spatial information is becoming digitized. Now, even with a smartphone, we can easily identify the location of national & military critical facilities located in the mega cities. As a result, mega cities' national & military critical facilities were exposed to not only traditional threats, but also non-traditional threats such as terrorism, cyber hacking, and criminal activities. This study suggests a way to protect national & military critical facilities of mega cities from such threats. Considering limitation of time & resources, protecting perfectly all national & military critical facilities is impossible, so we should focus on their critical nodes. Specifically, We suggest ways to protect the critical nodes by converging some measures such as design & arrangement in harmony with the surrounding environment, underground construction & covering, and visual deception. Transparency of digital spatial information will further increase with the advent of urban air mobility and autonomous vehicles in the future. Therefore, in order to prepare for future threats, we should take measures to minimize the exposure of critical nodes.

A Study on the Security Management for Critical Key Infrastructure(SCADA) (중요핵심기반시설(SCADA)에 대한 보안 관리 연구)

  • Kim InJung;Chung YoonJung;Koh JaeYoung;Won Dongho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.8C
    • /
    • pp.838-848
    • /
    • 2005
  • Most of the national critical key infrastructure, such as power, piped gas and water supply facilities, or the high-speed railroad, is run on the SCADA system. Recently, concerns have been raised about the possibility of these facilities being attacked by cyber terrorists, hacking, or viruses. Thus, it is time to adopt the relevant security management techniques. This paper attempts to propose such security management techniques, including information protection measures and troubleshooting, based on a risk analysis process concerning assets, threats/vulnerability, and hazards, and to examine the security management status of critical key infrastructure in the U.S. and Japan.

A Framework for Evaluating Ubiquitous Services using Fuzzy AHP (Fuzzy AHP를 이용한 유비쿼터스 서비스 평가 프레임워크)

  • Kim, Su-Yeon;Hwang, Hyun-Seok
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.5
    • /
    • pp.158-167
    • /
    • 2008
  • In recent years, various information technologies including ubiquitous computing technology have been developed and deployed. The more ubiquitous services based on ubiquitous technology have widely been spread, the more evaluation methods of those services are required. In this study, we suggest a framework for evaluating ubiquitous services by identifying evaluation factors and their relative importances. Combining review of related works and experts' opinions on the evaluation, we calculate the factors affecting ubiquitous service evaluation and relative importances among those factors using fuzzy Analytical Hierarchy Process (AHP). We conduct a case study to illustrate the applicability and feasibility of the suggested framework.

  • PDF

Differentiated Packet Transmission Methods for Underwater Sensor Communication Using SON Technique (SON (Self Organizing Network) 기술을 이용한 해양 수중 센서 간 통신에 있어서 데이터 중요도에 따른 패킷 차별화 전송 기법)

  • Park, Kyung-Min;Kim, Young-Yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.4B
    • /
    • pp.399-404
    • /
    • 2011
  • For the underwater wireless sensor networks, we propose the packet transmission method which distinguishes more important packet than others. Because the ocean underwater transmission environments are extremely unstable, we use SON(Self Organizing Network) techniques to adapt to the constantly varying underwater acoustic communication channels and randomly deployed sensor nodes. Especially we suppose two kinds of packets which have different priorities, and through the simulations we show that high priority packets arrive at the source node faster than lower priority packets with a proposed scheme.