• Title/Summary/Keyword: 취약성 요소

Search Result 644, Processing Time 0.024 seconds

Analysis of Global Success Factors of K-pop Music (K-pop 음악의 글로벌 성공 요인 분석)

  • Lee, Kate Seung-Yeon;Chang, Min-Ho
    • Journal of Korea Entertainment Industry Association
    • /
    • v.13 no.4
    • /
    • pp.1-15
    • /
    • 2019
  • Psy's Gangnam style in 2012 showed K-pop's potential for global growth and BTS proved it by reaching three consecutive Billboard No.1. The success in the global music market brings tremendous economical and cultural power. This study is conducted for the continuous growth of K-pop music in the global music market by analyzing the musical factor of K-pop's global success. The top 20 most-viewed K-pop MV on Youtube is chosen as a research subject because Youtube is a worldwide platform that reflects global popularity. For the process of K-pop music creation, the role of the composer is expanded and many overseas producers participate in music creation. All 20 songs are created by the collective creation system and there is a consecutive collaboration between the main producers and certain artists. The top 20 most viewed K-pop songs have the musical characteristics of transnational genre convergence, hook songs, sophisticated sounds, frequent use of English lyrics, a reflection of the latest global trends, rhythm optimized for dance and clear concept. It makes the K-pop song easily remembered and familiar to overseas listeners. K-pop's healthy and fresh theme brings emotional empathy and reflects Korean sentiments. K-pop's global success is not a coincidence, but a result of continuous efforts to advance overseas. Some critics criticize K-pop's musical style is similar and it shows K-pop's limitation but K-pop progressed its musical evolution. By keeping the merits of K-pop's success factors and complementing its weak points, K-pop will continue its popularity and increase influence in the global music market.

Behaviors of the High-profile Arch Soil-steel Structure During Construction (높은 아치형 지중강판 구조물의 시공 중 거동 분석)

  • 이종구;조성민;김경석;김명모
    • Journal of the Korean Geotechnical Society
    • /
    • v.19 no.6
    • /
    • pp.71-84
    • /
    • 2003
  • The metallic shell of soil-steel structures are so weak in bending moment that it should sustain the applied load by the interaction of the backfill soil around the structures. The shell can be subjected to excessive bending moment during side backfilling or under live-load when the soil cover is less than the minimum value. The current design code specifies the allowable deformation and Duncan(1979) and McGrath et al.(2001) suggested the strength analysis methods to limit the moments by the plastic capacity of the shell. However, the allowable deformation is an empirically determined value and the strength analysis methods are based on the results of FE analysis, hence the experimental verification is necessary. In this study, the full-scale tests were conducted on the high-profile arch to investigate its behaviors during backfilling and under static live-loads. Based on the measurements, the allowable deformation of the tested structure could be estimated to be 1.45% of rise, which is smaller than the specified allowable deformation. The comparison between the measurements and the results of two strength analyses indicate that Duncan underestimates the earth-load moment and overestimates the live-load moment, while McGrath et al. predicts both values close to the actual values. However, as the predicted factors of safeties using two methods coincide with the actual factor of safety, it can be concluded that both methods can predict the structural stability under live-loads adequately when the cover is less than the minimum.

A Performance Comparison of the Mobile Agent Model with the Client-Server Model under Security Conditions (보안 서비스를 고려한 이동 에이전트 모델과 클라이언트-서버 모델의 성능 비교)

  • Han, Seung-Wan;Jeong, Ki-Moon;Park, Seung-Bae;Lim, Hyeong-Seok
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.3
    • /
    • pp.286-298
    • /
    • 2002
  • The Remote Procedure Call(RPC) has been traditionally used for Inter Process Communication(IPC) among precesses in distributed computing environment. As distributed applications have been complicated more and more, the Mobile Agent paradigm for IPC is emerged. Because there are some paradigms for IPC, researches to evaluate and compare the performance of each paradigm are issued recently. But the performance models used in the previous research did not reflect real distributed computing environment correctly, because they did not consider the evacuation elements for providing security services. Since real distributed environment is open, it is very vulnerable to a variety of attacks. In order to execute applications securely in distributed computing environment, security services which protect applications and information against the attacks must be considered. In this paper, we evaluate and compare the performance of the Remote Procedure Call with that of the Mobile Agent in IPC paradigms. We examine security services to execute applications securely, and propose new performance models considering those services. We design performance models, which describe information retrieval system through N database services, using Petri Net. We compare the performance of two paradigms by assigning numerical values to parameters and measuring the execution time of two paradigms. In this paper, the comparison of two performance models with security services for secure communication shows the results that the execution time of the Remote Procedure Call performance model is sharply increased because of many communications with the high cryptography mechanism between hosts, and that the execution time of the Mobile Agent model is gradually increased because the Mobile Agent paradigm can reduce the quantity of the communications between hosts.

A Basic Study on the Evaluation Index of the Crime Prevention through Environmental Design of Wooden Cultural Buildings (목조 건축문화재의 범죄예방환경설계 평가지표에 대한 기초연구)

  • Kim, Choong-sik
    • Korean Journal of Heritage: History & Science
    • /
    • v.48 no.3
    • /
    • pp.4-29
    • /
    • 2015
  • To protect cultural heritages from damage and destruction, evaluating the crime prevention environments is considered extremely important. This study analyzed the crime patterns related to cultural heritages, classified the crime environments by their types, and deduced the elements of the CPTED(Crime Prevention Through Environment Design), aiming to present the indices for evaluating the crime prevention environments. The results of this study can be summarized as follows. First, the crimes related to cultural heritages that must be prevented were identified as the night time trespassing and arson. According to the results of the analysis of external environments based on crime actions, the crime prevention environments of cultural heritages were classified into 10 types. Second, the important evaluation principles of the cultural heritage CPTED were the access control, surveillance reinforcement and the surrounding environment. Third, the access control that cover the internal region, boundary, external region and surroundings were classified into 22 indices. The surveillance reinforcement covers natural, organized and mechanical surveillance with 21 indices. Fourth, the applicability of the CPTED evaluation index was presented according to the types of the cultural crime prevention environments. The results confirmed that the maximum 43 indices were applicable to the seowon(lecture hall), hyanggyo(Confucian school), and gwana(district government office), and the minimum 10 indices, to the ramparts. Finally, the 43 indices were applied to Donam Seowon to validate their applicability. The results confirmed that most of the indices were applicable with the partial supplements. The evaluation index presented in this study is likely to contribute to studies in the cultural heritage CPTED field and to the protection of cultural heritages. Furthermore, this study is considered significant because it unleashed continuous concerns on and developments of CPTED. However, as the field survey to validate the applicability of the indices was limited to only one type, it may require further objective verification such as through an expert's examination of the validity and applicability of the evaluation index. In addition, to accommodate the index in related policies and systems, more precise verifications of the indices by type are considered necessary.