• Title/Summary/Keyword: 컴퓨터 바이러스

Search Result 242, Processing Time 0.03 seconds

Design and implementation of Robot providing English educational contents (영어 교육용 콘텐츠를 제공하는 로봇 설계 및 구현)

  • Kim, Min-Jee;Kim, Ga-eun;Lee, Sang-won
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.605-608
    • /
    • 2020
  • 코로나바이러스 감염증-19(COVID-19)로 인해 기존 대면 수업 위주의 학습 방식에서 비대면 온라인 수업으로 변화하고 있다. 양육자가 일터에 나가야 하는 취약계층에서는 온라인 학습 여건을 갖추지 못해 학습 부진 현상이 발생하고 있다. 이에 본 논문에서는 가정 내에서 자녀들이 영어 학습을 돕는 로봇을 통해 공부에 흥미를 느낄 수 있기를 기대한다.

Metaverse Platform Design Proposal for Strengthening Gender Sensitivity of MZ Generation (MZ세대의 올바른 성인지 감수성 제고를 위한 메타버스 기반의 성교육 플랫폼 디자인 제안)

  • Kim, Sea Woo;Na, Eun Kyung;Kim, Junyi;Kim, Ha Eun;Kim, Seongeun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.07a
    • /
    • pp.677-679
    • /
    • 2022
  • 연이어 발생한 온라인 성범죄 사건과 코로나 바이러스 확산에 의한 온라인 수업 전환으로 인해 학교 내에서 이루어지는 성교육의 대안이 절실하게 요구된다. 본 논문에서는 메타버스를 활용하여 시공간의 제약이 없는 새로운 성교육 플랫폼을 제안한다.

  • PDF

A Exploring the impact of malware on mobile devices (모바일 장치에 대한 멀웨어의 영향 탐색)

  • Jun-ho Lee;Jae-kyung Park
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.611-613
    • /
    • 2023
  • 모바일 멀웨어는 민감한 데이터의 도용, 기기 성능 저하, 금전적 피해 유발 등 다양한 위협을 내포하고 있으며 특히 피싱, 앱 기반 공격 및 네트워크 기반 공격과 같은 기술을 통해 모바일 장치를 악용할 수 있다. 이를 해결하기 위해 바이러스 백신 소프트웨어 및 강력한 암호 사용과 같은 보안 기술을 구현하면 모바일 멀웨어의 영향을 방지하고 완화하는 데 도움이 될 수 있다. 추가적으로 개인과 조직이 모바일 멀웨어와 관련된 위험을 인식하고 불리한 결과를 피하기 위해 이를 차단하기 위한 사전 조치를 취하는 것이 중요하다. 본 논문에서는 이러한 조치에 대한 보안 예방책을 제안하고자 하며 이를 통해 보다 안전한 모바일 환경을 갖출 수 있을 것이라 판단한다.

  • PDF

A Study on Problem Analysis for Safe onLine Video Platform Use

  • Choi, Hee-Sik;Cho, Yang-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.10
    • /
    • pp.269-277
    • /
    • 2020
  • In this paper, we propose an efficient dynamic workload balancing strategy which improves the performance of high-performance computing system. The key idea of this dynamic workload balancing strategy is to minimize execution time of each job and to maximize the system throughput by effectively using system resource such as CPU, memory. Also, this strategy dynamically allocates job by considering demanded memory size of executing job and workload status of each node. If an overload node occurs due to allocated job, the proposed scheme migrates job, executing in overload nodes, to another free nodes and reduces the waiting time and execution time of job by balancing workload of each node. Through simulation, we show that the proposed dynamic workload balancing strategy based on CPU, memory improves the performance of high-performance computing system compared to previous strategies.

An Analysis of COVID-19 Prevention Behaviors between Firefighters and Maritime Police Officers

  • Song, Hyo-Suk;Bang, Sung-Hwan;Shim, Gyu-Sik;Kim, Eun-Mee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.213-220
    • /
    • 2021
  • As the coronavirus disease(COVID-19) pandemic is declared and the number of confirmed cases and deaths increases in countries around the world, the world is gripped with fear. Therefore, in this study, psychological factors of infection prevention behaviors of firefighters and maritime police officers were analyzed based on the Health Belief Model. Although there was no significant difference in the COVID-19 prevention behaviors between the two groups, there was a significant positive correlation between the perceived disease infection possibility, perceived severity, and perceived benefits in the general characteristics and the COVID-19 prevention behaviors. There was no significant difference with perceived obstacles. This study is of great significance in that it is the first analysis of firefighters and maritime police officers as a health belief model, and can be used as basic data for the implementation of new infectious disease prevention actions.

Job-related analysis and visualization using big data distributed processing system (빅데이터를 활용한 직업관련 분석 및 시각화)

  • Choi, Dong-Cheol;Choi, Nakjin;Kim, Min-Seok;Park, Jun-wook;Lee, Jun-Dong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.249-251
    • /
    • 2020
  • 본 논문에서는 코로나바이러스감염증19 사태가 국내 취업시장에 어떠한 영향을 미쳤는지에 대해 알아보기 위하여 빅데이터를 활용한 직업 관련 분석 및 시각화를 수행하였다. 빅데이터를 위한 기본 자료는 통계청 자료와 워크넷 Open API를 활용하였으며, 빅데이터 처리 과정을 거쳐 결과값을 예측을 시도하였다. 2020년도 워크넷 Open API를 통해 고용수와 통계청 자료를 통해 비교 분석 및 시각화를 실시하였고, 08년~20년 취업자수를 통해 시계열 분석 및 예측을 진행해 앞으로의 횡보를 예상해보았다. 분석한 결과 19년, 20년도를 비교 분석했을 때에는 크게 차이가 나지 않았다. 추가적으로 시계열 분석기법을 활용해 보았을 때 매년 고용수는 전체적으로 증가하고 4월에는 감소, 7월에는 증가하는 추세가 나왔다. 코로나바이러스감염증19 사태로 인해 공공기관과 언택트 시대에 따른 화상회의나 재택근무로 인해 운수·통신 취업률은 상승한다는 결과값이 도출되었고, 자영업이나 서비스 직업 등은 다른 직종에 비해 큰 감소를 보여줬으나 국가 경제 활성화에 따른 고용수는 점차 증가할 것이라 예측된다.

  • PDF

Core Promoter Mutation of ntC1731T and G1806A of Hepatitis B Virus Increases HBV Gene Expression (B형 간염 바이러스의 ntC1731T 및 G1806A의 core 프로모터 돌연변이에 의한 HBV 유전자 발현 증가 분석)

  • Cho, Ja Young;Yi, Yi Kyaw;Seong, Mi So;Cheong, JaeHun
    • Journal of Life Science
    • /
    • v.32 no.2
    • /
    • pp.94-100
    • /
    • 2022
  • Chronic infection by hepatitis B virus (HBV) greatly increases the risk for liver cirrhosis and hepatocellular carcinoma (HCC). The outcome of HBV infection is shaped by the complex interplay of the mode of transmission, host genetic factors, viral genotype, adaptive mutations, and environmental factors. The pregenomic RNA transcription of HBV for their replication is regulated by the core promoter activation. Core promoter mutations have been the reason for acute liver failure and are associated with HCC development. We obtained HBV genes from a patient in Myanmar who was infected with HBV and identified gene variations in the core promoter region. For measuring the relative transactivation activity of the core promoter, we prepared the core-promoter reporter construct. Among the gene variations of the core promoter, the mutations of C1731T and G1806A were associated with increase in the transactivation of the HBV core promoter. Through computer analysis for searching for a tentative transcription factor binding site, we showed that the mutations of C1713T and G1806A newly created C/EBPβ and XBP1-responsive elements of the core promoter, respectively. The ectopic expression of C/EBPβ largely increased the HBV core promoter containing the C1713T mutation and that of XBP1 activated the M95 promoter containing the G1806A mutation. Our efforts to treat and prevent HBV infections are hampered by the emergence of drug-resistant mutations and vaccine-escape mutations. Our results provide the biological properties and clinical significance of specific HBV core promoter mutations.

A Design of Network Management System for Efficiently Isolating Devices Infected with ARP Spoofing Virus (ARP spoofing 바이러스에 감염된 단말을 효율적으로 분리하기 위한 네트워크 관리시스템의 설계)

  • Ko, Bong-Koo;Chung, Seung-Jong;Cho, Gi-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.3
    • /
    • pp.641-648
    • /
    • 2013
  • ARP spoofing is a typical Internet attack, in which an attacker sends data by changing his's MAC address with the other's one. Currently, this attack is usually dealt with separating the attacking PCs infected with ARP spoofing virus, by keeping network devices investigating by the network manager. However, this manual process has some limitations in time and accuracy. This paper proposes a new network management system to replace the effort of network manager who has to keep on inspecting the network. Along with designing an ARP analyzer and a disconnection notifier and adding them into the existing network management system, the proposed system provides a basement to identify and notify the PC infected by an ARP spoofing virus with fast and high accuracy. As a result, it is expected to minimize the network break off and to make easy the network management.

Acute Lower Limb Ischemia Associated with COVID-19 (코로나바이러스감염증-19 이후 발생한 급성 하지허혈증)

  • Kim, Hyung Suh;Suh, Jin Soo;Choi, Jun Young
    • Journal of the Korean Orthopaedic Association
    • /
    • v.56 no.5
    • /
    • pp.450-454
    • /
    • 2021
  • A 75-year-old male patient without any significant medical and habitual risk factors for acute atherosclerosis obliterans except for hypertension was diagnosed with coronavirus disease 2019 with dyspnea, coughing, and mild fever. After a week of hospitalization, he complained of right foot pain and numbness. The symptoms were aggravated during the next week, resulting in a complete toe color change and loss of dorsalis artery pulse. Enhanced 3-dimensional computed tomography angiography revealed thrombus formation in the right common iliac artery and a loss of blood flow below the popliteal artery on both sides. The patient underwent percutaneous balloon angioplasty with stent insertion followed by medical therapy for anticoagulation. The clinical symptoms immediately were improved after the intervention, but the great toe necrosis was not recovered. Finally, amputation of the great toe was performed.

An Implementation and Evaluation of Junk Mail Filtering System to use the FQDN Check and personalized Quarantine Process (FQDN과 개인화 격리 처리를 이용한 정크메일 차단 시스템의 구현 및 평가)

  • Kim, Sung-Chan;Jun, Moon-Seog;Choun, Jun-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.6
    • /
    • pp.3-13
    • /
    • 2006
  • Internet mail has become a common communication method to send and receive an amount of data due to the tremendous high speed Internet service increment. But in other respect, the risk and damage of Junk mail is growing rapidly and nowadays Junk mail delivery problem is becoming more serious, because this is used for an attack or propagation scheme of malicious code. It's a most dangerous dominant cause for computer system accident. This paper shows the Junk mail characteristic which is based on the analysis of mail log in reality and then shows the implementation of the FQDN (Fully Qualified Domain Name) check and Personalized classification system and evaluates its performance.