• Title/Summary/Keyword: 콘텐츠 서비스

Search Result 5,354, Processing Time 0.03 seconds

A Study on the Linkage Method between Emergency Simulation Model and Other Models (비상대비 시뮬레이션 모델의 타 모델 연동방안 연구)

  • Bang, Sang-Ho;Lee, Seung-Lyong
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.11
    • /
    • pp.301-313
    • /
    • 2020
  • This study is a study on the interlocking method between emergency preparedness simulation model and military exercise war game model. The national emergency preparedness government exercises are being carried out by a message exercise and technology development for simulation models is being carried out to create a situation similar to the actual practice. In order to create a situation similar to the actual war, the military situation must be reflected and to do so, a link with the military exercise war game model is needed. The military exercise war game model applies HLA/RTI, which is a standardized interlocking method for various models such as Taegeuk JOS, and it is necessary to apply HLA/RTI linkage method to link with these military exercise war game models. In addition, since the emergency preparedness simulation model requires limited information such as enemy location and enemy attack situation on major facilities in the military exercise model, a method of interlocking that can select and link information is required. Therefore, in this study, the interlocking interface design plan is presented in order to selectively link the interlocking method and information between the emergency preparedness simulation model and the military exercise war game model. The main functions of interlocking interface include federation synchronization, storage and recovery, object management service, time management, and data filtering functions.

A Study on Social Worker's Perception and Practice of the Right to Self-determination for Person with Developmental Disability: Application of Importance-Performance Analysis(IPA) (발달장애인의 자기결정권에 대한 사회복지사의 인식 및 실천에 관한 연구: 중요도-실행도분석(IPA)의 적용)

  • Lee, Nam-Jeong;Lee, Dong-Young
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.11
    • /
    • pp.624-635
    • /
    • 2020
  • This study focuses on the right to self-determination, which has a higher possibility of infringement on rights, for people with developmental disabilities, who are more vulnerable to rights protection than other types of disabilities, and seeks to obtain implications of the basis for academic discussion and practical strategies. To this end, data were collected through a structured survey on 302 social workers in Seoul, Gyeonggi, and Gangwon area to identify the importance and execution degree of self-determination components of the developmental disabled, and descriptive analysis, differences. analysis, matrix analysis was applied. As a result of the analysis, the importance and performance degree were evaluated at an absolute level lower than the positive level, and the overall average standard execution degree was found to be applied relatively later, and the difference between the two levels was statistically significant. Meanwhile, goal setting and achievement, self-management and regulation, branch recognition and perception, etc. were identified as under-action elements as disparity between importance and performance. Therefore, in order to improve the balanced positivity of social workers and people with developmental disabilities in consideration of the reciprocity of human rights protection, applied behavior analysis, positive behavior support, and individualized service plan based on the application of a person-centered program and self-determination improvement program are applied. Suggestions were made on detailed strategies such as accounting.

The Living Lab Model of Smart City Based on Citizen Participation (시민참여 기반의 스마트시티 리빙랩 모델 설정)

  • Choi, Min-Ju;Lee, Sang-Ho;Jo, Sung-Su;Jung, Yae-Jin;Jo, Sung-Woon
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.4
    • /
    • pp.284-294
    • /
    • 2020
  • As a solution to local and social problems, the active use of smart city living labs is becoming increasingly important. The answer to solving local and social problems lies in the citizen and the field. The purpose of this study is to establish a smart city living lab model based on citizen participation. In this study, smart city living lab model(4P-SCLLM) based on citizen participation was established through domestic and overseas living lab methodology and case analysis. In order to evaluate the systemicity and specificity of the 4P-SCLLM, a smart city living lab model, we recently compared it with the living lab process in Busan where smart city living lab is applied. As a result of analyzing, the analysis shows similar trends in each stage, and Busan's private sector showed a similar process to 4P-SCLLM On the other hand, public and private sector cooperation and support systems were found to be less than the 4P-SCLLM model And In technology and methodology, the 4P-SCLLM model is analyzed to have a living lab process that incorporates new technologies. In order to maintain the 4P-SCLLM continuously, first, participants and stakeholders need to participate actively and communicate while collaborating on the whole process from start to finish. Second, public awareness needs to be improved. Third, continuous citizenship verification of services is needed. Fourth, citizens' constant participation is needed. Through these implications, this study proposed 4P-SCLLM as a smart city living lab model suitable for the domestic situation.

A Dynamical Load Balancing Method for Data Streaming and User Request in WebRTC Environment (WebRTC 환경에 데이터 스트리밍 및 사용자 요청에 따른 동적로드 밸런싱 방법)

  • Ma, Linh Van;Park, Sanghyun;Jang, Jong-hyun;Park, Jaehyung;Kim, Jinsul
    • Journal of Digital Contents Society
    • /
    • v.17 no.6
    • /
    • pp.581-592
    • /
    • 2016
  • WebRTC has quickly grown to be the world's advanced real-time communication in several platforms such as web and mobile. In spite of the advantage, the current technology in WebRTC does not handle a big-streaming efficiently between peers and a large amount request of users on the Signaling server. Therefore, in this paper, we put our work to handle the problem by delivering the flow of data with dynamical load balancing algorithms. We analyze the request source users and direct those streaming requests to a load balancing component. More specifically, the component determines an amount of the requested resource and available resource on the response server, then it delivers streaming data to the requesting user parallel or alternately. To show how the method works, we firstly demonstrate the load-balancing algorithm by using a network simulation tool OPNET, then, we seek to implement the method into an Ubuntu server. In addition, we compare the result of our work and the original implementation of WebRTC, it shows that the method performs efficiently and dynamically than the origin.

Secure Management Method for Private Key using Smartphon's Information (스마트폰 고유정보를 이용한 안전한 개인키 관리 방안)

  • Kim, Seon-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.8
    • /
    • pp.90-96
    • /
    • 2016
  • The 3390 million people, around 83% of the adult population in Korea use smartphone. Although the safety problem of the certificate has been occurred continuously, most of these users use the certificate. These safety issues as a solution to 'The owner of a mobile phone using SMS authentication technology', 'Biometric authentication', etc are being proposed. but, a secure and reliable authentication scheme has not been proposed for replace the certificate yet. and there are many attacks to steal the certificate and private key. For these reasons, security experts recommend to store the certificate and private key on usb flash drive, security tokens, smartphone. but smartphones are easily infected malware, an attacker can steal certificate and private key by malicious code. If an attacker snatchs the certificate, the private key file, and the password for the private key password, he can always act as valid user. In this paper, we proposed a safe way to keep the private key on smartphone using smartphone's unique information and user password. If an attacker knows the user password, the certificate and the private key, he can not know the smart phone's unique information, so it is impossible to use the encrypted private key. Therefore smartphone user use IT service safely.

An Analysis on the National Economic Contribution of the Chinese Textile Industry (중국 섬유산업의 국민경제적 기여도 분석)

  • Wang, Si-Yi;Meng, Hai-Yang;Bae, Ki-Hyung
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.8
    • /
    • pp.651-660
    • /
    • 2016
  • This study analyzed the contribution of the national economy, China's textile industry by 2010 I-O Table issued by the Chinese Bureau of Statistics 2013. The results shows that the production inducement coefficient of China's textile industry is the column total 3.6228 and in line total 3.5452, is a key industry that leads the industry in China. Second, the index of the power of dispersion of the Chinese textile industry is 1.1982, index of the sensitivity of dispersion is 1.1725. Third, income inducement coefficient of China's textile industry 0.5228, tax inducement coefficient 0.1522, a value-added inducement coefficient 1. Especially China's textile industry induce 2993.6 trillion yuan(textile industry of 8.6 trillion yuan, up 3.0%) in the national production, value-added inducement 97.1 trillion yuan (textile industry 1.7 trillion yuan, up 2.0%), income inducement 42.8 trillion yuan (textile industry 0.9 one trillion yuan, 2.0%), also tax inducement 15.4 trillion yuan (textile industry 0.3 one trillion yuan, 2.0%).

A Review Study on Adjustment of College Freshmen for Suggesting Adaptation Program (적응프로그램 제언을 위한 대학신입생 학교적응 관련 문헌분석)

  • Yoo, Kyung Hee;Kim, Jong Kyung
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.8
    • /
    • pp.580-591
    • /
    • 2016
  • The purpose of this study was to review articles and theses on adjustment of college freshmen from domestic researches conducted during the past 11 years, to identify overall research trends, and to suggest direction and strategies for college freshman's adjustment. The final 24 articles were selected from three databases, RISS, KISS, and NAL (National assembly library) using specific inclusion criteria. Twenty were correlation studies and four were experimental studies. In 2009, the first study on adjustment of college freshmen was published. Since then several more studies have been conducted to date. This means that people have recognized the importance of adjustment of college freshmen. Twenty three studies that are reviewed used Baker and Siryk's college adjustment tool. From reviewed correlation studies, mean score of college students' adjustment was 3.25. The related variables with adjustment of college freshmen revealed 20 items, especially self-esteem, self-efficacy, and stress showed important related concepts. The general characteristics related to adjustment of freshmen were outgoing character, living with family, aged students, satisfied with the area of study, and satisfied with school life. The findings of this study indicated that colleges when planning for the freshmen orientation program should focus on improving self-efficacy of students, stress management, mentor program, and freshmen adjustment program for each department of the school and college.

A Design Communication System for Message Protection in Next Generation Wireless Network Environment (차세대 무선 네트워크 환경에서 메시지 보호를 위한 통신 시스템 설계)

  • Min, So-Yeon;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.7
    • /
    • pp.4884-4890
    • /
    • 2015
  • These days most of people possesses an average of one to two mobile devices in the world and a wireless network market is gradually expanding. Wi-Fi preference are increasing in accordance with the use growth of mobile devices. A number of areas such as public agencies, health care, education, learning, and content, manufacturing, retail create new values based on Wi-Fi, and the global network is built and provides complex services. However, There exist some attacks and vulnerabilities like wireless radio device identifier vulnerability, illegal use of network resources through the MAC forgery, wireless authentication key cracking, unauthorized AP / devices attack in the next generation radio network environment. In addition, advanced security technology research, such as authentication Advancement and high-speed secure connection is not nearly progress. Therefore, this paper designed a secure communication system for message protection in next-generation wireless network environments by device identification and, designing content classification and storage protocols. The proposed protocol analyzed safeties with respect to the occurring vulnerability and the securities by comparing and analyzing the existing password techniques in the existing wireless network environment. It is slower 0.72 times than existing cypher system, WPA2-PSK, but enforces the stability in security side.

Inter-country Analysis on the Financial Determinants of Corporate Cash Holdings for the Large Firms With Headquarters in the U.S. and Korea (한국과 미국 대기업들의 현금유동성 보유수준에 대한 재무적 결정요인 분석)

  • Kim, Hanjoon
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.6
    • /
    • pp.504-513
    • /
    • 2017
  • This study investigated one of the controversial issues on debate or even controversial between policy makers at the government and corporate levels: To examine any financial determinants on the cash holdings of the firms in the advanced and emerging capital markets. Futhermore, it focused on the large representative firms headquartered in the U.S. and the Republic of Korea, taking into account scarcity of the previous literature concentrated on the comparative studies on this particular subject. Several legitimate, but robust econometric estimations such as static and dynamic panel data models and Tobit regression, were applied to investigate possible financial factors ono the cash liquidity. Given the continued debates or arguments on the excess cash reserves between interest partied at the government and corporate levels in the advanced and/or emerging capital markets, and more accelerated capital transfers among associated nations by engaging in the arrangements of the FTAs, the results of the study may provide a vision to search for the optimal level of corporate cash holdings for firms in the two nations.

Impact of Personal Health Information Security Awareness on Convenience (개인의료정보보안인식이 편의성에 미치는 영향)

  • Park, Jung-Hong
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.6
    • /
    • pp.600-612
    • /
    • 2017
  • The purpose of the research is that how awareness of importance of personal medical data, laws regarding personal medical data and perception gap regarding information of medical data system may affect usage of hospital convenience between a regular patient who has experienced hospital service and medical professionals. Preceding research analysis was conducted previous on establishing research model; 150 questionnaires to a regular patient and 150 questionnaires for a medical professional, total of 300 questionnaires were gathered for conducting a question investigation. First of all, the research concluded that there are a regular perception differences between a regular patient and medical professional. Moreover, there are perception differences among the different gender, age, and area of residence. Furthermore, medical professionals tend to consider that convenience of hospital usage will be increased if user strengthens recognition of security of personal medical data. Results of hypothesis stress that higher awareness of exposure of personal medical data and medical information system affect decision making convenience for a better usage of hospital. On the other side, awareness of laws related with personal medical information security does not affect decision making convenience of hospital usage and transaction. The results of the research analyzes with proof that strengthening awareness of personal medical data security positively increase convenience of decision making and transactions in selection of provided medical service.