• Title/Summary/Keyword: 파일 접근

Search Result 734, Processing Time 0.028 seconds

Leisure Activities and Self-efficacy according to Sensory Processing Feature of University Students (대학생의 감각처리특성에 따른 여가활동과 자기효능감)

  • Lee, Chun-Yeop;Park, Young-Ju
    • The Journal of Korean society of community based occupational therapy
    • /
    • v.8 no.3
    • /
    • pp.13-23
    • /
    • 2018
  • Objective : This study was conducted to investigate the leisure activities and self-efficacy according to sensory processing feature of university students. Methods : The survey was conducted from March to June, 2018. A total of 235 university students in Jeolla and Gyeongsang area participated. We used Adolescent/Adult Sensory Profiles to investigate sensory processing feature, Leisure Activity Questionnaires to examine leisure activities, and Self-Efficacy Scale for self-efficacy. This study identified the frequency of leisure activities of university students, the frequency of leisure activities and self-efficiency according to the sensory processing feature, and the leisure activities according to the feature of sensory seeking. Results : For the frequency of leisure activities and self-efficacy according to sensory processing feature of university students, only sensory seeking showed significantly difference in the leisure activity frequency, and the self-efficacy was significantly difference according to the feature of all types of sensory processing (p<.05). In addition, this study identified that leisure activities according to the feature of sensory seeking showed a significantly difference in gym, watching TV, shopping, internet search and web surfing (p<.05, p<.01). Conclusion : According to sensory seeking feature of university students, leisure activities and self-efficacy showed a significant difference. In order to encourage leisure activities of university students and to improve their self-efficacy, an interventional approach based on an understanding of sensory processing characteristics will be needed.

A Study of Pervasive Roaming Services with Security Management Framework (퍼베이시브 로밍 서비스를 위한 보안 관리 프레임워크)

  • Kim, Gwan-Yeon;Hwang, Zi-On;Kim, Yong;Uhm, Yoon-Sik;Park, Se-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.115-129
    • /
    • 2007
  • The ubiquitous and autonomic computing environments is open and dynamic providing the universal wireless access through seamless integration of software and system architectures. The ubiquitous computing have to offer the user-centric pervasive services according to the wireless access. Therefore the roaming services with the predefined security associations among all of the mobile devices in various networks is especially complex and difficult. Furthermore, there has been little study of security coordination for realistic autonomic system capable of authenticating users with different kinds of user interfaces, efficient context modeling with user profiles on Smart Cards, and providing pervasive access service by setting roaming agreements with a variety of wireless network operators. This paper proposes a Roaming Coordinator-based security management framework that supports the capability of interoperator roaming with the pervasive security services among the push service based network domains. Compared to traditional mobile systems in which a Universal Subscriber Identity Module(USIM) is dedicated to one service domain only, our proposed system with Roaming Coordinator is more open, secure, and easy to update for security services throughout the different network domains such as public wireless local area networks(PWLANs), 3G cellular networks and wireless metropolitan area networks(WMANs).

A Qualitative Study on Librarians' Recognition of the Joint Utilization of National Authority Data (국가전거데이터 공동활용에 대한 사서들의 인식에 관한 질적 탐구)

  • Lee, Sung-Sook
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.32 no.1
    • /
    • pp.443-467
    • /
    • 2021
  • The purpose of this study was to conduct interviews with librarians who have experience in establishing local authority data by participating in the national authority sharing system of the National Library of Korea and to understand librarians' recognition and support for the joint utilization of national authority data. For this purpose, a total of 10 librarians who participated in the national authority sharing system project were interviewed by telephone using semi-structured questionnaires. Through this, it was possible to investigate the benefits, difficulties, utilization plans, revision plans of headings, and opinions on necessary support. The results of this study showed that the participants recognized that the joint utilization of national authority data provides the basis for the authority work of the local library and brings about the efficiency of the authority work, but they recognized the difficulty of modifying, selecting, creating new data, lacking knowledge, and lacking support system. The necessary support for the joint utilization of national authority data was provided with education and manuals related to authority, provision of rules related to authority that fully consider the position of the institution, budget and manpower support for system development and maintenance, establishment of communication channel and council, system and data advancement, and incentive to participating libraries. Based on the results of the study, the method and direction for the future operation of the joint utilization of national authority data were presented.

Designing a Web-Based Jeongganbo Notation Program (웹기반 정간보 사보 프로그램 설계)

  • Shim, In Sup
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.4
    • /
    • pp.742-753
    • /
    • 2022
  • Recently, the globalization of culture and the global trend of K-culture have become a good background for further developing and promoting Korean traditional culture. However, although Korean traditional music has an excellent notation method called Jeongganbo developed by King Sejong, it is gradually not being used as the universality of Western notation. However, since the 7th curriculum, the proportion of introduction and utilization of Jeongganbo in elementary music education has been increasing. And this is a good opportunity to re-generalize our unique traditional notation. On the other hand, in addition to practicing the interpretation of the notation method, more diverse tools will be needed to activate the practice of Jeongganbo. Therefore, this study studied the design of a web program that can make Jeongganbo on the web without installation or download. In addition, in order to increase the user's convenience in the process of publishing Jeongganbo, it designs and proposes a method of inputting using a computer keyboard like a piano keyboard and method of listening to input music information through MIDI function and save it as a file. Through this study, it is possible to develop a web program that anyone can easily and simply approach, practice, and publish, and it is expected to be a useful tool for practicing Korean traditional music or publishing traditional music in the future.

A Study on Non-Fungible Token Platform for Usability and Privacy Improvement (사용성 및 프라이버시 개선을 위한 NFT 플랫폼 연구)

  • Kang, Myung Joe;Kim, Mi Hui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.11
    • /
    • pp.403-410
    • /
    • 2022
  • Non-Fungible Tokens (NFTs) created on the basis of blockchain have their own unique value, so they cannot be forged or exchanged with other tokens or coins. Using these characteristics, NFTs can be issued to digital assets such as images, videos, artworks, game characters, and items to claim ownership of digital assets among many users and objects in cyberspace, as well as proving the original. However, interest in NFTs exploded from the beginning of 2020, causing a lot of load on the blockchain network, and as a result, users are experiencing problems such as delays in computational processing or very large fees in the mining process. Additionally, all actions of users are stored in the blockchain, and digital assets are stored in a blockchain-based distributed file storage system, which may unnecessarily expose the personal information of users who do not want to identify themselves on the Internet. In this paper, we propose an NFT platform using cloud computing, access gate, conversion table, and cloud ID to improve usability and privacy problems that occur in existing system. For performance comparison between local and cloud systems, we measured the gas used for smart contract deployment and NFT-issued transaction. As a result, even though the cloud system used the same experimental environment and parameters, it saved about 3.75% of gas for smart contract deployment and about 4.6% for NFT-generated transaction, confirming that the cloud system can handle computations more efficiently than the local system.

Analysis of a Compound-Target Network of Oryeong-san (오령산 구성성분-타겟 네트워크 분석)

  • Kim, Sang-Kyun
    • Journal of the Korea Knowledge Information Technology Society
    • /
    • v.13 no.5
    • /
    • pp.607-614
    • /
    • 2018
  • Oryeong-san is a prescription widely used for diseases where water is stagnant because it has the effect of circulating the water in the body and releasing it into the urine. In order to investigate the mechanisms of oryeong-san, we in this paper construct and analysis the compound-target network of medicinal materials constituting oryeong-san based on a systems pharmacology approach. First, the targets related to the 475 chemical compounds of oryeong-san were searched in the STITCH database, and the search results for the interactions between compounds and targets were downloaded as XML files. The compound-target network of oryeong-san is visualized and explored using Gephi 0.8.2, which is an open-source software for graphs and networks. In the network, nodes are compounds and targets, and edges are interactions between the nodes. The edge is weighted according to the reliability of the interaction. In order to analysis the compound-target network, it is clustered using MCL algorithm, which is able to cluster the weighted network. A total of 130 clusters were created, and the number of nodes in the cluster with the largest number of nodes was 32. In the clustered network, it was revealed that the active compounds of medicinal materials were associated with the targets for regulating the blood pressure in the kidney. In the future, we will clarify the mechanisms of oryeong-san by linking the information on disease databases and the network of this research.

Signal and Telegram Security Messenger Digital Forensic Analysis study in Android Environment (안드로이드 환경에서 Signal과 Telegram 보안 메신저 디지털 포렌식분석 연구)

  • Jae-Min Kwon;Won-Hyung Park;Youn-sung Choi
    • Convergence Security Journal
    • /
    • v.23 no.3
    • /
    • pp.13-20
    • /
    • 2023
  • This study conducted a digital forensic analysis of Signal and Telegram, two secure messengers widely used in the Android environment. As mobile messengers currently play an important role in daily life, data management and security within these apps have become very important issues. Signal and Telegram, among others, are secure messengers that are highly reliable among users, and they safely protect users' personal information based on encryption technology. However, much research is still needed on how to analyze these encrypted data. In order to solve these problems, in this study, an in-depth analysis was conducted on the message encryption of Signal and Telegram and the database structure and encryption method in Android devices. In the case of Signal, we were able to successfully decrypt encrypted messages that are difficult to access from the outside due to complex algorithms and confirm the contents. In addition, the database structure of the two messenger apps was analyzed in detail and the information was organized into a folder structure and file format that could be used at any time. It is expected that more accurate and detailed digital forensic analysis will be possible in the future by applying more advanced technology and methodology based on the analyzed information. It is expected that this research will help increase understanding of secure messengers such as Signal and Telegram, which will open up possibilities for use in various aspects such as personal information protection and crime prevention.

Development of a Probabilistic Approach to Predict Motion Characteristics of a Ship under Wind Loads (풍하중을 고려한 확률론적 운동특성 평가기법 개발에 관한 연구)

  • Sang-Eui Lee
    • Journal of Navigation and Port Research
    • /
    • v.47 no.6
    • /
    • pp.315-323
    • /
    • 2023
  • Marine accidents due to loss of stability of small ships have continued to increase over the past decade. In particular, since sudden winds have been pointed out as main causes of most small ship accidents, safety measures have been established to prevent them. In this regard, to prevent accidents caused by sudden winds, a systematic analysis technique is required. The aim of the present study was to develop a probabilistic approach to estimate extreme value and evaluate effects of wind on motion characteristics of ships. The present study included studies of motion analysis, extraction of extreme values, and motion characteristics. A series analysis was conducted for three conditions: wave only, wave with uniform wind speed, and wave with the NPD wind model. Hysteresis filtering and Peak-Valley filtering techniques were applied to time-domain motion analysis results for extreme value extraction. Using extracted extreme values, the goodness of fit test was performed on four distribution functions to select the optimal distribution-function that best expressed extreme values. Motion characteristics of a fishing boat were evaluated for three periodic motion conditions (Heave, Roll, and Pitch) and results were compared. Numerical analysis was performed using a commercial solver, ANSYS-AQWA.

Usefulness of Data Mining in Criminal Investigation (데이터 마이닝의 범죄수사 적용 가능성)

  • Kim, Joon-Woo;Sohn, Joong-Kweon;Lee, Sang-Han
    • Journal of forensic and investigative science
    • /
    • v.1 no.2
    • /
    • pp.5-19
    • /
    • 2006
  • Data mining is an information extraction activity to discover hidden facts contained in databases. Using a combination of machine learning, statistical analysis, modeling techniques and database technology, data mining finds patterns and subtle relationships in data and infers rules that allow the prediction of future results. Typical applications include market segmentation, customer profiling, fraud detection, evaluation of retail promotions, and credit risk analysis. Law enforcement agencies deal with mass data to investigate the crime and its amount is increasing due to the development of processing the data by using computer. Now new challenge to discover knowledge in that data is confronted to us. It can be applied in criminal investigation to find offenders by analysis of complex and relational data structures and free texts using their criminal records or statement texts. This study was aimed to evaluate possibile application of data mining and its limitation in practical criminal investigation. Clustering of the criminal cases will be possible in habitual crimes such as fraud and burglary when using data mining to identify the crime pattern. Neural network modelling, one of tools in data mining, can be applied to differentiating suspect's photograph or handwriting with that of convict or criminal profiling. A case study of in practical insurance fraud showed that data mining was useful in organized crimes such as gang, terrorism and money laundering. But the products of data mining in criminal investigation should be cautious for evaluating because data mining just offer a clue instead of conclusion. The legal regulation is needed to control the abuse of law enforcement agencies and to protect personal privacy or human rights.

  • PDF

The Characteristics of Healthy City Project in Korea (국내 건강도시 프로젝트 담당자를 대상으로 한 건강도시 관련 특성 조사)

  • Jung, Gil-Ho;Kim, Keon-Yeop;Na, Bak-Ju
    • Journal of agricultural medicine and community health
    • /
    • v.34 no.2
    • /
    • pp.155-167
    • /
    • 2009
  • Objectives: The purpose of this study was to investigate healthy city project related characteristics to members of the Korea Healthy Cities Partnership(KHCP). Methods: This study analyzed general characteristics of healthy city, characteristics of healthy city(political support, collaboration & citizen participation, healthy city project, infrastructure development, capacity building), self-evaluation of healthy city and etc by self-questionnaires from February to December, 2007, which were distributed to government workers who were in charged in health city project of 23 membership cities of KHCP. Results: The number of urban city was 11(47.8%) and that of rural municipality was 12(52.5%). Public health center was almost in charge of healthy city project(73.9%). As for the characteristics of healthy city, healthy city municipal budget(91.3%), city health profile(91.3%), technical support of cooperative university(82.6%), healthy city regulation(78.3%), citizen participation(78.3%), committee(73.9%), setting approach(69.9%) and healthy city network(69.6%) were good. But intersectoral collaboration(34.8%), long-term healthy city plan(39.1%), administrative policy or campaign promise(43.5%), programs to the vulnerable population(47.8%), department in charge(47.8%) and seminar(47.8%) were not good. Especially, characteristics of healthy city according to the existence of department in charge were significantly different in intersectoral collaboration, citizen participation, setting approach and healthy city network. Conclusions: In spite of rapid expansion in healthy cities, there were great difficulty in political support, collaboration, department in charge and programs of health equity. So we need to go a long way to achieve the vision of healthy cites by its principles and characteristics.