• Title/Summary/Keyword: Actual network

Search Result 1,372, Processing Time 0.024 seconds

Intergenerational Conflict and Integration in family (가족 내 세대갈등과 통합)

  • Nam, Soonhyeon
    • Korean Journal of Culture and Social Issue
    • /
    • v.10 no.2
    • /
    • pp.1-15
    • /
    • 2004
  • The drastically changing society has brought diverse types of families, and these diversities are changing the concept of the word 'family' itself. Inevitably, these changes cause different viewpoints among family members, developing into conflicts and social issues. In this paper, generational family problems, which are caused by changes within the family as a result of the variously, diversely changing society, are observed to suggest a resolution. Looking into the functional variety that today's structural change within a family demands, several positives changes described below have been observed; Firstly, the change in the way of interaction among family members; Secondly, the demand for continuance on relational functions including love, care, etc, as a psychological resource of family; Thirdly, the conversion from form's sake relationship to actual relationship; and Lastly, the usage of a clearer communications network. The interaction between the parent-children relationship, according to the changes in family life cycle, is also re-focused to seek resolutions for intergenerational conflicts. The results are as follows; Firstly, the changeability of various family types today must be accepted, and the functional aspects of changing families must be emphasized ; Secondly, the mutual-exchanging value of each generation must be accepted, strengthening relational functions between generations; Thirdly, it is necessary to refocus filial piety. In other words, though the intergenerational transmission of family functions may become the basis of lineage and clan formation, it won't be possible without interaction between generation.

  • PDF

Comparison of Integrated Health and Welfare Service Provision Projects Centered on Medical Institutions (의료기관 중심 보건의료·복지 통합 서비스 제공 사업 비교)

  • Su-Jin Lee;Jong-Yeon Kim
    • Journal of agricultural medicine and community health
    • /
    • v.49 no.2
    • /
    • pp.132-145
    • /
    • 2024
  • Objectives: This study compares cases of Dalgubeol Health Care Project, 301 Network Project, and 3 for 1 Project based on program logic models to derive measures for promoting integrated healthcare and welfare services centered around medical institutions. Methods: From January to December 2021, information on the implementation systems and performance of each institution was collected. Data sources included prior academic research, project reports, operational guidelines, official press releases, media articles, and written surveys from project managers. A program logic model analysis framework was applied, structuring the information based on four elements: situation, input, activity, and output. Results: All three projects aimed to address the fragmentation of health and welfare services and medical blind spots. Despite similar multidisciplinary team compositions, differences existed in specific fields, recruitment scale, and employment types. Variations in funding sources led to differences in community collaboration, support methods, and future directions. There were discrepancies in the number of beneficiaries and medical treatments, with different results observed when comparing the actual number of people to input manpower and project cost per beneficiary. Conclusions: To design an integrated health and welfare service provision system centered on medical institutions, securing a stable funding mechanism and establishing an appropriate target population and service delivery system are crucial. Additionally, installing a dedicated department within the medical institution to link activities across various sectors, rather than outsourcing, is necessary. Ensuring appropriate recruitment and stable employment systems is needed. A comprehensive provision system offering services from mild to severe cases through public-private cooperation is suggested.

A Study on the Efficacy of Edge-Based Adversarial Example Detection Model: Across Various Adversarial Algorithms

  • Jaesung Shim;Kyuri Jo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.2
    • /
    • pp.31-41
    • /
    • 2024
  • Deep learning models show excellent performance in tasks such as image classification and object detection in the field of computer vision, and are used in various ways in actual industrial sites. Recently, research on improving robustness has been actively conducted, along with pointing out that this deep learning model is vulnerable to hostile examples. A hostile example is an image in which small noise is added to induce misclassification, and can pose a significant threat when applying a deep learning model to a real environment. In this paper, we tried to confirm the robustness of the edge-learning classification model and the performance of the adversarial example detection model using it for adversarial examples of various algorithms. As a result of robustness experiments, the basic classification model showed about 17% accuracy for the FGSM algorithm, while the edge-learning models maintained accuracy in the 60-70% range, and the basic classification model showed accuracy in the 0-1% range for the PGD/DeepFool/CW algorithm, while the edge-learning models maintained accuracy in 80-90%. As a result of the adversarial example detection experiment, a high detection rate of 91-95% was confirmed for all algorithms of FGSM/PGD/DeepFool/CW. By presenting the possibility of defending against various hostile algorithms through this study, it is expected to improve the safety and reliability of deep learning models in various industries using computer vision.

Analysis of Cyber Crime and Its Characteristics (사이버범죄 유형별 특징 분석 연구)

  • So-Hyun Lee;Ilwoong Kang;Yoonhyuk Jung;Hee-Woong Kim
    • Information Systems Review
    • /
    • v.21 no.3
    • /
    • pp.1-26
    • /
    • 2019
  • Now we are facing with a possibility of having crimes, which have been only possible offline, in cyber spaces as well.Especially, a recent growth in the use of SNS, promoted by popularization of smart phones, also has led an abrupt increase in cyber crime. It would be important to have a understanding of cyber crime and its characteristics by type as well as factors associated with each type of cyber crime in order to devise appropriate preventive measures against cyber crime. However, most of the previous studies on cyber crimesolely made through literature review or indirect approaches. Therefore, this study has been designed to conduct the interview with actual suspects(criminals) of cyber crime to address factors of cyber crime and to devise specific preventive measures and countermeasures against cyber crime. Especially, among various types of cyber crime, this study aims at addressing the 'trades' and 'financial transaction' of crimes committed using the information and communication network and the 'cyber libel/insult'of crimes committed using unlicensed contents, which have been soared recently and become significant issues. The findings of this study could be beneficial for the society since it has managed to conduct the interview and reveal relationships among major factors of cyber crime. The findings of this study could be used for devising and developing proper preventive and countermeasures against cyber crime, in turn reducing and preventing its damage.

SARS-CoV-2 Omicron Mutation Is Faster than the Chase: Multiple Mutations on Spike/ACE2 Interaction Residues

  • Sinae Kim;Tam T. Nguyen;Afeisha S. Taitt;Hyunjhung Jhun;Ho-Young Park;Sung-Han Kim;Yong-Gil Kim;Eun Young Song;Youngmin Lee;Hokee Yum;Kyeong-Cheol Shin;Yang Kyu Choi;Chang-Seon Song;Su Cheong Yeom;Byoungguk Kim;Mihai Netea;Soohyun Kim
    • IMMUNE NETWORK
    • /
    • v.21 no.6
    • /
    • pp.38.1-38.8
    • /
    • 2021
  • Recently, a new severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) (B.1.1.529) Omicron variant originated from South Africa in the middle of November 2021. SARS-CoV-2 is also called coronavirus disease 2019 (COVID-19) since SARS-CoV-2 is the causative agent of COVID-19. Several studies already suggested that the SARS-CoV-2 Omicron variant would be the fastest transmissible variant compared to the previous 10 SARS-CoV-2 variants of concern, interest, and alert. Few clinical studies reported the high transmissibility of the Omicron variant but there is insufficient time to perform actual experiments to prove it, since the spread is so fast. We analyzed the SARS-CoV-2 Omicron variant, which revealed a very high rate of mutation at amino acid residues that interact with angiostatin-converting enzyme 2. The mutation rate of COVID-19 is faster than what we prepared vaccine program, antibody therapy, lockdown, and quarantine against COVID-19 so far. Thus, it is necessary to find better strategies to overcome the current crisis of COVID-19 pandemic.

Research on APC Verification for Disaster Victims and Vulnerable Facilities (재난약자 및 취약시설에 대한 APC실증에 관한 연구)

  • Seungyong Kim;Incheol Hwang;Dongsik Kim;Jungjae Shin;Seunggap Yong
    • Journal of the Society of Disaster Information
    • /
    • v.20 no.1
    • /
    • pp.199-205
    • /
    • 2024
  • Purpose: This study aims to improve the recognition rate of Auto People Counting (APC) in accurately identifying and providing information on remaining evacuees in disaster-vulnerable facilities such as nursing homes to firefighting and other response agencies in the event of a disaster. Methods: In this study, a baseline model was established using CNN (Convolutional Neural Network) models to improve the algorithm for recognizing images of incoming and outgoing individuals through cameras installed in actual disaster-vulnerable facilities operating APC systems. Various algorithms were analyzed, and the top seven candidates were selected. The research was conducted by utilizing transfer learning models to select the optimal algorithm with the best performance. Results: Experiment results confirmed the precision and recall of Densenet201 and Resnet152v2 models, which exhibited the best performance in terms of time and accuracy. It was observed that both models demonstrated 100% accuracy for all labels, with Densenet201 model showing superior performance. Conclusion: The optimal algorithm applicable to APC among various artificial intelligence algorithms was selected. Further research on algorithm analysis and learning is required to accurately identify the incoming and outgoing individuals in disaster-vulnerable facilities in various disaster situations such as emergencies in the future.

Study on Method to Develop Case-based Security Threat Scenario for Cybersecurity Training in ICS Environment (ICS 환경에서의 사이버보안 훈련을 위한 사례 기반 보안 위협 시나리오 개발 방법론 연구)

  • GyuHyun Jeon;Kwangsoo Kim;Jaesik Kang;Seungwoon Lee;Jung Taek Seo
    • Journal of Platform Technology
    • /
    • v.12 no.1
    • /
    • pp.91-105
    • /
    • 2024
  • As the number of cases of applying IT systems to the existing isolated ICS (Industrial Control System) network environment continues to increase, security threats in the ICS environment have rapidly increased. Security threat scenarios help to design security strategies in cybersecurity training, including analysis, prediction, and response to cyberattacks. For successful cybersecurity training, research is needed to develop valid and reliable security threat scenarios for meaningful training. Therefore, this paper proposes a case-based security threat scenario development methodology for cybersecurity training in the ICS environment. To this end, we develop a methodology consisting of five steps based on analyzing actual cybersecurity incident cases targeting ICS. Threat techniques are standardized in the same form using objective data based on the MITER ATT&CK framework, and then a list of CVEs and CWEs corresponding to the threat technique is identified. Additionally, it analyzes and identifies vulnerable functions in programming used in CWE and ICS assets. Based on the data generated up to the previous stage, develop security threat scenarios for cybersecurity training for new ICS. As a result of verification through a comparative analysis between the proposed methodology and existing research confirmed that the proposed method was more effective than the existing method regarding scenario validity, appropriateness of evidence, and development of various scenarios.

  • PDF

Influence of the Existing Cavern on the Stability of Adjacent Tunnel Excavation by Small-Scale Model Tests (축소모형시험을 통한 공동이 근접터널 굴착에 미치는 영향평가)

  • Jung, Minchul;Hwang, Jungsoon;Kim, Jongseob;Kim, Seungwook;Baek, Seungcheol
    • Journal of the Korean GEO-environmental Society
    • /
    • v.15 no.12
    • /
    • pp.117-128
    • /
    • 2014
  • Generally, when constructing a tunnel close to existing structures, the tunnel must be built at a constant distance from the structures that is more than width of tunnel to minimize the impact of interference between an existing structures and new tunnel. Spacing of these closed tunnels should be designed considering soil state, size of tunnel and reinforcement method. Particularly when the ground is soft, a care should be taken with the tunnel plans because the closer the tunnel is to the existing structures, the greater the deformation becomes. As methods of reviewing the effect of cavities on the stability of a tunnel, field measurement, numerical analysis and scaled model test can be considered. In the methods, the scaled model test can reproduce the engineering characteristics of a rock in a field condition and the shape of structures using the scale factor even not all conditions cannot be considered. In this study, when construction of a tunnel close to existing structures, the method and considering factors of the scaled model test were studied to predict the actual tunnel behavior in planning stage. Furthermore, model test results were compared with the numerical analysis results for verifying the proposed model test procedure. Also, practical results were derived to verify the stability of a tunnel vis-a-vis cavities through the scaled model test, which assumed spacing distances of 0.25 D, 0.50 D, and 1.00 D between the cavities and tunnel as well as the network state distribution. The spacing distances of 1.0 D is evaluated as the critical distance by the results of model test and numerical analysis.

A Study on the Influence of Entrepreneurship and Start-Up Competency on Entrepreneurial Satisfaction: Focusing on the Moderating Effect of Flow Experience (창업가정신, 창업역량이 창업만족도에 미치는 영향에 관한 연구: 플로우(Flow)경험의 조절효과를 중심으로)

  • Lee, Sang Hwa;Ha, Kyu Soo
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.10 no.5
    • /
    • pp.137-150
    • /
    • 2015
  • This study investigated the influence of Entrepreneurship, Start-up Competency on Entrepreneurial Satisfaction and the moderating effect of Flow experience. The goal of this investigation is to empirically prove that despite the benefits of educational and financial support, mentoring and consulting which selected applicants received as a part of supporting business for start-up companies provided by national and local government and public organizations, there is a gap between individual entrepreneurs' satisfaction after actual foundation of the company. For the purpose of this investigation, data was collected through a survey with 320 entrepreneurs who were beneficiaries of government's supporting business for start-up companies and have founded their companies less than 5 years ago. For entrepreneurship variables, three factors of innovativeness, proactiveness and risk-taking were reviewed, and also reviewed the three variables network capability, market orientation and marketing capacity as Start-up competency. The collected data was used to perform a multiple regression analysis, and the moderating effect of flow experience was analysed using moderated regression analysis. The result of analysis shows that innovativeness, proactiveness and risk-taking of entrepreneurship positively affected the entrepreneurial satisfaction, and network capability, market orientation and marketing capability also positively affected the entrepreneurial satisfaction. As a result of analysing the moderating effect of flow experience, it appeared that there is a positive moderating effect between entrepreneurship, start-up competency, and the entrepreneurial satisfaction. This result concludes that evaluation items of entrepreneurship and start-up competency as applicant selecting criteria in supporting business for start-up companies, are valid. It is also concluded that start-up supports such as education, funds and consulting are also important, but it is necessary to make changes such as construction of start-up ecosystem and reinforcement of networking support, so that entrepreneurs can have the flow experience themselves in the process after founding a company.

  • PDF

An Analysis of the Roles of Experience in Information System Continuance (정보시스템의 지속적 사용에서 경험의 역할에 대한 분석)

  • Lee, Woong-Kyu
    • Asia pacific journal of information systems
    • /
    • v.21 no.4
    • /
    • pp.45-62
    • /
    • 2011
  • The notion of information systems (IS) continuance has recently emerged as one of the most important research issues in the field of IS. A great deal of research has been conducted thus far on the basis of theories adapted from various disciplines including consumer behaviors and social psychology, in addition to theories regarding information technology (IT) acceptance. This previous body of knowledge provides a robust research framework that can already account for the determination of IS continuance; however, this research points to other, thus-far-unelucidated determinant factors such as habit, which were not included in traditional IT acceptance frameworks, and also re-emphasizes the importance of emotion-related constructs such as satisfaction in addition to conscious intention with rational beliefs such as usefulness. Experiences should also be considered one of the most important factors determining the characteristics of information system (IS) continuance and the features distinct from those determining IS acceptance, because more experienced users may have more opportunities for IS use, which would allow them more frequent use than would be available to less experienced or non-experienced users. Interestingly, experience has dual features that may contradictorily influence IS use. On one hand, attitudes predicated on direct experience have been shown to predict behavior better than attitudes from indirect experience or without experience; as more information is available, direct experience may render IS use a more salient behavior, and may also make IS use more accessible via memory. Therefore, experience may serve to intensify the relationship between IS use and conscious intention with evaluations, On the other hand, experience may culminate in the formation of habits: greater experience may also imply more frequent performance of the behavior, which may lead to the formation of habits, Hence, like experience, users' activation of an IS may be more dependent on habit-that is, unconscious automatic use without deliberation regarding the IS-and less dependent on conscious intentions, Furthermore, experiences can provide basic information necessary for satisfaction with the use of a specific IS, thus spurring the formation of both conscious intentions and unconscious habits, Whereas IT adoption Is a one-time decision, IS continuance may be a series of users' decisions and evaluations based on satisfaction with IS use. Moreover. habits also cannot be formed without satisfaction, even when a behavior is carried out repeatedly. Thus, experiences also play a critical role in satisfaction, as satisfaction is the consequence of direct experiences of actual behaviors. In particular, emotional experiences such as enjoyment can become as influential on IS use as are utilitarian experiences such as usefulness; this is especially true in light of the modern increase in membership-based hedonic systems - including online games, web-based social network services (SNS), blogs, and portals-all of which attempt to provide users with self-fulfilling value. Therefore, in order to understand more clearly the role of experiences in IS continuance, analysis must be conducted under a research framework that includes intentions, habits, and satisfaction, as experience may not only have duration-based moderating effects on the relationship between both intention and habit and the activation of IS use, but may also have content-based positive effects on satisfaction. This is consistent with the basic assumptions regarding the determining factors in IS continuance as suggested by Oritz de Guinea and Markus: consciousness, emotion, and habit. The principal objective of this study was to explore and assess the effects of experiences in IS continuance, with special consideration given to conscious intentions and unconscious habits, as well as satisfaction. IN service of this goal, along with a review of the relevant literature regarding the effects of experiences and habit on continuous IS use, this study suggested a research model that represents the roles of experience: its moderating role in the relationships of IS continuance with both conscious intention and unconscious habit, and its antecedent role in the development of satisfaction. For the validation of this research model. Korean university student users of 'Cyworld', one of the most influential social network services in South Korea, were surveyed, and the data were analyzed via partial least square (PLS) analysis to assess the implications of this study. In result most hypotheses in our research model were statistically supported with the exception of one. Although one hypothesis was not supported, the study's findings provide us with some important implications. First the role of experience in IS continuance differs from its role in IS acceptance. Second, the use of IS was explained by the dynamic balance between habit and intention. Third, the importance of satisfaction was confirmed from the perspective of IS continuance with experience.