• 제목/요약/키워드: Border Security

검색결과 118건 처리시간 0.025초

The Effect of Using WhatsApp on EFL Students' Medical English Vocabulary Learning During the Covid-19 Pandemic

  • Saud Alenezi;Elias Bensalem
    • International Journal of Computer Science & Network Security
    • /
    • 제24권2호
    • /
    • pp.143-149
    • /
    • 2024
  • The role of social networking mobile applications such as WhatsApp in enhancing second language vocabulary learning among English language learners continues to be a subject of interest for many scholars. The current study aimed at examining medical English vocabulary learning among undergraduate students using WhatsApp compared to learning vocabulary via the Blackboard platform during the Covid-19 pandemic. To this end, 108 medical students (51 males, 57 females) enrolled in a first semester English for a specific English course participated in the study. A quasi-experimental design was adopted for two groups. Fifty-three students participated in the WhatsApp group and 55 students formed the Blackboard group. A pretest-posttest design was employed to collect data. Results of t-test scores did not show a significant difference between the WhatsApp and Blackboard groups on a vocabulary test. Results of a survey that measured students' opinion of the use of WhatsApp as a platform for learning new vocabulary showed positive perceptions since participants thought that WhatsApp enhanced their learning experience.

보안대비 컨테이너 지연분석을 위한 방법론적 연구 (A Study for a Methodology to Analyze Container Delays versus Security)

  • 윤대근
    • 해양환경안전학회지
    • /
    • 제13권1호
    • /
    • pp.47-54
    • /
    • 2007
  • 2001년 9월 11일 World trade center 테러이후, 미국세관 및 국경 경비대는 미국에 있는 모든 컨테이너 터미널에 inspection station을 설치하였다. 이 인스펙션은 container의 추가적인 지연을 직 간접적으로 유발하고 있다. 이에 본 연구는 이 지연을 분석하기위하여 대기이론을 이용하여 방법론적 연구를 제시하였다.

  • PDF

강원도 접경지역이 평화지역으로 가기위한 새로운 지평과 지속가능발전 (On the New Prospect of Gangwon Border Area as a Peace Zone and its Sustainable Development)

  • 김종현
    • 한국콘텐츠학회논문지
    • /
    • 제22권6호
    • /
    • pp.638-651
    • /
    • 2022
  • 지난해는 한반도 평화권에 대한 새로운 인식으로 '2021 DMZ양구평화선언문'이 채택되었다. DMZ관련 법과 제도, 지속가능한 생태·환경, 안보·공동체 관점에서 새로운 인식과 접근 등에 관한 필요성이 대두되고 있다. 강원도는 DMZ 접경지역을 평화지역으로 만들기에 상당한 노력을 기울이고 있다. '평화특별자치도' 설치를 위하여 지속적으로 공론화시키고 있다. 이 연구를 통하여 한반도 접경지역이 담의 기능에서 통로의 기능으로의 대전환이 필요함을 제시하였다. 경계의 벽을 허물어 소통의 흐름을 위한 새로운 지평으로 지속발전 가능한 지역으로 나갈 수 있는 토대가 되어야 한다. 한반도 접경지역 중에서 강원도 지역이 왜 평화지역으로 나가야 하는 지에 대하여 주장하였다. 결론은 한반도 통일 정책의 새로운 시각으로 '평화권'에 대한 이해와 아젠다의 정립에 있어서 중요하다. 또한 유네스코 생물권보전지역의 지정을 활용한 DMZ일원의 생태환경 보전의 가치가 미래 지구환경보전이라는 가치와 맞물려야 한다. 평화지역은 한반도를 넘어 범세계화를 위한 미래지향적 글로컬 지역주의 시대를 열어야 한다. 그 방법은 4차 산업혁명의 기술요소 반영이 필요함을 주장하였다. 그동안 접경지역은 아픔과 상처의 피해 지역이었다. 이제 강원도 평화지역은 치유를 통한 평화공존의 지역가치 실현의 공간으로 거듭나야 할 것이다. 이 연구는 강원도 접경지역이 새롭게 평화지역으로서의 가치를 조명하여 지속가능 발전을 위해 나아갈 방향의 제시이다.

Indonesia in the BIMP-EAGA: Assessing Connectivity Development in Reducing Inequality

  • Sandy Nur Ikfal Raharjo;Tri Nuke Pudjiastuti
    • 수완나부미
    • /
    • 제16권1호
    • /
    • pp.175-203
    • /
    • 2024
  • With the enactment of international free trade and economic agreements and cooperation, BIMP-EAGA is an opportunity to accelerate development and economic growth in eastern Indonesia. This subregional cooperation could be used to reduce the development gap or inequality between the western and eastern regions, which are geographically, demographically, and economically different. This cooperation also may accelerate development in the border area. This study analyzes Indonesia's policies related to connectivity in BIMP-EAGA subregional cooperation and its implementation. The study results show that the National Secretariat of Sub-Regional Economic Cooperation has encouraged cooperation clusters ranging from natural resources, transportation, infrastructure, ICT, and tourism to MSMEs. In terms of connectivity, Indonesia is also involved in the development program of three economic corridors, namely West Borneo, East Borneo, and Sulu-Sulawesi. Indonesia's involvement in the three corridors has boosted the connectivity of Indonesia's territory, especially border areas, with neighboring countries. Connectivity has covered not only physical but also institutional and people-to-people dimensions. However, there are still several challenges, ranging from the standardization of the Customs, Immigration, and Quarantine (CIQ) mechanisms, improvement of institutional quality, and consistent strong political will among the involved parties. In addition, considering the vulnerability of the BIMP subregion to transnational crimes and acts of radical terrorism, BIMP-EAGA needs to think about solutions to overcome these cross-border security problems so that the momentum of development in the subregion may be sustained.

Reducing Cybersecurity Risks in Cloud Computing Using A Distributed Key Mechanism

  • Altowaijri, Saleh M.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권9호
    • /
    • pp.1-10
    • /
    • 2021
  • The Internet of things (IoT) is the main advancement in data processing and communication technologies. In IoT, intelligent devices play an exciting role in wireless communication. Although, sensor nodes are low-cost devices for communication and data gathering. However, sensor nodes are more vulnerable to different security threats because these nodes have continuous access to the internet. Therefore, the multiparty security credential-based key generation mechanism provides effective security against several attacks. The key generation-based methods are implemented at sensor nodes, edge nodes, and also at server nodes for secure communication. The main challenging issue in a collaborative key generation scheme is the extensive multiplication. When the number of parties increased the multiplications are more complex. Thus, the computational cost of batch key and multiparty key-based schemes is high. This paper presents a Secure Multipart Key Distribution scheme (SMKD) that provides secure communication among the nodes by generating a multiparty secure key for communication. In this paper, we provide node authentication and session key generation mechanism among mobile nodes, head nodes, and trusted servers. We analyzed the achievements of the SMKD scheme against SPPDA, PPDAS, and PFDA schemes. Thus, the simulation environment is established by employing an NS 2. Simulation results prove that the performance of SMKD is better in terms of communication cost, computational cost, and energy consumption.

A Border Line-Based Pruning Scheme for Shortest Path Computations

  • Park, Jin-Kyu;Moon, Dae-Jin;Hwang, Een-Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제4권5호
    • /
    • pp.939-955
    • /
    • 2010
  • With the progress of IT and mobile positioning technologies, various types of location-based services (LBS) have been proposed and implemented. Finding a shortest path between two nodes is one of the most fundamental tasks in many LBS related applications. So far, there have been many research efforts on the shortest path finding problem. For instance, $A^*$ algorithm estimates neighboring nodes using a heuristic function and selects minimum cost node as the closest one to the destination. Pruning method, which is known to outperform the A* algorithm, improves its routing performance by avoiding unnecessary exploration in the search space. For pruning, shortest paths for all node pairs in a map need to be pre-computed, from which a shortest path container is generated for each edge. The container for an edge consists of all the destination nodes whose shortest path passes through the edge and possibly some unnecessary nodes. These containers are used during routing to prune unnecessary node visits. However, this method shows poor performance as the number of unnecessary nodes included in the container increases. In this paper, we focus on this problem and propose a new border line-based pruning scheme for path routing which can reduce the number of unnecessary node visits significantly. Through extensive experiments on randomly-generated, various complexity of maps, we empirically find out optimal number of border lines for clipping containers and compare its performance with other methods.

Encryption-based Image Steganography Technique for Secure Medical Image Transmission During the COVID-19 Pandemic

  • Alkhliwi, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • 제21권3호
    • /
    • pp.83-93
    • /
    • 2021
  • COVID-19 poses a major risk to global health, highlighting the importance of faster and proper diagnosis. To handle the rise in the number of patients and eliminate redundant tests, healthcare information exchange and medical data are transmitted between healthcare centres. Medical data sharing helps speed up patient treatment; consequently, exchanging healthcare data is the requirement of the present era. Since healthcare professionals share data through the internet, security remains a critical challenge, which needs to be addressed. During the COVID-19 pandemic, computed tomography (CT) and X-ray images play a vital part in the diagnosis process, constituting information that needs to be shared among hospitals. Encryption and image steganography techniques can be employed to achieve secure data transmission of COVID-19 images. This study presents a new encryption with the image steganography model for secure data transmission (EIS-SDT) for COVID-19 diagnosis. The EIS-SDT model uses a multilevel discrete wavelet transform for image decomposition and Manta Ray Foraging Optimization algorithm for optimal pixel selection. The EIS-SDT method uses a double logistic chaotic map (DLCM) is employed for secret image encryption. The application of the DLCM-based encryption procedure provides an additional level of security to the image steganography technique. An extensive simulation results analysis ensures the effective performance of the EIS-SDT model and the results are investigated under several evaluation parameters. The outcome indicates that the EIS-SDT model has outperformed the existing methods considerably.

공공분야 정보보안 역량 강화를 위한 단기 교육과정 연구 (A Study on the Short Term Curriculum for Strengthening Information Security Capability in Public Sector)

  • 윤주범
    • 정보보호학회논문지
    • /
    • 제26권3호
    • /
    • pp.769-776
    • /
    • 2016
  • 최근 사이버공격은 국경을 초월하여 국가의 사이버 공간을 지속적으로 위협하고 있다. 이런 사이버공격은 국가 주요기반시설을 마비시킬 수 있는 수준으로 지능화 고도화되는 양상을 보여주고 있다. 이런 사실은 원전 해킹 위협, 3.20 사이버테러 등의 사건에서 잘 볼 수 있다. 특히 국가 중요 정보가 존재하는 국가 공공기관에서는 이와 같은 사이버공격으로 대규모 피해가 예상되기 때문에 사전예방이 중요하다. 기술적인 대응도 중요하지만 국가 공공기관 근무자에게 사이버보안 교육을 통해 사이버 보안의식 고취 및 보안 전문지식 향상을 통해 보안 수준을 높이는 것이 중요하다. 이에 본 논문에서는 공공분야 근무자들에 대한 단기 교육과정을 통해 최고의 보안 효과 상승을 위한 교육과정을 제안한다.

문화예술회관 옥외공간 경관구성요소의 이용만족도 연구 (A study on User Satisfaction of Landscape Component Factors for Outdoor Space of Culture Art Center)

  • 이경진;강준모
    • KIEAE Journal
    • /
    • 제9권1호
    • /
    • pp.31-38
    • /
    • 2009
  • The purpose of this study is to present direction in outdoors space planning and design after direction through user characteristic analysis through spectacle component establishment of culture art center outdoors space through on-the-site analysis and literature investigation to culture art center of Seoul city and capital region 17 places in this research. The data was collected from classification and bisection kind, subdivision kind, and great classification composed to 17 items. User satisfaction side and Variable that is looked below satisfaction than average appeared to bench, pergola, sculpture facilities, pavement facilities, border facilities. And these facilities were analyzed dissatisfaction. When see satisfaction model, when make up culture art center or similar facilities in local government hereafter because parking facilities and rest area cause big effect in satisfaction, is judged that is item to consider most preferentially. In most case, parking lot security from outdoors space, resting place security, security of field performance facilities etc. taking a serious view because tendency that users see performance or use most vehicles except neighborhood walking area for a rest, a walk etc.. is trend. But, is judged that physical side so that can feel satisfaction as space security of quantitative side is important but users utilize substantially and side that is the program are more important in hereafter.

Sysmon과 ELK를 이용한 산업제어시스템 사이버 위협 탐지 (Cyber-Threat Detection of ICS Using Sysmon and ELK)

  • 김용준;손태식
    • 정보보호학회논문지
    • /
    • 제29권2호
    • /
    • pp.331-346
    • /
    • 2019
  • 국내 외에서 산업제어시스템을 대상으로 한 사이버 위협이 증가하고 있다. 이에 따라 관련 연구와 협력이 활발히 진행되고 있다. 하지만 물리적인 망 분리와 경계선에 대한 보안을 강화에 치중하고 있어 내부에서 발생하는 위협에 대해서는 여전히 취약한 편이다. 왜냐하면, 가장 손쉽고 강력한 대응방법이 경계선 보안을 강화하는 것이며 내부의 보안을 강화하기 위한 솔루션들은 시스템의 가용성 문제로 인하여 적용이 쉽지 않기 때문이다. 특히, 산업제어시스템 전반에 걸쳐 레거시 시스템이 상당수 잔존하고 있어 취약점이 많이 존재하고 있다. 이러한 취약한 시스템들이 보안 프레임워크에 따라 새롭게 구축되지 않는 한 이에 대한 대응방안이 필요함에 따라 가용성을 고려한 보안 솔루션을 검증하고 활용방안을 제시하였다. Sysmon과 ELK를 이용하는 방법으로 보안 솔루션이 미구축된 산업제어시스템에서 탐지하기 어려운 사이버 위협을 탐지할 수 있다.