• Title/Summary/Keyword: Communication Model

Search Result 8,193, Processing Time 0.039 seconds

Church's Cognition and Christian Counseling in Luther's Church in Korea (한국 루터교회 평신도의 교회인식과 기독교 상담)

  • Kim, Ock-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.10
    • /
    • pp.194-202
    • /
    • 2018
  • This study was designed to analyze the impact of Christian counseling for the common faith and religious wellbeing within the Korean Luther Church, and to provide church growth factors based on the results. The study target was based on the survey results of a total of 83 members who were attending layman in the ${\bigcirc}{\bigcirc}{\bigcirc}$ church, which is affiliated with the Korean Lutheran Church. The research tool used NCD questionnaire for church health diagnosis by the Korea Church Growth Institute for the church growth model and the reliability of Cronbach's ${\alpha}$ in this study was 0.91. The collected questionnaire was tested for correlation to verify the relationship between church development and growth, and for multiple recursive analysis to confirm factors affecting church development and growth. The results showed that church's services, programs, and atmosphere were highly correlated with development of church, including counseling. The research showed that the relationship between church services, programs, and friends, including counseling, was highly correlated with spiritual growth and self-growth, while community activities and mutual communication were low. Therefore, for continuous church growth, the importance of community programs in the church is considered necessary.

The Effect of Social Trust on Risk Perception : Focused on the Seoul Citizens' Perception (사회신뢰가 위험인식에 미치는 효과 : 서울시민의 인식을 중심으로)

  • Lee, Jae-Wan
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.10
    • /
    • pp.518-526
    • /
    • 2018
  • The purpose of this study is to analyze the effect of social trust on risk perception. In other words, I tried to analyze empirically how the generalized trust about other people they have based on subjective perception of Seoul citizens affects the perception of risk factors. First, the risk factors that Seoul citizens face in everyday life are classified into five categories: natural disaster, technical disaster risk, economic risk, social disintegration risk and health risk. Then, the influence of social trust on each of these risk perception was analyzed by multiple regression model. The results show that social trust has a statistically significant negative impact on all types of risk perception. These results imply that social trust makes low-risk assessments of various risk factors around people. The implication of this study is that the responsibility for risk is given to the central and local governments in the modern risk society. In order to prevent effective risk, it is necessary to make efforts to promote social trust through various activities together with efforts to prevent the spread of unfounded risk will be. And trust among people also promotes cooperation in coping with risks, so it is necessary to promote communication and mutual understanding that can build trust among people in their daily life.

The introductory study for MIMO techniques over satellite systems

  • Kang, Yeon-Su;Kang, Kun-Suk;Ahn, Do-Seob
    • Journal of Satellite, Information and Communications
    • /
    • v.2 no.2
    • /
    • pp.80-84
    • /
    • 2007
  • In this paper, the introductory study of the multi input multi output (MIMO) techniques for satellite communication systems is presented. Because of the advantage of wide coverage of satellite, it has been considered for broadcasting services and fill-in services. On the other hand, state of the art multi input multi output (MIMO) techniques such as space time code (STC) and spatial multiplexing (SM) makes the terrestrial system increase link performance and their coverage, and also increase the link throughput. For these regard, in order to satisfy the requirements of the next generation communications and coexists with terrestrial systems harmoniously, the studying about satellite MIMO techniques is necessary. In this paper, we introduce some system model and scenarios to apply MIMO technique to intermediate module repeater (IMR). The possibility of these techniques and technical requirements are also considered. Especially, Space time code is used to enhance IMRs coverage and increase the link performance, and space time multiplexing is utilized to multiplex satellite broadcasting signals with local broadcasting signal in IMR cell.

  • PDF

Peer-to-Peer Transfer Scheme for Multimedia Partial Stream using Client Initiated with Prefetching (멀티미디어 데이터를 위한 피어-투-피어 전송모델)

  • 신광식;윤완오;정진하;최상방
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7B
    • /
    • pp.598-612
    • /
    • 2004
  • Client requests have increased with the improvement of network resources at client side, whereas network resources at server side could not keep pace with the increased client request. Therefore, it is primary factor of the Qos that efficiently utilize network resources at server side. In this paper, we proposed a new model that peer-to-peer transfer scheme for partial multimedia stream based on CIWP which it decrease server network bandwidth by utilizing client disk resources saves additional server network resources. Especially, adapting Threshold_Based Multicast scheme guarantees to do that data transfer within clients never exceed service time of previous peer by restriction of which data size transferring from previous peer less than data size transferring from server. Peer-to-peer transfer within clients is limited in same group classified as ISPs. Our analytical result shows that proposed scheme reduces appling network resources at server side as utilizing additional client disk resource. furthermore, we perform various simulation study demonstrating the performance gain through comparing delay time and proportion of waiting requesters. As a result, when we compared to Threshold_Based Multicast scheme, the proposed scheme reduces server network bandwidth by 35%.

The study of Data Logging Model Development for ICT Instruction in elementary school (초등학교 ICT 활용 교육을 위한 데이터 로깅 모델 개발에 관한 연구)

  • Lee, Gil-Kyung;Hong, Myung-Hui
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1410-1413
    • /
    • 2007
  • 현재 초등학교에서 실시되고 있는 ICT(Information & Communication Technology) 교육은 ICT 소양교육과 ICT 활용교육으로 구분되어 실시되고 있다. ICT 소양교육은 컴퓨터 과학을 기반으로 하여 정보기술과 통신 기술에 대한 기본적인 소양교육으로 그 내용을 구성하고 있다. 현재 초고속 통신망의 발달과 컴퓨터 사용으로 인하여 소양교육에 대한 학업 성취도는 매우 향상되어 가고 있는 실정이다. 따라서 앞으로의 ICT 교육은 활용 교육에 더 많은 노력을 기울여 전 교과에 걸쳐 정보 통신 기술을 활용하여 교육의 내용뿐만 아니라 교육의 방법 등에서 많은 변화의 필요성이 증대되고 있다. ICT 활용교육에서 컴퓨터를 활용하기 위해서는 실생활에서 습득하거나 측정된 데이터를 컴퓨터에 입력하는 과정, 데이터 로깅(data logging), 으로부터 시작 한다. 최근의 유비쿼터스 컴퓨팅 환경에서 데이터가 발생한 곳에서 즉시 받아들이고 또한 결과가 필요한 곳에서 즉시 정보를 제공하여 주는 컴퓨팅 환경을 구성하는 것이 매우 중요 하다고 본다. 이에 본 연구에서는 유비쿼터스 컴퓨팅의 기본 개념 중 하나인 실시간 데이터 로깅 기법을 응용하여 초등학교에서 ICT 활용 학습 활동 시 발생되는 각종 원시 데이터들을 컴퓨터로 가져오는 데이터로깅 모델을 제안하고, 초등학교 과학과를 중심으로 교육과정의 실험 요소들을 분석하여 이를 개발된 모델에 적용하였다. 데이터 로깅 모델 적용 결과, 손쉽게 해당 원시 데이터를 수집할 수 있었고 데이터의 처리 및 분석을 간편하게 수행하여 정확한 실험 데이터를 바탕으로 실험 결과에 대한 토의, 토론에 더욱 많은 시간을 할애할 수 있었으며 학교에서의 ICT 활용 교육의 새로운 모델을 제시하였다.다.ovoids에서도 각각의 점들에 대한 선량을 측정하였다. SAS와 SSAS의 직장에 미치는 선량차이는 실제 임상에서의 관심 점들과 가장 가까운 25 mm(R2)와 30 mm(R3)거리에서 각각 8.0% 6.0%였고 SAS와 FWAS의 직장에 미치는 선량차이는 25 mm(R2) 와 30 mm(R3)거리에서 각각 25.0% 23.0%로 나타났다. SAS와 SSAS의 방광에 미치는 선량차이는 20 m(Bl)와 30 mm(B2)거리에서 각각 8.0% 3.0%였고 SAS와 FWAS의 방광에 미치는 선량차이는 20 mm(Bl)와 30 mm(B2)거리에서 각각 23.0%, 17.0%로 나타났다. SAS를 SSAS나 FWAS로 대체하였을 때 직장에 미치는 선량은 SSAS는 최대 8.0 %, FWAS는 최대 26.0 %까지 감소되고 방광에 미치는 선량은 SSAS는 최대 8.0 % FWAS는 최대 23.0%까지 감소됨을 알 수 있었고 FWAS가 SSAS 보다 차폐효과가 더 좋은 것으로 나타났으며 이 두 종류의 shielded applicator set는 부인암의 근접치료시 직장과 방광으로 가는 선량을 감소시켜 환자치료의 최적화를 이룰 수 있을 것으로 생각된다.)한 항균(抗菌) 효과(效果)를 나타내었다. 이상(以上)의 결과(結果)로 보아 선방활명음(仙方活命飮)의 항균(抗菌) 효능(效能)은 군약(君藥)인 대황(大黃)의 성분(成分) 중(中)의 하나인 stilbene 계열(系列)의 화합물(化合物)인 Rhapontigenin과 Rhaponticin의 작용(作用)에 의(依)한 것이며, 이는 한의학(韓醫學) 방제(方劑) 원리(原理)인 군신좌사(君臣佐使) 이론(理論)에서 군약(君藥)이 주증(主症)에 주(主)로 작용(作用)하는 약물(藥物)이라는 것을 밝혀주는 것

  • PDF

Improvement of a Verified Secure Key Distribution Protocol Between RFID and Readers (RFID와 리더간의 안전성이 검증된 키 분배 프로토콜의 개선)

  • Bae, Woo-Sik;Lee, Jong-Yun
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.331-338
    • /
    • 2011
  • The RFID system includes a section of wireless communication between the readers and the tags. Because of its vulnerability in terms of security, this part is always targeted by attackers and causes various security problems including the leakage of secret and the invasion of privacy. In response to these problems, various protocols have been proposed, but because many of them have been hardly implementable they have been limited to theoretical description and theorem proving without the accurate verification of their safety. Thus, this study tested whether the protocol proposed by Kenji et al. satisfies security requirements, and identified its vulnerabilities such as the exposure of IDs and messages. In addition, we proposed an improved RFID security protocol that reduced the number of public keys and random numbers. As one of its main characteristics, the proposed protocol was designed to avoid unnecessary calculations and to remove vulnerabilities in terms of security. In order to develop and verify a safe protocol, we tested the protocol using Casper and FDR(Failure Divergence Refinements) and confirmed that the proposed protocol is safe in terms of security. Furthermore, the academic contributions of this study are summarized as follows. First, this study tested the safety of a security protocol through model checking, going beyond theorem proving. Second, this study suggested a more effective method for protocol development through verification using FDR.

Digital Forensic Investigation of HBase (HBase에 대한 디지털 포렌식 조사 기법 연구)

  • Park, Aran;Jeong, Doowon;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.2
    • /
    • pp.95-104
    • /
    • 2017
  • As the technology in smart device is growing and Social Network Services(SNS) are becoming more common, the data which is difficult to be processed by existing RDBMS are increasing. As a result of this, NoSQL databases are getting popular as an alternative for processing massive and unstructured data generated in real time. The demand for the technique of digital investigation of NoSQL databases is increasing as the businesses introducing NoSQL database in their system are increasing, although the technique of digital investigation of databases has been researched centered on RDMBS. New techniques of digital forensic investigation are needed as NoSQL Database has no schema to normalize and the storage method differs depending on the type of database and operation environment. Research on document-based database of NoSQL has been done but it is not applicable as itself to other types of NoSQL Database. Therefore, the way of operation and data model, grasp of operation environment, collection and analysis of artifacts and recovery technique of deleted data in HBase which is a NoSQL column-based database are presented in this paper. Also the proposed technique of digital forensic investigation to HBase is verified by an experimental scenario.

A Study on Big Data Based Non-Face-to-Face Identity Proofing Technology (빅데이터 기반 비대면 본인확인 기술에 대한 연구)

  • Jung, Kwansoo;Yeom, Hee Gyun;Choi, Daeseon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.10
    • /
    • pp.421-428
    • /
    • 2017
  • The need for various approaches to non-face-to-face identification technology for registering and authenticating users online is being required because of the growth of online financial services and the rapid development of financial technology. In general, non-face-to-face approaches can be exposed to a greater number of threats than face-to-face approaches. Therefore, identification policies and technologies to verify users by using various factors and channels are being studied in order to complement the risks and to be more reliable non-face-to-face identification methods. One of these new approaches is to collect and verify a large number of personal information of user. Therefore, we propose a big-data based non-face-to-face Identity Proofing method that verifies identity on online based on various and large amount of information of user. The proposed method also provides an identification information management scheme that collects and verifies only the user information required for the identity verification level required by the service. In addition, we propose an identity information sharing model that can provide the information to other service providers so that user can reuse verified identity information. Finally, we prove by implementing a system that verifies and manages only the identity assurance level required by the service through the enhanced user verification in the non-face-to-face identity proofing process.

The Service Features Influencing the Acceptance of Telecommunication-Broadcasting Bundling in Convergence Environment (컨버전스 환경 하에서 통신.방송 결합상품 수용의도에영향을 미치는 서비스 특성 연구)

  • Sim, Jin-Bo
    • Journal of Technology Innovation
    • /
    • v.18 no.2
    • /
    • pp.59-89
    • /
    • 2010
  • One of the key words that represent the culture and social phenomena in this 21st century is 'Digital Convergence'. Presently our society is going through the second evolving phase of the convergence, integration between industries. Integration between industries refers to the phenomenon of integrating various industrial areas such as broadcasting, communication, finance, automobile, and medical treatment as the range of IT utilization becomes extended. The telecommunication-broadcasting bundling is a typical example of integration between industries. This study analyzed the effect of the service features of the bundling on the customer's acceptance intention by applying the innovative technology product acceptance model, TAM, in the process of accepting the telecommunication-broadcasting bundling. This study suggests three independent variables, the 'low cost(discount)', 'service integrity', and 'selectability', which affect perceived usefulness, perceived ease of use, and perceived risk, and figures out the actual influence as follows. In conclusion, these results suggest that in order to accept and spread the telecommunication-broadcasting bundling, it is necessary to establish (1) the cost discounting strategy realize (price strategy), (2) the fee noticing system, payment system, call-service system, and systemic integration including installation and A/S system integration, and develop (service strategy), (3) the bundling or related options that can provide users with selectability (product strategy).

  • PDF

A Study of Information system Effects on the Trust between Wholesale Market Company and Intermediary Wholesaler in SeaFood Market (수산물 도매시장의 유통정보화가 도매법인과 중도매인 간의 신뢰에 미치는 영향연구)

  • Jang, Young-Soo;Park, Kwang-Ho
    • The Journal of Fisheries Business Administration
    • /
    • v.36 no.2 s.68
    • /
    • pp.1-24
    • /
    • 2005
  • The purpose of the study are summarized as follows : First, it has researched the possibility of the Distribution Information application in Sea Food Wholesale Market. Second, the effects which the Wholesale Market Company and the Intermediary Wholesaler Corporations can obtain in Sea Food Wholesale Market by building up a Distribution Information are classified into the effects of task, cost, and competition. It has analyzed the influence of these effects in direct and indirect Trust between the Wholesale Market Company and the Intermediary Wholesaler. Third, it has recognized the upcoming problems in Sea Food Wholesale Market by building up a Distribution Information, and it has suggested a plan to make the Distribution Information application successful in Sea Food Wholesale Market. This study has used a questionnaire to verify 5 hypotheses. Research model, factor analysis, correlation relationship analysis. The result of this study are summarized as follows : Building up the Distribution Information influences positively on the effectiveness of task, cost and competitiveness regardless of it being the Wholesale Market Company or the Intermediary Wholesaler corporation. However, the results of this analysis are to verify differences according to the degree of construction of the Distribution Information and the degree of the perception of the problems between the Wholesale Market Company and the Intermediary Wholesaler corporations have shown that there were distinct differences in the degree of computerization and of efforts to build a Distribution Information. Also there were distinct differences according to the degree of perceiving problems relating to building up the Distribution Information and the stages of the Distribution Information between the Wholesale Market Company and the Intermediary Wholesaler corporations. This study suggest three important steps that will help to establish a successful Distribution Information. First, the Wholesale Market Company and the Intermediary Wholesaler corporations should make efforts to increase mutual profits in partnership, and make direct Trust by sharing mutual information. Second, the lack of understanding of the Distribution Information between departments within the company requires educating employees about the Distribution Information. It is necessary to expand the communication networks of the Distribution Information between the Wholesale Market Company and the Intermediary Wholesaler. Third, mutual exchange of Information should be possible to offer systematic exchange of Information between the Wholesale Market Company and the Intermediary Wholesaler corporations.

  • PDF