• 제목/요약/키워드: Critical infrastructure

검색결과 482건 처리시간 0.029초

비대면 환경에서의 비판적 사고와 토론교육 - 공대 신입생 대상 온라인 수업 사례를 중심으로 (Critical Thinking and Debate Education under Non-Face-to-Face Situation - Through Online classes for Freshmen at the Engineering College)

  • 신희선
    • 공학교육연구
    • /
    • 제24권1호
    • /
    • pp.34-45
    • /
    • 2021
  • This research is a case study about "Critical Thinking and Debate Education" class which was done for freshmen at the engineering college of "S" Women's University. Real time remote classes through LMS and ZOOM were the most effective tools under on-line circumstances, considering the fact that video lectures only cannot cultivate students' capabilities of critical thinking and communication. Throughout the analysis on students' self-reflection journals and lecture evaluations, this paper examined considerable future points and the pros and cons of "Critical Thinking and Debate Education" under online presentation and discussion situation. As research outputs, students told they could feel less nervousness and anxiety when they exercise and have a presentation because they could choose familiar space for them. In addition, students also told that they feel comfortable about both self-feedback and peer evaluation, repeatedly seeing the recorded video clip. However, on the contrary, sometimes students felt uncomfortable due to unstable internet connection through the online classes, and they also were regretful about the missing chances of interaction between a teacher and students and of intimate exchanges among students. They also told they had felt a kind of limit of enhancing their presentation skills just in front of the monitor. Considering these outcomes, this research paper points out that online education needs to be proceeded by strengthening multi layered feedback to students with the build-up of a non-face-to-face stable educational infrastructure, application of online instructional strategy, and utilization of YouTube platform and video contents. Through this research paper, I hope the new system of encompassing on/off line "Critical Thinking and Debate Education" and effective teaching and learning method can be developed soon by strengthening the strength of online education.

Galloping analysis of roof structures

  • Zhang, Xiangting;Zhang, Ray Ruichong
    • Wind and Structures
    • /
    • 제6권2호
    • /
    • pp.141-150
    • /
    • 2003
  • This paper presents galloping analysis of multiple-degree-of-freedom (MDOF) structural roofs with multiple orientations. Instead of using drag and lift coefficients and/or their combined coefficient in traditional galloping analysis for slender structures, this study uses wind pressure coefficients for wind force representation on each and every different orientation roof, facilitating the galloping analysis of multiple-orientation roof structures. In the study, influences of nonlinear aerodynamic forces are considered. An energy-based equivalent technique, together with the modal analysis, is used to solve the nonlinear MDOF vibration equations. The critical wind speed for galloping of roof structures is derived, which is then applied to galloping analysis of roofs of a stadium and a high-rise building in China. With the aid of various experimental results obtained in pertinent research, this study also shows that consideration of nonlinear aerodynamic forces in galloping analysis generally increases the critical wind speed, thus enhancing aerodynamic stability of structures.

Protection Management for Guaranteed User-Driven Virtual Circuit Services in Dynamic Multi-domain Environments: Design Issues and Challenges

  • Lim, Huhnkuk
    • ETRI Journal
    • /
    • 제37권2호
    • /
    • pp.369-379
    • /
    • 2015
  • Fault management of virtualized network environments using user-driven network provisioning systems (NPSs) is crucial for guaranteeing seamless virtual network services irrespective of physical infrastructure impairment. The network service interface (NSI) of the Open Grid Forum reflects the need for a common standard management API for the reservation and provisioning of user-driven virtual circuits (VCs) across global networks. NSI-based NPSs (that is, network service agents) can be used to compose user-driven VCs for mission-critical applications in a dynamic multi-domain. In this article, we first attempt to outline the design issues and challenges faced when attempting to provide mission-critical applications using dynamic VCs with a protection that is both user-driven and trustworthy in a dynamic multi-domain environment, to motivate work in this area of research. We also survey representative works that address inter-domain VC protection and qualitatively evaluate them and current NSI against the issues and challenges.

전자상거래 산업의 해외 진출 결정요인에 관한 실증적 연구 (An Empirical Research for the Critical Factors on International Market Entry in Electronic Commerce Industry)

  • 김정욱;홍성태;이동일
    • 품질경영학회지
    • /
    • 제29권3호
    • /
    • pp.18-38
    • /
    • 2001
  • This paper attempts to identify variables which affect Korean electronic commerce(EC) venture's strategies for the international market entry decision making. Especially in the perspective of quality management perspective, it is highly relevant question which factors are critical when the industry has high technology driven characteristics such as EC, product quality related factors or environmental factors. Technology competence, operational competence, local marketing competence, psychological barriers, domestic competition level, and local infrastructure level are included to generate the explaining model for international market entry decision. The result is that the higher technology competence and local marketing competence are the significant factors. The higher the perception in these factors, the higher the intention to enter the international market in EC industry. These factors play a pivotal role in determining to go abroad the foreign EC market. Our finding implies that the subjective confidence on quality of EC solution(technology competence) and venture's capability of maintaining it(local marketing competence) are the important factors, when EC ventures make the decisions to enter the foreign markets.

  • PDF

Cyber Security Approaches for Industrial Control Networks

  • Dillabaugh, Craig;Nandy, Biswajit;Seddigh, Nabil;Wong, Kevin;Lee, Byoung-Joon (BJ)
    • 정보보호학회지
    • /
    • 제26권6호
    • /
    • pp.42-50
    • /
    • 2016
  • Critical infrastructure (CI) such as the electrical grid, transportation systems and water resource systems are controlled by Industrial Control and SCADA (Supervisory Control and Data Acquisition) networks. During the last few years, cyber attackers have increasingly targeted such CI systems. This is of great concern because successful attacks have wide ranging impact and can cause widespread destruction and loss of life. As a result, there is a critical requirement to develop enhanced algorithms and tools to detect cyber threats for SCADA networks. Such tools have key differences with the tools utilized to detect cyber threats in regular IT networks. This paper discusses key factors which differentiate network security for SCADA networks versus regular IT networks. The paper also presents various approaches used for SCADA security and some of the advancements in the area.

업무지식의 획득 프레임워크 및 적용사례 (A Framework for the Acquisition of Task Knowledge and a Case)

  • 서우종;정재우
    • 지식경영연구
    • /
    • 제4권1호
    • /
    • pp.67-79
    • /
    • 2003
  • Today, corporate knowledge plays a critical role in obtaining competitive advantage. It is often pointed out that corporate knowledge is expected to be able to support various efforts for process innovation. Accordingly, it is important to establish a systematic infrastructure for the acquisition of knowledge which can support business-critical tasks effectively. From this motivation, this paper proposes a framework to guide a series of acquisition procedures for task knowledge and shows how to intemperate with activities for an innovation purpose. Moreover, the useful components of task knowledge are proposed; the schema of the components is ultimately implemented as a repository in a system for the management of task knowledge. To demonstrate the practical usefulness of the framework and the schema components, a real-life case is illustrated.

  • PDF

EVALUATING CRITICAL SUCCESS FACTORS FOR ACCURATE FIRST COST ESTIMATES OF LARGE-SCALE CONSTRUCTION PROJECTS

  • Jin-Lee Kim;Ok-Kyue Kim
    • 국제학술발표논문집
    • /
    • The 3th International Conference on Construction Engineering and Project Management
    • /
    • pp.354-360
    • /
    • 2009
  • The demands for large-scale construction projects such as Mega-projects are largely increasing due to the rapid growth of increasing populations as well as the need to replace existing buildings and infrastructure. Increasing costs of materials, supplies, and labors require the first cost estimates at the preliminary planning stage to be as accurate as possible. This paper presents the results obtained from the survey on evaluating nine critical success factors that influence the accurate first cost estimates for large-scale projects from practical experiences. It then examines the current cost structures of construction companies for large-scale projects, followed by the causes for cost and schedule overrun. Twenty completed surveys were collected and the Analytic Hierarchy Process was applied to analyze the data. The results indicate that technology issues, the contract type, and social and environmental impacts are the significant leading factors for accurate first cost estimates of large-scale construction projects.

  • PDF

주요국 사이버보안 정책 동향 및 시사점 (Trends and Implications of Cybersecurity Policies in Major Countries)

  • 이재성;최선미;안춘모;유영상
    • 전자통신동향분석
    • /
    • 제38권4호
    • /
    • pp.58-69
    • /
    • 2023
  • Cyberspace is emerging as a critical domain requiring national-level governance and international cooperation owing to its potential financial and societal impacts. This research aims to investigate the cybersecurity policies from major countries for understanding with comprehensive perspectives. Global trends emphasize a comprehensive command-centered approach, with top leadership directing cybersecurity policies. Key policy areas include security across technology ecosystems, protection of critical infrastructure, and software supply chain security. Investment is being focused on zero-trust architectures, software bills, and new technologies like artificial intelligence. For countries like Korea, immediate response and adaptation to these trends are crucial to develop and enforce national cybersecurity policies.

저조도 환경 감시 영상에서 시공간 패치 프레임을 이용한 이상행동 분류 (Spatiotemporal Patched Frames for Human Abnormal Behavior Classification in Low-Light Environment)

  • ;공성곤
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2023년도 추계학술발표대회
    • /
    • pp.634-636
    • /
    • 2023
  • Surveillance systems play a pivotal role in ensuring the safety and security of various environments, including public spaces, critical infrastructure, and private properties. However, detecting abnormal human behavior in lowlight conditions is a critical yet challenging task due to the inherent limitations of visual data acquisition in such scenarios. This paper introduces a spatiotemporal framework designed to address the unique challenges posed by low-light environments, enhancing the accuracy and efficiency of human abnormality detection in surveillance camera systems. We proposed the pre-processing using lightweight exposure correction, patched frames pose estimation, and optical flow to extract the human behavior flow through t-seconds of frames. After that, we train the estimated-action-flow into autoencoder for abnormal behavior classification to get normal loss as metrics decision for normal/abnormal behavior.

사회기술적 시스템의 시스템보안과 시스템엔지니어링 (Systems Approach to Sociotechnical Systems - Cyber Security)

  • 한명덕
    • 시스템엔지니어링학술지
    • /
    • 제10권1호
    • /
    • pp.65-71
    • /
    • 2014
  • As one member of the Korea Society of Systems Engineering (KOSSE) and especially as a member of Sociotechnical Systems session of the KOSSE, I tried to contribute somehow to the activity of KOSSE to help development of better Korea systems. This report is a brief discussion of the need for KOSSE activity in the Cyber Security area especially for the protection of national critical infrastructure systems from cyber terror.