• Title/Summary/Keyword: Cyber range

Search Result 102, Processing Time 0.024 seconds

Study on Price Sensitivity at University Cafeterias - Focus on Seoul and Chungcheong Area - (대학구내식당에 대한 대학생의 가격민감도에 관한 연구 - 서울권과 충청권을 중심으로 -)

  • Lee, Eun-Yong;Park, Kyu-Eun;Jeon, Yu-Jung
    • Journal of the East Asian Society of Dietary Life
    • /
    • v.26 no.2
    • /
    • pp.117-124
    • /
    • 2016
  • As the number of cafeterias at universities has increased, studies on student perception of price sensitivity at cafeterias have gained increased attention. Therefore, the study investigated the relationship between students and university cafeterias according to price sensitivity measurement (PSM). According to the analysis, the indifference price (IDP) was 3,444.06 Korean Won while the subsequent cumulative distribution percentage was approximately 17.68%. The optimal pricing point (OPP) was 3,233.73 Korean Won and the stress price (IDP-OPP) was 210.33 Korean Won. The point of marginal expensiveness (PME) was 4,602.24 Koean Won and the point of marginal cheapness (PMC) was 2,036.29 Korean Won. Therefore, the range of acceptable prices (RAP) was established as 2,565.95 Korean Won. In addition, the study examined differences between price sensitivity measurement (PSM) for the respondent subgroups. Hence, the results will provide a practical background for development of business plans for university cafeterias.

Effect of pressure and temperature on bulk micro defect and denuded zone in nitrogen ambient furnace

  • Choi, Young-Kyu;Jeong, Se-Young;Sim, Bok-Cheol
    • Journal of the Korean Crystal Growth and Crystal Technology
    • /
    • v.26 no.3
    • /
    • pp.121-125
    • /
    • 2016
  • The effect of temperature and pressure in the nitrogen ambient furnace on bulk micro defect (BMD) and denuded zone (Dz) is experimentally investigated. It is found that as pressure increases, Dz depth increases with a small decrease of BMD density in the range of temperature, $100{\sim}300^{\circ}C$. BMD density with hot isostatic pressure treatment (HIP) at temperature of $850^{\circ}C$ is higher than that without HIP while Dz depth is lower due to much higher BMD density. As the pressure increases, BMD density is increased and saturated to a critical value, and Dz depth increases even if BMD density is saturated. The concentration of nitrogen increases near the surface with increasing pressure, and the peak of the concentration moves closer to the surface. The nitrogen is gathered near the surface, and does not become in-diffusion to the bulk of the wafer. The silicon nitride layer near the surface prevents to inject the additional nitrogen into the bulk of the wafer across the layer. The nitrogen does not affect the formation of BMD. On the other hand, the oxygen is moved into the bulk of the wafer by increasing pressure. Dz depth from the surface is extended into the bulk because the nuclei of BMD move into the bulk of the wafer.

Exploring the dynamic knowledge structure of studies on the Internet of things: Keyword analysis

  • Yoon, Young Seog;Zo, Hangjung;Choi, Munkee;Lee, Donghyun;Lee, Hyun-woo
    • ETRI Journal
    • /
    • v.40 no.6
    • /
    • pp.745-758
    • /
    • 2018
  • A wide range of studies in various disciplines has focused on the Internet of Things (IoT) and cyber-physical systems (CPS). However, it is necessary to summarize the current status and to establish future directions because each study has its own individual goals independent of the completion of all IoT applications. The absence of a comprehensive understanding of IoT and CPS has disrupted an efficient resource allocation. To assess changes in the knowledge structure and emerging technologies, this study explores the dynamic research trends in IoT by analyzing bibliographic data. We retrieved 54,237 keywords in 12,600 IoT studies from the Scopus database, and conducted keyword frequency, co-occurrence, and growth-rate analyses. The analysis results reveal how IoT technologies have been developed and how they are connected to each other. We also show that such technologies have diverged and converged simultaneously, and that the emerging keywords of trust, smart home, cloud, authentication, context-aware, and big data have been extracted. We also unveil that the CPS is directly involved in network, security, management, cloud, big data, system, industry, architecture, and the Internet.

A study on the Application of Distributed ID Technology based on Blockchain for Welfare Blind Spot Management (복지사각지대 관리를 위한 블록체인 분산 ID기술 적용 연구)

  • Min, Youn A
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.6
    • /
    • pp.145-150
    • /
    • 2020
  • The importance of managing blind spots in the welfare crisis is increasing. Accordingly, in order to manage the blind spot of the welfare crisis, it is necessary to manage the social safety net with the contents of supporting income and self-reliance of low-income families, and actively discovering and supporting poor and crisis households. In this paper, we reviewed various problems related to blind spots for the management of welfare blind spots, and proposed the applicability of blockchain-based distributed ID and the possibility of distributed ID technology in stages by considering the range of blind spots.

A Study on Efficient Data De-Identification Method for Blockchain DID

  • Min, Youn-A
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.60-66
    • /
    • 2021
  • Blockchain is a technology that enables trust-based consensus and verification based on a decentralized network. Distributed ID (DID) is based on a decentralized structure, and users have the right to manage their own ID. Recently, interest in self-sovereign identity authentication is increasing. In this paper, as a method for transparent and safe sovereignty management of data, among data pseudonymization techniques for blockchain use, various methods for data encryption processing are examined. The public key technique (homomorphic encryption) has high flexibility and security because different algorithms are applied to the entire sentence for encryption and decryption. As a result, the computational efficiency decreases. The hash function method (MD5) can maintain flexibility and is higher than the security-related two-way encryption method, but there is a threat of collision. Zero-knowledge proof is based on public key encryption based on a mutual proof method, and complex formulas are applied to processes such as personal identification, key distribution, and digital signature. It requires consensus and verification process, so the operation efficiency is lowered to the level of O (logeN) ~ O(N2). In this paper, data encryption processing for blockchain DID, based on zero-knowledge proof, was proposed and a one-way encryption method considering data use range and frequency of use was proposed. Based on the content presented in the thesis, it is possible to process corrected zero-knowledge proof and to process data efficiently.

lwEPSep: A Lightweight End-to-end Privacy-preserving Security Protocol for CTI Sharing in IoT Environments

  • Hoonyong Park;Jiyoon Kim;Sangmin Lee;Daniel Gerbi Duguma;Ilsun You
    • Journal of Internet Technology
    • /
    • v.22 no.5
    • /
    • pp.1069-1082
    • /
    • 2021
  • The Internet of Things (IoT) is vulnerable to a wide range of security risks, which can be effectively mitigated by applying Cyber Threat Intelligence (CTI) sharing as a proactive mitigation approach. In realizing CTI sharing, it is of paramount importance to guarantee end-to-end protection of the shared information as unauthorized disclosure of CTI is disastrous for organizations using IoT. Furthermore, resource-constrained devices should be supported through lightweight operations. Unfortunately, the aforementioned are not satisfied by the Hypertext Transfer Protocol Secure (HTTPS), which state-of-the-art CTI sharing systems mainly depends on. As a promising alternative to HTTPS, Ephemeral Diffie-Hellman over COSE (EDHOC) can be considered because it meets the above requirements. However, EDHOC in its current version contains several security flaws, most notably due to the unprotected initial message. Consequently, we propose a lightweight end-to-end privacy-preserving security protocol that improves the existing draft EDHOC protocol by utilizing previously shared keys and keying materials while providing ticket-based optimized reauthentication. The proposed protocol is not only formally validated through BAN-logic and AVISPA, but also proved to fulfill essential security properties such as mutual authentication, secure key exchange, perfect forward secrecy, anonymity, confidentiality, and integrity. Also, comparing the protocol's performance to that of the EDHOC protocol reveals a substantial improvement with a single roundtrip to allow frequent CTI sharing.

Distortion of the Dose Profile in a Three-dimensional Moving Phantom to Simulate Tumor Motion during Image-guided Radiosurgery (방사선수술에서 종양 움직임을 재현시킨 움직이는 팬텀을 이용하여 선량 분포의 왜곡에 대한 연구)

  • Kim, Mi-Sook;Ha, Seong-Hwan;Lee, Dong-Han;Ji, Young-Hoon;Yoo, Seong-Yul;Cho, Chul-Koo;Yang, Kwang-Mo;Yoo, Hyung-Jun;Seo, Young-Seok;Park, Chan-Il;Kim, Il-Han;Ye, Seong-Jun;Park, Jae-Hong;Kim, Kum-Bae
    • Radiation Oncology Journal
    • /
    • v.25 no.4
    • /
    • pp.268-277
    • /
    • 2007
  • Purpose: Respiratory motion is a considerable inhibiting factor for precise treatment with stereotactic radiosurgery using the CyberKnife (CK). In this study, we developed a moving phantom to simulate three-dimensional breathing movement and investigated the distortion of dose profiles between the use of a moving phantom and a static phantom. Materials and Methods: The phantom consisted of four pieces of polyethylene; two sheets of Gafchromic film were inserted for dosimetry. Treatment was planned to deliver 30 Gy to virtual tumors of 20, 30, 40, and 50 mm diameters using 104 beams and a single center mode. A specially designed robot produced three-dimensional motion in the right-left, anterior-posterior, and craniocaudal directions of 5, 10 and 20 mm, respectively. Using the optical density of the films as a function of dose, the dose profiles of both static and moving phantoms were measured. Results: The prescribed isodose to cover the virtual tumors on the static phantom were 80% for 20 mm, 84% for 30 mm, 83% for 40 mm and 80% for 50 mm tumors. However, to compensate for the respiratory motion, the minimum isodose levels to cover the moving target were 70% for the $30{\sim}50$ mm diameter tumors and 60% for a 20 mm tumor. For the 20 mm tumor, the gaps between the isodose curves for the static and moving phantoms were 3.2, 3.3, 3.5 and 1.1 mm for the cranial, caudal, right, and left direction, respectively. In the case of the 30 mm tumor, the gaps were 3.9, 4.2, 2.8, 0 mm, respectively. In the case of the 40 mm tumor, the gaps were 4.0, 4.8, 1.1, and 0 mm, respectively. In the case of the 50 mm diameter tumor, the gaps were 3.9, 3.9, 0 and 0 mm, respectively. Conclusion: For a tumor of a 20 mm diameter, the 80% isodose curve can be planned to cover the tumor; a 60% isodose curve will have to be chosen due to the tumor motion. The gap between these 80% and 60% curves is 5 mm. In tumors with diameters of 30, 40 and 50 mm, the whole tumor will be covered if an isodose curve of about 70% is selected, equivalent of placing a respiratory margin of below 5 mm. It was confirmed that during CK treatment for a moving tumor, the range of distortion produced by motion was less than the range of motion itself.

Analysis of Fire Risk Assessment Indicators of Publicly-Used Establishments using Delphi/AHP (Delphi/AHP를 활용한 다중이용업 신종업종의 화재위험평가지표 분석)

  • Kim, Myung-Cheol;Kim, Hak-Joong;Park, Kyung-Hwan;Youn, Hae-Kwon;Lee, Seung-Ho
    • Fire Science and Engineering
    • /
    • v.33 no.6
    • /
    • pp.87-94
    • /
    • 2019
  • Through a press release dated July 17, 2018, the Anti-Corruption and Civil Rights Commission recommended that the National Fire Agency develop preventive measures against fire in the "Indoor Archery Ground" and "Room Escape Café" etc., which were originally excluded from the category of "Publicly Used Establishments." This study developed the hierarchy of domains and indicators of measurement for fire risk assessment of the new business of publicly used establishments through the Delphi Method. It analyzed the goodness of fit scores (over 3.00) and secured an average score of 4.25. Using AHP analysis, the ratio of consistency for the domains of measurement of fire risk assessment was found to be 4.0%, which was lower than CR ≤ 0.1 (10%). The consistency of subsequent measurement indicators were distributed in the range of 0.1%~3.6%, and they were identified as being commonly consistent. The indicators of measurement appeared as follows in order of importance and priority: Type of Internal Passage of Establishment and Evacuation Capacity of Exit (0.316), Control of Ignition Source (0.141), Inherent Risk (0.106), Appropriateness and Adaptiveness of Fire Detection System (0.097), Control of Inflammables/Combustibles (0.084), Guides and Facilities helping Evacuation (0.075), Fire Resistant Structure and Finishing Materials (0.060), Compartmentalization and Emergency Exit (0.049), Risk of Fire Expansion (0.046), and Appropriateness and Adaptiveness of Fire Extinguishing Facilities (0.026). The findings of this study are expected to be expansively used as data for future research on the development of fire risk assessment indicators.

Clinical outcome of fiducial-less CyberKnife radiosurgery for stage I non-small cell lung cancer

  • Jung, In-Hye;Song, Si Yeol;Jung, Jinhong;Cho, Byungchul;Kwak, Jungwon;Je, Hyoung Uk;Choi, Wonsik;Jung, Nuri Hyun;Kim, Su Ssan;Choi, Eun Kyung
    • Radiation Oncology Journal
    • /
    • v.33 no.2
    • /
    • pp.89-97
    • /
    • 2015
  • Purpose: To evaluate the treatment results in early stage non-small cell lung cancer patients who have undergone fiducial-less CyberKnife radiosurgery (CKRS). Materials and Methods: From June 2011 to November 2013, 58 patients underwent CKRS at Asan Medical Center for stage I lung cancer. After excluding 14 patients, we retrospectively reviewed the records of the remaining 44 patients. All analyses were performed using SPSS ver. 21. Results: The median age at diagnosis was 75 years. Most patients had inoperable primary lung cancer with a poor pulmonary function test with comorbidity or old age. The clinical stage was IA in 30 patients (68.2%), IB in 14 (31.8%). The mean tumor size was 2.6 cm (range, 1.2 to 4.8 cm), and the tumor was smaller than 2 cm in 12 patients (27.3%). The radiation dose given was 48-60 Gy in 3-4 fractions. In a median follow-up of 23.1 months, local recurrence occurred in three patients (2-year local recurrence-free survival rate, 90.4%) and distant metastasis occurred in 13 patients. All patients tolerated the radiosurgery well, only two patients developing grade 3 dyspnea. The most common complications were radiation-induced fibrosis and pneumonitis. Eight patients died due to cancer progression. Conclusion: The results showed that fiducial-less CKRS shows comparable local tumor control and survival rates to those of LINAC-based SABR or CKRS with a fiducial marker. Thus, fiducial-less CKRS using Xsight lung tracking system can be effectively and safely performed for patients with medically inoperable stage I non-small cell lung cancer without any risk of procedure-related complication.

A Mathematics Tutoring Model That Supports Interactive Learning of Problem Solving Based on Domain Principles (공식원리에 기반한 대화식 문제해결 학습을 지원하는 수학교수 모형)

  • Kook, Hyung-Joon
    • The KIPS Transactions:PartB
    • /
    • v.8B no.5
    • /
    • pp.429-440
    • /
    • 2001
  • To achieve a computer tutor framework with high learning effects as well as practicality, the goal of this research has been set to developing an intelligent tutor for problem-solving in mathematics domain. The maine feature of the CyberTutor, a computer tutor developed in this research, is the facilitation of a learning environment interacting in accordance with the learners differing inferential capabilities and needs. The pedagogical information, the driving force of such an interactive learning, comprises of tutoring strategies used commonly in various domains such as phvsics and mathematics, in which the main contents of learning is the comprehension and the application of principles. These tutoring strategies are those of testing learners hypotheses test, providing hints, and generating explanations. We illustrate the feasibility and the behavior of our propose framework with a sample problem-solving learning in geometry. The proposed tutorial framework is an advancement from previous works in several aspects. Firstly, it is more practical since it supports handing of a wide range of problem types, including not only proof types but also finding-unkown tpes. Secondly, it is aimed at facilitating a personal tutor environment by adapting to learners of varying capabilities. Finally, learning effects are maximized by its tutorial dialogues which are derived from real-time problem-solving inference instead of from built-in procedures.

  • PDF