• Title/Summary/Keyword: Cyber university

Search Result 2,868, Processing Time 0.03 seconds

Comparative Studies on Figures Appeared in Moral Education Textbooks for Elementary and Junior High Schools in Korea and Japan (한국과 일본의 초·중학교 도덕 교과서에 나타난 인물상 비교연구)

  • Kunii, Yutaka
    • Korean Journal of Comparative Education
    • /
    • v.22 no.4
    • /
    • pp.51-73
    • /
    • 2012
  • The purpose of this study was to demonstrate the characteristics of ideal figure aimed by the moral education of both Korea and Japan by comparing and analyzing the descriptive content and characters' tendency appeared in the moral education textbooks published in accordance with the current moral education curriculum in Korea and Japan. First, this study examined the tendency of real persons appeared in the moral education textbooks in both countries. To be specific, this study attempted a quantitative comparative analysis of the characters' tendency by expressing the distribution of the characters by appearance time, male-to-female ratio, Koreans and foreigners and characters by occupation and position in percentage. Furthermore, it attempted to demonstrate the particular emphasis in values and virtues in both countries by examining the moral values derived from the characters' decency, way of life and teachings and expressing the distribution of the characters by value and virtue in percentage.

An Analysis of Complement Structures of a Sentence in Indonesian: Based on the Analyses of Current Studies (인도네시아어 보어 문장구조 분석: 학자들 시각 분석을 토대로)

  • IM, Youngho
    • The Southeast Asian review
    • /
    • v.28 no.4
    • /
    • pp.223-252
    • /
    • 2018
  • The purpose of this paper is to substantially analyse the patterns of complements considering the aspects of not only syntax but also morphology since the concept of complement has been used as a term to analyse the components of a sentence. However, it cannot be denied that there seemed to be limitations due to the partial explanation or different explanations of the same sentence. Thus, this paper aims at dealing with the close relation between sentential components and suffixes to examine the sentence patterns; subject, predicate, object, complement, and adjunct focusing on the terms of complement which has been seen problematic due to incomplete explanations and different interpretations of the same sentence. Finally, this paper synthesises various opinions of many scholars and integrates them to get explicit and practical patterns of complement of a sentence based on not only syntax but also morphology through close relation between sentential components and morphological suffixes.

Study on the Shift Characteristics of a 2speed Manual Transmission apply to V-Blet (V-blet를 적용한 2단 수동변속기의 변속특성에 관한 연구)

  • Youm, Kwang-wook
    • Journal of the Korean Institute of Gas
    • /
    • v.24 no.6
    • /
    • pp.55-60
    • /
    • 2020
  • As research and development of eco-friendly vehicles are expanding worldwide, additional devices of vehicles are reduced or deleted to increase the mileage, or research is being conducted to reduce weight. Among them, the multi-stage transmission that was applied to the internal combustion engine vehicle was deleted and replaced with a reducer, and the initial driving power is secured by increasing the torque through the control of the motor output value. However, since frequent motor speed change can result in a load increase, this study attempts to develop a compact and lightweight manual two-stage reducer with a general reducer structure. Therefore, a two-speed transmission with two gear ratio was designed by inserting a large gear and a small gear in a structure with a parallel shaft to connect the gears with a V-belt in the form of a parallel shaft reducer, and setting the gear ratio of the low and high gears respectively. In addition, power performance according to the rotational speed and load of the transmission was checked through a test, and the heat generation characteristics generated during driving were checked to verify the validity of the transmission.

A study on the application of blockchain technology to prevent duplicate supply and demand of similar welfare services (복지서비스 유사사업의 중복수급 방지를 위한 블록체인 기술 적용 연구)

  • Min, Youn A
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.6
    • /
    • pp.151-156
    • /
    • 2020
  • Various institutions provide various welfare-related services, and accordingly, the quantity and quality of welfare-related services are improved. Along with the improvement of welfare services, the rate of fraudulent and redundant supply and demand due to inappropriate applicants is also increasing. In particular, in the case of similarly promoted projects by various institutions, confirmation of duplicate applications may be insufficient due to system inconsistency between institutions and delays in qualification verification, which may result in duplicate supply and demand. In this paper, in order to prevent the redundant supply and demand related to welfare service similar projects in various institutions, the problem of data management and sharing between institutions was reviewed and a method of applying blockchain technology was proposed step by step. Through the proposal of this paper, transparent data management of recipients is possible, and through this, trust-based welfare benefit management will be possible.

Cybersecurity of The Defense Information System network connected IoT Sensors (IoT Sensor가 연결된 국방정보통신망의 사이버보안 연구)

  • Han, Hyun-Jin;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.6
    • /
    • pp.802-808
    • /
    • 2020
  • The IoT(Internet of Things) is based on the development of sensor technology and high-speed communication infrastructure, and the number of IoT connected to the network is increasing more than the number of people, and the increase is also very fast. In the field of defense, IoT is being deployed in various fields such as operations, military, base defense, and informatization, and the need is also increasing. Unlike the existing PC/server information protection system, cyber threats are also increasing as IoT sensors, which are vulnerable to information protection, are increasing in the network, so it is necessary to study the platform to protect the defense information and communication network. we investigated the case of connecting wired and wireless IoT to the defense network, and presented an efficient interlocking design method of the IoT integrated independent network with enhanced security by minimizing the contact point with the defense network.

Case Study of Supportive Music Imagery for Enhancing Self-Worth (지지적 음악심상(SMI)기법을 통한 내담자의 자기가치감 증진에 대한 사례연구)

  • Park, Jieun
    • Journal of Music and Human Behavior
    • /
    • v.17 no.2
    • /
    • pp.57-82
    • /
    • 2020
  • As a case study of the application of supportive music and imagery (SMI), this study examined the impact of SMI in helping clients establish greater self-worth. Sense of self-worth was defined as trust and respect for the self as evidenced by understanding of one's individuality and uniqueness. Participants in the study were two adults in need of help with psychological challenges arising from low self-worth. Each of them participated in SMI sessions once a week, for a total of 6 weeks. Participants' statements on the imagery drawn by them during SMI sessions were analyzed in relation to components of the sense of self-worth. The results of this study showed that SMI sessions helped both clients recognize their internal resources and gaining insight into the value of their internal resources increased their evaluation of their own self-worth. Specific factors of SMI sessions that impacted the clients' self-worth and suggestions for future studies are also discussed.

A study on the threat hunting model for threat detection of circumvent connection remote attack (우회 원격공격의 위협탐지를 위한 위협 헌팅 모델 연구)

  • Kim, Inhwan;Ryu, Hochan;Jo, Kyeongmin;Jeon, Byungkook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.4
    • /
    • pp.15-23
    • /
    • 2021
  • In most hacking attacks, hackers intrudes inside for a long period of time and attempts to communicate with the outside using a circumvent connection to achieve purpose. research in response to advanced and intelligent cyber threats has been mainly conducted with signature-based detection and blocking methods, but recently it has been extended to threat hunting methods. attacks from organized hacking groups are advanced persistent attacks over a long period of time, and bypass remote attacks account for the majority. however, even in the intrusion detection system using intelligent recognition technology, it only shows detection performance of the existing intrusion status. therefore, countermeasures against targeted bypass rwjqthrwkemote attacks still have limitations with existing detection methods and threat hunting methods. in this paper, to overcome theses limitations, we propose a model that can detect the targeted circumvent connection remote attack threat of an organized hacking group. this model designed a threat hunting process model that applied the method of verifying the origin IP of the remote circumvent connection, and verified the effectiveness by implementing the proposed method in actual defense information system environment.

A Single Case Study of Enneagram Counseling for Adult Women Experiencing Interpersonal Conflict (대인관계 갈등을 경험하고 있는 성인여성에 대한 에니어그램상담 단일사례연구)

  • Bae, Na-Rae
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.4
    • /
    • pp.293-298
    • /
    • 2022
  • This study is a case study using the Enneagram counseling technique for adult women who are having difficulties in interpersonal relationships. As a result of the analysis, the client learned how to express emotions and thoughts without suppressing the interpersonal difficulties they are currently experiencing at work. Focusing on the current task, he looked at what he was obsessed with in the most difficult and difficult situation, and confirmed that he realized that he had become obsessed with the interaction of distorted emotions and thoughts of the ego. During the counseling process, the client looked back on herself and realized a new communication method, understood her personality change, social interaction and attitude change in order to restore confidence, and also showed changes in relationship formation with co-workers.

Performance Analysis of Consensus Algorithm considering NFT Transaction Stability (NFT 거래 안정성을 고려한 합의알고리즘 성능분석)

  • Min, Youn-A;Lim, Dong-Kyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.2
    • /
    • pp.151-157
    • /
    • 2022
  • In this paper, the performance of various blockchain consensus algorithms was compared and analyzed as a method to increase the transaction cost and processing time during NFT transactions and to increase the transaction stability requirements that occur during smart contract execution. Network reliability and TPS are evaluation items for performance comparison. TPS and the stability of the Consensus algorithm are presented for three evaluation items. In order to establish a standardized expression for each evaluation item, the reliability of the node and the success rate of the smart contract were considered as variables in the calculation formula, and the performance of the consensus algorithm of the three groups, PoW/PoS, Paxos/Raft and PBFT, was compared under the same conditions. / analyzed. As a result of the performance evaluation, the network reliability of the three groups was similar, and in the case of the remaining two evaluation items, it was analyzed that the PBFT consensus algorithm was superior to other consensus algorithms. Through the performance evaluation equations and results of this study, it was analyzed that when the PBFT consensus processing process is reflected in the consensus process, the network reliability can be guaranteed and the stability and economic efficiency of the consensus algorithm can be increased.

A Study on the Use of RDW Data in Virtual Environment (가상환경에서 방향전환보행 데이터 활용 연구)

  • Lim, Yangmi
    • Journal of Broadcast Engineering
    • /
    • v.27 no.5
    • /
    • pp.629-637
    • /
    • 2022
  • This study is an experiment on the use of RDW(Redirected Walking) technology, which helps users to hardly feel the difference of user movement in the limited physical space and the extended virtual space when the user moves while wearing the HMD in the real world. The RDW function installed in 3D space realization software such as Unity3D is used to induce the user's redirection by slightly distorting the virtual space according to the user's point of view. However, if the RDW distortion rate is used excessively, dissonance is highly likely to occur. In particular, it is easy to make errors that cause cybersickness of users. It is important to obtain the RDW data value in the virtual environment so that the user does not feel fatigue and cybersickness even after wearing the HMD for a long time. In this experiment, it was tested whether the user's RDW was safely implemented, and item and obstacle arrangement data were obtained through this experiment. The RDW data obtained as a result of the experiment were used for item placement and obstacle placement in the virtual space.