• Title/Summary/Keyword: Cyber university

Search Result 2,845, Processing Time 0.027 seconds

Comparative Analysis of Information Security Textbooks for Chinese Elementary and Secondary Students (중국의 초·중등학생 대상 정보보호 교재 비교 고찰)

  • Eunsun Choi;Namje Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.183-192
    • /
    • 2023
  • Digital transformation is taking place rapidly around the world. As the development of digital technology becomes very fast, more information is expected to be digitized. Therefore, the possibility of cyber threats is increasing in transmitting and storing sensitive information such as personal and financial information online. In this paper, we compared and analyzed information security textbooks for elementary and secondary school students in China, where the recent development of artificial intelligence and digital transformation are rapidly occurring. After we collected related textbooks, textbooks suitable for analysis were selected. Then, we analyzed the external and internal systems of the textbooks separately. As a result of the external system analysis, all the textbook covers were properly produced, but the quality difference was significant among textbooks. In the case of textbooks for elementary school students, the excellence of layout and content placement was noticed. On the other hand, due to the internal system analysis, various contents were not included evenly when looking at the learning contents based on the "information society responsibility" learning goals presented in China. Through this paper, we hope to provide implications for information security-related education and textbook development research.

Text Network Analysis on Stalking-Related News Articles (스토킹 관련 언론기사에 대한 텍스트네트워크분석)

  • Eun-Sun Ji;Sang-Hee Jeong
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.579-585
    • /
    • 2023
  • The purpose of this study is to explore keywords within stalking-related news articles according to political orientation through the text network analysis, and then to examine the implicit intentions. Selecting total 1,607 articles including 824 articles of the conservative press(The Chosun Ilbo, The Joongang Ilbo) and 783 articles of the progressive press(The Hankyoreh, The Kyunghyang Shinmun) reported from January 1, 2018 to December 31, 2022, this study explored the aspect of topic category drawn through the topic modeling technique based on LDA(Latent Dirichlet Allocation). In the results of this study, the common topics of the conservative and progressive press were improvement of the perception of gender-based violence, personal protection & intensity of punishment, and disclosure of stalkers' personal information. Regarding the topics differently shown in those two press, the conservative press showed stalkers' harmful act, and outline of 'murder case at Sindang Station' while the progressive press showed request for aggravated punishment on the 'murder case at Sindang Station', and eradication of sexual exploitation crime (in cyber space). The results of this study imply that there are changes in the type of reporting according to ideological opinions about stalking in news articles.

Life Stage Preparation Program in an Aged Society (고령사회를 대비한 노년준비교육 프로그램에 관한 연구)

  • Kim, Byung-Sook;Yang, Ok-Nam;Kang, In;Han, Eun-Joo;Won, Mihee
    • 한국노년학
    • /
    • v.25 no.2
    • /
    • pp.229-244
    • /
    • 2005
  • Korea is expected to become an "aged society" in approximately fifteen years. In order to prepare Korean society for this "aged society", the government and social organizaitons need to offer a life stage preparation manual for the young, middle-aged, and aging populations, as well as providing support structures to guide them through this transition. Researchers have developed a Life Stage Preparation Program, based on surveys and experiments conducted to assess needs and appraise effectiveness. To accomplish the goal of this research, the team has been composed of specialists from the fields of social welfare, family studies, occupational studies, and gerontology. The Life Stage Preparation Program consists of ten areas: understanding ageing issues, sustaining and improving health, psychological issues, continuing education, family relations, social activities, financial preparation, occupations, shelter, and mortality. The effectiveness of the program surveyed on age group of 20s and 60s resulted in nine areas. The Life Stage Preparation Program needs to be operated as a life long education program.

Assessment of Apartment Building Construction Workers' Noise Exposure (아파트 건설노동자 소음 노출평가)

  • Taesun Kang
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.33 no.3
    • /
    • pp.308-316
    • /
    • 2023
  • Objectives: The aim of this study is to measure and assess the occupational noise exposure levels among construction workers at apartment building construction sites in South Korea. Methods: Noise exposure assessments were conducted for 139 construction workers across 10 different trades at 53 apartment building construction sites in the northern part of Gyeonggi-do. Assessments were carried out using a noise dosimeter set with a 90 dB criterion, an 80 dB threshold, and a 5 dB exchange rate over a period of more than 6 hours(LMOEL) Results: The mean LMOEL (equivalent continuous noise level over 8 hours) for the 139 dosimeter samples was 87.8 ± 4.3 dBA. The mean noise exposure level for each construction trade, referred to as the trade mean, was also calculated. Significant differences in noise exposure levels were observed between construction trades (ANOVA, p < 0.001). The highest LMOEL values were recorded for concrete chippers (93.2 ± 2.6 dBA), followed by ironworkers (88.4 ± 0.7 dBA), concrete finishers (88.3 ± 2.7 dBA), masonry workers (87.7 ± 1.9 dBA), pile driver operators (85.6 ± 1.7 dBA), concrete carpenters (84.9 ± 2.4 dBA), interior carpenters (83.5 ± 2.1 dBA), and other groups (81.4 ± 2.2 dBA). Conclusions: The findings suggest that nearly all construction workers in this study are at risk of Noise-Induced Hearing Loss (NIHL). Moreover, the study establishes that construction trades can serve as a useful metric for assessing noise exposure levels at apartment construction sites.

Efforts against Cybersecurity Attack of Space Systems

  • Jin-Keun Hong
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.4
    • /
    • pp.437-445
    • /
    • 2023
  • A space system refers to a network of sensors, ground systems, and space-craft operating in space. The security of space systems relies on information systems and networks that support the design, launch, and operation of space missions. Characteristics of space operations, including command and control (C2) between space-craft (including satellites) and ground communication, also depend on wireless frequency and communication channels. Attackers can potentially engage in malicious activities such as destruction, disruption, and degradation of systems, networks, communication channels, and space operations. These malicious cyber activities include sensor spoofing, system damage, denial of service attacks, jamming of unauthorized commands, and injection of malicious code. Such activities ultimately lead to a decrease in the lifespan and functionality of space systems, and may result in damage to space-craft and, lead to loss of control. The Cybersecurity Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) matrix, proposed by Massachusetts Institute of Technology Research and Engineering (MITRE), consists of the following stages: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command & Control, Exfiltration, and Impact. This paper identifies cybersecurity activities in space systems and satellite navigation systems through the National Institute of Standards and Technology (NIST)'s standard documents, former U.S. President Trump's executive orders, and presents risk management activities. This paper also explores cybersecurity's tactics attack techniques within the context of space systems (space-craft) by referencing the Sparta ATT&CK Matrix. In this paper, security threats in space systems analyzed, focusing on the cybersecurity attack tactics, techniques, and countermeasures of space-craft presented by Space Attack Research and Tactic Analysis (SPARTA). Through this study, cybersecurity attack tactics, techniques, and countermeasures existing in space-craft are identified, and an understanding of the direction of application in the design and implementation of safe small satellites is provided.

Task offloading scheme based on the DRL of Connected Home using MEC (MEC를 활용한 커넥티드 홈의 DRL 기반 태스크 오프로딩 기법)

  • Ducsun Lim;Kyu-Seek Sohn
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.6
    • /
    • pp.61-67
    • /
    • 2023
  • The rise of 5G and the proliferation of smart devices have underscored the significance of multi-access edge computing (MEC). Amidst this trend, interest in effectively processing computation-intensive and latency-sensitive applications has increased. This study investigated a novel task offloading strategy considering the probabilistic MEC environment to address these challenges. Initially, we considered the frequency of dynamic task requests and the unstable conditions of wireless channels to propose a method for minimizing vehicle power consumption and latency. Subsequently, our research delved into a deep reinforcement learning (DRL) based offloading technique, offering a way to achieve equilibrium between local computation and offloading transmission power. We analyzed the power consumption and queuing latency of vehicles using the deep deterministic policy gradient (DDPG) and deep Q-network (DQN) techniques. Finally, we derived and validated the optimal performance enhancement strategy in a vehicle based MEC environment.

Study on Development of Basic Fire Evacuation Scenarios considering Characteristics of Special Schools (특수학교 특성을 고려한 화재대피 기본 시나리오 개발 연구)

  • Sammy Park;Sanghyun Ryu;Changhee Cho;Serim Kang;Yunseo Jeong;Younggeun Yoon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.6
    • /
    • pp.1081-1087
    • /
    • 2023
  • Although the school-age population is continuously decreasing, the number of people eligible for special education is increasing every year. Special schools, which are comprised entirely of students with special education needs, are vulnerable due to restrictions on evacuation in the event of a fire. However, the characteristics of special schools are not reflected in the plans related to firefighting and safety in special schools. In this study, essential items such as placement of helpers were selected through analysis of firefighting and school safety plans and collection of faculty and staff opinions. Afterwards, through analysis of experts' opinions, a basic fire evacuation scenario was presented that reflected the characteristics of special schools. We hope that this scenario will contribute to the development of customized fire evacuation scenarios for each special school in the future.

Evaluation of Vasodilative Effects on 10 Traditional Herbal Formulas for Treatment of Hypertension (고혈압 치료를 위한 상용하는 한약 처방 10종의 혈관이완 평가)

  • Bumjung Kim
    • The Korea Journal of Herbology
    • /
    • v.39 no.3
    • /
    • pp.69-76
    • /
    • 2024
  • Objectives : Hypertension (high blood pressure), one of the world's major chronic diseases, has a high mortality rate due to its high prevalence and complications, but its control rate is low. The proper management and control through appropriate exercise, diet management, and optimal drug choice can reduce the risk of death from hypertension. Although various antihypertensive drugs are used to treat hypertension, they also have numerous adverse effects. Alongside increased interest in the use of Traditional Herbal Formulas (THF) for hypertension treatment, the purpose of this study was to examine the vasodilative effects of 10 THF in the rat thoracic artery pre-contracted by potassiumchloride (KCl). Methods : THF were extracted with distilled water for 2 hours. The rat thoracic artery was suspended and contracted by KCl in the organ bath which contained 10 ml Krebs Henseleit (KH) buffer. THF extracts were added in a dose-dependent increase (10-1,000 ㎍/mL) to examine vasodilative effects. The vasodilative effects produced by THF were expressed as the percentage in response to KCl-induced contraction. Results : Among the 10 THF, Banhasasim-tang, Buhnsimgieum, Sagunja-tang, and Samul-tang showed vasodilative effects. And, Sipjeondaebo-tang, Ssanghwa-tang, Ojeok-san, Onkyung-tang, Yongdamsagan-tang, and Hyangsayukgunja-tang showed no significant vasodilative effects. Also, in co-administration with amlodipine, Banhasasim-tang showed higher vasodilative effects than amlodipine alone, and Buhnsimgieum showed greater vasodilative effects at low concentrations, but inhibited amlodipine's vasodilative effects at high concentrations. Conclusion : As a result of these studies, they will be expected to provide useful data to establish guidelines of combined administration of THF and western antihypertensive drugs for the treatment of hypertension.

The Design Research on ICT Security Concepts and Domains (ICT기반 보안개념 정의와 범위에 관한 설계연구)

  • Minseo Jeon;Hangbae Chang
    • Information Systems Review
    • /
    • v.21 no.3
    • /
    • pp.49-61
    • /
    • 2019
  • As the number of security incidents and damages increase steadily, interest in the security of society is growing, and the amount of academic interest and research is steadily increasing. However, despite these concerns and the quantitative increase in research, the terms 'security' and 'safety' have been mixed and studies have been conducted without the conceptual definition of various security terms being clearly defined. As a result, various forms of security concepts based on ICT environments have been misused. Therefore, we tried to derive the consensus of experts among the various security terms which are mixed in this study, and to summarize the concepts based on the analysis of domestic and foreign documents based on the concept of the terms. Through this research, we intend to contribute to the establishment of the academic identity of security by preventing related mistakes caused by the mixed use of terminology.

A study on Shift Efficiency Characteristics of a 2-speed Transmission applying CVT Structure (CVT구조를 적용한 2단 변속기의 효율특성에 관한 연구)

  • Kwang-Wook Youm
    • Journal of the Korean Institute of Gas
    • /
    • v.28 no.1
    • /
    • pp.59-64
    • /
    • 2024
  • In this study, we conducted research on a miniaturized transmission system suitable for ultra-compact electric vehicles, such as electric arts or small electric cars. While conventional electric vehicles eliminate multi-gear transmissions and control motor output or secure initial driving force through reducers, in vehicles like electric karts or compact electric cars, which have relatively small battery capacities, the driving range can be reduced or the motor can be stressed epending on the loading state. Therefore, in this study, we developed a low stage ratio 0.625 and high stage ratio 1.6 a two-stage transmission system that can change gears as needed, considering factors such as slope conditions and loading status, by applying the continuously variable transmission (CVT) mechanism. Based on the selected gear ratios, we designed the transmission and created a test rig to verify the power transmission efficiency of the developed transmission. Using the test rig, we varied the rotational speed and load of the transmission to confirm its power transmission characteristics and also examined the heat generation characteristics during shifting and operation. As a result, developed a two-stage transmission with a CVT structure.