• Title/Summary/Keyword: Cyber university

Search Result 2,837, Processing Time 0.026 seconds

Performance Estimation of Hexagonal Rockfall Protection Net by Numerical Analysis (수치해석을 이용한 육각 낙석방지망의 성능 평가)

  • Oh, Sewook;Park, Soobeom;Kwon, Youngcheul
    • Journal of the Korean GEO-environmental Society
    • /
    • v.15 no.11
    • /
    • pp.53-59
    • /
    • 2014
  • It has been generally recognized that the conventional rockfall protection nets have several problems to actual field application in the aspect of shock absorption, lack of pullout bearing capacities, and net damages. Because of the recognition, authors have tried to develop a new rockfall protection system consisted of shock absorption parts and hexagonal net configuration. In the previous research by the authors, the performance of the newly developed rockfall protection system has been investigated through the laboratory tests and the full-scale testing. In this study, subsequently, numerical analysis program is organized to make a confirmation of the structural stability and performance. For the correct design procedure of the hexagonal net system, it is essential to understand the various mechanical behavior of the entire system. It is also important to be reproduced the systematic characteristics of the system acquired by laboratory and full-scale testing by numerical analysis in order to carry out the numerical experiment to understand various mechanical behavior of the system. As a conclusion, the hexagonal net has better performance in mechanical and physical behavior compared with that of the rectangular net. Furthermore, due to the hexagonal net shows a good performance in aspect of the load distribution, it gives a good alternative in long-term management of the rockfall protection net.

A Study on the Clustering method for Analysis of Zeus Botnet Attack Types in the Cloud Environment (클라우드 환경에서 제우스 Botnet 공격 유형 분석을 위한 클러스터링 방안 연구)

  • Bae, Won-il;Choi, Suk-June;Kim, Seong-Jin;Kim, Hyeong-Cheon;Kwak, Jin
    • Journal of Internet Computing and Services
    • /
    • v.18 no.1
    • /
    • pp.11-20
    • /
    • 2017
  • Recently, developments in the various fields of cloud computing technology has been utilized. Whereas the demand for cloud computing services is increasing, security threats are also increasing in the cloud computing environments. Especially, in case when the hosts interconnected in the cloud environments are infected and propagated through the attacks by malware. It can have an effect on the resource of other hosts and other security threats such as personal information can be spreaded and data deletion. Therefore, the study of malware analysis to respond these security threats has been proceeded actively. This paper proposes a type of attack clustering method of Zeus botnet using the k-means clustering algorithm for malware analysis that occurs in the cloud environments. By clustering the malicious activity by a type of the Zeus botnet occurred in the cloud environments. it is possible to determine whether it is a malware or not. In the future, it sets a goal of responding to an attack of the new type of Zeus botnet that may occur in the cloud environments.

Laboratory and Full-scale Testing to Investigate the Performance of Rock Fall Protection System with Hexagonal Wire Net (육각 낙석방지망의 성능평가를 위한 실내 및 실대형실험)

  • Youn, Ilro;Oh, Sewook;Kwon, Youngcheul
    • Journal of the Korean GEO-environmental Society
    • /
    • v.15 no.9
    • /
    • pp.69-75
    • /
    • 2014
  • Rock fall protection system installed against rock slope is one of the most conventional way to protect nearby infra structures. Despite of wide application of typical rectangular nets, virtually installed to protect rock slope face, several problems have also been pointed out up to date. Rectangular draped nets are vulnerable to a sudden external shock such as rock fall, because it doesn't have any systematical buffers or shock absorbers. Furthermore, it has been widely recognized from the some cases of rock fall accident in Korea that rock fall protection nets cause wide range of failure in the rock slope faces due to insufficient pullout bearing capacity of fixing parts. Therefore, in this study, we tried to make a consideration about the problems of existing standard rock fall protection nets in Korea, and develop a new type of hexagonal net with a shock absorber based on design rock fall energy. In this paper, laboratory and full scale test procedure is described to analysis the performance of newly developed hexagonal rock fall net, and the key results are presented and discussed.

Study on the Standardization of Korean Distribution Terminology through its Usage Survey (유통분야 전문용어 사용실태 조사를 통한 용어 표준화 연구)

  • Han, Kyu-Chul;Lee, Sang-Youn
    • Journal of Distribution Science
    • /
    • v.13 no.4
    • /
    • pp.77-87
    • /
    • 2015
  • Purpose - This study aims to investigate the current state of distribution terminology usage by retailers and consumers nationwide, and to suggest a practical improvement plan for its standardization. The Korean distribution industry is closely related to consumers' daily lives. However, in reality, there exists a gap among producers, distributors, and consumers in terms of the definition, understanding, and perception of the terminology. Therefore, standardizing this terminology is essential for more smooth communication. This paper suggests the necessity of committing overall research and survey activities to the actual conditions of using Korean distribution terminology by organizations and their respective management situations, and further, the necessity of probing the problem and its measures in line with the objective and mission of the "Fundamental Law of the Korean Language." Research design, data, and methodology - This study's scope is limited to wholesale and retail including some information systems. First, the study covers most written material including lexicons and glossary of distribution terminology, university textbooks and teaching material for national certificate of qualification, and related laws and ordinances. Second, the survey covers retailers' management situations by store format. The retailers used as the sample for the survey include department stores, discount stores, SSM, and convenience stores. Altogether, 20 specialists were interviewed in their respective sectors or retail formats. Finally, the project team surveyed a sample of 1,300 consumers nationwide on 50 distribution terms mainly used by consumers, including those about awareness, understanding, usage, and attitude. Results - In total, 1,249 terms are drawn through literature research including distribution terminology used in the related literature, glossary and lexicons, distribution terminology in textbooks, and legal terminology. A classified table comprises four large categories including general distribution, distribution marketing, distribution information, and merchandise. The results of the three-step research including literature survey, field survey of retailers, and consumer survey were advised to be screened by academia (retail associations, faculty etc.), retailers (major retail management by store format), retail specialists and consultants, consumers, and Korean linguists. In total, 1,300 questionnaires for 50 terms of the distribution terminology closely associated with consumers were distributed to subjects nationwide. Conclusions - The desired and expected results from this study are summarized from three perspectives as follows: First, from retailers' perspective, a new concept, or coinage of new terms of the distribution industry stems from advanced countries such as America and Europe. However, the original meaning and definition are diluted and distorted with changes in the language users' situations and context. This study provides basic guidelines for standardization of distribution terms used among various retail formats in most daily life situations that consumers encounter. Second, from the nation's perspective, this study suggests optimal choices of distribution terminology in the context of laws and ordinances regarding concerned Ministries. Last, from the consumers' perspective, this paper enables consumers to understand and use distribution terms properly in their daily life.

Sino-Globalization Network of Chinese Migrants, Students, and Travellers (중국 이민자, 유학생, 여행자를 통해서 본 세계화 네트워크)

  • Zhu, Yupeng;Park, Hyejin;Park, Han Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.9
    • /
    • pp.509-517
    • /
    • 2020
  • This study examined Sino-globalization through the network analysis of Chinese immigrants, international students, and travelers. The data were collected from the United Nations for immigrants, UNESCO for international students, and Ministry of Culture and Tourism of China for travelers. Consequently, Chinese immigrants and international students' favorite destinations were advanced Western countries, and Chinese travelers showed a high preference for Asian regions. Specifically, Thailand was the most popular destination for traveling, while the U.S. appeared to be the main destination for Chinese immigrants and students. The QAP analysis results showed a statistically significant correlation between the immigrant network and international student network. MR-QAP analysis found a causal relationship between the two networks. These findings may serve as empirical evidence for the Chinese government to review potential opportunities and problems related to Sino-globalization and provide the basis for preparing policy measures for other countries. Subsequent studies should compensate for research limitations by analyzing specific factors affecting national choice of Chinese immigrants, students, and travelers. The economic, social, and cultural impacts of China's globalization on other countries need to be discussed using qualitative research.

The Study on Possibility of Strategic Trade using Disclosure Interval (공시시차를 이용한 전략적 매매의 개연성에 관한 연구)

  • Ko, Hyuk-Jin;Park, Seong-Ho;Lim, Jun-Kyu;Park, Young-S.
    • The Korean Journal of Financial Management
    • /
    • v.26 no.4
    • /
    • pp.165-189
    • /
    • 2009
  • According to disclosure regulation, insider can hide their trading until disclosure day, because there be interval between trading time and disclosure time. To accommodate strategic trade, they have an incentive to be brought disclosure interval as long as possible. This research investigate whether strategical behaviour of informed traders using disclosure intervals exists in domestic stock market.ls xt, we aney he whether they can get abnormal return through stealth strategy after announcement date. We also evaluate the effect of mimicking trading on price impact with the assumption of existence of mimicking trading. Our major research results are as follows: In case of main shareholder without having no prompt disclosure duty, the frequency of trading started at the beginning of month is shown significantly higher than others. This result shows a direct evidence that informed traders buy or sell their equity strategically using disclosure intervals. Also, we find the result that the coefficient of strategic variables has highest value in middle size information. However, the empirical evidence that informed trader get abnormal return through strategic trading was not shown in this study. Meanwhile, stock price over-reacts for selling transaction on trading point and is recovered after disclosure date., so we assume possibility of mimicking trading exists in domestic stock market.

  • PDF

A Classification Model for Attack Mail Detection based on the Authorship Analysis (작성자 분석 기반의 공격 메일 탐지를 위한 분류 모델)

  • Hong, Sung-Sam;Shin, Gun-Yoon;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.18 no.6
    • /
    • pp.35-46
    • /
    • 2017
  • Recently, attackers using malicious code in cyber security have been increased by attaching malicious code to a mail and inducing the user to execute it. Especially, it is dangerous because it is easy to execute by attaching a document type file. The author analysis is a research area that is being studied in NLP (Neutral Language Process) and text mining, and it studies methods of analyzing authors by analyzing text sentences, texts, and documents in a specific language. In case of attack mail, it is created by the attacker. Therefore, by analyzing the contents of the mail and the attached document file and identifying the corresponding author, it is possible to discover more distinctive features from the normal mail and improve the detection accuracy. In this pager, we proposed IADA2(Intelligent Attack mail Detection based on Authorship Analysis) model for attack mail detection. The feature vector that can classify and detect attack mail from the features used in the existing machine learning based spam detection model and the features used in the author analysis of the document and the IADA2 detection model. We have improved the detection models of attack mails by simply detecting term features and extracted features that reflect the sequence characteristics of words by applying n-grams. Result of experiment show that the proposed method improves performance according to feature combinations, feature selection techniques, and appropriate models.

The optical and structural properties by ZrO2 and Y2O3 compositional ratio of Co- and Ce-doped cubic zirconia (YSZ) single crystals (ZrO2와 Y2O3 조성비에 따른 Co와 Ce 첨가 큐빅지르코니아(YSZ) 단결정의 광학적 및 구조적 특성)

  • Moon, So-I.;Park, Hee-Yul;Seok, Jeong-Won
    • Journal of the Korean Crystal Growth and Crystal Technology
    • /
    • v.22 no.2
    • /
    • pp.73-77
    • /
    • 2012
  • Co-(0.8 wt%) and Ce-(0.4 wt%) doped cubic zirconia ($ZrO_2$ : $Y_2O_3$ = 80 : 20, 70 : 30, 60 : 40, 50 : 50 wt%) single crystals grown by a skull melting method were heat-treated in $N_2$ at $1000^{\circ}C$ for 5 hrs. The orange, yellowish brown and brown colored as-grown single crystals were changed into either brownish red, yellow and green color after the heat treatment. Before and after the heat treatment, the YSZ (yttria-stabilized zirconia) single crystals were cut for wafer form (${\phi}6.5mm{\times}t2mm$). The optical and structural properties were examined by UV-VIS spectrophotometer and X-ray diffraction. Absorption by $Ce^{3+}(^2F_{5/2,7/2}(4f){\rightarrow}^2T_g(5d^1))$, $Co^{2+}(^4A_2(^4F){\rightarrow}^4T_1(^4F)$ or $^4T_1(^4P))$ and $Co^{3+}$, change of ionization energy and lattice parameter were confirmed.

Self-Assertiveness and Sexual Experiences of Teenage Girls in Korea (십대 여학생의 성 관련 경험과 자기주장)

  • Chang, Soon-Bok;Yoo, Myung-Sook;Lee, Sun-Kyung
    • Women's Health Nursing
    • /
    • v.7 no.3
    • /
    • pp.305-316
    • /
    • 2001
  • The purpose of this study was to identify characteristics related to self assertiveness in teenage girls, and to identify the relationship between the self assertiveness and sexual experiences in teenage girls in Korea. The subjects for this study were 12,733 girls from an accessible population of 19,000 girls who were a multi-stage cluster sample from a population of 1,988,902 girls attending to 4,684 schools in the seven large cities and nine provinces of Korea. The response rate was 68.9%. Data were collected by mail from October 2 to October 28, 2000. A structured questionnaire of 125 items which included measurement of general characteristics, sexual experiences, and self-assertiveness was used. The sexual experiences were defined as dating, holding hands, putting arms on the shoulders, light kissing, French kissing, touching breasts, touching genitalia, and coitus. The self assertiveness measurement was developed by S. B. Chang et al.(2000) and has a Cronbach's alpha of .6031. Data was analyzed with SPSS 10.0 Program using descriptive statistics, reliability, and t-test. The results of this study are as follows; 1. The subjects were from 9th to 11th graders and 42.7% answered that they followed their partner's request. The range for the self assertiveness score was 7-21 out of a possible range of 7-21. The group of girls who were in vocational schools, lived away from family or in rural areas, attended night school, took part in drinking, smoking, and glue inhalation, who had cyber sex or phone sex or were exposed to pornography, and who had run away from home showed significantly lower self assertiveness scores than those without these characteristics (P<.05). 2. The group which had experience in dating(t=2.379, P=.017), French kissing (t=5.425, P=.000), touching breasts (t=8.637, P=.000), touching genitalia (t=6.057, P=.000), and coitus(t=6.057, P=.000) showed significantly lower self assertiveness scores than the group which had not had these sexual experiences. But there was no difference in the self assertiveness scores between the group which had experience of holding hands, light kissing, and using contraceptives compared to the group which did not. It can be concluded that the group which had delinquent behavior showed lower self assertiveness, and the lower self assertiveness led to unwanted sexual experiences. It is suggested that self assertiveness training be provided for the group with delinquent behavior as a first priority, and then analyze of the process of self assertiveness in relation to sexual experiences.

  • PDF

Making a Civil War Surrounding History in Cyber Space Focused on 5·18 Discourses in Ilbe Storehouse (사이버 공간에서의 역사의 내전(內戰)화 '일간베스트저장소'의 5·18 언설을 중심으로)

  • Jung, Soo-Young;Lee, Youngjoo
    • Korean journal of communication and information
    • /
    • v.71
    • /
    • pp.116-154
    • /
    • 2015
  • Officially given a historical signifier as Gwangju Democratic Movement since 1987, far-right and conservative group have restated that $5{\cdot}18$ is a rebellion and a riot that was committed by rebellious elements who obeyed North Korea's command or who were connected with North Korea. As those who had been responsible for the rebellion, revolt and riot were rewarded, far-right and conservatives' collective narrative that a country was born where the pro-North Korea left became dominated aroused extreme hostility towards $5{\cdot}18$. Far-right and conservatives involved in many different fields such as political party, university, press and media and civil group carry out incendiary discourse politics with intention to reestablish history and memory of $5{\cdot}18$ in their own story. Many people at online sites such as Ilbe Storehouse who are considered 'young right wing' is a main route to spread the far-right groups' remarks on $5{\cdot}18$. Ilbe is a main channel to reconstitute and reproduce the far-right conservatives' remarks and information on $5{\cdot}18$. Ilbe is one of main area where remarks of disparagement and ridicule, hostility and hatred on $5{\cdot}18$ unfurl. This study collects $5{\cdot}18$-related remarks and stories unfolded at Ilbe and examines how these remarks and stories make significance as to $5{\cdot}18$ and how information resources which remarks are dependent upon are connected each other. In this process, this study intends to find implications of incendiary politics that echoed of remarks on $5{\cdot}18$ have which at the online site Ilbe and by the far-right conservatives.

  • PDF