The Journal of the Institute of Internet, Broadcasting and Communication
/
v.15
no.2
/
pp.269-272
/
2015
this is the study of the human body antenna device which can detect the powder in a 360-degree on(under) the ground whether it is metal or nonmetal using superhigh frequency RF beam equipped with the body. and it is able to transmit the data of the detection of the powder, battle combats can share that among them. with its flexible roof radial antenna structure, it emits the superhigh frequency RF beam to the front and flank multiply, preprocesses through the powder preprocessing part. and with the non-linear regression model algorism engine part, reflecting the attenuation characteristics depend on the delayed time of degree of the signal power which is received to the superhigh frequency RF beam. so it is able to detect the signal of the most likely mine or powder based on the degree of the answer signal power according to the delayed time of the superhigh frequency RF beam. also, it can detect the powder whether it is metal or nonmetal, mine, dud, VBIED. it can increase the chance of detection about 90% more than existing mine detector.
Journal of the Korea Society of Computer and Information
/
v.16
no.2
/
pp.153-163
/
2011
Smartphone is a mobile device which can perform better than feature phone. Recently, growth in demand for advanced mobile devices boasting powerful performance, market share of smartphone is increasing rapidly in mobile device market, for example, iphone and android phone. Smartphone can provide many functionalities, e-mail, scheduler, word-processing, 3D-game, and etc, based on its powerful performance. Thus, various secret information is integrated in smartphone. To provide service, sometimes, smartphone transmits informations to outside via wireless network. Because smartphone is a mobile device, user can lose his/her smartphone, easily, and losing smartphone can cause serious security threats, because of integrated information in smartphone. Also data which is transmitted in wireless network can be protected for privacy. Thus, in present, it is very important to keep secure smartphone. In this paper, we analyze threats and vulnerabilities of smartphone based on its environments and describe countermeasures against threats and vulnerabilities.
Journal of the Korean BIBLIA Society for library and Information Science
/
v.31
no.3
/
pp.101-124
/
2020
Plan S is a policy that mandates research papers supported by specific funders such as the European Community be published in open access journals. The funder supports APC to researchers, providing a chance to advance the era of gold open access, and is expected to bring significant changes to the scholarly publishing ecosystem. This study explored the impact of Plan S from the perspective of each stakeholder of the scholarly publishing ecosystem, such as funders, academic societies or publishers, authors, and libraries, through a review of previous studies. In addition, the status of Korean gold open access publishing and position for each stakeholder were identified through the collected data analysis. As a result of the analysis, the share of publishing gold open access journals in Korea was 22%, which was less than 26% worldwide. Korean funding agencies were predicting and preparing for the impact of Plan S. On the other hand, Korean academic societies produce about 70% of all papers, but there are not many open access papers except medicine (51%). The response of the Korean library was not sufficient, and it contrasted with the activities of librarians in the U.S. that actively provide research support services based on the research lifecycle. It was suggested that Korean libraries should also actively try to change the role of librarians; advising researchers to plan open access publishing in grant project applications, consulting on copyrights, and so on. This study identified the background, principles, and impact of Plan S policy that would be effective in 2021 and examined the response situation in Korea. This study is valuable in that it served as the necessary basis for revitalizing the academic publishing ecosystem in Korea.
Asia-Pacific Journal of Business Venturing and Entrepreneurship
/
v.15
no.5
/
pp.113-127
/
2020
Based on the social exchange theory and innovation diffusion theory, this study is to identify the correlation between factors influencing investor's funding intention in crowdfunding and to analyze moderating effect of trust in the relationship of shared value, communication and individual innovation. The purpose of this study is to consider the funding trends of crowdfunding investors from a personal point of view through the results of the study and to help fundraiser of crowdfunding establish specifically strategies for financing. In order to conduct empirical analysis, an online survey was conducted on people who had participated in crowdfunding, and a total of 228 questionnaires were collected and a total of 186 responses were finally analyzed, excluding outliers. For data analysis, structural equation model analysis was conducted using SPSS 26.0 and Smart PLS 3.0. The results of this study showed that shared value in the relationship between fundraiser and investors has a significant effect on the perceived risk. High level of communication between fundraiser and investors showed positive effects on the level of commitment of the crowdfunding project and the innovation of the individual investor. And commitment had a positive effect on the funding intention. According to the results of this research, trust has moderating effect only in relationship between shared value and perceived risk. It is significant that investors share the value of fundraiser together is a motivation factor to fund in crowdfunding and an opportunity to recognize the risk. Through this study, it is expected to utilize them in establishing strategies for start-ups and marketing plans to raise funds through crowdfunding and to empirically identify factors influencing the funding intention through individual levels of crowdfunding investors.
Portfolio has recently come to gain more attention from school as an alternative evaluation tool and a self-reflective learning tool for learning. After literature reviews about the case studies on the use of portfolio in higher education including both universities in Korea and abroad, this study attempted, first, to analyze the current e-portfolio system running in Kyung Hee University for the undergraduate students starting from the spring semester, 2010, and then, suggested the ways the system can be more actively utilized among the students, and simultaneously, acquiring more interest and participation from both the faculty members and the school administrators. The data collected from the survey and reflective journals of the students suggested 1) more user-friendly, easy-to-edit version of the system, 2) more diverse modes and functions of the system which, therefore, are able to adjust well to the specific and unique features of subjects or majors of the students, and 3) collaborative learning environments among the students and between the students and the faculty members from which students can share, participate, interact with each other, getting useful feedback from those co-learners and faculty members. Eventually the study aimed to enhance the recognition of the participants about the importance of portfolio as a learning tool for self-reflective learning and authentic evaluation of the students.
Purpose - The aim of this study is to investigate the benefit-sharing activities. They affect contract renewal intention between franchisers and franchisees that are linked through a contract with the intention of building their relationship from the level based on dynamic trust. This study will show a new approach on qualitative growth and consolidation of competitive power and may well be able to suggest practical ways to strengthen directions in the field of franchise industries. Research design, data, and methodology - In this study, based on literature review, we separated logistical-supporting activities and non-logistical-supporting activities from benefit-sharing activities. We modeled how benefit-sharing activities influence contract renewal intention of franchisees by dynamic trust. In particular, considering the possibility of trading concepts and characteristics of trust between providers opportunistic behaviors was defined as variables, depending on the situation and dynamic characters reveal their relationship trust concept. That is, dynamic trust having the possibility of changing depending on opportunistic risks and interdependencies by Lewis & Weigert(1985, 2012) was classified into transitional-based trust, calculated based trust, relational-based trust and balance-based on trust. The total of 104 samples from domestic franchisees being with franchisees were collected by using a structural composed questionnaire. Results - The results are as following. Benefit-sharing activities in logistical supporting activities appeared to affect the multidimensional concept of transitional trust, calculated based on trust, relationship-based trust and balance based on trust dynamic trust with all-defined impact. Non-logistical supporting activities appeared to affect significantly the positive (+) to the dynamic trust concept except transitional trust. Lewis & Weigert(1985; 2012) have proposed a dynamic confidence calculated from relations within-based trust relationship based on trust appears to affect the significant positive (+) to the balance-based confidence transactions confidence mechanism of the system side in the verified relationship. Finally, a relationship based on trust and confidence in the balance based on the Influence of dynamic renewed confidence showed significantly affect the positive(+). In particular, the balance based trust showed the acts as a mediating factors between relational trust and confidence and renew calculated. Conclusion - From the above these results, the significance from this study is as following. First, the proposed activity is to share and validate the approach by identifying the potential in the relationship from the contract with building dynamic trust, and one of the ways from the franchise headquarters and affiliated merchants mutual growth through win-win cooperation in sharing activities. Next, the dynamic segmentation confidence to suggest the possibility can be broken down over the validity and reliability test for each concept. In addition, by identifying the relationship between the dynamic level of confidence granular multi-dimensional concept, to determine the level of trust with a dynamic relationship between risk and interdependencies can be possible in franchise industries. In order to maintain and develop their mutual relationship, franchise industries should propose confidence-building steps to promote their quality improvement.
The purpose of this paper is to verify the differences of the effect of the support between the number of employment of those who have experienced employment and the unemployment period of those who have not experienced employment for the participants of the Jeollanam-do Youth Job Search Allowance Support Project. In addition, this study attempted to find out the ways to develop the system using the Internet of Things by figure out how to use the allowance, the field of help, the average investment time per day, the average monthly expenditure, the difficulties of job search activities, and the differences in the youth job search activities for the required programs. In this study, 602 people who participated in the Jeollanam-do Youth Job Search Allowance Support Project from February 19 to March 9, 2020 are surveyed. The collected data was processed using the SPSS 21.0 program. The research results are as follows. First, there was a difference in satisfaction according to the number of jobs employed. Second, there was a difference in the effectiveness according to the number of employment. Third, there was a difference in satisfaction according to the period of unemployment. Fourth, there was a difference in effectiveness according to the period of unemployment. In order to enhance the effectiveness of the youth job search allowance support project, the Edutech industry and technology that can share various information using the Internet of Things environment in the untact era must be improved together.
Journal of the Korea Institute of Building Construction
/
v.10
no.5
/
pp.45-54
/
2010
Recently more and more construction projects have become high-rise, complex and intelligent. Accordingly, such projects require an integrated management system for tasks, with a lean approach to construction with work processes for management and productivity. In particular, Construction Information Technology (CIT) fields are concerned with Building Information Modeling (BIM), which represents the process of generating and managing building data during its life cycle. Constructability research has progressed for the project goal which is a cost-time-quality of optimization by integrated construction knowledge and experience. However, the current constructability process has not been performed efficiently, as the existing 2D drawings and papers lack consistent and accurate information, it is difficult to share the contents of work, and the use of information is inefficient. This study proposes that the reformation and enhancement of BIM-based constructability work process can lead to brilliant performance in the framework of the construction phase through achieving collaboration between the design team and the workers at the site.
Database sharing system (DSS) refers to a system for high performance transaction processing. In DSS, the processing nodes are locally coupled via a high speed network and share a common database at the disk level. Each node has a local memory and a separate copy of operating system. To reduce the number of disk accesses, the node caches database pages in its local memory buffer. In this paper, we propose a dynamic transaction routing algorithm to balance the load of each node in the DSS. The proposed algorithm is novel in the sense that it can support node-specific locality of reference by utilizing the primary copy authority assigned to each node; hence, it can achieve better cache hit ratios and thus fewer disk I/Os. Furthermore, the proposed algorithm avoids a specific node being overloaded by considering the current workload of each node. To evaluate the performance of the proposed algorithm, we develop a simulation model of the DSS, and then analyze the simulation results. The results show that the proposed algorithm outperforms the existing algorithms in the transaction processing rate. Especially the proposed algorithm shows better performance when the number of concurrently executed transactions is high and the data page access patterns of the transactions are not equally distributed.
Social Networks such as 'Facebook' and 'Myspace' are regarded as useful tools for people to share interests and maintain or expand relationships with other people. However, they pose the risk that personal information can be exposed to other people without explicit permission from the information owner. Therefore, we need a solution for this problem. Although existing social network sites allow users to specify the exposing range or users who can access their personal information, this cannot be a practical solution because the information can still be revealed to third parties through the permitted users albeit unintentionally. Usually, people allow the access of unknown person to personal data in online social networks and this implies the possibility of information leakage. We could use an access control method based on trust value, but this has the limitation that it cannot reflect the quantitative risk of information leakage. As a solution to this problem, this paper proposes an access control method based on a synthesized metric from trust and risk factors. Our various experiments show that the risk of information leakage can play an important role in the access control of online social networks.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.