• Title/Summary/Keyword: Information manipulation

Search Result 566, Processing Time 0.024 seconds

Development of Goldberg device-based Software Convergence Education Tool (골드버그 장치 기반 소프트웨어 융합교육 도구 개발)

  • Lee, Sihoon;Kim, Sunghoon;Son, Jungmyung;Kim, Eungyeong;Cho, Wansub
    • Journal of The Korean Association of Information Education
    • /
    • v.25 no.3
    • /
    • pp.547-555
    • /
    • 2021
  • The purpose of this study is to develop a Goldberg device-based software(SW) convergence Education tool. The 2015 revised curriculum emphasizes convergence with various subjects for effective SW education. In particular, physics is often used as a material for SW convergence education because it is closely related to computational thinking such as sequential movement, quantification of energy and simulation. In this study, we developed an educational program based on the Goldberg device that utilizes physical knowledge, concepts and manipulation. In order to verify the effectiveness of the program, the survey questions were developed through Delphi verification and a basic satisfaction survey was conducted based on this. As a result, the developed program can be effectively used as a program for SW convergence education.

Factors which Hinder Attention in Online Classes and Solutions (온라인 수업에서 주의 집중을 저해하는 요인과 해결방안)

  • Shin, Soo-Bum
    • Journal of Creative Information Culture
    • /
    • v.6 no.3
    • /
    • pp.159-168
    • /
    • 2020
  • Unlike in-person classes, such as classroom classes, various variables affect learning effectiveness in online classes. In online classes, the teacher must recognize various variables of learners in advance, and if there are variables that hinder learning, students can increase the concentration of learning attention by removing them. Therefore, it is necessary to study which variables distract attention. In this study, factors that inhibit attentional attention that may occur in online classes were selected, and factors analysis was conducted through questionnaires. As a result of the study, the factors of class progression, environment and device manipulation were indicated as the factors that hinder the attention in online classes. According to the results of this study, plans to increase attention in on-line classes were suggested.

Classification of fun elements in metaverse content (메타버스 콘텐츠의 재미 요소 분류)

  • Lee, Jun-Suk;Rhee, Dea-Woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.8
    • /
    • pp.1148-1157
    • /
    • 2022
  • In 2019, COVID-19 changed many people's lives. Among them, metaverse supports non-face-to-face services through various methods, replacing daily tasks. This phenomenon was created and formed like a culture due to the prolonged COVID-19. In this paper, the fun elements used in the existing game were organized to find out the fun factors of the metaverse, and the items and contents were reclassified according to the metaverse with five experts. Classification was classified using reproducibility, sensory fun [graphic, auditory, text, manipulation, empathy, play, perspective], challenging fun [absorbedness, challenging, discovery, thrill, reward, problem-solving], imaginative fun [new story, love, freedom, agency, expectation, change], social fun[rules, competition, social behavior, status, cooperation, participation, exchange, belonging, currency transaction], interactive fun[decision making, communication sharing, hardware, empathy, nurturing, autonomy], realistic fun[sense of unity in reality, easy of learning, adaptation, intellectual problems solving, pattern recognition, sense of reality, community], and creative fun[application, creation, customizing, virtual world].

A Study on IKE v2 Analysis Method for RealTime (NIKEv2 AR : IKE v2 실시간 분석 기술 연구)

  • Park, Junghyung;Ryu, Hyungyul;Ryou, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.4
    • /
    • pp.661-671
    • /
    • 2022
  • Due to the COVID-19 pandemic, remote working, e-learning, e-teaching and online collaboration have widely spread and become popular. Accordingly, the usage of IPsec VPN for security reasons has also dramatically increased. With the spread of VPN, VPN vulunerabilities are becoming an important target of attack for attackers, and many studies have been conducted on this. IKE v2 analysis is an essential process not only for developing and building IPsec VPN systems but also for security analysis. Network packet analysis tools such as Wireshark and Tcpdump are used for IKE v2 analysis. Wireshark is one of the most famous and widely-used network protocol analyzers and supports IKE v2 analysis. However Wireshark has many limitations, such as requiring system administrator privileges for IKE v2 analysis. In this paper, we describe Wireshark's limitations in detatil and propose a new analysis method. The proposed analysis method can analyze all encrypted IKE v2 messages in real time from the session key exchange In addition, the proposed analysis method is expected to be used for dynamic testing such as fuzzing as packet manipulation.

Efficient and Secure Signature Scheme applicable to Secure multi-party Computation

  • Myoungin Jeong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.7
    • /
    • pp.77-84
    • /
    • 2023
  • This research originated from the need to enhance the security of secure multiparty computation by ensuring that participants involved in multiparty computations provide truthful inputs that have not been manipulated. While malicious participants can be involved, which goes beyond the traditional security models, malicious behaviors through input manipulation often occur in real-world scenarios, leading to privacy infringements or situations where the accuracy of multiparty computation results cannot be guaranteed. Therefore, in this study, we propose a signature scheme applicable to secure multiparty technologies, combining it with secret sharing to strengthen the accuracy of inputs using authentication techniques. We also investigate methods to enhance the efficiency of authentication through the use of batch authentication techniques. To this end, a scheme capable of input certification was designed by applying a commitment scheme and zero-knowledge proof of knowledge to the CL signature scheme, which is a lightweight signature scheme, and batch verification was applied to improve efficiency during authentication.

An exploratory study on the Press Arbitration Act, freedom of expression, and regulation of false and manipulated information (언론중재법과 표현의 자유 그리고 허위·조작 정보의 규제에 대한 탐색적 연구)

  • Kim, Jea-young
    • Journal of Arbitration Studies
    • /
    • v.31 no.4
    • /
    • pp.71-97
    • /
    • 2021
  • The meaning of the amendment to the Media Arbitration Act in our society is not limited to media companies. And it's not just a problem for a specific group. It expresses public value because it is an issue that can affect members of society as a whole and furthermore, it becomes a bill that can infringe or strengthen individual freedom guaranteed by the Constitution, but makes different arguments. Freedom of speech is not achieved in a day and should not be easily lost by someone. Although it is not a frequent problem, fatal threats arising from wrong media reports take away an individual's present and future. It is because of this problem that the responsibility is important. Freedom of speech and control are heading in different directions, but they are the same as the front and back of the coin. The freedom pursued is different, but it consists of one body. If freedom and responsibility of speech made up of one body criticize or ignore each other, the results are scattered into a distorted On the other hand, the flexion of responsibility without freedom serves as a speaker that conveys the ideology of some classes or represents the interests of a particular group. The fact that the media should act as the air of society means that it should represent the interests of the majority, make them aware of the rights of unfair or marginalized members, and be their strength.

Analysis and Demonstration of GPS Spoofing Attack: Based on Commercial Drones (GPS 스푸핑 공격 취약점 분석 및 실증: 상용 드론을 대상으로)

  • Jinseo Yun;Minjae Kim;Kyungroul Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.3
    • /
    • pp.431-437
    • /
    • 2024
  • Drones in the contemporary landscape have transcended their initial public utility, expanding into various industries and making significant inroads into the private sector. The majority of commercially available drones are presently equipped with GPS receivers to relay location signals from artificial satellites, aiming to inform users about the drone's whereabouts. However, a notable drawback arises from the considerable distance over which these location signals travel, resulting in a weakened signal intensity. This limitation introduces vulnerabilities, allowing for the possibility of location manipulation and jamming attacks if the drone receives a stronger signal than the intended location signal from satellites. Thus, this paper focuses on the safety assessment of drones relying on GPS-based location acquisition and addresses potential vulnerabilities in wireless communication scenarios. Targeting commercial drones, the paper analyzes and empirically demonstrates the feasibility of GPS spoofing attacks. The outcomes of this study are anticipated to serve as foundational experiments for conducting more realistic vulnerability analysis and safety evaluations.

Manual Therapy for Plantar Fasciitis: A Review of Clinical Study (족저근막염의 수기요법에 대한 문헌 연구 보고)

  • In-hwa Park;Yun-Yeop Cha;Min-Jeong Kim;In Heo;Byung-Jun Kim
    • Journal of Korean Medicine Rehabilitation
    • /
    • v.34 no.3
    • /
    • pp.53-63
    • /
    • 2024
  • Objectives This study aims to analyze the effectiveness of manual therapy for the treatment of plantar fasciitis by reviewing existing randomized controlled trials. Specifically, it seeks to identify various manual therapy techniques and evaluate their applicability in clinical settings. Methods The study reviewed literature from six databases (PubMed, the Cochrane Library, China National Knowledge Infrastructure, ScienceON, Research Information Sharing Service, Korean studies Information Service System) up to April 2024. Studies were selected based on criteria including randomized controlled trials involving manual therapy for plantar fasciitis. Results An analysis of ten studies involving 714 patients revealed the use of techniques such as joint mobilization, muscle relaxation, and pressure point techniques. Manual therapy was found to be more effective in reducing pain than both extracorporeal shock wave therapy and routine physical therapy alone. However, caution is needed in generalizing these results due to the limited number of studies analyzed. No significant adverse effects were reported. Conclusions Manual therapy demonstrates potential as an effective treatment for plantar fasciitis, offering benefits in pain management and functional recovery. However, further high-quality randomized controlled trials are necessary to strengthen the clinical evidence and establish standardized treatment protocols.

Input Certification protocol for Secure Computation

  • Myoungin Jeong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.8
    • /
    • pp.103-112
    • /
    • 2024
  • This study was initiated with the aim of authenticating that inputs have not been tampered with without disclosing them in the case of computations where multiple inputs are entered by participants using the same key. In general, in the authentication stage, authentication is performed after the input value is disclosed, but we do not want to reveal the inputs until the end. This is a case of deviating from the traditional security model in which malicious participants exist in cryptography, but it is a malicious attack method that can actually occur enough. Privacy infringement or distortion of calculation results can occur due to malicious manipulation of input values. To prevent this, this study studied a method that can authenticate that the message is not a modified message without disclosing the message using the signature system, zero-knowledge proof, and commitment scheme. In particular, by modifying the ElGamal signature system and combining it with the commitment scheme and zero-knowledge proof, we designed and proved a verification protocol that the input data is not a modified data, and the efficiency was improved by applying batch verification between authentication.

A Study of Augmented Reality based Visualization using Shape Information of Building Information Modeling (BIM 형상정보를 이용한 증강현실기반 가시화 사례)

  • Heo, Kyung-Jin;Lee, Seok-Jun;Jung, Soon-Ki
    • Spatial Information Research
    • /
    • v.20 no.2
    • /
    • pp.1-11
    • /
    • 2012
  • In the current construction planning and designing process, an architectural miniature model was designed to verify the interior or exterior spatial sense of a building structure, but building of the miniature model is demand much more effort and time; in addition to this it has limitation to identify interior information of the building. For a complement of it, CAD would be used in the existing planning and designing process to visualize the building information, but its visualization is not satisfactory for the 3D volume which could be easily verified with the miniature model. CAD is the specific software for designing building structures and the 3D results are usually rendered on 2D monitor screen. Therefore, there is a shortage of cognitive immersion for the 3D space. In this paper, we introduce the conversion process of BIM shape data into the Augmented Reality contents by using a series of softwares. As a result of modification on construction plan or design we reduced the cost and time to reconstruct the final visualization. We have shown that the interior or exterior information of the building structures are easily visualized with BIM shape data on augmented reality environment. Several proposed interaction methods, such as rem oval of building components, and slice-cut operation, provide the user for the effective manipulation of models on the augmented reality environment.