• Title/Summary/Keyword: Key way

Search Result 1,498, Processing Time 0.038 seconds

A Study on the Key Competencies of Industrial High School Students and Some Way of their Improvement (공업계 고등학교 학생들의 직업기초능력의 수준과 개선 방안)

  • An, Gwang-Sik;Bae, Dong-Yun;Park, Rak-Young;Choi, Wansik
    • 대한공업교육학회지
    • /
    • v.30 no.2
    • /
    • pp.3-11
    • /
    • 2005
  • The purpose of this study is to measure the level of the key competencies of industrial high school students and to use it as the basic material so as to improve the key competencies. The subject was 359 industrial high school students(boys: 244, girls: 115) in Seoul, Daejeon, Gwangju, and Busan. The instrument used to measure the key competencies is that developed by Cheol-Young Jeong, which was partly revised with the help of a group of experts. The results of this study showed some of skills were below an average of 3.0, which were writting skill(M=2.85) and speaking skill(M=2.96) in communication skills, logical thinking(M=2.98) in problem solving skills, leadership skill(M=2.88) in interpersonal skills, and self-improvement skill(M=2.96) and the spirit of public service(M=2.93) in self-management and self-improvement skills. But technology skills were above an average of 3.0. And it appeared that technology skills(P=.023) depended on having a certificate or not, and so did communication skills(P=.020) and problem solving skills(P=.034) on the types of a course(employment or entrance into a college). So, to strengthen the key competencies which appeared below an average of 3.0 in this study, not only does the curriculum of industrial high schools need to be reorganized, but systematic strengthening program of key competencies should also be developed.

esearch Trend Analysis Focused on Thesis Key Words: in the Fields of Korean Language and Literature, Korean Language Education, and Korean Language Education as a Foreign Language (학위논문 주제어 중심 연구동향 분석 -국어국문학, 국어교육학, 한국어교육학 분야를 중심으로-)

  • Kim, Eunsil;Kang, Seunghae
    • Journal of Korean language education
    • /
    • v.29 no.2
    • /
    • pp.25-48
    • /
    • 2018
  • The aim of this study was to analyze research trends in the fields of Korean Language and Literature, Korean Language Education, and Korean Language Education as a Foreign Language. To this end, key words were extracted from 29,470 academic theses published between 2000 and 2017. The results of the analysis are as follows. First, in the field of Korean Language and Literature, there is greater quantity in studies about Korean language than about literature, and starting from 2010, there was an increase in studies similar to those from the field of Korean Language Education as a Foreign Language. Next, in comparison to the other fields, the field of Korean Language Education has greater variance in its research theme-in particular, numerous studies related to the site of education. Finally, the field of Korean Language Education has the following trends: a) there are copious studies focused on Korean language learners in comparison to other fields, b) there are a greater number of studies focused on culture, and c) the key words change by time period which suggest that research demands transformed over time. Overall, a total of 64 highest frequency key words from the three academic fields were investigated. Of these, 22 were common key words and 42 were differential key words. In this way, it was possible to illuminate the identity of each field.

Design of a Strong Authentication Mechanism using Public-Key based on Kerberos (공개키를 이용한 커버로스 기반의 강력한 인증 메커니즘 설계)

  • 김은환;전문석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.4
    • /
    • pp.67-76
    • /
    • 2002
  • Kerberos is designed to provide strong authentication between client and application servers which are working in distributed network environment by using symmetric-key cryptography, and supposed to trust other systems of the realm. In this paper, we design an efficient and strong authentication mechanism by introducing the public/private-key to Kerberos. In the mechanism to make a system more secure, the value of the session key is changed everytime using MAC(message authentication code) algorithm with the long-term key for user-authentication and a random number exchanged through the public key. Also, we employ a mutual authentication method, which is used on challenge-response mechanism based on digital signatures, to improve trust between realms, and present a way of reducing the number of keys by simplifying authentication steps.

One-Time Key Generation System for Agent Data Protection in Mobile Agent Systems (이동 에이전트의 데이타 보호를 위한 일회용 에이전트 키 생성 시스템)

  • Park, Jong-Youl;Lee, Dong-Ik;Lee, Hyung-Hyo;Park, Joong-Gil
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.3
    • /
    • pp.309-320
    • /
    • 2001
  • This paper deals with security issues in a mobile agent system, especially protecting agent data from malicious agent servers. For this purpose, one-time key generation system, OKGS in short, is proposed. In OKGS, we integrate notions of a one-way hash function and a coupler. One-way function plays a major role in ensuring confidentiality and integrity of agent data. And the notion of a coupler is used to establish inter-relationship among consecutive encryption keys for agent data, i.e. all agent keys form a unidirectional chain. With these two features of OKGS, therefore, only the agent owner, who creates the agent bearing data, can decrypt and protect all the agent data which are gathered in the itinerary.

  • PDF

A Study of the Cognition and the Requirement on the Key Competency of Dental Technology (치과기공분야에서의 직업기초능력수준과 요구도에 관한 연구)

  • Hwang, Jae Sun
    • Journal of Technologic Dentistry
    • /
    • v.34 no.4
    • /
    • pp.457-469
    • /
    • 2012
  • Purpose: The purpose of this study is analyzing how much students of dental technology possess core competencies and cognition between dental technicians and students. Methods: The subjects of this study were dental technicians, dental technology students and a self-administered structured questionnaire survey wax conducted for 428 selected people. Collected data were analyzed using SPSS Win 20.0 statistics program and analysis techniques include the frequency, t-test, One-way ANOVA. Results: The results of the survey are as follows. The cognition of key competency according to the gender in the students showed differences in interpersonal ability, information ability and the requirement of key competency according to the gender in the students showed differences in speaking ability, listening ability, problem solving ability. The cognition of key competency according to the grade in the students showed difference in speaking ability, listening ability and the requirement of key competency according to the grade in the students showed difference in comprehension of organization ability. The speaking ability is the lowest in the cognition of key competency according to the gender, grade, experience of clinical training in the students and the skill ability is the highest in the requirement of key competency according to the gender, experience of clinical training in the students. The cognition of key competency according to the career in the dental technicians showed difference in problem solving ability, self-regulation and self-development ability, skill ability and the requirement of key competency according to the career in the dental technicians showed difference in writing ability. The cognition of key competency according to the educational background in the dental technicians showed difference in comprehension of organization ability. The foreign language ability is the lowest in the cognition of key competency according to the career, job in the dental technicians and the skill ability is the highest and the math ability is th lowest in the requirement of key competency according to the career, place of employment in the dental technician. Conclusion: This study can be used as basic data for dental technology that are available not only to field-oriented disciplines but also to overall higher education fields which aim to strengthen key competency.

Homomorphic Subspace MAC Scheme for Secure Network Coding

  • Liu, Guangjun;Wang, Xiao
    • ETRI Journal
    • /
    • v.35 no.1
    • /
    • pp.173-176
    • /
    • 2013
  • Existing symmetric cryptography-based solutions against pollution attacks for network coding systems suffer various drawbacks, such as highly complicated key distribution and vulnerable security against collusion. This letter presents a novel homomorphic subspace message authentication code (MAC) scheme that can thwart pollution attacks in an efficient way. The basic idea is to exploit the combination of the symmetric cryptography and linear subspace properties of network coding. The proposed scheme can tolerate the compromise of up to r-1 intermediate nodes when r source keys are used. Compared to previous MAC solutions, less secret keys are needed for the source and only one secret key is distributed to each intermediate node.

Practical Attacks on Hybrid Group Key Management for SOHAN

  • Liew, Jiun-Hau;Ong, Ivy;Lee, Sang-Gon;Lim, Hyo-Taek;Lee, Hoon-Jae
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.5
    • /
    • pp.549-553
    • /
    • 2010
  • Lim et al. proposed a Hybrid Group Key Management scheme for Hierarchical Self-Organizing Sensor Network in 2008 to provide a secure way to pass down the group key for cluster-based communication. This paper presents two practical attacks on the scheme proposed by Lim et al. by tampering sensor nodes of a cluster to recover necessary secret keys and by exploiting the IDS employed by the scheme. The first attack enables a long-term but slow data fabrication while other attack causes more severe DoS on the access to cluster sensor nodes.

Presentation-Oriented Key-Frames Coding Based on Fractals

  • Atzori, Luigi;Giusto, Daniele D.;Murroni, Maurizio
    • ETRI Journal
    • /
    • v.27 no.6
    • /
    • pp.713-724
    • /
    • 2005
  • This paper focuses on the problem of key-frames coding and proposes a new promising approach based on the use of fractals. The summary, made of a set of key-frames selected from a full-length video sequence, is coded by using a 3D fractal scheme. This allows the video presentation tool to expand the video sequence in a "natural" way by using the property of the fractals to reproduce the signal at several resolutions. This feature represents an important novelty of this work with respect to the alternative approaches, which mainly focus on the compression ratio without taking into account the presentation aspect of the video summary. In devising the coding scheme, we have taken care of the computational complexity inherent in fractal coding. Accordingly, the key-frames are first wavelet transformed, and the fractal coding is then applied to each subband to reduce the search range. Experimental results show the effectiveness of the proposed approach.

  • PDF

An Algorithm for Secure key Exchange based on the Mutual Entity Authentication (상호 실체인증 기능을 갖는 안전한 키 교환 알고리즘)

  • Kang, Chang-Goo;Choi, Yong-Rak
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.8
    • /
    • pp.2083-2090
    • /
    • 1998
  • In this paper, we propose two authentication exchange schemes which combine public key-based mutual authentication with a Diffie-Hellman key derivation exchange. The security of key exchange of the proposed schemes depends on the discrete logarithm problem. The ,securtly of the etity authentication depends on that of the signature mechanism to be used in the proposed scheme. In comparisun with the Kerberos, X.509 exchanges, and ISO 3-way authentication protocol, the proposed schemes are not only simple and efficient. but also are resistant to the full range of replay and interceptiun attacks.

  • PDF

Completed Stream Cipher by Cellular Automata - About Cellular Automata rule 30 - (Cellular Automata 기초로 형성된 Stream Cipher - Cellular Automata rule 30을 중심으로 -)

  • Nam, Tae-Hee
    • Journal of the Korea Computer Industry Society
    • /
    • v.9 no.2
    • /
    • pp.93-98
    • /
    • 2008
  • In this study, analyzed principle about stream cipher that is formed to Cellular Automata foundation. Cellular Automata can embody complicated and various principle with simple identifying marks that is State, Neighborhood, Transition Rules originally. Cellular Automata is hinting that can handle encipherment smoothly using transition rule. Create binary pad (key stream) by Cellular Automata's transition rule 30 applications in treatise that see therefore, and experimented ability of encryption and decryption because using stream cipher of symmetric key encryption way of password classification.

  • PDF