• Title/Summary/Keyword: Party School

Search Result 265, Processing Time 0.029 seconds

The Strategy of Russia's Political Elites to Maintain Dominance Through the Overhaul of Electoral System (선거제도 개편을 통한 러시아 정치 엘리트의 지배력 유지 전략)

  • Siheon Kim;Seho Jang
    • Analyses & Alternatives
    • /
    • v.7 no.1
    • /
    • pp.7-43
    • /
    • 2023
  • This study examines and identified a series of strategies of Russia's political elites to maintain and strengthen their dominance by reviewing the case of revisions in the election laws of Russia in 2014. At that time, a mixed-member electoral system was newly introduced, and on the surface, it seemed that the new system was a step toward meeting the demands of the people for "enhanced democracy". However, in 2016 and 2021, the ruling party of Russia won the general elections by making the most of the factors that could distort the election results inherent in the mixed-member electoral system. Therefore, this study aimed to analyze whether the revision of election laws was a mere vehicle used by the ruling party, United Russia, to maintain its political power, or whether it was a leap forward to achieve democracy. The study result indicate that the revision of election laws in 2014 was part of the policy responses to the internal conflicts in the circle of Russia's political elites, which had been rising since 2008, as well as to the public resistance. In other words, it was confirmed that the revision of election laws was one of the measures taken to "minimize competition" and "reproduce political power on a stable basis".

Securing Sensitive Data in Cloud Storage (클라우드 스토리지에서의 중요데이터 보호)

  • Lee, Shir-Ly;Lee, Hoon-Jae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.871-874
    • /
    • 2011
  • The fast emerging of network technology and the high demand of computing resources have prompted many organizations to outsource their storage and computing needs. Cloud based storage services such as Microsoft's Azure and Amazon's S3 allow customers to store and retrieve any amount of data, at anytime from anywhere via internet. The scalable and dynamic of the cloud storage services help their customer to reduce IT administration and maintenance costs. No doubt, cloud based storage services brought a lot of benefits to its customer by significantly reducing cost through optimization increased operating and economic efficiencies. However without appropriate security and privacy solution in place, it could become major issues to the organization. As data get produced, transferred and stored at off premise and multi tenant cloud based storage, it becomes vulnerable to unauthorized disclosure and unauthorized modification. An attacker able to change or modify data while data inflight or when data is stored on disk, so it is very important to secure data during its entire life-cycle. The traditional cryptography primitives for the purpose of data security protection cannot be directly adopted due to user's lose control of data under off premises cloud server. Secondly cloud based storage is not just a third party data warehouse, the data stored in cloud are frequently update by the users and lastly cloud computing is running in a simultaneous, cooperated and distributed manner. In our proposed mechanism we protect the integrity, authentication and confidentiality of cloud based data with the encrypt- then-upload concept. We modified and applied proxy re-encryption protocol in our proposed scheme. The whole process does not reveal the clear data to any third party including the cloud provider at any stage, this helps to make sure only the authorized user who own corresponding token able to access the data as well as preventing data from being shared without any permission from data owner. Besides, preventing the cloud storage providers from unauthorized access and making illegal authorization to access the data, our scheme also protect the data integrity by using hash function.

Design and Analysis of Fabrication Threat Management in Peer-to-Peer Collaborative Location Privacy

  • Jagdale, Balaso;Sugave, Shounak;Kolhe, Kishor
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.399-408
    • /
    • 2021
  • Information security reports four types of basic attacks on information. One of the attacks is named as fabrication. Even though mobile devices and applications are showing its maturity in terms of performance, security and ubiquity, location-based applications still faces challenges of quality of service, privacy, integrity, authentication among mobile devices and hence mobile users associated with the devices. There is always a continued fear as how location information of users or IoT appliances is used by third party LB Service providers. Even adversary or malicious attackers get hold of location information in transit or fraudulently hold this information. In this paper, location information fabrication scenarios are presented after knowing basic model of information attacks. Peer-to-Peer broadcast model of location privacy is proposed. This document contains introduction to fabrication, solutions to such threats, management of fabrication mitigation in collaborative or peer to peer location privacy and its cost analysis. There are various infrastructure components in Location Based Services such as Governance Server, Point of interest POI repository, POI service, End users, Intruders etc. Various algorithms are presented and analyzed for fabrication management, integrity, and authentication. Moreover, anti-fabrication mechanism is devised in the presence of trust. Over cost analysis is done for anti-fabrication management due to nature of various cryptographic combinations.

3D Facial Scanners: How to Make the Right Choice for Orthodontists

  • Young-Soo Seo;Do-Gil Kim;Gye-Hyeong Lee;Kyungmin Clara Lee
    • Journal of Korean Dental Science
    • /
    • v.17 no.1
    • /
    • pp.1-13
    • /
    • 2024
  • With the advances of digital scanning technology in dentistry, the interests in facial scanning in orthodontics have increased. There are many different manufacturers of facial scanners marketing to the dental practice. How do you know which one will work best for you? What questions should you be asking? We suggest a clinical guideline which may help you make an informed decision when choosing facial scanners. The characteristics of 7 facial scanners were discussed in this article. Here are some considerations for choosing a facial scanner. *Accuracy: For facial scanners to be of real value, having an appropriate camera resolution is necessary to achieve more accurate facial image representation. For orthodontic application, the scanner must create an accurate representation of an entire face. *Ease of Use: Scanner-related issues that impact their ease of use include type of light; scan type; scan time; file type generated by the scanner; unit size and foot print; and acceptance of scans by third-party providers. *Cost: Most of the expenses associated with facial scanning involve the fixed cost of purchase and maintenance. Other expenses include technical support, warranty costs, transmission fees, and supply costs. This article suggests a clinical guideline to make the right choice for facial scanner in orthodontics.

Students injuries and Injury Surveillance System in Cheonan (손상감시체계를 통한 천안지역 초․중․고교생의 손상실태 분석)

  • Kang, Chang-Hyun;Kang, Hyun-A;Park, Jee-Hyun
    • Journal of the Korean Society of School Health
    • /
    • v.22 no.2
    • /
    • pp.157-167
    • /
    • 2009
  • Purpose : The purpose of this study is to explore the students injuries by analyzing the data which has been inputted by the emergency center of the cooperated hospitals and the 119 rescue party through the injury surveillance system in Cheonan city. Method : Students were divided into the elementary, middle, high school students with the 776 cases of children and teenagers(7-19years old) of injury surveillance system in Cheonan area from january to june in 2009. Frequency analysis and $x^2$-test was done to recognize the features of students injuries among the groups. The program to be used for the statistical analysis is SPSS 17.0. Result : Out of the injury incidence rate, the elementary school students(52.1%) are first, the high school students (24.9%) are second, the middle school students appear to be 23.1%. Male is about two times higher than female by 66.6% in the injury incidence. In terms of the injury mechanism, the injury(22.2%) by hit is the first, the traffic accident(21.5%) is the second, the slippery(16.8%) is followed. The injuries were occurred most largely at 16:00-20:00(33.4%), and the 33.6% of injury by daily leisure activity occurs at 16:00-20:00 chiefly. Conclusion : Analysis using the data of the injury surveillance system has some advantages compared to the previous research such as reliability and specification. To prevent the students injuries, not the individual problem but the social dimension should be acknowledged so that we can secure and promote the safety from the risk. Therefore, we must organize the role assignment and the cooperative network in the school, home and community.

Philosophical Thoughts and Reality Percetions of the Toege School (퇴계학파(退溪學派)의 철학사상과 현실인식)

  • Lee, Sang-Ik
    • The Journal of Korean Philosophical History
    • /
    • no.32
    • /
    • pp.7-41
    • /
    • 2011
  • Theories of Li-Ki mutual dynamism and piety represent philosophical thoughts of Toege School. The theory of Li-Ki mutual dynamism reflects conflicts of Heavenly Law and Human Desire or Principled Mind and Selfish Mind on the private level, but conflicts of Virtuous Gentleman and Materialistic Person on the social level. The theory of piety is for establishments of Heavenly Law's Superintendence and Virtuous Gentleman's Leading Power in life. Toege's followers keep this theoretical stream Their perception of reality has two distinct features: one is that they focus on the fundamental distinguished from the incidental: the other is that they don't tolerate any compromise between righteousness and interest, They think they can make a beautiful world without any compromise between righteousness and material interest if trying hard on the fundamental. Their propensities are very different from those of Yulgok school who sought an appropriate compromise between principle and reality or between the Eastern and the Western party distinguishing an argument of the fundamental from an argument of the incidental.

A Study on Preference of Lecture Room by Seating Layout (대학 강의실 좌석이용형태에 관한 연구)

  • So, Kab-Soo;Park, Min-Hyuk;Kim, Seung-Je
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.20 no.4
    • /
    • pp.3-10
    • /
    • 2013
  • Basic precondition for effective curriculum on learning activities to take place, the internal and external environment of the school facilities, improve the environment of the classroom space and etc. Specifically, the use of classroom space, hardly learners improve their academic motivation to achievement tend to concentrate within the party regularly scheduled class hours. Physical environment surrounding them is giving considerable impact for behavioral psychological and bodily change of the learners. In this study, we are focused on the form of the learner in the general classroom space and classroom environment that can increase the learning effect will be examined. Consequently, What is appropriate classroom environment for learning increase the concentration of elements are presented.

Ecological support system for promoting youth culture in a new millenium age - Comparative Analysis on psychological environment of family between Adolescent and Parent- (새 밀레니엄에서의 청소년 문화창조를 위한 생태학적 지원체계(II) -청소년 자녀와 부모가 인지한 가족의 심리적 환경 비교 분석-)

  • 김명자;이정우;계선자;박미석;박수선
    • Journal of the Korean Home Economics Association
    • /
    • v.38 no.9
    • /
    • pp.41-56
    • /
    • 2000
  • The purpose of this study is to compare the psychological environment of adolescent family between parents and their children through analysis each party's perception. A survey was conducted on 1235 high school students and their parents from 19 high schools. The main results are as follows: 1. Regarding family cohesion and family adjustment, both the parents and their children showed an average level, whereas parents had a tendency to show a higher level than their children. There is no significant difference between girls and boys and between fathers and mothers as for family cohesion, while the girls and their mothers showed significantly higher level of adjustment than boys and their fathers. 2. The adolescents and their parents showed relatively open communication style and parents have significantly more open communication style than their children. 3. The adolescents felt that they were viewed more negatively by their parents than what their parents actual views were.

  • PDF

How can We Make Satisfiable Dental Restorations? (모두에게 만족을 주는 보철물은 어떻게 만들어지는가?)

  • Ahn, Seung-Geun
    • Journal of Dental Rehabilitation and Applied Science
    • /
    • v.21 no.2
    • /
    • pp.183-189
    • /
    • 2005
  • There is no single or simple answer for effective communication between laboratory technician and clinical dentist. Love-hate could be used to describe the relationship between dentists and their labs. Great lab work can make a dentists life much easier and can result in getting many referrals. However, if the lab work is not up to par and/or late, it can add stress and agony to a dentists practice. Also the opposition is right. If the preparations are calibrated, the impressions clear, and the bite registrations accurate, most labs can do their work reasonably well. Unfortunately, many cases received by labs are barely adequate, especially when it comes to reading margins, which are frequently created by the imagination of the person trimming the dies. In other words, both dentists and lab technicians need to be able to understand how each party operates so that solutions to problems can be found. Effective communication with the laboratory is critical if any degree of success is desired.

Identity-based Authenticated Multiple Key Agreement Protocol with PKG Forward Security

  • Tan, Zuowen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.8
    • /
    • pp.1982-1997
    • /
    • 2012
  • Authenticated multiple key agreement protocols not only allow participants to agree the multiple session keys within one run of the protocol but also ensure the authenticity of the other party. In 2011, Dehkordi et al. proposed an identity-based authenticated multiple key agreement protocol. In this paper, we demonstrate that Dehkordi et al.'s protocol is vulnerable to impersonation attacks. Furthermore, we have found that their protocol cannot provide perfect forward security or mutual security. Then we propose an identity-based authenticated multiple key agreement protocol which removes the weaknesses of the Dehkordi et al.'s protocol. Compared with the multiple key agreement protocols in the literature, the proposed protocol is more efficient and holds stronger security.