• Title/Summary/Keyword: Problem Behaviors

Search Result 955, Processing Time 0.026 seconds

Association between Self-efficacy, Stress, Violence Experiences, Economic state, Relationship Conflict, Health Behaviors and Depression in Graduate Student (대학원생의 자기효능감, 스트레스, 폭력 경험, 경제적 환경, 관계갈등, 건강행위가 우울에 미치는 영향)

  • Kim, Da Hye;Ham, Ok Kyung;Suh, Min Hee;Park, Sihyun
    • Journal of Korean Public Health Nursing
    • /
    • v.35 no.1
    • /
    • pp.89-103
    • /
    • 2021
  • Purpose: This study examined the factors associated with depression among Korean graduate students. Specifically, personal (self-efficacy, stress), environmental (violence experience, economic state, and relationship conflict), and behavioral (health behavior) factors were analyzed. Methods: This study used a cross-sectional study design. One hundred and fifty participants currently enrolled in graduate programs were recruited. Google Drive was used for online data collection. Descriptive statistics, correlational analyses, and hierarchical regression analysis were conducted. Results: First, 52% of the participants were male, with an average age of 28.05(±3.19). Master's students comprised the largest proportion (63.3%). Approximately about 38.7% were engineering majors. Second, approximately 27.3% had depressive symptoms; and 7.3% had major depression. Third, there was a significant correlation between personal, environmental (financial burdens), and behavioral factors. Fourth, hierarchical regression analysis revealed a lower depression level to be associated with a higher self-efficacy level and health behavior. In contrast, a higher depression level was related to violence experience. Conclusion: The government should press on establishing rules on the prevention and regulation of violence in universities, and impose strong disciplinary measures to root out the problem. In addition, universities must pay attention to the mental health of graduate students and establish systems to manage them.

An Enhancement Scheme of Dynamic Analysis for Evasive Android Malware (분석 회피 기능을 갖는 안드로이드 악성코드 동적 분석 기능 향상 기법)

  • Ahn, Jinung;Yoon, Hongsun;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.519-529
    • /
    • 2019
  • Nowadays, intelligent Android malware applies anti-analysis techniques to hide malicious behaviors and make it difficult for anti-virus vendors to detect its presence. Malware can use background components to hide harmful operations, use activity-alias to get around with automation script, or wipe the logcat to avoid forensics. During our study, several static analysis tools can not extract these hidden components like main activity, and dynamic analysis tools also have problem with code coverage due to partial execution of android malware. In this paper, we design and implement a system to analyze intelligent malware that uses anti-analysis techniques to improve detection rate of evasive malware. It extracts the hidden components of malware, runs background components like service, and generates all the intent events defined in the app. We also implemented a real-time logging system that uses modified logcat to block deleting logs from malware. As a result, we improve detection rate from 70.9% to 89.6% comparing other container based dynamic analysis platform with proposed system.

Cooperative bearing behaviors of roadside support and surrounding rocks along gob-side

  • Tan, Yunliang;Ma, Qing;Zhao, Zenghui;Gu, Qingheng;Fan, Deyuan;Song, Shilin;Huang, Dongmei
    • Geomechanics and Engineering
    • /
    • v.18 no.4
    • /
    • pp.439-448
    • /
    • 2019
  • The bearing capacity of roadside support is the key problem in gob-side entry retaining technology. To study the cooperative bearing characteristics of the roof-roadside support-floor along the gob-side entry retaining, a mechanical model of the composite structure of the roof-roadside support-floor was first established. A method for determining the structural parameters of gob-side entry retaining was then proposed. Based on this model, adaptability analysis of roadside support was carried out. The results showed that the reasonable width of the gob-side entry roadway was inversely proportional to the mining height, and directly proportional to the bearing strength of the roof and floor. And the reasonable width of the "flexible-hard" roadside support was directly proportional to its own strength, and inversely proportional to the width of the gob-side entry retaining. When determining the position and size of the roadside support along the gob-side entry retaining, the surrounding rock environment should be fully considered. Measured results from case study also show the rationality of the model and calculation method.

An Agent-based Model for an Act of Expression or Silence : Focused on College Students' Behavior in Class (행위자 기반의 의견 표출 행동 모형 : 대학 수업을 중심으로)

  • Yee, Soung Ryong
    • Journal of Digital Convergence
    • /
    • v.17 no.1
    • /
    • pp.99-109
    • /
    • 2019
  • This paper explores a way to solve students' silence problem in the class by studying dynamic behaviors in the class. In order to build a behavioral model, several factors affecting the students' behavior were extracted by literature review and by performing a survey to the students. The paper also implemented the model into an agent-based computer model for simulation. The simulation result showed that the behavior of an individual depends on the neighboring students. The more students are expressing their opinion, and then the better motivation one can get to express an opinion. Other observations are that supportive atmosphere considerably reduces the silent ratio, and even the majority of silence phenomenon appears at critical atmosphere.

Vector form intrinsic finite-element analysis of static and dynamic behavior of deep-sea flexible pipe

  • Wu, Han;Zeng, Xiaohui;Xiao, Jianyu;Yu, Yang;Dai, Xin;Yu, Jianxing
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.12 no.1
    • /
    • pp.376-386
    • /
    • 2020
  • The aim of this study was to develop a new efficient strategy that uses the Vector form Intrinsic Finite-element (VFIFE) method to conduct the static and dynamic analyses of marine pipes. Nonlinear problems, such as large displacement, small strain, and contact and collision, can be analyzed using a unified calculation process in the VFIFE method according to the fundamental theories of point value description, path element, and reverse motion. This method enables analysis without the need to integrate the stiffness matrix of the structure, because only motion equations of particles established according to Newton's second law are required. These characteristics of the VFIFE facilitate the modeling and computation efficiencies in analyzing the nonlinear dynamic problem of flexible pipe with large deflections. In this study, a three-dimensional (3-D) dynamical model based on 3-D beam element was established according to the VFIFE method. The deep-sea flexible pipe was described by a set of spatial mass particles linked by 3-D beam element. The motion and configuration of the pipe are determined by these spatial particles. Based on this model, a simulation procedure to predict the 3-D dynamical behavior of flexible pipe was developed and verified. It was found that the spatial configuration and static internal force of the mining pipe can be obtained by calculating the stationary state of pipe motion. Using this simulation procedure, an analysis was conducted on the static and dynamic behaviors of the flexible mining pipe based on a 1000-m sea trial system. The results of the analysis proved that the VFIFE method can be efficiently applied to the static and dynamic analyses of marine pipes.

The Impact of Foreign Ownership on the Dividend and Investment Behaviors of Korean Firms (한국기업의 배당과 투자에 대한 외국인 투자자의 영향력 연구)

  • Kang, Shin Ae;Min, Sang Kee
    • International Area Studies Review
    • /
    • v.14 no.2
    • /
    • pp.79-105
    • /
    • 2010
  • This paper investigates empirically the impact of foreign investors on a firm's dividend and investment decision making in Korean stock market. Empirical results using the sample firms in non-financial firms listed in Korean stock market whose settlement month are December, we find that foreign investors who declared participation in management didn't exert significant impact on dividend increase. In the case of investment, foreign investors exerts significant impact on R&D investments. Using Hausman-Taylor Instrumental Variable method, we controlled endogeneity problem related with foreign ownership and dividend and investment policy. The contribution of this paper is that the purpose of foreign investors whether or not participate in management is the most critical point and the impacts of foreign investors on dividends and investment are different whether they participate in management or not.

Surface Modification of High Si Content Al Alloy by Plasma Electrolytic Oxidation (플라즈마 전해 산화 공정을 이용한 고 실리콘 알루미늄 합금의 표면 산화막 형성)

  • Kim, Yong Min;Hwang, Duck Young;Lee, Chul Won;Yoo, Bongyoung;Shin, Dong Hyuk
    • Korean Journal of Metals and Materials
    • /
    • v.48 no.1
    • /
    • pp.49-56
    • /
    • 2010
  • This study investigated how the surface of Al-12wt.%Si alloy modified by the plasma electrolytic oxidation process (PEO). The PEO process was performed in an electrolyte with sodium hexametaphsphate as a conducting salt, and the effect of ammonium metavanadate on variations in the morphology of electrochemically generated oxide layers on the alloy surface was investigated. It is difficult to form a uniform passive oxide layer on Al alloys with a high Si content due to the differences in the oxidation behavior of the silicon-rich phase and the aluminum-rich phase. The oxide layer covered the entire surface of the Al-12WT.%Si alloy uniformly when ammonium metavanadate was added to the electrolyte. The oxide layer was confirmed as a mixture of $V_2O_3$ and $V_2O_5$ by XPS analysis. In addition, the oxide layer obtained by the PEO process with ammonium metavanadate exhibited a black color. Application of this surface modification method is expected to solve the problem of the lack of uniformity in the coloring of oxide layeres caused by different oxidation behaviors during a surface treatment.

Selection of Detection Measures for Malicious Codes using Naive Estimator (단순 추정량을 이용한 악성코드의 탐지척도 선정)

  • Mun, Gil-Jong;Kim, Yong-Min
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.97-105
    • /
    • 2008
  • The various mutations of the malicious codes are fast generated on the network. Also the behaviors of them become intelligent and the damage becomes larger step by step. In this paper, we suggest the method to select the useful measures for the detection of the codes. The method has the advantage of shortening the detection time by using header data without payloads and uses connection data that are composed of TCP/IP packets, and much information of each connection makes use of the measures. A naive estimator is applied to the probability distribution that are calculated by the histogram estimator to select the specific measures among 80 measures for the useful detection. The useful measures are then selected by using relative entropy. This method solves the problem that is to misclassify the measure values. We present the usefulness of the proposed method through the result of the detection experiment using the detection patterns based on the selected measures.

User Behavior Analysis for Online Game Bot Detection (온라인 게임 봇 탐지를 위한 사용자 행위 분석)

  • Kang, Ah-Reum;Woo, Ji-young;Park, Ju-yong;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.225-238
    • /
    • 2012
  • Among the various security threats in online games, the use of game bots is the most serious problem. In this paper, we propose a framework for user behavior analysis for bot detection in online games. Specifically, we focus on party play that reflects the social activities of gamers: In a Massively Multi-user Online Role Playing Game (MMORPG), party play log includes a distinguished information that can classify game users under normal-user and abnormal-user. That is because the bot users' main activities target on the acquisition of cyber assets. Through a statistical analysis of user behaviors in game activity logs, we establish the threshold levels of the activities that allow us to identify game bots. Also, we build a knowledge base of detection rules based on this statistical analysis. We apply these rule reasoner to the sixth most popular online game in the world. As a result, we can detect game bot users with a high accuracy rate of 95.92%.

FRChain: A Blockchain-based Flow-Rules-oriented Data Forwarding Security Scheme in SDN

  • Lian, Weichen;Li, Zhaobin;Guo, Chao;Wei, Zhanzhen;Peng, Xingyuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.264-284
    • /
    • 2021
  • As the next-generation network architecture, software-defined networking (SDN) has great potential. But how to forward data packets safely is a big challenge today. In SDN, packets are transferred according to flow rules which are made and delivered by the controller. Once flow rules are modified, the packets might be redirected or dropped. According to related research, we believe that the key to forward data flows safely is keeping the consistency of flow rules. However, existing solutions place little emphasis on the safety of flow rules. After summarizing the shortcomings of the existing solutions, we propose FRChain to ensure the security of SDN data forwarding. FRChain is a novel scheme that uses blockchain to secure flow rules in SDN and to detect compromised nodes in the network when the proportion of malicious nodes is less than one-third. The scheme places the flow strategies into blockchain in form of transactions. Once an unmatched flow rule is detected, the system will issue the problem by initiating a vote and possible attacks will be deduced based on the results. To simulate the scheme, we utilize BigchainDB, which has good performance in data processing, to handle transactions. The experimental results show that the scheme is feasible, and the additional overhead for network performance and system performance is less than similar solutions. Overall, FRChain can detect suspicious behaviors and deduce malicious nodes to keep the consistency of flow rules in SDN.