• Title/Summary/Keyword: School security

Search Result 3,325, Processing Time 0.028 seconds

A Study on the Differences in Perception of Mobile Payment System Characteristics by User Characteristics

  • Liu, Rui-xue;Yoon, Jong-soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.4
    • /
    • pp.183-191
    • /
    • 2022
  • Thanks to various characteristics of mobile payment system, many users can easily purchase various products anytime, anywhere, free from time and place restrictions. In this respect, this study attempted to investigate how the perception of mobile payment system's characteristics (security, compatibility, efficiency, economy, reliability) varies depending on the characteristics of mobile payment system users (demographic characteristics, usage characteristics of mobile payment system). The results of the empirical analysis using questionnaires for mobile payment system users in Korea and China say that there are differences in the perceptions of few characteristics of mobile payment system by gender, nationality, age, and usage amount of mobile payment system users. The analysis results of the study are expected to provide implications in various aspects to researchers and practitioners seeking ways for facilitating the usage of mobile payment systems in Korea and China in the future.

The Specification of Air-to-Air Combat Tactics Using UML Sequence Diagram (UML Sequence Diagram을 활용한 공대공 교전 전술 명세)

  • Park, Myunghwan;Oh, Jihyun;Kim, Cheonyoung;Seol, Hyeonju
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.24 no.6
    • /
    • pp.664-675
    • /
    • 2021
  • Air force air-to-air combat tactics are occurring at a high speed in three-dimensional space. The specification of the tactics requires dealing with a quite amount of information, which makes it a challenge to accurately describe the maneuvering procedure of the tactics. The specification of air-to-air tactics using natural languages is not suitable because of the intrinsic ambiguity of natural languages. Therefore, this paper proposes an approach of using UML Sequence Diagram to describe air-to-air combat tactics. Since the current Sequence Diagram notation is not sufficient to express all aspects of the tactics, we extend the syntax of the Sequence Diagram to accommodate the required features of air-to-air combat tactics. We evaluate the applicability of the extended Sequence Diagram to air-to-air combat tactics using a case example, that is the manned-unmanned teaming combat tactic. The result shows that Sequence Diagram specification is more advantageous than natural language specification in terms of readability, conciseness, and accuracy. However, the expressiveness of the Sequence Diagram is evaluated to be less powerful than natural language, requiring further study to address this issue.

Mark XIIA(Mode 5) IFF System Integration and Certification Test for Surface to Air Missile System (유도무기체계 모드 5 피아식별 체계통합 및 인증시험)

  • Kim, Woo-Hyun;Jung, Se-Young;Lee, Yun-Soo;Chang, Se-Myong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.2
    • /
    • pp.160-168
    • /
    • 2022
  • The new IFF mode, Mode-5 replacing Mode-4, has already been established by the US DoD for its allies and NATO forces. A IFF retrofit program for replacing the Mark XII Mode-4 with Mark XIIA Mode-5 is in progress in order to overcome the security limitations of the former in R.O.K. IFF certification test for the new mode, Mode-5, has been performed on medium range surface to air missile platform of the Korean armed forces for the first time in R.O.K and this is regarded as a monumental event in Korean defense industry. The present paper is a discussion on the procedures applied to the IFF system retrofit and integration, lessons learned from AIMS test with the US AIMS PO as observer. The minimum modification from the existing Mark XII Mode-4 to Mark XIIA Mode-5 and evolutional adaption from previous design including interoperability are required for the system retrofit. Letter of Certification was received from the US AIMS PO after the tests. The authors propose that the lessons learned and know-how acquired during the tests are managed by the R.O.K Government as the standard structure of a database. It is expected that the use of the database will reduce the developmental difficulties and risk, also increase efficiency in future developments and other projects.

Application of Machine Learning Techniques for Problematic Smartphone Use (스마트폰 과의존 판별을 위한 기계 학습 기법의 응용)

  • Kim, Woo-sung;Han, Jun-hee
    • Asia-Pacific Journal of Business
    • /
    • v.13 no.3
    • /
    • pp.293-309
    • /
    • 2022
  • Purpose - The purpose of this study is to explore the possibility of predicting the degree of smartphone overdependence based on mobile phone usage patterns. Design/methodology/approach - In this study, a survey conducted by Korea Internet and Security Agency(KISA) called "problematic smartphone use survey" was analyzed. The survey consists of 180 questions, and data were collected from 29,712 participants. Based on the data on the smartphone usage pattern obtained through the questionnaire, the smartphone addiction level was predicted using machine learning techniques. k-NN, gradient boosting, XGBoost, CatBoost, AdaBoost and random forest algorithms were employed. Findings - First, while various factors together influence the smartphone overdependence level, the results show that all machine learning techniques perform well to predict the smartphone overdependence level. Especially, we focus on the features which can be obtained from the smartphone log data (without psychological factors). It means that our results can be a basis for diagnostic programs to detect problematic smartphone use. Second, the results show that information on users' age, marriage and smartphone usage patterns can be used as predictors to determine whether users are addicted to smartphones. Other demographic characteristics such as sex or region did not appear to significantly affect smartphone overdependence levels. Research implications or Originality - While there are some studies that predict smartphone overdependence level using machine learning techniques, but the studies only present algorithm performance based on survey data. In this study, based on the information gain measure, questions that have more influence on the smartphone overdependence level are presented, and the performance of algorithms according to the questions is compared. Through the results of this study, it is shown that smartphone overdependence level can be predicted with less information if questions about smartphone use are given appropriately.

Salt and Pepper Noise Removal Algorithm based on Euclidean Distance Weight (유클리드 거리 가중치를 기반한 Salt and Pepper 잡음 제거 알고리즘)

  • Chung, Young-Su;Kim, Nam-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.11
    • /
    • pp.1637-1643
    • /
    • 2022
  • In recent years, the demand for image-processing technology in digital marketing has increased due to the expansion and diversification of the digital market, such as video, security, and machine intelligence. Noise-processing is essential for image-correction and reconstruction, especially in the case of sensitive noises, such as in CT, MRI, X-ray, and scanners. The two main salt and pepper noises have been actively studied, but the details and edges are still unsatisfactory and tend to blur when there is a lot of noise. Therefore, this paper proposes an algorithm that applies a weight-based Euclidean distance equation to the partial mask and uses only the non-noisy pixels that are the most similar to the original as effective pixels. The proposed algorithm determines the type of filter based on the state of the internal pixels of the designed partial mask and the degree of mask deterioration, which results in superior noise cancellation even in highly damaged environments.

The AHP Analysis of Music Streaming Platform Selection Attributes

  • Tae-Ho, Noh;Hyung-Seok, Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.1
    • /
    • pp.161-170
    • /
    • 2023
  • In this study, based on existing studies on music streaming services and e-services, the selection factors for music streaming platforms were derived, and the AHP technique was implemented to calculate the importance of each factor. As a result of this study, economic feasibility was found to be the most important factor among security, economic feasibility, informativeness, convenience, and responsiveness, which are the first-step selection factors of music streaming platforms. As a result of synthesizing the weights of the first and second factors, reasonable price was found to be the most important factor. Finally, an additional analysis was conducted to determine whether there was a difference in importance between the selection factors of the music streaming platform according to gender and age. Through this study, it will be possible to figure out the factors that consumers consider most important when using a music streaming platform.

Determinant Factors of Rice Farmers' Selection of Adaptation Methods to Climate Change in Eastern Rwanda (동부 르완다 쌀 농업인의 기후변화에 대한 적응 방법 결정 요인)

  • Butera, Tonny;Kim, Tae-Kyun;Choi, Se-Hyun
    • Korean Journal of Organic Agriculture
    • /
    • v.30 no.2
    • /
    • pp.241-253
    • /
    • 2022
  • The negative impact of climate change on the agricultural sector is rapidly increasing, and it is urgent to prepare policies at the government level to mitigate it. In the case of Rwanda's agricultural sector, which lacks the government's budget and farmers' capital, efficient and effective policy implementation is of paramount importance. To this end, rather than establishing related policies in the public sector from the top down, it is necessary to establish a bottom-up customized policy that is reflected in policy establishment by identifying the characteristics and behaviors of farmers who actually participate in adaptation activities. In this study, the effects of farmers' characteristics and farmers' perception status/adaptation status to climate change on the selection of adaptation methods for climate change were analyzed. 357 rice farmers randomly selected from Eastern Rwanda were surveyed to explore the information related to farmers' perception to climate change and adaptation methods as well as basic information of the farm. Research shows that the probability of selecting a variety of adaptation methods rather than not responding to climate change increases the younger the age, the higher the education level, and the easier access to climate information and credit. As a policy proposals, it is judged that public support such as strengthening agricultural technology support services, including more detailed guidance for elderly and low-educated farmers, and improving access to farm loan services by agricultural financial institutions is needed. In addition, it is necessary to adjust the planting time and cultivation method, provide timely information related to climate change, and provide crop variety improvement services to farmers.

Moisturizing and Dryness Reduction Effect of Face Cream Containing Persicaria Perfoliata (L.) Extract (며느리배꼽추출물을 함유하는 페이스 크림의 보습 및 건조함 감소 효과)

  • Kim, Seong-Yun;Yoon, Hyun-Seo;Hyun, Sook-Kyung;Park, Chung-Mu
    • Journal of The Korean Society of Integrative Medicine
    • /
    • v.10 no.3
    • /
    • pp.27-36
    • /
    • 2022
  • Purpose : This study was aimed to analyze the effects of cosmetics containing Persicaria perfoliata water extract (PPWE) on the skin moisturizing and improvement of skin condition in clinical trials. Methods : Clinical trial was conducted for five weeks after IRB approval at Dong-Eui University. Out of a total of 64 people, 15 people each were assigned to four groups as follows; control group A, B, C and the experimental group A that using cosmetic containing PPWE. Skin condition was measured two times, before and after clinical trial, by a professional skin analyzer, SDM (skin diagnosis system). Moisture and oil value of participants was analyzed twice, each morning and evening, using a portable device on their cheeks. In addition, the survey was investigated subjective satisfaction on change in skin condition and the satisfaction on the use of cosmetics. Result : The experimental group exhibited subjectively significant changes before and after clinical trials on skin its dryness (p=.039), blush (p=.017), and redness (p<.001). In addition, subjective evaluation was also the highest satisfaction in aspects of number of application (p=.003), amount of application (p=.002), moisture maintenance, and skin scratching frequency. The satisfaction on the use of cosmetics was the highest in the intention to repurchase (p=.045), recommendation willingness to others (p=.020), and intention to use various products (p=.001). Skin moisture of the clinical trial participants using the SDM, moisture level and elasticity of the experimental group increased by 12.94 and 10.28. Moisture level, which was measured by a portable device, was the most potently increased in the experimental group. Conclusion : Consequently, PPWE containg cosmetics exhibited the effects of moisturization and attenuated skin dryness in clinical trials, which might be utilized as a fundamental data to develop numerous lines of cosmetics.

SHOMY: Detection of Small Hazardous Objects using the You Only Look Once Algorithm

  • Kim, Eunchan;Lee, Jinyoung;Jo, Hyunjik;Na, Kwangtek;Moon, Eunsook;Gweon, Gahgene;Yoo, Byungjoon;Kyung, Yeunwoong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.8
    • /
    • pp.2688-2703
    • /
    • 2022
  • Research on the advanced detection of harmful objects in airport cargo for passenger safety against terrorism has increased recently. However, because associated studies are primarily focused on the detection of relatively large objects, research on the detection of small objects is lacking, and the detection performance for small objects has remained considerably low. Here, we verified the limitations of existing research on object detection and developed a new model called the Small Hazardous Object detection enhanced and reconstructed Model based on the You Only Look Once version 5 (YOLOv5) algorithm to overcome these limitations. We also examined the performance of the proposed model through different experiments based on YOLOv5, a recently launched object detection model. The detection performance of our model was found to be enhanced by 0.3 in terms of the mean average precision (mAP) index and 1.1 in terms of mAP (.5:.95) with respect to the YOLOv5 model. The proposed model is especially useful for the detection of small objects of different types in overlapping environments where objects of different sizes are densely packed. The contributions of the study are reconstructed layers for the Small Hazardous Object detection enhanced and reconstructed Model based on YOLOv5 and the non-requirement of data preprocessing for immediate industrial application without any performance degradation.

Trend of Paradigm for integrating Blockchain, Artificial Intelligence, Quantum Computing, and Internet of Things

  • Rini Wisnu Wardhani;Dedy Septono Catur Putranto;Thi-Thu-Huong Le;Yustus Eko Oktian;Uk Jo;Aji Teguh Prihatno;Naufal Suryanto;Howon Kim
    • Smart Media Journal
    • /
    • v.12 no.2
    • /
    • pp.42-55
    • /
    • 2023
  • The combination of blockchain (BC), artificial Intelligence (AI), quantum computing (QC), and the Internet of Things (IoT) can potentially transform various industries and domains, including healthcare, logistics, and finance. In this paper, we look at the trends and developments in integrating these emerging technologies and the potential benefits and challenges that come with them. We present a conceptual framework for integrating BC, AI, QC, and IoT and discuss the framework's key characteristics and challenges. We also look at the most recent cutting-edge research and developments in integrating these technologies, as well as the key challenges and opportunities that come with them. Our analysis highlights the potential benefits of integrating the technologies and looks to increased security, privacy, and efficiency to provide insights into the future of these technologies.