• Title/Summary/Keyword: School security

Search Result 3,325, Processing Time 0.033 seconds

Exploring the organic harmony of the Modern Pentathlon of sports

  • Han, Doryung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.8
    • /
    • pp.99-109
    • /
    • 2020
  • What sports have in common is that they must use their bodies to play and lead to victory. The use of the body differs in many ways depending on the event, which part should be used as the focus. The commonality of all sports is that sports can achieve the best results by using and using parts of the body in harmony. The use of strength or muscles varies depending on the type of sport or the type of sport, so the use of the body or the results of athletic events also varies. Sports are premised on the organic use of the body, but the implications of sports can be found in that the degree of organic use does not apply equally to all sports. Sports demand organic balance and flexibility. Depending on the type of sport, you can explore which organic harmony produces more effective effects and find out which events are more beneficial to the human body. This study aimed to find out whether the organic harmony of the body actively contributes to the development of sports and a healthy mental culture. In this study, we proposed the hypothesis that the modern Pentathlon will induce the most desirable organic harmony as a global Olympic sport, and tried to verify that the hypothesis is valid and verifiable. In order to do this study, I tried to find out the organic viewpoints centered on the Miletos school, re-examine the meaning of the modern Pentathlon of games as an Olympic event, and conduct organic harmony and exploration of the modern Pentathlon of games in terms of sports.

Hybrid Detection Algorithm of Copy-Paste Image Forgery (Copy-Paste 영상 위조의 하이브리드 검출 알고리즘)

  • Choi, YongSoo;Atnafu, Ayalneh Dessalegn;Lee, DalHo
    • Journal of Digital Contents Society
    • /
    • v.16 no.3
    • /
    • pp.389-395
    • /
    • 2015
  • Digital image provides many conveniences at the internet environment recently. A great number of applications, like Digital Library, Stock Image, Personal Image and Important Information, require the use of digital image. However it has fatal defect which is easy to be modified because digital image is only electronic file. Numerous digital image forgeries have become a serious problem due to the sophistication and accessibility of image editing software. Copy-Move forgery is the simplest type of forgery that involves copying portion of an image and paste it on different location within the image. There are many approaches to detect Copy-Move forgery, but all of them have their own limitations. In this paper, visual and invisible feature based forgery detection techniques are tested and analyzed. The analysis shows that pros and cons of these two techniques compensate each other. Therefore, a hybrid of visual based and invisible feature based forgery detection that combine the merits of both techniques is proposed. The experimental results show that the proposed algorithm has enhanced performance compared to individual techniques. Moreover, it provides more information about the forgery, like identifying copy and duplicate regions.

K-Ar Ages of Illite from Clay Veins Distributed in Granitic Rocks in the Korean Peninsula (국내 화강암 중의 점토세맥에 포함되는 일라이트의 K-Ar 연대)

  • KITAGAWA Ryuji;NISHIDO Hirotsugu;HWANG Jin-Yeon;JIGE Mayumi
    • Journal of the Mineralogical Society of Korea
    • /
    • v.18 no.3 s.45
    • /
    • pp.215-225
    • /
    • 2005
  • Numerous clay veins along fractures such as fault, joints, cracks and small fissures are found in granitic rocks in the Korean Peninsula. Granitic rocks of three geological stages (Jurassic, Cretaceous and Paleogene) occur in the Korean Peninsula, and are known as the Daebo, Bulguksa and Hoam granites, respectively. Specimens from clay veins composed or mainly mica clay mineral (illite) were dated using the K-Ar method with the hosted granitoids. The respective ages were as follows. Jurassic: granites 143.7 Ma and 160 Ma, clay mineral veins 104 Ma and 107 Ma: Cretaceous: granite 133.2 Ma, clay mineral veins 93.6 Ma, 84.2 Ma and 84.3 Ma: Paleogene: granite 39.7 Ma and 35.4Ma, clay mineral veins 27.1 Ma and 23.9 Ma. The ages of the clay veins in the Korean Peninsula are clearly much younger than those of their hosted granitoids. This contrasts with data for similar clay veins in Cretaceous and Paleogene granitoids in southwest Japan, where the K-Ar ages of mica clay minerals are slightly younger than their host rocks, or are almost the same.

Discovery of Market Convergence Opportunity Combining Text Mining and Social Network Analysis: Evidence from Large-Scale Product Databases (B2B 전자상거래 정보를 활용한 시장 융합 기회 발굴 방법론)

  • Kim, Ji-Eun;Hyun, Yoonjin;Choi, Yun-Jeong
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.4
    • /
    • pp.87-107
    • /
    • 2016
  • Understanding market convergence has became essential for small and mid-size enterprises. Identifying convergence items among heterogeneous markets could lead to product innovation and successful market introduction. Previous researches have two limitations. First, traditional researches focusing on patent databases are suitable for detecting technology convergence, however, they have failed to recognize market demands. Second, most researches concentrate on identifying the relationship between existing products or technology. This study presents a platform to identify the opportunity of market convergence by using product databases from a global B2B marketplace. We also attempt to identify convergence opportunity in different industries by applying Structural Hole theory. This paper shows the mechanisms for market convergence: attributes extraction of products and services using text mining and association analysis among attributes, and network analysis based on structural hole. In order to discover market demand, we analyzed 240,002 e-catalog from January 2013 to July 2016.

A Study of the Establishment of Small and Medium Sized Architectural Design Firm BIM Environment based on Virtual Desktop Infrastructure (가상 데스크톱 인프라(VDI) 기술을 활용한 중소규모 설계사의 BIM 사용자 별 데스크탑 자원 할당 전략에 관한 연구)

  • Lee, Kyuhyup;Shin, Joonghwan;Kwon, Soonwook;Park, Jaewoo
    • Korean Journal of Construction Engineering and Management
    • /
    • v.17 no.5
    • /
    • pp.78-88
    • /
    • 2016
  • Recently BIM technology has been expanded for using in construction project. However its spread has been delayed than the initial expectations, due to the high-cost of BIM infrastructure development, the lack of regulations, the lack of process and so forth. In design phase, especially, collaboration based on BIM system has being a key factor for successful next generation building project. Through the analysis of current research trend about IT technologies, virtualization and BIM service, data exchange such as drawing, 3D model, object data, properties using cloud computing and virtual server system is defined as a most successful solution. In various industrial fields, cloud computing technology is utilized as a promising solution which can reduce time and cost of hardware infrastructure. Among the cloud computing technology, VDI is receiving a great deal of attention from it market as an essential part cloud computing. VDI enables to host multiple individual virtual machines by using hypervisor. It has an advantage to easy main device management. Therefore, this study implements a step-by-step user's DaaS by analyzing the desktop resource data of the workers from Pre-design phase to Schematic design, Design develop and Construction design phase. It also develops BIM environment based on test of BIM modeler and designers in architectural design firm. The goal of the study is to enable the cloud computing BIM server. It provides cost saving, high-performance quality of working environment and cooperation's convenience and high security when doing BIM work in small and medium sized architectural design firm.

Single Path Phase-only Security System using Phase-encoded XOR Operations in Fourier Plane (푸리에 영역에서의 위상 변조 Exclusive-OR 연산을 이용한 단일 경로 위상 암호화 시스템)

  • Shin, Chang-Mok;Cho, Kyu-Bo;Kim, Soo-Joong;Noh, Duck-Soo
    • Korean Journal of Optics and Photonics
    • /
    • v.16 no.4
    • /
    • pp.326-333
    • /
    • 2005
  • Phase-only encryption scheme using exclusive-OR rules in Fourier plane and a single path decryption system are presented. A zero-padded original image, multiplied by a random phase image, is Fourier transformed and its real-valued data is encrypted with key data by using XOR rules. A decryption is simply performed based on 2-1 setup with spatial filter by Fourier transform for multiplying phase-only encrypted data by phase-only key data, which are obtained by phase-encoding process, and spatial filtering for zero-order elimination in inverse-Fourier plane. Since the encryption process is peformed in Fourier plane, proposed encryption scheme is more tolerant to loss of key information by scratching or cutting than previous XOR encryption method in space domain. Compare with previous phase-visualization systems, due to the simple architecture without a reference wave, our system is basically robust to mechanical vibrations and fluctuations. Numerical simulations have confirmed the proposed technique as high-level encryption and simple decryption architecture.

Cloud Messaging Service for Preventing Smishing Attack (스미싱 공격 방지를 위한 클라우드 메시징 서비스)

  • Park, Hyo-Min;Kim, Wan-Seok;Kang, So-Jeong;Shin, Sang Uk
    • Journal of Digital Convergence
    • /
    • v.15 no.4
    • /
    • pp.285-293
    • /
    • 2017
  • They are rapidly evolving malicious attacks on smart devices, and to timely protect the smart devices from these attacks has become a very important issue. In particular, smishing attack has emerged as one of the most important threats on the smartphone. In this paper, we propose the cloud service that can fundamentally protect the user from the risk of smishing attack. The proposed scheme provides cloud messaging service that can filter text messages including URLs in the user's smart device, view and manage them through a virtual machine provided by a cloud server. The existing techniques for preventing smshing attacks protect only malicious code of a known pattern and there is the possibility of error such as FP(False Positive) or FN(False Negative). However, since the proposed method automatically filters all text messages including URLs, storing, viewing, and managing them in their own storage space on the cloud server, it can completely block the installation of malwares(malicious codes) on the user's smart device through smishing attacks.

Job Stress, Job Satisfaction, and Organizational Commitment of Customized Home Health Care Nurse (방문건강관리 간호사의 직무스트레스, 직무만족도와 조직애착도)

  • Park, Chan Gyeong;Park, Ki Soo;Kang, Young Sil
    • Journal of agricultural medicine and community health
    • /
    • v.38 no.1
    • /
    • pp.39-48
    • /
    • 2013
  • Objectives: This research was done to identify relationships among job stress, fatigue, job satisfaction, and commitment to organization in customized home health care nurses. Methods: Research participants were 130 nurses who worked in the customized home health care of 20 county in Gyeongnam province. Data collection for this descriptive correlational study was done at August 2010 using self report questionnaires, and analyzed using descriptive statistics, t-test, ANOVA, and we analyzed a four step approach in which several regression analyses were conducted and significance of the coefficients is examined at each step. Results: The results from step 1 showed that, the effect of each job stress was significantly related to job satisfaction. In step 2, the direct effect of commitment to organization on job satisfactions were all significant too. Step 3 analysis showed that the total effect of each job stress on commitment to organization symptoms was significant. Step 4 showed the results of controlling for mediating factor (job satisfaction): job demand and insecurity were significantly associated with commitment to organization(p<0.001), the finding supports that others were fully mediated by each job satisfaction, and, the job demand and insecurity were partially mediated by job satisfaction. Conclusion: Results of this research indicated that job stress in customized home health care nurses was the principal variable affecting job satisfaction and commitment to organization. Appropriate stress management strategies based on assessment of job demand and job security for these nurses lead to development of improved commitment to organization.

Integration Process of Federation Object Model for Interoperation of Federations (페더레이션 연동을 위한 객체 모델 통합 프로세스)

  • Kwon, Se Jung;Yu, Minwook;Kim, Tag Gon
    • Journal of the Korea Society for Simulation
    • /
    • v.26 no.2
    • /
    • pp.1-8
    • /
    • 2017
  • High Level Architecture(HLA) is a specification for interoperation among heterogeneous simulators which are executed in a distributed environment. HLA originally allows many federates to join in a federation using a single RTI(Run-Time Infrastructure). As the target systems become more complex, the need for the interoperation of federations, performed in a RTI-RTI interoperation environment, has been growing. It can be performed by the confederation interface with the agents, which subrogate the API calls and callbacks of each federation. The existing studies have assumed that the object models of each federation are based on same HLA standard and their object descriptions are equal. Because the existing federations are usually not under this assumption, this paper proposes the integration process of object models for the federation interoperation environment. To integrate the object models for the interoperation of federations, this process resolves the differences of HLA standards, provides conversion process between objects with different descriptions and excludes the security objects. We expect that this process enhances the reusability and effectiveness of interoperation of federations in various domains.

Analysis on the Damage Status by Diagnostical Methodology for the Improvement Landscape on the Supyo-bridge at Chunggae-stream (청계천 수표교(水標橋)의 경관 향상을 위한 진단학적(診斷學的) 훼손상태 분석)

  • An, Jin-Sung;Choi, Ah-Hyun;Kim, Yu-Il
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.28 no.3
    • /
    • pp.105-113
    • /
    • 2010
  • This study is for the preservation plan of the tradition space which is performed by the damage status analysis through performing the value assessment. Especially, it is an experimental study for finding the process and methods by analyzing the major element for the value assessment of the selected object's damage status through the expert group who are systematized in their interest to conserve the traditional structure in traditional space. For that purpose, this study should be performed by the fundamental understanding of the physical property of the Supyo-bridge and the condition of the selected site's environment. Meanwhile, this study has been done that 'map of the damage status distribution' for making records of damage status of the Supyo-bridge on the property utilized field measurement adapted by photogrammetry and assessment guidelines, which are for investigation on damage status of objects that are standardized 'Raccomandazioni Normal' which could be said construction culture assets management guidelines of Italian government. As the result of investigation, damage status of each part in the Supyo-bridge was mostly composed of damage by sediment and corrosion and in case of 9 damage types including corrosion, in consideration of physical and chemical properties and distribution status of those elements, it is made an judgement that is not working as a threatened factor regarding security of the Supyo-bridge. On the contrary, for the improvement landscape, in case of 'Thermoclastism' phenomenon observed in 'upper floor', 'Myungae stone' and 'bridge pier' is that when taking it into consideration that is widely distributed concentrated on the bridge pier, surface reinforcement job along with elimination of damage part will be judged to be requested for earliest treatment.