• Title/Summary/Keyword: Secure Development

Search Result 1,865, Processing Time 0.034 seconds

Children's Emotion Recognition, Emotion Expression, and Social Interactions According to Attachment Styles (애착 유형에 따른 아동의 정서인식, 정서표현 및 상호작용)

  • Choi, Eun-Sil;Bost, Kelly
    • Korean Journal of Child Studies
    • /
    • v.33 no.2
    • /
    • pp.55-68
    • /
    • 2012
  • The goals of this study were to examine how children's recognition of various emotions, emotion expression, and social interactions among their peers differed according to their attachment styles. A total of 65 three to five years old children completed both attachment story-stem doll plays and a standard emotion recognition task. Trained observers documented children's valence of emotion expression and social interactions among their peers in the classroom. Consistent with attachment theory, children who were categorized as secure in the doll play were more likely to express positive emotions than children who were categorized as avoidant in the doll play. Children who were categorized as avoidant in the doll play were more likely to express neutral emotions among their peers than children who were categorized as secure and anxious in the doll play. The findings of this study contribute to the general attachment literature by documenting how attachment security plays a crucial role in having positive emotions in ordinary situations. It does so by also demonstrating how different attachment styles are associated with children's qualitatively different patterns of emotion processing, especially in terms of their expression of emotions.

Validation Test Codes Development of Static Analysis Tool for Secure Software (안전한 소프트웨어 개발을 위한 정적분석 도구 시험코드 개발)

  • Bang, Jiho;Ha, Rhan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.5
    • /
    • pp.420-427
    • /
    • 2013
  • Recently, for secure software development, static analysis tools have been used mostly to analyze the source code of the software and identify software weaknesses caused of vulnerabilities. In order to select the optimal static analysis tool, both weaknesses rules and analysis capabilities of the tool are important factors. Therefore, in this paper we propose the test codes developed for evaluating the rules and analysis capabilities of the tools. The test codes to involve 43 weaknesses such as SQL injection etc. can be used to evaluate the adequacy of the rules and analysis capabilities of the tools.

Development of Application Service for Secure Container Transport Based on CSD (CSD 기반의 컨테이너 안전운송 응용 서비스 개발)

  • Choo, Young-Yeol;Choi, Su-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.10
    • /
    • pp.2203-2208
    • /
    • 2011
  • In this paper, we describe application service development for secure land and marine transport based on CSD (Conveyance Security Device) systems. Based on CSD systems, we present application service and security service according to relevant standards as well as test procedure of developed services. Exploiting temperature, moisture, impact sensors, state monitoring function of container freight was developed to prevent disaster during transportation in addition to security function with CSD. For confidentiality of messages exchanged among application service entity and CSD systems, Encryption and decryption functions going by RC5 and AES-128 algorithms were implemented at desktop PC and 8 bit CPU environments, respectively. Measuring the elapsed time during encryption and decryption shows that two algorithms are allowable for the application service.

An Exploration of Direction for Human Resource Development in Marine industry (해양산업 인적자원개발 방향 탐색)

  • LYU, Mi-Hyun;WON, Hyo-Heon;HONG, Jeong-Whan
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.28 no.6
    • /
    • pp.1801-1811
    • /
    • 2016
  • The purpose of this research is to grasp the present state of marine lifelong education and to provide direction for maritime industry. In this research, we first saw our country present ocean industry and the ocean lifelong education concept and definition besides formal school education to secure ocean human capital. Second, we researched about the ocean lifelong education that has been progressing by the organization, and by this, we inferred what to improve from our country ocean lifelong education. As a result, the improvement point for present ocean lifelong education of our country was first, the reflect of variety of marine related information in our country lifelong education is low, second, the learners were mostly children and teenagers, third, most of the were event education. Forth, it is good that there are a lot of experimenting programs, but most of them were experiment of ocean leisure sports and visiting the facilities, and because these are one-time thing so it was hard to secure marine citizenship or help them set their career in marine. Fifth, all facilities had similar contents for the experimenting program, and sixth, education period was concentrated on May and November.

A Design of Block cipher-Secure Electronic Xenogenesis Alorithm for Efficient Plaintext Management in Block Cryptosystem

  • Lee, Seon-Keun;Kim, Hwan-Yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.4C
    • /
    • pp.356-364
    • /
    • 2003
  • Presently, etwork is being in the existence as an influence can not be neglected. This rapid progress of network has gone with development of mobile network and information communication. But the development of network can generate serous social problems. So, it is highly required to control security of network. These problems related security will be developed and keep up to confront with anti-security part such as hacking, cracking. There's no way to preserve security from hacker or cracker without delvelopping new cryptographic algorithm or keeping the state of anti-cryptanalysis in a prescribed time by means of extendig key-length. Worldwidely, many researchers for network security are trying to handle these problems. In this paper, we proposed a new block cryptosystem. The Block cipher-Secure Electronic Xenogenesis Algorithm(B-SEXA) which is capable to cipher regardless of key distribution or key-length for these definite problem is proposed and designed in hardware. B-SEXA increase secret level from using a MDP and MLP in maximum is proposed to prevent cryptograpy analysis. The designed B-SEXA in this paper performed synthesization and simulation using Synopsys Vwe. 1999.10 and VHDL.

A study on the Policy Suggestion for Re-establishment of Health Family Support Centers - focused to Gyeonggi-do - (건강가정지원센터 위상 재정립을 위한 정책 제안 연구 -경기도를 중심으로-)

  • Kim, Sung-Hee;Yang, Jung-Sun
    • Journal of Family Resource Management and Policy Review
    • /
    • v.15 no.4
    • /
    • pp.43-64
    • /
    • 2011
  • This study suggests policies to rearrange the status of Health Family Support Centers, targeting hands-on workers and centering on collected problems and improvements. To attain this aim, the study rearranged the materials investigated in 2009. On this basis, the study suggests the following policies. First, Health Family Support Centers changed into Korean Institute Healthy family which could prepare a means for opinion convergence through base organizations. Thus, it is necessary to establish a Gyeonggi-do wide area Health Family Support Center. Second, space and human resource arrangement, suitable to business, are necessary, and so are stable, secure finances. Third, urban areas, agricultural villages, and fishing villages are distributed across Gyeonggi-do. Thus, the development of specialized business, suitable to Gyeonggi-do, is necessary. Consequently, this study suggests executing obligatory family education (education for engaged couples, education for parents). Fourth, case management models, unique to Health Family Support Centers, have to be developed, as well as unified services related to education, counseling, and cultural businesses. Fifth, the Health Family Support Center has to secure its own status as a hub organization of inter-regional family businesses, has to strengthen its organizational identity, and has to promote suitable business development.

  • PDF

Utilizing a Model Registry to Secure Interoperability Among Urban Domain Information Models (도메인 정보 모델 간의 상호운용성 확보를 위한 모델 레지스트리 활용방안)

  • Won Wook Choi;Sang Ki Hong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.2
    • /
    • pp.18-25
    • /
    • 2024
  • This study proposes the utilization of a model registry to secure interoperability among urban domain information models. It reviews urban information and data sharing along with related standards and standardization activities. By analyzing registry use cases in the context of Spatial Data Infrastructure (SDI), it presents the concept of a model registry for facilitating information sharing and exchange among urban domain information models. An use case linking urban domain information models using the model registry is developed with a prerequisite of seamless implementation of smart city services. The paper discusses technical requirements and outlines technology implementation and validation through prototype development, highlighting them as future research tasks.

Evaluation of Spraying Characteristics for Masonry Buildings Seismic Retrofit Fiber-Reinforced Mortar (조적조 내진보강용 섬유보강 모르타르의 분사특성 평가)

  • Hwang, Byoung-Il;Park, Jong-Pil;Yoo, Byung-Hyun;Lee, Dong-gyu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.11
    • /
    • pp.37-43
    • /
    • 2020
  • The seismic reinforcement ratio of SOC facilities, such as domestic roads and railroads, is 96%. Out of approximately 7 million buildings as of 2016, only 0.51 million buildings with seismic performance were secured. Although the proportion of masonry structures is 38.8% of the total buildings, there is almost no seismic resistance, only 2.0%. To solve the problem in Korea, government-level seismic measures are being promoted, but the situation is insufficient. Overseas, the UBC research team in Vancouver, Canada, has developed and used EDCC to reinforce the seismic performance of masonry buildings. EDCC is a construction material that can secure concrete ductility capability by mixing fibers and secure deformation resistance of concrete through bridging action. It is necessary to examine various materials because EDCC is not used as a spray type of secure seismic reinforcement. In this study, as part of the research and development of spraying materials to improve the durability of masonry buildings, this study examined the spraying characteristics of fiber-reinforced mortar according to fiber use and the viscosity change according to the use of thickener. As a result, the working performance of the fiber-reinforced mortar for seismic reinforcement was improved when using 1% fiber and 1% thickener.

The Relationship Among Mother-Daughter Relationship, Husband-Wife Relationship and Prenatal Attachment according to Pregnant Women's Internal Working Model (임부의 내적 작동모델에 따른 산전애착과 친모와의 관계 및 배우자와의 관계)

  • Jeong, Young-Sook
    • Women's Health Nursing
    • /
    • v.10 no.3
    • /
    • pp.210-217
    • /
    • 2004
  • Purpose: The purpose of this study was to identify the relationship among mother-daughter relationship, husband-wife relationship, and prenatal attachment according to pregnant women's internal working model. Method: A convenience sample of 68 pregnant women was recruited from two OBGYN hospitals in M city. Data collection was conducted through the use of an Adult Attachment Interview and questionnaires. This study used a descriptive correlational design and the period of investigation was from July 3-20, 2002. 41 of the 68 women were in a secure pregnant women's internal working model and 27 of the 68 in insecure ones. The data were analyzed by Chi-square test, t-test, and Pearson Correlation Coefficient. Result: The results of this study were as follows: Mean score of the prenatal attachment of the secure pregnant women and mean score of the mother-daughter relationship of the secure pregnant women was significantly higher than that of insecure ones. 3) Prenatal attachment was negatively and significantly related to mother-daughter attachment and husbandwife attachment in the secure pregnant women's internal working model. However it was not significantly relationship in insecure pregnant women's internal working model. Conclusion: It is found in this study that there is an intergenerational attachment relationship during pregnancy. Further findings support the development of creative strategies to enhance positive attachment relationships for pregnant women. It is recommended to develop nursing education of attachment for the insecure pregnant women's internal working model.

  • PDF

Development of a Secure Routing Protocol using Game Theory Model in Mobile Ad Hoc Networks

  • Paramasivan, Balasubramanian;Viju Prakash, Maria Johan;Kaliappan, Madasamy
    • Journal of Communications and Networks
    • /
    • v.17 no.1
    • /
    • pp.75-83
    • /
    • 2015
  • In mobile ad-hoc networks (MANETs), nodes are mobile in nature. Collaboration between mobile nodes is more significant in MANETs, which have as their greatest challenges vulnerabilities to various security attacks and an inability to operate securely while preserving its resources and performing secure routing among nodes. Therefore, it is essential to develop an effective secure routing protocol to protect the nodes from anonymous behaviors. Currently, game theory is a tool that analyzes, formulates and solves selfishness issues. It is seldom applied to detect malicious behavior in networks. It deals, instead, with the strategic and rational behavior of each node. In our study,we used the dynamic Bayesian signaling game to analyze the strategy profile for regular and malicious nodes. This game also revealed the best actions of individual strategies for each node. Perfect Bayesian equilibrium (PBE) provides a prominent solution for signaling games to solve incomplete information by combining strategies and payoff of players that constitute equilibrium. Using PBE strategies of nodes are private information of regular and malicious nodes. Regular nodes should be cooperative during routing and update their payoff, while malicious nodes take sophisticated risks by evaluating their risk of being identified to decide when to decline. This approach minimizes the utility of malicious nodes and it motivates better cooperation between nodes by using the reputation system. Regular nodes monitor continuously to evaluate their neighbors using belief updating systems of the Bayes rule.