• Title/Summary/Keyword: Security SoC

Search Result 198, Processing Time 0.022 seconds

Influencing Factors of Social Anxiety in Late School-aged Children (학령후기 아동의 사회불안에 미치는 영향요인)

  • Moon, So-Hyun;Kim, Hyung-ran;Kim, Jeong-Suk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.6
    • /
    • pp.63-73
    • /
    • 2019
  • The purpose of this study was to investigate the prevalence of social anxiety among late School-aged Children and identify factors influencing the tendency to social anxiety. A self-report survey was conducted with primary school children who were in the 6th grades. Two hundred and seventy eight children were included in the study. The instruments utilized in this study were SASCA-K (Korean Social Anxiety Scale for children and adolescents), SES(Self-esteem Scale), CAPS(Child and Adolescent Perfectionism Scale), DSRS-C(Depression Self-Rating Scale for Children), and IPPA-R(Inventory of Parent and Peer Attachment-Revised version). Data were analyzed using descriptive statistics, t-test, One-way ANOVA, Pearson correlation and multiple regression with SPSS WIN 23.0 program. Social anxiety for the schoolchildren was positively correlated with perfectionism and depression, whereas self-esteem and attachment security was negatively correlated with social anxiety. Stepwise multiple regression analysis showed that 38.0% of the variance for social anxiety was significantly accounted for by self-esteem, self-oriented perfectionism, depression, attachment security (Father-communication). The most significant factor influencing social anxiety was self-esteem. Findings suggest that expanding health education, counseling and school-based health education programs is necessary to prevent and intervention mental problems of late School-aged Children through integrated intervention by schools, families and communities.

Evaluation Criteria of the Walkway Level-of-Service in Korea (국내 보행 서비스수준의 평가기준)

  • 김경환
    • Journal of Korean Society of Transportation
    • /
    • v.17 no.3
    • /
    • pp.31-46
    • /
    • 1999
  • In the middle of motorization, the traffic problems become serious social problems in Korea. The walking environment is not only a topic which restores the community spirit of a city or society but also a lever which renovates the future space of the city environment-friendly. Thus, the Purpose of this study is to suggest the new criteria of walkway level of service adopting the concepts of safety. convenience, comfort, environment, security, and continuity in addition to present pedestrian flow rate, and to provide basic data for walkway plan in Korea. In order to analyze the adequacy of the present walkway level of service criteria, the walkways of which service levels were A, C, E according to USHCM were selected as study walkways, and an interview surrey was conducted to compare the three service levels with those that pedestrians evaluate actually. Also, another interview survey was conducted to analyze the service conditions and satisfaction level at the walkways of high service levels(A and B). For the establishment of more reasonable walkway level of service criteria. the survey of pedestrian\`s consciousness for walkway service was conducted. Based on the survey results, the new criteria for the evaluation of walkway service were selected and the six levels of service for each criterion was analyzed: so the comprehensive criteria of walkway level of service were suggested.

  • PDF

Improved a Mutual Authentication Protocol in RFID based on Hash Function and CRC Code (개선된 해시함수와 CRC 코드 기반의 RFID 상호인증 프로토콜)

  • Oh, Se-Jin;Yun, Tae-Jin;Lee, Chang-Hee;Lee, Jae-Kang;Chung, Kyung-Ho;Ahn, Kwang-Seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.2C
    • /
    • pp.132-139
    • /
    • 2012
  • In 2011, Woosik Bae proposed a NLMAP(New Low-cost Mutual Authentication Protocol) in RFID based on hash function. They argued that minimize computation such as random number generation. In addition, NLMAP is safe against replay attack, spoofing attack, traffic analysis and eavesdropping attack due to using mutual authentication. So, when applied to RFID system has advantage such as providing a high level of security at a lower manufacturing cost. However, unlike their argue, attacker can obtain Tag's hash computed unique identification information. This paper proves possible the location tracking and spoofing attack using H(IDt) by attacker. In addition, we propose the improved a mutual authentication protocol in RFID based on hash function and CRC code. Also, our protocol is secure against various attacks and suitable for efficient RFID systems better than NLMAP.

Performance Analysis of 2-Stage Compression and 1-Stage Expansion Refrigeration System using Alternative Natural Refrigerants (암모니아 대체 자연냉매를 이용하는 2단압축 1단팽창 냉동시스템의 성능예측)

  • Roh, Geon-Sang
    • Journal of the Korean Institute of Gas
    • /
    • v.16 no.3
    • /
    • pp.42-47
    • /
    • 2012
  • In this paper, alternative natural refrigerant R290(Propane), R600(Butane), R717(Ammonia), R1270(Propylene) for freon refrigerant R22 were used working fluids for 2-stage compression and 1-stage expansion refrigeration system. The operating parameters considered in this study included evaporation temperature, condensation temperature, subcooling degree, superheating degree, mass flow rate ratio of inter-cooler. The main results were summarized as follows : The COP of 2-stage compression and 1-stage expansion refrigeration system increases with the increasing subcooling degree and mass flow rate ration of inter-cooler, but decreases with the increasing evaporating temperature, condensing temperature and superheating degree. Therefore, subcooling degree, mass flow rate ratio of inter-cooler of 2-stage compression and 1-stage expansion refrigeration system using natural refrigerants have an effect on COP of this system. The COP of natural refrigerants was higher than the COP of freon R22 in this study, so points to be considered are the security, the attached facilities for natural refrigerants than COP.

The Design and Implementation of Web Agents for vCard Service in Mobile Enviromnent (모바일 환경에서 vCard 서비스를 위한 웹 에이전트의 설계 및 구현)

  • Yun, Se-Mi;Jo, Ik-Seong
    • The KIPS Transactions:PartD
    • /
    • v.9D no.3
    • /
    • pp.477-486
    • /
    • 2002
  • vCard that is the electronic business card automates the exchange of personal information typically found on a traditional business card. vCard information contains not only simple text, but also graphics and multimedia data like pictures, company logos, Web addresses, and so on. This paper describes the design and implementation of Web-based vCard agent system for exchanging vCard, an electronic business card and searching another user's vCard in mobile phone environment. In today's business environment, such as that this information is typically exchanged on business cards. Our web agent system in this paper connect web server which provide vCard service and search, edit vCard information displayed by web browser of mobile phone and exchange vCard with another user through internet. Considering characteristics of wireless devices that have limited storage space, It also saves constructed XML documents that include user's informations in a web server and solves the security problem by exchanging not personal data or XML but encrypted directory name where XML document exits as exchanging vcard.

PRC Maritime Operational Capability and the Task for the ROK Military (중국군의 해양작전능력과 한국군의 과제)

  • Kim, Min-Seok
    • Strategy21
    • /
    • s.33
    • /
    • pp.65-112
    • /
    • 2014
  • Recent trends show that the PRC has stepped aside its "army-centered approach" and placed greater emphasis on its Navy and Air Force for a wider range of operations, thereby reducing its ground force and harnessing its economic power and military technology into naval development. A quantitative growth of the PLA Navy itself is no surprise as this is not a recent phenomenon. Now is the time to pay closer attention to the level of PRC naval force's performance and the extent of its warfighting capacity in the maritime domain. It is also worth asking what China can do with its widening naval power foundation. In short, it is time to delve into several possible scenarios I which the PRC poses a real threat. With this in mind, in Section Two the paper seeks to observe the construction progress of PRC's naval power and its future prospects up to the year 2020, and categorize time frame according to its major force improvement trends. By analyzing qualitative improvements made over time, such as the scale of investment and the number of ships compared to increase in displacement (tonnage), this paper attempts to identify salient features in the construction of naval power. Chapter Three sets out performance evaluation on each type of PRC naval ships as well as capabilities of the Navy, Air Force, the Second Artillery (i.e., strategic missile forces) and satellites that could support maritime warfare. Finall, the concluding chapter estimates the PRC's maritime warfighting capability as anticipated in respective conflict scenarios, and considers its impact on the Korean Peninsula and proposes the directions ROK should steer in response. First of all, since the 1980s the PRC navy has undergone transitions as the focus of its military strategic outlook shifted from ground warfare to maritime warfare, and within 30 years of its effort to construct naval power while greatly reducing the size of its ground forces, the PRC has succeeded in building its naval power next to the U.S.'s in the world in terms of number, with acquisition of an aircraft carrier, Chinese-version of the Aegis, submarines and so on. The PRC also enjoys great potentials to qualitatively develop its forces such as indigenous aircraft carriers, next-generation strategic submarines, next-generation destroyers and so forth, which is possible because the PRC has accumulated its independent production capabilities in the process of its 30-year-long efforts. Secondly, one could argue that ROK still has its chances of coping with the PRC in naval power since, despite its continuous efforts, many estimate that the PRC naval force is roughly ten or more years behind that of superpowers such as the U.S., on areas including radar detection capability, EW capability, C4I and data-link systems, doctrines on force employment as well as tactics, and such gap cannot be easily overcome. The most probable scenarios involving the PRC in sea areas surrounding the Korean Peninsula are: first, upon the outbreak of war in the peninsula, the PRC may pursue military intervention through sea, thereby undermining efforts of the ROK-U.S. combined operations; second, ROK-PRC or PRC-Japan conflicts over maritime jurisdiction or ownership over the Senkaku/Diaoyu islands could inflict damage to ROK territorial sovereignty or economic gains. The PRC would likely attempt to resolve the conflict employing blitzkrieg tactics before U.S. forces arrive on the scene, while at the same time delaying and denying access of the incoming U.S. forces. If this proves unattainable, the PRC could take a course of action adopting "long-term attrition warfare," thus weakening its enemy's sustainability. All in all, thiss paper makes three proposals on how the ROK should respond. First, modern warfare as well as the emergent future warfare demonstrates that the center stage of battle is no longer the domestic territory, but rather further away into the sea and space. In this respect, the ROKN should take advantage of the distinct feature of battle space on the peninsula, which is surrounded by the seas, and obtain capabilities to intercept more than 50 percent of the enemy's ballistic missiles, including those of North Korea. In tandem with this capacity, employment of a large scale of UAV/F Carrier for Kill Chain operations should enhance effectiveness. This is because conditions are more favorable to defend from sea, on matters concerning accuracy rates against enemy targets, minimized threat of friendly damage, and cost effectiveness. Second, to maintain readiness for a North Korean crisis where timely deployment of US forces is not possible, the ROKN ought to obtain capabilities to hold the enemy attack at bay while deterring PRC naval intervention. It is also argued that ROKN should strengthen its power so as to protect national interests in the seas surrounding the peninsula without support from the USN, should ROK-PRC or ROK-Japan conflict arise concerning maritime jurisprudence. Third, the ROK should fortify infrastructures for independent construction of naval power and expand its R&D efforts, and for this purpose, the ROK should make the most of the advantages stemming from the ROK-U.S. alliance inducing active support from the United States. The rationale behind this argument is that while it is strategically effective to rely on alliance or jump on the bandwagon, the ultimate goal is always to acquire an independent response capability as much as possible.

Critical Success Factor of Noble Payment System: Multiple Case Studies (새로운 결제서비스의 성공요인: 다중사례연구)

  • Park, Arum;Lee, Kyoung Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.4
    • /
    • pp.59-87
    • /
    • 2014
  • In MIS field, the researches on payment services are focused on adoption factors of payment service using behavior theories such as TRA(Theory of Reasoned Action), TAM(Technology Acceptance Model), and TPB (Theory of Planned Behavior). The previous researches presented various adoption factors according to types of payment service, nations, culture and so on even though adoption factors of identical payment service were presented differently by researchers. The payment service industry relatively has strong path dependency to the existing payment methods so that the research results on the identical payment service are different due to payment culture of nation. This paper aims to suggest a successful adoption factor of noble payment service regardless of nation's culture and characteristics of payment and prove it. In previous researches, common adoption factors of payment service are convenience, ease of use, security, convenience, speed etc. But real cases prove the fact that adoption factors that the previous researches present are not always critical to success to penetrate a market. For example, PayByPhone, NFC based parking payment service, successfully has penetrated to early market and grown. In contrast, Google Wallet service failed to be adopted to users despite NFC based payment method which provides convenience, security, ease of use. As shown in upper case, there remains an unexplained aspect. Therefore, the present research question emerged from the question: "What is the more essential and fundamental factor that should takes precedence over factors such as provides convenience, security, ease of use for successful penetration to market". With these cases, this paper analyzes four cases predicted on the following hypothesis and demonstrates it. "To successfully penetrate a market and sustainably grow, new payment service should find non-customer of the existing payment service and provide noble payment method so that they can use payment method". We give plausible explanations for the hypothesis using multiple case studies. Diners club, Danal, PayPal, Square were selected as a typical and successful cases in each category of payment service. The discussion on cases is primarily non-customer analysis that noble payment service targets on to find the most crucial factor in the early market, we does not attempt to consider factors for business growth. We clarified three-tier non-customer of the payment method that new payment service targets on and elaborated how new payment service satisfy them. In case of credit card, this payment service target first tier of non-customer who can't pay for because they don't have any cash temporarily but they have regular income. So credit card provides an opportunity which they can do economic activities by delaying the date of payment. In a result of wireless phone payment's case study, this service targets on second of non-customer who can't use online payment because they concern about security or have to take a complex process and learn how to use online payment method. Therefore, wireless phone payment provides very convenient payment method. Especially, it made group of young pay for a little money without a credit card. Case study result of PayPal, online payment service, shows that it targets on second tier of non-customer who reject to use online payment service because of concern about sensitive information leaks such as passwords and credit card details. Accordingly, PayPal service allows users to pay online without a provision of sensitive information. Final Square case result, Mobile POS -based payment service, also shows that it targets on second tier of non-customer who can't individually transact offline because of cash's shortness. Hence, Square provides dongle which function as POS by putting dongle in earphone terminal. As a result, four cases made non-customer their customer so that they could penetrate early market and had been extended their market share. Consequently, all cases supported the hypothesis and it is highly probable according to 'analytic generation' that case study methodology suggests. We present for judging the quality of research designs the following. Construct validity, internal validity, external validity, reliability are common to all social science methods, these have been summarized in numerous textbooks(Yin, 2014). In case study methodology, these also have served as a framework for assessing a large group of case studies (Gibbert, Ruigrok & Wicki, 2008). Construct validity is to identify correct operational measures for the concepts being studied. To satisfy construct validity, we use multiple sources of evidence such as the academic journals, magazine and articles etc. Internal validity is to seek to establish a causal relationship, whereby certain conditions are believed to lead to other conditions, as distinguished from spurious relationships. To satisfy internal validity, we do explanation building through four cases analysis. External validity is to define the domain to which a study's findings can be generalized. To satisfy this, replication logic in multiple case studies is used. Reliability is to demonstrate that the operations of a study -such as the data collection procedures- can be repeated, with the same results. To satisfy this, we use case study protocol. In Korea, the competition among stakeholders over mobile payment industry is intensifying. Not only main three Telecom Companies but also Smartphone companies and service provider like KakaoTalk announced that they would enter into mobile payment industry. Mobile payment industry is getting competitive. But it doesn't still have momentum effect notwithstanding positive presumptions that will grow very fast. Mobile payment services are categorized into various technology based payment service such as IC mobile card and Application payment service of cloud based, NFC, sound wave, BLE(Bluetooth Low Energy), Biometric recognition technology etc. Especially, mobile payment service is discontinuous innovations that users should change their behavior and noble infrastructure should be installed. These require users to learn how to use it and cause infra-installation cost to shopkeepers. Additionally, payment industry has the strong path dependency. In spite of these obstacles, mobile payment service which should provide dramatically improved value as a products and service of discontinuous innovations is focusing on convenience and security, convenience and so on. We suggest the following to success mobile payment service. First, non-customers of the existing payment service need to be identified. Second, needs of them should be taken. Then, noble payment service provides non-customer who can't pay by the previous payment method to payment method. In conclusion, mobile payment service can create new market and will result in extension of payment market.

Development and Application of Tunnel Design Automation Technology Using 3D Spatial Information : BIM-Based Design for Namhae Seomyeon - Yeosu Shindeok National Highway Construction (3D 공간정보를 활용한 터널 설계 자동화 기술 개발 및 적용 사례 : 남해 서면-여수 신덕 국도 건설공사 BIM기반 설계를 중심으로)

  • Eunji Jo;Woojin Kim;Kwangyeom Kim;Jaeho Jung;Sanghyuk Bang
    • Tunnel and Underground Space
    • /
    • v.33 no.4
    • /
    • pp.209-227
    • /
    • 2023
  • The government continues to announce measures to revitalize smart construction technology based on BIM for productivity innovation in the construction industry. In the design phase, the goal is design automation and optimization by converging BIM Data and other advanced technologies. Accordingly, in the basic design of the Namhae Seomyeon-Yeosu Sindeok National Road Construction Project, a domestic undersea tunnel project, BIM-based design was carried out by developing tunnel design automation technology using 3D spatial information according to the tunnel design process. In order to derive the optimal alignment, more than 10,000 alignment cases were generated in 36hr using the generative design technique and a quantitative evaluation of the objective functions defined by the designer was performed. AI-based ground classification and 3D Geo Model were established to evaluate the economic feasibility and stability of the optimal alignment. AI-based ground classification has improved its precision by performing about 30 types of ground classification per borehole, and in the case of the 3D Geo Model, its utilization can be expected in that it can accumulate ground data added during construction. In the case of 3D blasting design, the optimal charge weight was derived in 5 minutes by reviewing all security objects on the project range on Dynamo, and the design result was visualized in 3D space for intuitive and convenient construction management so that it could be used directly during construction.

Experimental Study of Collapse Delay Effect of Riprap on Dam Slope (사력댐 사석 보호공의 붕괴 지연 효과에 대한 실험 연구)

  • Jeong, Seokil;Kim, Seung Wook;Kim, Hong Taek;Lee, Seung Oh
    • Journal of Korean Society of Disaster and Security
    • /
    • v.11 no.1
    • /
    • pp.31-38
    • /
    • 2018
  • The 99.1% of small dam and most of the levees in Korea are soil dam which can be constructed with lower cost and less effort compared with ones made of concrete. However, they are so vulnerable to overflow. Sudden collapses of these strucrues lead to increase flow rate rapidly, which may cause catastrophic problems in downstream regions. In this study, the experimental study on the collapse delay effect of riprap that was laid on slope of soil levee was carried out. A prismatic rectangular open channel was used and three different sizes of the riprap were installed on slope of a scaled earth dam. A new formula for the collapse time of the levee with the installation of riprap was presented, using the previous researches and the dimensional analysis. In this process, an unsteady flow condition was considered to derive the deviation time of the riprap. And additional experiments were conducted to understand the effect of reinforcement of riprap, and it was found that the reinforcement of riprap was more effective than twice sizing of intial riprap. If the collapse time is delayed, EAP (Emergency Action Plan) and forecasting can greatly reduce the degree of flood damage. Also, it will be meaningful that the results of this study are used for river design.

Implementation of a pipelined Scalar Multiplier using Extended Euclid Algorithm for Elliptic Curve Cryptography(ECC) (확장 유클리드 알고리즘을 이용한 파이프라인 구조의 타원곡선 암호용 스칼라 곱셈기 구현)

  • 김종만;김영필;정용진
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.5
    • /
    • pp.17-30
    • /
    • 2001
  • In this paper, we implemented a scalar multiplier needed at an elliptic curve cryptosystem over standard basis in $GF(2^{163})$. The scalar multiplier consists of a radix-16 finite field serial multiplier and a finite field inverter with some control logics. The main contribution is to develop a new fast finite field inverter, which made it possible to avoid time consuming iterations of finite field multiplication. We used an algorithmic transformation technique to obtain a data-independent computational structure of the Extended Euclid GCD algorithm. The finite field multiplier and inverter shown in this paper have regular structure so that they can be easily extended to larger word size. Moreover they can achieve 100% throughput using the pipelining. Our new scalar multiplier is synthesized using Hyundai Electronics 0.6$\mu\textrm{m}$ CMOS library, and maximum operating frequency is estimated about 140MHz. The resulting data processing performance is 64Kbps, that is it takes 2.53ms to process a 163-bit data frame. We assure that this performance is enough to be used for digital signature, encryption & decryption and key exchange in real time embedded-processor environments.