• Title/Summary/Keyword: Session

Search Result 3,106, Processing Time 0.03 seconds

Comparison between a 13-session and One-time Program on Korean Elementary, Middle and High School Students' Understanding of Nuclear Power

  • Han, Eun Ok;Choi, YoonSeok;Lim, YoungKhi
    • Journal of Radiation Protection and Research
    • /
    • v.42 no.1
    • /
    • pp.56-62
    • /
    • 2017
  • Background: To help future generations make accurate value judgments about nuclear power generation and radiation, this study will provide an effective education plan suitable for South Korea by applying and analyzing programs for the understanding of nuclear power within the diversely operated programs in the current Korean education system. Materials and Methods: This study analyzed the difference in educational effects by operating a 13-session regular curriculum for one semester and a one-session short-term curriculum from March to July 2016. Results and Discussion: As a result of operating a 13-session model school and a one-time educational program to analyze behavior changes against the traditional learning model, it was found that all elementary, middle and high school students showed higher acceptability of nuclear power in South Korea. The variation was greater for the model school than the short-term program. Conclusion: To prevent future generations from making biased policy decisions stemming from fear regarding nuclear power, it is necessary to bolster their value judgments in policy decisions by acquiring sufficient information about nuclear power generation and radiation through educational programs.

A Visual Protocol Analyzer for Session Monitoring over IMS Network (IMS 망에서 세션 모니터링을 위한 비쥬얼 프로토콜 분석기)

  • Jung, In-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.3B
    • /
    • pp.195-207
    • /
    • 2011
  • In this paper, we design and implement a visual IMS protocol analyzer, VIPA(Visual IMS Protocol Analyzer), providing a graphical view of session connection information between user equipments on IMS network. The VIPA captures SIP packets, which are used to setup sessions on IMS networks, and shows graphical view of session information to provide easy way to analyze IMS protocols. The existing protocol analyzer has limitation to show only terminal side protocol analysis information. Whereas the VIPA can provide not only terminal side but also server side analysis result so that the connection status between all the session participating user agents can be monitored.

MK-801-induced learning impairments reversed by physostigmine and nicotine in zebrafish

  • Choi, Yong-Seok;Lee, Chang-Joong;Kim, Yeon-Hwa
    • Animal cells and systems
    • /
    • v.15 no.2
    • /
    • pp.115-121
    • /
    • 2011
  • Previous studies have demonstrated that N-methyl-D-aspartate (NMDA) receptors and acetylcholine receptors are related to learning and memory in rat and mice. In this study, we examined the effects of MK-801, a non-competitive NMDA receptor antagonist, on learning and memory in zebrafish using a passive avoidance test. We further tested whether or not nicotine, a nicotinic acetylcholine receptor agonist, and physostigmine, an acetylcholinesterase inhibitor, reverse the effects of MK-801. Crossing time was increased significantly in the training and test sessions for the controls. When 20 ${\mu}M$ MK-801 was administered prior to the training session, the crossing time did not increase in either session. The MK-801-induced learning deficit was rescued by pretreatment with 20 ${\mu}M$ physostigmine, and crossing time was increased in the training and test sessions compared to the MK-801-treated zebrafish. Further, the MK-801-induced learning deficit was prevented by pretreatment with 20 ${\mu}M$ nicotine, and crossing time was increased in the training session but not in the test session. These results show that MK-801 induced a learning deficit in zebrafish that was prevented by pretreatment with nicotine and physostigmine.

Improved Session Management for Mobile Workflow in Web Application Service (모바일 환경을 위한 웹 애플리케이션 서비스의 세션 관리 개선방안)

  • Kim, Young-hun;Park, Yongsuk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.387-389
    • /
    • 2014
  • It is preferred to the popularization of smart device business processes through mobile. The ratio of Internet access via mobile devices is reached 30% of PC in September 2012. It is reproduced in a mobile environment that security threats arising from the Internet. that is the characteristics of cyber security threats appearing on the mobile era. Web Application Service security research firm OWASP (The Open Web Application Security Project) issued Session Management threat. That threat will be reproduced in the mobile environment. But Mobile is significantly different from Desktop Computer about Session Management environment. This proceeding proposes a improved Session Management method in Mobile environment.

  • PDF

An Analysis of Replay Attack Vulnerability on Single Sign-On Solutions (Single Sign-On 솔루션의 재전송 공격 취약점 분석)

  • Maeng, Young-Jae;Nyang, Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.103-114
    • /
    • 2008
  • Single Sign-On is an authentication scheme that enables a user to authenticate once and then to access to the resources of multiple software systems without re-authentication. As web services are being integrated into a single groupware, more web sites are adopting for user convenience. However, these Single Sign-On services are very dependent upon the cookies and thus, simple eavesdropping enables attackers to hiject the user's session. Even worse, the attacker who hijacked one session can move to another site through the Single Sign-On. In this paper, we show the vulnerabilities of the top ranked sites regarding this point of view and also propose a way to protect a user's session.

Improved Group Key Exchange Scheme Secure Against Session-State Reveal Attacks (세션상태 정보 노출 공격에 안전한 개선된 그룹 키 교환 프로토콜)

  • Kim, Ki-Tak;Kwon, Jeong-Ok;Hong, Do-Won;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.3
    • /
    • pp.3-8
    • /
    • 2008
  • Ephemeral data are easily revealed if state specific information is stored in insecure memory or a random number generator is corrupted. In this letter, we show that Nam et al.'s group key agreement scheme, which is an improvement of Bresson et al.'s scheme, is not secure against session-state reveal attacks. We then propose an improvement to fix the security flaw.

Development of fashion therapy programs for improving body image and self-esteem - Focused on the male workers - (신체이미지와 자아존중감 향상을 위한 패션테라피 프로그램 개발 - 직장인 남성을 중심으로 -)

  • Kang, Yu Rim;Kim, Mun Young
    • The Research Journal of the Costume Culture
    • /
    • v.29 no.2
    • /
    • pp.167-184
    • /
    • 2021
  • The objective of this study was to develop a fashion therapy program for improving body image and self-esteem among male workers. Accordingly, the demand for fashion therapy programs was examined by conducting a literature review, survey, and in-depth interviews with men working in the Daegu and Gyeongbuk areas. The results are summarized as follows. The fashion therapy program followed a framework of "introduction-development-final" and was 60 minutes in length, for four sessions (one per week). The contents of the program consisted of a study of the participants' appearance and any concerns they had about their body in Session 1. In Session 2, differences in image perception were examined according to color coding of menswear and personal color. Session 3 comprised understanding what styling is required to supplement men's body shape and what style is suitable for each participant. The content of Session 4 determined how to build social performance or positive image using nonverbal elements. Overall, this study has great significance in that it has developed a study on fashion therapy program originally applied for psychological treatment with women that has been adapted as a program to help improve positive emotions and social competitiveness of male workers in an office environment.

Intra-Session Network Coding for Improving Throughput in Multirate Multihop Wireless Networks (다중 레이트 멀티 홉 무선 네트워크 환경의 처리율 향상을 위한 인트라세션 네트워크 코딩)

  • Park, Mu-Seong;Yoon, Won-Sik
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.5
    • /
    • pp.21-26
    • /
    • 2012
  • Intra-session network coding has been proposed to improve throughput by simplifying scheduling of multi-hop wireless network and efficiency of packet transmission. Multi-rate transmission has been used in multihop wireless networks. An opportunistic routing with multirate shows throughput improvement compared with single rate. In this paper, we propose a method of throughput improvement in multi-hop wireless network by using multi-rate and intra-session network coding. We suggest a method to select an local optimal transmission rate at each node. The maximum throughput is evaluated by using linear programming (LP). To solve the LP, we use MATLAB and lp_solve IDE program. The performance evaluation results show that end-to-end throughput is improved by using multirate and intra-session network coding can achieve better throughput than opportunistic routing.

Encryption Algorithm Technique for Device's key Protect in M2M environment (M2M 환경의 디바이스 키 보호를 위한 암호 알고리즘 응용 기법)

  • Choi, Do-Hyeon;Park, Jung-Oh
    • Journal of Digital Convergence
    • /
    • v.13 no.10
    • /
    • pp.343-351
    • /
    • 2015
  • With the diverse services of the current M2M environment being expanded to the organizations, the corporations, and the daily lives, the possibility of the occurrence of the vulnerabilities of the security of the related technologies have become an issue. In order to solve such a problem of the vulnerability of the security, this thesis proposes the technique for applying the cryptography algorithm for the protection of the device key of the M2M environment. The proposed technique was based on the elliptic curve cryptography Through the key exchange and the signature exchange in the beginning, the security session was created. And the white box cipher was applied to the encryption that creates the white box table using the security session key. Application results cipher algorithm, Elliptic Curve Cryptography provides a lightweight mutual authentication, a session key for protecting the communication session and a conventional white-box cipher algorithm and was guaranteed the session key used to encrypt protected in different ways. The proposed protocol has secure advantages against Data modulation and exposure, MITM(Man-in-the-middle attack), Data forgery and Manipulation attack.

The Design and Implementation of a Vehicle Location Tracing System using RM Multi-Session Processing (RM 다중세션 처리를 이용한 차량 추적 시스템의 설계 및 구현)

  • Lee, Yong Kwon;Jang, Chung Ryong;Lee, Dae Sik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.2
    • /
    • pp.61-73
    • /
    • 2014
  • An automatic vehicle location tracing system is to build GIS server and on transmission for providing service in various ways by collecting a GPS location information from each vehicle. It is to save GPS data from OBU built-in on the vehicle and transmit the GPS data using the RSU on the roadside and WAVE communication technology. The collected data from the RSU is transmitted to the GIS server and stored in DB(database) and based on the GPS data that was collected from the each vehicle the system is to provide user service to suit the applications so it is to provide various services between RSU and OBU. In this paper, by implementing a multi-session process between the RM and the RMA a variety of services between RSU and OBU are provided. In addition, the system is designed and implemented using GPS to provide a variety of services, for the services provided from each RMA by configuring them as an independent session so it enables a variety of services implemented from one of RSU. With the result of the comparative analysis on the multi-session processing and single-session processing it shows that the differenes of them are minor in repect of the data loss rate and the data transfer rate but various services can be provided.