• Title/Summary/Keyword: concept network

Search Result 1,812, Processing Time 0.027 seconds

The Importance of Employee's Perceptions When Conducting a Company's CSR Strategy : The Concept of 'Authenticity' (조직의 CSR 전략 이행과정에서 직원 인식 중요성 : '진정성' 개념을 바탕으로)

  • Jung, Ji-Young;Kim, Sang-Joon
    • Korean small business review
    • /
    • v.43 no.4
    • /
    • pp.27-57
    • /
    • 2021
  • How does authenticity influence the process that conducts a company's CSR Strategy? Authenticity, an internal/external alignment condition that an employee feels in relation to an organization, means the decision on how true and beneficial to employees through their experiences, such as thoughts and emotions. Also, it can be understood as a process of meaning formation between the organization's strategy to conduct CSR and the perception of employees conducting CSR. To prove the relation between authenticity and CSR clearly, we used various techniques like Text Mining, Topic Modeling and Semantic network analysis about O corporation's 657 review data, from 2015 to 2021. As a result of the analysis, we find out the special issues and types. The analysis shows that the issue concerning the 'external image' is the biggest characteristic of authenticity perception in other conditions. Furthermore, the types of authenticity perception evaluations are largely divided into acceptance and rejection, in detail, five categories. This study indicates that organizations should consider both external and internal conditions when establishing CSR strategies. In addition, it is necessary to be an interactive circular relationship between the organization and employee, collecting and reflecting employee's perceptions. Finally, this study proposes ways to overcome problems related to interaction.

A Study on Deep Learning based Aerial Vehicle Classification for Armament Selection (무장 선택을 위한 딥러닝 기반의 비행체 식별 기법 연구)

  • Eunyoung, Cha;Jeongchang, Kim
    • Journal of Broadcast Engineering
    • /
    • v.27 no.6
    • /
    • pp.936-939
    • /
    • 2022
  • As air combat system technologies developed in recent years, the development of air defense systems is required. In the operating concept of the anti-aircraft defense system, selecting an appropriate armament for the target is one of the system's capabilities in efficiently responding to threats using limited anti-aircraft power. Much of the flying threat identification relies on the operator's visual identification. However, there are many limitations in visually discriminating a flying object maneuvering high speed from a distance. In addition, as the demand for unmanned and intelligent weapon systems on the modern battlefield increases, it is essential to develop a technology that automatically identifies and classifies the aircraft instead of the operator's visual identification. Although some examples of weapon system identification with deep learning-based models by collecting video data for tanks and warships have been presented, aerial vehicle identification is still lacking. Therefore, in this paper, we present a model for classifying fighters, helicopters, and drones using a convolutional neural network model and analyze the performance of the presented model.

A research on cyber target importance ranking using PageRank algorithm (PageRank 알고리즘을 활용한 사이버표적 중요성 순위 선정 방안 연구)

  • Kim, Kook-jin;Oh, Seung-hwan;Lee, Dong-hwan;Oh, Haeng-rok;Lee, Jung-sik;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.115-127
    • /
    • 2021
  • With the development of science and technology around the world, the realm of cyberspace, following land, sea, air, and space, is also recognized as a battlefield area. Accordingly, it is necessary to design and establish various elements such as definitions, systems, procedures, and plans for not only physical operations in land, sea, air, and space but also cyber operations in cyberspace. In this research, the importance of cyber targets that can be considered when prioritizing the list of cyber targets selected through intermediate target development in the target development and prioritization stage of targeting processing of cyber operations was selected as a factor to be considered. We propose a method to calculate the score for the cyber target and use it as a part of the cyber target prioritization score. Accordingly, in the cyber target prioritization process, the cyber target importance category is set, and the cyber target importance concept and reference item are derived. We propose a TIR (Target Importance Rank) algorithm that synthesizes parameters such as Event Prioritization Framework based on PageRank algorithm for score calculation and synthesis for each derived standard item. And, by constructing the Stuxnet case-based network topology and scenario data, a cyber target importance score is derived with the proposed algorithm, and the cyber target is prioritized to verify the proposed algorithm.

A Study on "On-tact" Christian Education in the Post-Corona Era (포스트 코로나 시대의 "온택트(ontack)" 기독교교육에 관한 연구)

  • Yang, Kum Hee
    • Journal of Christian Education in Korea
    • /
    • v.68
    • /
    • pp.41-76
    • /
    • 2021
  • This paper begins with the question of whether "on-tact" Christian education, which has become the most new-normal phenomenon since Corona 19, will remain as a decisive form of Christian education even in the post-Corona era. In order to answer that question, this study explored whether on-tact Christian education has its own domain of experience and educational elements that cannot be replaced by face-to-face education, specifically focusing on "types of on-tact Christian Education", "discussion of digital church" and "digital epistemology". Through research on "types of onn-tact Christian education," it confirmed that, when viewed on the basis of 'participation' or 'communication', on-tact Christian education has an independent field of experience and educational elements. Through contemplation on "digital ecclesiology", it found that on-tact education is the decisive channel for Christian education to reach digital generation. It also found a new metaphor from the "network" concept for the public church and the Kingdom of God. This paper also found that we experience the perception of the body that is expanded through the combination between the body and technology in the digital world, and that this is a unique epistemology that occurs only in the digital world. Based on the above points, it affirmed that on-tact Christian education is not simply a means of supplementing face-to-face education in the era of COVID-19, but is a Christian education that has an independent field of experience and educational power that face-to-face education cannot replace. Thus it foresees that on-tact Christian education will continue to expand as a center and form of Christian education even in the post-corona era.

Detecting Weak Signals for Carbon Neutrality Technology using Text Mining of Web News (탄소중립 기술의 미래신호 탐색연구: 국내 뉴스 기사 텍스트데이터를 중심으로)

  • Jisong Jeong;Seungkook Roh
    • Journal of Industrial Convergence
    • /
    • v.21 no.5
    • /
    • pp.1-13
    • /
    • 2023
  • Carbon neutrality is the concept of reducing greenhouse gases emitted by human activities and making actual emissions zero through removal of remaining gases. It is also called "Net-Zero" and "carbon zero". Korea has declared a "2050 Carbon Neutrality policy" to cope with the climate change crisis. Various carbon reduction legislative processes are underway. Since carbon neutrality requires changes in industrial technology, it is important to prepare a system for carbon zero. This paper aims to understand the status and trends of global carbon neutrality technology. Therefore, ROK's web platform "www.naver.com." was selected as the data collection scope. Korean online articles related to carbon neutrality were collected. Carbon neutrality technology trends were analyzed by future signal methodology and Word2Vec algorithm which is a neural network deep learning technology. As a result, technology advancement in the steel and petrochemical sectors, which are carbon over-release industries, was required. Investment feasibility in the electric vehicle sector and technology advancement were on the rise. It seems that the government's support for carbon neutrality and the creation of global technology infrastructure should be supported. In addition, it is urgent to cultivate human resources, and possible to confirm the need to prepare support policies for carbon neutrality.

Study on security framework for cyber-hacking control facilities (제어시설 사이버공격 대응을 위한 사이버보안 프레임워크 (Framework) 연구)

  • Lee, Sang-Do;Shin, Yongtae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.4
    • /
    • pp.285-296
    • /
    • 2018
  • Among many hacking attempts carried out in the past few years, the cyber-attacks that could have caused a national-level disaster were the attacks against nuclear facilities including nuclear power plants. The most typical one was the Stuxnet attack against Iranian nuclear facility and the cyber threat targeting one of the facilities operated by Korea Hydro and Nuclear Power Co., Ltd (Republic of Korea; ROK). Although the latter was just a threat, it made many Korean people anxious while the former showed that the operation of nuclear plant can be actually stopped by direct cyber-attacks. After these incidents, the possibility of cyber-attacks against industrial control systems has become a reality and the security for these systems has been tightened based on the idea that the operations by network-isolated systems are no longer safe from the cyber terrorism. The ROK government has established a realistic control systems defense concept and in the US, the relevant authorities have set up several security frameworks to prepare for the threats. This paper presented various cyber security attack cases and their scenarios against control systems, along with the analysis of countermeasures for them. Though this task, we attempt to identify the items that need to be considered when designing a domestic security framework to improve security and secure stability.

Development of PSC I Girder Bridge Weigh-in-Motion System without Axle Detector (축감지기가 없는 PSC I 거더교의 주행중 차량하중분석시스템 개발)

  • Park, Min-Seok;Jo, Byung-Wan;Lee, Jungwhee;Kim, Sungkon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.28 no.5A
    • /
    • pp.673-683
    • /
    • 2008
  • This study improved the existing method of using the longitudinal strain and concept of influence line to develop Bridge Weigh-in-Motion system without axle detector using the dynamic strain of the bridge girders and concrete slab. This paper first describes the considered algorithms of extracting passing vehicle information from the dynamic strain signal measured at the bridge slab, girders, and cross beams. Two different analysis methods of 1) influence line method, and 2) neural network method are considered, and parameter study of measurement locations is also performed. Then the procedures and the results of field tests are described. The field tests are performed to acquire training sets and test sets for neural networks, and also to verify and compare performances of the considered algorithms. Finally, comparison between the results of different algorithms and discussions are followed. For a PSC I-girder bridge, vehicle weight can be calculated within a reasonable error range using the dynamic strain gauge installed on the girders. The passing lane and passing speed of the vehicle can be accurately estimated using the strain signal from the concrete slab. The passing speed and peak duration were added to the input variables to reflect the influence of the dynamic interaction between the bridge and vehicles, and impact of the distance between axles, respectively; thus improving the accuracy of the weight calculation.

Policy Implications of the Long-term Care Insurance System Revitalization Process for Establishing Integrated Care System in Japan (일본의 지역포괄케어시스템 구축과 개호보험제도 개정과정의 정책적 시사점)

  • Yoo, Ae Jung
    • 한국노년학
    • /
    • v.39 no.1
    • /
    • pp.1-20
    • /
    • 2019
  • Recently, the Ministry of Health and Welfare has emphasized the necessity to build community care, and the interest of health care- long-term care-social welfare system continues. In order to examine the future vision of long-term care for elderly people, which can be a core system in establishing community models for elderly people in the future, we will implement aging in place as a national policy project. It is meaningful to analyze in depth the case of Japan's policy implementation through the amendment process of long-term care insurance system. The purpose of this study is to examine the concept definition, operating system, and major promotion process of the Integrated Care System in Japan and to suggest policy implications for the future Korea long-term care insurance system. As a result of reviewing the operation status and revision process of the long-term care insurance system for establishing the Integrated care system in Japan, it is necessary to clarify the basic principles and construction of community care system, diversification of residence type and upgrading work, establishment of linkage network of health care-long term care-social welfare, expansion of support for family and self-mind.

A Study on Constructing a RMF Optimized for Korean National Defense for Weapon System Development (무기체계 개발을 위한 한국형 국방 RMF 구축 방안 연구)

  • Jung keun Ahn;Kwangsoo Cho;Han-jin Jeong;Ji-hun Jeong;Seung-joo Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.827-846
    • /
    • 2023
  • Recently, various information technologies such as network communication and sensors have begun to be integrated into weapon systems that were previously operated in stand-alone. This helps the operators of the weapon system to make quick and accurate decisions, thereby allowing for effective operation of the weapon system. However, as the involvement of the cyber domain in weapon systems increases, it is expected that the potential for damage from cyber attacks will also increase. To develop a secure weapon system, it is necessary to implement built-in security, which helps considering security from the requirement stage of the software development process. The U.S. Department of Defense is implementing the Risk Management Framework Assessment and Authorization (RMF A&A) process, along with the introduction of the concept of cybersecurity, for the evaluation and acquisition of weapon systems. Similarly, South Korea is also continuously making efforts to implement the Korea Risk Management Framework (K-RMF). However, so far, there are no cases where K-RMF has been applied from the development stage, and most of the data and documents related to the U.S. RMF A&A are not disclosed for confidentiality reasons. In this study, we propose the method for inferring the composition of the K-RMF based on systematic threat analysis method and the publicly released documents and data related to RMF. Furthermore, we demonstrate the effectiveness of our inferring method by applying it to the naval battleship system.

Intergenerational Conflict and Integration in family (가족 내 세대갈등과 통합)

  • Nam, Soonhyeon
    • Korean Journal of Culture and Social Issue
    • /
    • v.10 no.2
    • /
    • pp.1-15
    • /
    • 2004
  • The drastically changing society has brought diverse types of families, and these diversities are changing the concept of the word 'family' itself. Inevitably, these changes cause different viewpoints among family members, developing into conflicts and social issues. In this paper, generational family problems, which are caused by changes within the family as a result of the variously, diversely changing society, are observed to suggest a resolution. Looking into the functional variety that today's structural change within a family demands, several positives changes described below have been observed; Firstly, the change in the way of interaction among family members; Secondly, the demand for continuance on relational functions including love, care, etc, as a psychological resource of family; Thirdly, the conversion from form's sake relationship to actual relationship; and Lastly, the usage of a clearer communications network. The interaction between the parent-children relationship, according to the changes in family life cycle, is also re-focused to seek resolutions for intergenerational conflicts. The results are as follows; Firstly, the changeability of various family types today must be accepted, and the functional aspects of changing families must be emphasized ; Secondly, the mutual-exchanging value of each generation must be accepted, strengthening relational functions between generations; Thirdly, it is necessary to refocus filial piety. In other words, though the intergenerational transmission of family functions may become the basis of lineage and clan formation, it won't be possible without interaction between generation.

  • PDF