• Title/Summary/Keyword: security characteristic

Search Result 449, Processing Time 0.021 seconds

Old Age Workers' Labor Market: A Model for Understanding Its Structure and Policy Implication (고령자 임금노동시장의 구조와 정책적 시사)

  • Hur, Jai-Joon
    • Korea journal of population studies
    • /
    • v.21 no.2
    • /
    • pp.58-82
    • /
    • 1998
  • It is usually proposed that job security of old age workers is hampered by the structure of wage increasing with age. This paper sets forth a model to comprehend the characteristic of the old age workers' labor market and policy implications derived from it. In order to stimulate demand for old age workers, policy initiatives should be taken as follows : the wage criteria should be simplified which apply differently from one institution to other; incentives relatively favorable for employing old age workers' in manufacturing sector should be also given to service sectors; employment subsidy or other tax incentives should be given for labor contract after the retirement age; licensing and evaluation system for job ability should be introduced based on occupation & job analysis. To lower the reservation wage of workers, mortgage loan for house and long-term low interest loan for tuition fees should be developed together with stabilization of housing cost. Wedding culture which requires high expense should be amended. Above all, it is necessary to install reasonable social security system. Policy orientation should also pay attention to reduce labor supply of the old aged via aiding old age workers' firm opening and voluntary civil service together with developing various honor programs for members of civil corps.

  • PDF

Design of Single Balanced Diode Mixer with Filter for Improving Band Flatness in Microwave Frequency Down Converter (마이크로파 주파수 하향 변환기에서의 대역 평탄도 개선을 위한 여파기 집적형 단일 평형 다이오드 혼합기 설계)

  • Ryu, Seung-Kab;Hwang, In-Ho;Han, Seok-Kyun
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.18 no.1 s.116
    • /
    • pp.37-43
    • /
    • 2007
  • In this.paper, we introduce design and implementation results of the single balanced diode mixer for European point-to-point microwave radio in order to improve flatness performance. When a resonator such as RF filter is integrated with a mixer, impedance characteristic of 50 ohm is maintained only in RF band, not in LO band resulting deterioration of flatness performance because of LO power variation on the diode. In the paper, we suggest a design method of mixer integrated with image rejection filter and LO harmonic filter to have a better performance of flatness using embedding electrical length between filter and mixer's port. Frequency specification of fabricated mixer is $21.2{\sim}22.6\;GHz$ for RF, $19.32{\sim}20.72\;GHz$ for LO and 1.88 GHz+/-50 MHz for IF, respectively. Measured results show conversion loss of 8.5 dB, flatness of 2 dB, input PldB of 8 dBm, IIP3 of 15 dBm under LO power level of 10 dBm. Return losses of RF, LO and IF port are under -12 dB, -10 dB and -5 dB, respectively. Isolations of LO/RF and LO/IF are 20 dB and 50 dB, respectively.

A Study on the Estimation of the Threshold Rainfall in Standard Watershed Units (표준유역단위 한계강우량 산정에 관한 연구)

  • Choo, Kyung-Su;Kang, Dong-Ho;Kim, Byung-Sik
    • Journal of Korean Society of Disaster and Security
    • /
    • v.14 no.2
    • /
    • pp.1-11
    • /
    • 2021
  • Recently, in Korea, the risk of meteorological disasters is increasing due to climate change, and the damage caused by rainfall is being emphasized continuously. Although the current weather forecast provides quantitative rainfall, there are several difficulties in predicting the extent of damage. Therefore, in order to understand the impact of damage, the threshold rainfall for each watershed is required. The damage caused by rainfall occurs differently by region, and there are limitations in the analysis considering the characteristic factors of each watershed. In addition, whenever rainfall comes, the analysis of rainfall-runoff through the hydrological model consumes a lot of time and is often analyzed using only simple rainfall data. This study used GIS data and calculated the threshold rainfall from the threshold runoff causing flooding by coupling two hydrologic models. The calculation result was verified by comparing it with the actual case, and it was analyzed that damage occurred in the dangerous area in general. In the future, through this study, it will be possible to prepare for flood risk areas in advance, and it is expected that the accuracy will increase if machine learning analysis methods are added.

Methods of Regulating Migration Processes in EU Countries

  • Hamova, Oksana;Dergach, Anna;Pikulyk, Oksana;Zolotykh, Irina;Diachenko, Kateryna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.257-265
    • /
    • 2021
  • Modern methods of regulating migration processes in EU states include a wide variety of adapted, transformed under the sway of globalization tools in order to influence the movement of human capital within the European space. The main purpose of the regulatory policy on migration flows is the redistribution of professionally competent professionals between different spheres of life. Herewith, the determining factor in the effectiveness of such distribution is a rational combination of stimulating and disincentive levers of influence on the movement of citizens of different EU countries and taking into account the motives of such mobility. Modernization of migration management approaches can be a major economic, social, political and cultural progress of European countries. The purpose of the research is to conduct a detailed analysis of existing practices of migration flow management, in particular their stimulation or containment, and to outline key migration trends formed under the influence of multicomponent approaches to migration regulation, transformation of regulatory legislation and changing priorities of modern society. The research methods: statistical-analytical method; ARIS method; method of tabular, graphical and analytical modeling; comparative analysis; systematization, generalization. Results. Current pan-European methods of regulating migration processes are insufficiently adapted to the multinational socialeconomic space; consequently, there are some disparities in the distribution of migrants between EU countries, although the overall dynamics of migration is positive. Fluctuations in the population of European countries during 2000-2019 and trends in the transformation of social-economic space confirm the insufficient level of influence of current methods of regulating migration flows. Along with this, the presence of a characteristic asymmetry in the distribution of migrants requires a greater focus on the modernization of regulatory instruments, in particular, the regulatory mechanism for managing migration processes. As a result of the conducted study, further prospects for the implementation of alternative methods of regulating migration processes in EU states have been outlined; the current and projected limits for increasing the level of observance of migrants' rights at the European level have been clarified through the adoption of appropriate regulatory acts; effective solutions for intensifying the influx of high-quality labor resources from different countries to EU have been identified. The research results can be used to study methods of regulating migration processes in the countries in the global dimension.

A Study of Key Pre-distribution Scheme in Hierarchical Sensor Networks (계층적 클러스터 센서 네트워크의 키 사전 분배 기법에 대한 연구)

  • Choi, Dong-Min;Shin, Jian;Chung, Il-Yong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.43-56
    • /
    • 2012
  • Wireless sensor networks consist of numerous small-sized nodes equipped with limited computing power and storage as well as energy-limited disposable batteries. In this networks, nodes are deployed in a large given area and communicate with each other in short distances via wireless links. For energy efficient networks, dynamic clustering protocol is an effective technique to achieve prolonged network lifetime, scalability, and load balancing which are known as important requirements. this technique has a characteristic that sensing data which gathered by many nodes are aggregated by cluster head node. In the case of cluster head node is exposed by attacker, there is no guarantee of safe and stable network. Therefore, for secure communications in such a sensor network, it is important to be able to encrypt the messages transmitted by sensor nodes. Especially, cluster based sensor networks that are designed for energy efficient, strongly recommended suitable key management and authentication methods to guarantee optimal stability. To achieve secured network, we propose a key management scheme which is appropriate for hierarchical sensor networks. Proposed scheme is based on polynomial key pool pre-distribution scheme, and sustain a stable network through key authentication process.

Novel Deep Learning-Based Profiling Side-Channel Analysis on the Different-Device (이종 디바이스 환경에 효과적인 신규 딥러닝 기반 프로파일링 부채널 분석)

  • Woo, Ji-Eun;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.987-995
    • /
    • 2022
  • Deep learning-based profiling side-channel analysis has been many proposed. Deep learning-based profiling analysis is a technique that trains the relationship between the side-channel information and the intermediate values to the neural network, then finds the secret key of the attack device using the trained neural network. Recently, cross-device profiling side channel analysis was proposed to consider the realistic deep learning-based profiling side channel analysis scenarios. However, it has a limitation in that attack performance is lowered if the profiling device and the attack device have not the same chips. In this paper, an environment in which the profiling device and the attack device have not the same chips is defined as the different-device, and a novel deep learning-based profiling side-channel analysis on different-device is proposed. Also, MCNN is used to well extract the characteristic of each data. We experimented with the six different boards to verify the attack performance of the proposed method; as a result, when the proposed method was used, the minimum number of attack traces was reduced by up to 25 times compared to without the proposed method.

Application of Art Therapy with Usage of Distance Education in the Process of Specialists Professional Training

  • Klepar, Maria;Khomyak, Hryhoriy;Kurkina, Snizhana;Ishchenko, Liudmyla;Bai, Ihor;Lashkul, Valerii;Bida, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.251-257
    • /
    • 2022
  • Nowadays, the issues of comprehensive formation of a person capable of self-education, self-development and creative self-realization in the conditions of distance education are relevant. There is a need to solve this problem, which is due to social, cultural, and pedagogical factors. This makes it necessary to find effective means of personality formation. In this matter, great importance is attached to the modern method of forming a creative personality - art therapy. Various approaches to the definition of art therapy have been clarified. They consider various forms of art therapy when working with children, adolescents and adults in the context of distance education. The most relevant are the two main forms of work - individual and group art therapy. Art therapy develops the individual's creativity. Therefore, during art therapy, attention is focused on the inner world, experiences, and feelings. Therefore, we believe that in the context of distance education, art therapy has everything for the powerful potential of personality formation. Scientists consider this therapy as therapy by means of art, which is based on experiences, conflicts that can be expressed in the visual arts and music. Art therapy helps to get rid of conflicts and experiences. This happens in the context of distance education through the development of attention to feelings, strengthening one's own personal value and increasing artistic competence. The article describes the signs that characterize art therapy. Art-therapeutic technologies in the context of distance education, which are now actively used by psychologists, teachers and art therapists themselves, are highlighted. The advantages of distance learning are considered. The characteristic features of distance learning and features of the use of art therapy by means of distance education in the process of professional training of specialists are determined.

A Study on Application of Improved Tunnel Water-Sealing Grouting Construction Process and the Inverse Analysis Material Selection Method Using the Injection Processing Results (개선된 터널 차수그라우팅 시공 프로세스 적용 및 그 주입시공결과를 이용한 역해석 재료선정방법 연구)

  • Kim, Jin Chun;Yoo, Byung Sun;Kang, Hee Jin;Choi, Gi Sung;Kim, Seok Hyun
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.3
    • /
    • pp.101-113
    • /
    • 2022
  • This study is planned with the aim of developing a systematic construction process based on the scientific and engineering theory of the water-sealing grouting construction applied to the tunnel excavation process during the construction of the downtown underground traffic network, so that the construction quality of the relatively backward domestic tunnel water-sealing grouting construction is improved and continuously maintained no matter who constructs it. The main contents of the improved tunnel water-sealing grouting can be largely examined in the classification of tunnel water-sealing grouting application and the definition of grouting materials, the correlation analysis of groundwater pressure conditions with groundwater inflow, the study of the characteristic factors of bedrock, and the element technologies and injection management techniques required for grouting construction. Looking at the trends in global research, research in the field of theoretical-based science and engineering grouting is actively progressing in Nordic countries (Sweden, Finland, Norway, etc.), Japan, Germany, and the United States. Therefore, in this study, the algorithm is established through theoretical analysis of the elements of tunnel water-sealing grouting construction techniques to provide an integrated solution including a construction process that can effectively construct tunnel water-sealing grouting construction.

A Study on the Application of FLO-2D Model for Analysis of Debris Flow Damage Area (토석류 피해지역 분석을 위한 FLO-2D 모형의 적용에 관한 연구)

  • Jo, Hang-Il;Jun, Kye-Won
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.2
    • /
    • pp.37-44
    • /
    • 2022
  • As the frequency of torrential rains and typhoons increases due to climate change, the frequency of occurrence of debris flow is also increasing. In particular, in the case of Kangwon-do, the occurrence of damage caused by mountain disasters is increasing as it has a topographical characteristic where the mountains and the coast are in contact. In order to analyze the flow characteristics in the sedimentary part of the debris flow, input data were constructed through numerical maps and field data, and a two-dimensional model, FLO-2D, was simulated. The damaged area was divided into the inflow part of the debris flow, the village center, and the vicinity of the port, and the flow center and flow velocity of the debris flow were simulated and compared with field survey data. As a result, the maximum flow depth was found to be 2.4 m at the debris flow inlet, 2.7 m at the center of the village, and 1.4 m at the port adjacent to the port so the results were similar when compared to the field survey. And in the case of the maximum flow velocity, it was calculated as 3.6 m/s at the debris flow inlet, 4.9 m/s in the center of the village and 1.2 m/s in the vicinity of the port, so It was confirmed that the maximum flow center occurred in the section where the maximum flow rate appeared.

A Study on the Establishment of Entropy Source Model Using Quantum Characteristic-Based Chips (양자 특성 기반 칩을 활용한 엔트로피 소스 모델 수립 방법에 관한 연구)

  • Kim, Dae-Hyung;Kim, Jubin;Ji, Dong-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.140-142
    • /
    • 2021
  • Mobile communication technology after 5th generation requires high speed, hyper-connection, and low latency communication. In order to meet technical requirements for secure hyper-connectivity, low-spec IoT devices that are considered the end of IoT services must also be able to provide the same level of security as high-spec servers. For the purpose of performing these security functions, it is required for cryptographic keys to have the necessary degree of stability in cryptographic algorithms. Cryptographic keys are usually generated from cryptographic random number generators. At this time, good noise sources are needed to generate random numbers, and hardware random number generators such as TRNG are used because it is difficult for the low-spec device environment to obtain sufficient noise sources. In this paper we used the chip which is based on quantum characteristics where the decay of radioactive isotopes is unpredictable, and we presented a variety of methods (TRNG) obtaining an entropy source in the form of binary-bit series. In addition, we conducted the NIST SP 800-90B test for the entropy of output values generated by each TRNG to compare the amount of entropy with each method.

  • PDF