• Title/Summary/Keyword: u-IT Convergence

Search Result 427, Processing Time 0.027 seconds

Korea-U.S. Relationship appearing in the Newspaper and Social Media: Based on the news and information related to the (언론과 소셜미디어를 통해 살펴본 한미관계: <한미정상회담> 관련 뉴스와 정보를 중심으로)

  • Hong, Juhyun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.5
    • /
    • pp.459-468
    • /
    • 2022
  • This study searched and analyzed news and information on the Korea-U.S. Summit to explore which political agenda is spreading among Korean newspapers and social media. The result of the analysis revealed that, on the one hand, the conservative-leaning newspaper, Chosunilbo, covered the unresolved issue between two countries. The principal source of news was the opposition party. On the other hand, the progressive-leaning newspaper, Kyunghany Sinmun, highlighted President Moon's visit to the United States and described the visit to the United States as an achievement. In this paper, the principal source of news is the ruling party. Both conservative and the progressive newspapers did not present a negative view of the United States. In the case of Chosunilbo, it mentioned that foreign policy priority of President Biden is human rights in North Korea. If the two countries do not solve this issue, the relationship between Korea and the United States will not develop further. Second, I searched YouTube videos about the Korea-U.S. summit and conducted a network analysis to understand the influence of YouTube videos and explore their relationship the each other. The results of the analysis revealed that the 10 most influential videos portrayed the Moon government positively. These videos held the achievement of the visit to the United States in highly esteem and framed it positively, similarly to the progressive newspaper.

Design of the secure data management system using homomorphic encryption (준동형 암호를 이용한 안전한 데이터 관리 시스템 설계)

  • Cha, Hyun-Jong;Yang, Ho-Kyung;Choi, Kang-Im;Ryou, Hwang-Bin;Shin, Hyo-Young
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.91-97
    • /
    • 2015
  • General companies consider saving the information after enciphering as law. However, if the actual information is saved as enciphered, the decoding process must be conducted when the information is searched or edited in the ser ver. Therefore, process delay time occurs and is less efficient. This kind of work gives burden to the server, so the companies or managers handling the server do not save the information after enciphering. In this paper, the Networ k constructs and realizes an efficient security data management system that ensures safety and haste in operating u sing the homomorphic encryption technology, which collects information and decides quickly, and enables editing the encryption without a decoding process. To ensure the security of the embodied system, the existing encryption algo rithm can be used. Search method to use the keyword search. Additionally, by using a trapdoor, the keyword is not expose and it is changed whenever it is searched, and the formation of the keyword does not get exposed.

Development of Multi-function Sensor Integration and Data Process SW Module for Real-time Situation Recognition (실시간 상황 인식을 위한 다기능 센서 통합 및 데이터 처리 SW 모듈 개발)

  • Oh, Jung-Hei;Kim, Bong-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.11
    • /
    • pp.143-148
    • /
    • 2019
  • In modern society, developing and utilizing safety service and system environments is a very important and great interest. In particular, the provision of safety services to socially vulnerable groups such as children, the elderly, women, the disabled and foreigners has become a social issue. However, since most safety services and systems are applied to the general public, it is necessary to develop systems for socially vulnerable groups. Therefore, in this paper, we developed a system module that processes and transmits data to recognize the situation in real time and respond quickly. To this end, various sensors for real-time situation recognition were designed as integrated modules, and a safety system module was developed to analyze the collected data and transmit the processing results.

Effects of Psychiatric Nursing Practice Education Using Virtual Simulation for Nursing (가상간호시뮬레이션을 활용한 정신간호실습 교육의 효과)

  • Han, Mi Ra;Lee, Jihye
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.10
    • /
    • pp.333-342
    • /
    • 2021
  • The purpose of this study is to compare the differences in transfer motivation and learning self-efficacy before and after applying virtual simulation for nursing in psychiatric nursing practice, and to provide them as basic data for effective psychiatric practical education. This study was conducted from October to December 2020. The subjects were 41 people who were enrolled in the third year of a located in U city, and who had received psychiatric nursing practice education using virtual simulation for nursing. Data were analyzed by paired t-test and pearson's correlation coefficient. After practice compared to before psychiatric nursing practice with virtual simulation nursing applied, transfer motivation was significantly increased and learner self-efficacy increased, but it was not statistically significant. Therefore, It was confirmed that psychiatric nursing practice education using virtual simulation for nursing is partly an effective practice strategy.

A Study on the Security Enhancement for Personal Healthcare Information of CloudHIS (CloudHIS의 개인 의료정보를 위한 보안강화에 관한 연구)

  • Cho, Young-Sung;Chung, Ji-Moon;Na, Won-Shik
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.9
    • /
    • pp.27-32
    • /
    • 2019
  • Along with the growth of u-Healthcare, we propose a security enhancement based on network separation for CloudHIS with for handling healthcare information to cope with cyber attack. To protect against all security threats and to establish clear data security policies, we apply desktop computing servers to cloud computing services for CloudHIS. Use two PCs with a hypervisor architecture to apply physical network isolation and select the network using KVM switched controller. The other is a logical network separation using one PC with two OSs, but the network is divided through virtualization. Physical network separation is the physical connection of a PC to each network to block the access path from both the Internet and the business network. The proposed system is an independent desktop used to access an intranet or the Internet through server virtualization technology on a user's physical desktop computer. We can implement an adaptive solution to prevent hacking by configuring the CloudHIS, a cloud system that handles medical hospital information, through network separation for handling security enhancement.

The Media Pole Design Applying the Playfulness of Scribbling (낙서의 유희성을 반영한 '미디어 폴' 디자인)

  • Kim, Hee Eun;Ryoo, Han Young
    • Design Convergence Study
    • /
    • v.14 no.5
    • /
    • pp.103-115
    • /
    • 2015
  • This study sheds light on the entertaining aspects of Media Pole that is located in Gangnam U-Street and proposes design that considers the aspects of the form, experience, contents and communication of scribbling. Functioning as public digital media, Media Pole provides various convenient services related to the area. According to the research on user's behavior upon Media Pole, photo related services, which can be categorized as entertainment, were found to be the most frequently used services among various services. Taking user's behaviors into consideration, this study highlights the entertaining aspects of Media Pole and suggests design that applies the playfulness of scribbling. The playful characteristics of scribbling were applied to the Media Pole's user interface, interaction, application and interlocking functions. As a result, users are expected to increase as Media Pole becomes more playful than before. Since scribbling is an act of intrinsic human's desire, it will attract users to participate more voluntarily. It can be applied not only to Media Pole, but to any public digital media devices.

A Study on the Concept of Convergence and Combined Combat Based on South Korean-style AICBM for the Victory of Future War (미래전 승리를 위한 한국형 AICBM 기반 융·복합 전투개념 연구)

  • Jung, Min-Sub;Lee, Woong;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.2
    • /
    • pp.321-325
    • /
    • 2020
  • The purpose of this study is to re-concept the future battle of the Army, which combines the effects of advanced technology on the concept of combat and the AICBM technology. The "war concept" changes with the times, and can be seen through the following two examples. First, it is a concept that achieves relative superiority by analyzing enemies. A case in point is the U.S. military's development of a "public joint battle" into a "multi-domain operation." Second, it is 'science and technology' that leads to a change in the concept of combat. A case in point is that the firepower warfare on land and sea in World War I developed from World War II to "air warfare" due to the emergence of aircraft. In this regard, the U.S. military is focusing on the concept of fighting in line with the future operational environment based on high-tech science and technology and the construction of the future military through the creation of the "Future Command." Therefore, our military needs to utilize the major technologies of the fourth industrial revolution as an opportunity to develop the concept of future combat, and the future war will greatly affect the development of the concept of advanced science and technology carrying out war, as AIC technology based on the fourth industrial revolution will promote innovation in defense operations in the form of super-connected, super-intelligence and super-integration. Therefore, this study will present the impact of advanced technology on the concept of combat and the concept of battle of the future Army incorporating the technology of AICBM.

TriSec: A Secure Data Framework for Wireless Sensor Networks Using Authenticated Encryption

  • Kumar, Pardeep;Cho, Sang-Il;Lee, Dea-Seok;Lee, Young-Dong;Lee, Hoon-Jae
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.2
    • /
    • pp.129-135
    • /
    • 2010
  • Wireless sensor networks (WSNs) are an emerging technology and offers economically viable monitoring solution to many challenging applications. However, deploying new technology in hostile environment, without considering security in mind has often proved to be unreasonably unsecured. Apparently, security techniques face many critical challenges in WSNs like data security and secrecy due to its hostile deployment nature. In order to resolve security in WSNs, we propose a novel and efficient secure framework called TriSec: a secure data framework for wireless sensor networks to attain high level of security. TriSec provides data confidentiality, authentication and data integrity to sensor networks. TriSec supports node-to-node encryption using PingPong-128 stream cipher based-privacy. A new PingPong-MAC (PP-MAC) is incorporated with PingPong stream cipher to make TriSec framework more secure. PingPong-128 is fast keystream generation and it is very suitable for sensor network environment. We have implemented the proposed scheme on wireless sensor platform and our result shows their feasibility.

A New Link-Based Single Tree Building Algorithm for Shortest Path Searching in an Urban Road Transportation Network

  • Suhng, Byung Munn;Lee, Wangheon
    • Journal of Electrical Engineering and Technology
    • /
    • v.8 no.4
    • /
    • pp.889-898
    • /
    • 2013
  • The shortest-path searching algorithm must not only find a global solution to the destination, but also solve a turn penalty problem (TPP) in an urban road transportation network (URTN). Although the Dijkstra algorithm (DA) as a representative node-based algorithm secures a global solution to the shortest path search (SPS) in the URTN by visiting all the possible paths to the destination, the DA does not solve the TPP and the slow execution speed problem (SEP) because it must search for the temporary minimum cost node. Potts and Oliver solved the TPP by modifying the visiting unit from a node to the link type of a tree-building algorithm like the DA. The Multi Tree Building Algorithm (MTBA), classified as a representative Link Based Algorithm (LBA), does not extricate the SEP because the MTBA must search many of the origin and destination links as well as the candidate links in order to find the SPS. In this paper, we propose a new Link-Based Single Tree Building Algorithm in order to reduce the SEP of the MTBA by applying the breaking rule to the LBA and also prove its usefulness by comparing the proposed with other algorithms such as the node-based DA and the link-based MTBA for the error rates and execution speeds.

The Influence of Female University Students' Perception of Dating Violence on Dating Violence Victim Behavior: Mediating effect of Violence Tolerance (여대생의 데이트 폭력 인식이 데이트 폭력 피해자 행동에 미치는 영향; 폭력허용도의 매개 효과)

  • Kim, Rae-Eun;Koo, Sang-Mee;Song, Min-Seo
    • Journal of Industrial Convergence
    • /
    • v.20 no.11
    • /
    • pp.1-10
    • /
    • 2022
  • The purpose of this study is to analyze the mediating effect of female university students' perception of dating violence on the dating violence victims behavior. A questionnaire was distributed and collected to a total of 161 female students enrolled in four departments of U University. Frequency and percentage, correlation analysis, simple regression analysis, and hierarchical multiple regression analysis were performed, and the Sobel test was performed to verify the significance of the indirect effects. Findings First, it was found that female university students' perception of dating violence had a negative effect on the behavior of victims of dating violence, and the explanation power was 5%. Second, violence tolerance was found to have a positive effect on the behavior of all dating violence victims, and the explanatory power was 12%. Third, in the first stage, female university students' perception of dating violence significantly explained the tolerance of violence. In step 2, perception of dating violence significantly explained the behavior of dating violence victims, and in step 3, the tolerance of violence explained the behavior of victims of dating violence. When violence tolerance was introduced in step 4, the influence of dating violence perception on the victimization behavior of dating violence decreased, but it was not significant. That is, violence tolerance showed a partial mediating effect in the effect of dating violence perception on dating violence victim behavior. It is necessary to develop and implement practical programs that can raise perception of violence and lower the tolerance for violence to prevent victims of dating violence.