• Title/Summary/Keyword: 안전한 활용

Search Result 8,329, Processing Time 0.036 seconds

e-Gov's Big Data utilization plan for social crisis management (사회 위기관리를 위한 전자정부의 빅데이터 활용 방안)

  • Choung, Young-chul;Choy, Ik-su;Bae, Yong-guen
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.2
    • /
    • pp.435-442
    • /
    • 2017
  • Our anxiousness has risen for recent increase in unpredicatable disaster. Accordingly, for the future society's preventing measure in advance against current considerable disasters due to societal crisis, we need to prepare secure measure ahead. Hence, we need to recognize the significance of governmental role and the value of Big Data application as ICT developed country in order to manage social crisis all the time. This manuscript analyzes human anxiety from listed disasters and describes that our government seeks new way to utilize Big Data in public in order to visualize Big Data related issues and its significance and urgency. Also, it suggests domestic/international application trend of Big Data's public sector with new practical approach to Big Data. Then, it emphasizes e-Gov's role for its Big Data application and suggests policies implying governmental use of Big Data for social crisis management by case-studying disaster measures against unpredictable crisis.

Seismic Fragility Evaluation of Inverted T-type Wall with a Backfill Slope Considering Site Conditions (사면 경사도가 있는 뒷채움토와 지반특성을 고려한 역T형 옹벽의 지진시 취약도 평가)

  • Seo, Hwanwoo;Kim, Byungmin;Park, Duhee
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.41 no.5
    • /
    • pp.533-541
    • /
    • 2021
  • Retaining walls have been used to prevent slope failure through resistance of earth pressure in railway, road, nuclear power plant, dam, and river infrastructure. To calculate dynamic earth pressure and determine the characteristics for seismic behavior, many researchers have analyzed the nonlinear response of ground and structure based on various numerical analyses (FLAC, PLAXIS, ABAQUS etc). In addition, seismic fragility evaluation is performed to ensure safety against earthquakes for structures. In this study, we used the FLAC2D program to understand the seismic response of the inverted T-type wall with a backfill slope, and evaluated seismic fragility based on relative horizontal displacements of the wall. Nonlinear site response analysis was performed for each site (S2 and S4) using the seven ground motions to calculate various seismic loadings reflecting site characteristics. The numerical model was validated based on other numerical models, experiment results, and generalized formula for dynamic active earth pressure. We also determined the damage state and damage index based on the height of retaining wall, and developed the seismic fragility curves. The damage probabilities of the retaining wall for the S4 site were computed to be larger than those for the S2 site.

Instructional Development of Making Upcycle Clothing Accessories for the Middle School Home Economics Classes Applying the Design Thinking Technique (디자인씽킹 기법을 활용한 중학교 가정교과 의류 업사이클링 소품제작 수업개발)

  • Yu, Myoung Suk;Lee, Yhe Young
    • Journal of Korean Home Economics Education Association
    • /
    • v.33 no.3
    • /
    • pp.173-187
    • /
    • 2021
  • The purpose of this research was to develop instructions for making upcycled clothing accessories related to the 'clothing management and recycling' unit of middle school home economics applying the design thinking technique. Teaching and learning process plans were developed according to the ADDIE model which includes the following process: analysis, design, development, implementation, and evaluation. The design thinking process includes understanding the related knowledge, sympathizing, problem identification(sharing perspectives) and idea development, making prototypes, testing, and making the actual product. Thirteen home economics teachers served as critics. Student feedbacks were collected to evaluate whether the course objectives were attained after the implementation. As a result, teaching and learning process plans, course materials, and evaluation rubrics for ten class sessions were developed. Student feedbacks confirmed the attainment of following five course objectives: improvement of ethical responsibilities through the exploration of various clothing recycling techniques, practice of creative and eco-friendly clothing culture, acquisition of the skills to use sewing tools safely, improvement of abilities to think, sympathize, and communicate, and exploration of aesthetic activities and fashion careers.

Design of Translator for generating Secure Java Bytecode from Thread code of Multithreaded Models (다중스레드 모델의 스레드 코드를 안전한 자바 바이트코드로 변환하기 위한 번역기 설계)

  • 김기태;유원희
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2002.06a
    • /
    • pp.148-155
    • /
    • 2002
  • Multithreaded models improve the efficiency of parallel systems by combining inner parallelism, asynchronous data availability and the locality of von Neumann model. This model executes thread code which is generated by compiler and of which quality is given by the method of generation. But multithreaded models have the demerit that execution model is restricted to a specific platform. On the contrary, Java has the platform independency, so if we can translate from threads code to Java bytecode, we can use the advantages of multithreaded models in many platforms. Java executes Java bytecode which is intermediate language format for Java virtual machine. Java bytecode plays a role of an intermediate language in translator and Java virtual machine work as back-end in translator. But, Java bytecode which is translated from multithreaded models have the demerit that it is not secure. This paper, multhithread code whose feature of platform independent can execute in java virtual machine. We design and implement translator which translate from thread code of multithreaded code to Java bytecode and which check secure problems from Java bytecode.

  • PDF

Changes in the Behavior of Healthcare Organizations Following the Introduction of Drug Utilization Review Evaluation Indicators in the Healthcare Quality Evaluation Grant Initiative (의료질평가지원금 제도의 의약품안전사용서비스 평가지표 도입에 따른 의료기관의 행태 변화)

  • Hyeon-Jeong Kim;Ki-Bong Yoo;Young-Joo Won;Han-Sol Jang;Kwang-Soo Lee
    • Health Policy and Management
    • /
    • v.34 no.2
    • /
    • pp.178-184
    • /
    • 2024
  • Background: This study aimed to determine the effectiveness of drug utilization review (DUR) evaluation indicators on safe drug use by comparing the changes in DUR inspection rates and drug duplication prescription prevention rates between the pre- and post-implementation of the DUR evaluation indicators of the Healthcare Quality Evaluation Grant Initiative. Methods: This study used DUR data from the Health Insurance Review and Assessment Service in 2018 (pre-implementation) and the evaluation results of the Healthcare Quality Evaluation Grant Initiative in 2023 (post-implementation). The dependent variables were the DUR evaluation indicators, including DUR inspection rate and drug duplicate prescription prevention rate. The independent variable was the implementation of the DUR evaluation indicators, and the control variables included medical institution characteristics such as type, establishment classification, location, DUR billing software company, and number of beds. Results: The results of the analysis of the difference in the prevention rate of drug duplicate prescriptions between the pre- and post-implementation of the DUR evaluation indicators of the Healthcare Quality Evaluation Grant Initiative showed that the prevention rate of drug duplicate prescriptions increased statistically significantly after the implementation of the DUR evaluation indicators. Conclusion: The policy implications of this study are as follows: First, ongoing evaluation of DUR systems is needed. Second, it is necessary to establish a collaborative partnership between healthcare organizations that utilize DUR system information and the organizations that manage it.

A Product Risk Assessment based on Scenario for Safety Management (제품안전관리를 위한 시나리오 기반의 리스크 평가기법 연구)

  • Suh, Jungdae
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.101-112
    • /
    • 2014
  • In this study, a risk assessment method based on scenario for the product safety management in Korea has been developed and proposed. To this end, Korea's related regulations for product safety management should be analyzed first, and the risk assessment method necessary for the enforcement of the regulations is presented by itemizing the method into the case of general injury and toxic substances. The features of the method presented in this study are as follows: (i) It is a method based on the injury scenario which can occur during the use of product. (ii) It assesses a risk based on the probability of the scenario and the severity of injury. (iii) In the case of toxic substances, it assesses a risk considering the hazard of the toxic substances on the human body and the severity of injury. To determine the probability of the injury scenario, this study has decomposed the scenario into several configuration factors and estimates each factor's probability to calculate the whole scenario's probability. The results of risk assessment through the method of this study are presented and it is shown that the method can be applied to the product classification for the product safety management.

Guidelines for Safe and Reliable PUF Implementation (안전하고 신뢰성 있는 PUF 구현을 위한 가이드라인)

  • Lee, Donggeon;Lee, Yeonchoel;Kim, Kyunghoon;Park, Jong-Gyu;Choi, Yong-Je;Kim, Howon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.241-259
    • /
    • 2014
  • A PUF is a technology for distinguishing a device from other devices like biological information such as humans' iris or fingerprints. Over the past decade, many researchers studied various methods for implementing PUFs and utilizing them in identification, random number generation, key distribution and authentication. However, various attacks on the PUFs are the major reason to inhibiting the proliferation of PUF. For the reasons, various technologies are being studied to enhance safety of PUFs. In this paper, we will see several PUF implementations and various attacks on PUFs, and suggest guidelines for securely implementing PUFs. We expect our guidelines would be the foundation for implementing the secure and reliable PUFs.

Evaluation of Software Diagnostics for Secure Operational Environment in Nuclear I&C systems (원전 계측제어 시스템 보안성환경을 위한 진단기능 평가)

  • Yoo, Sung Goo;Seul, Namo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.8
    • /
    • pp.107-112
    • /
    • 2016
  • Safety Critical Instrumentation and Control Systems perform those functions to maintain nuclear power plants' parameters within acceptable limits established for a design basis events and anticipated operating occurrence to ensure safety function. Those digitalized systems shall protect inadvertent and non-malicious behavior to ensure the reliable operation of systems, known as a Secure Development and Operational Environment(SDOE). SDOE would be established through managerial and technical controls. The objective of this paper is to evaluate the effectiveness of Cyclic Redundancy Checksum diagnostic, which is one of technical controls for SDOE, that can confirm the integrity of software of I&C systems to establish the secure environment. The results of this assessment would be the practical implementation of design and safety review of nuclear I&C systems.

Authority Delegation Scheme for Secure Social Community Creation in Community-Based Ubiquitous Networks (커뮤니티 기반의 유비쿼터스 네트워크 환경에서 안전한 커뮤니티 생성 권한 위임 방안)

  • Roh, Hyo-Sun;Jung, Sou-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.1
    • /
    • pp.91-98
    • /
    • 2010
  • This paper proposes authority delegation for secure social community creation and mutual authentication scheme between the community members using proxy signature in community-based ubiquitous networks. In community-based ubiquitous network, User's context-awareness information is collected and used to provide context-awareness network service and application service for someone who need it. For the many reason, i.e. study, game, information sharing, business and conference, social community could be created by members of a social group. However, in community-based ubiquitous network, this kind of the context-awareness information could be abused and created by a malicious nodes for attack the community. Also, forgery community could be built up to attack the community members. The proposed scheme using the proxy signature provides a mutual authentication and secure secret key exchange between community members, and supports secure authority delegation that can creates social community. Also, when delegation of signing authority and mutual authentication, this scheme reduces total computation time compared to the RSA signature scheme.

Preventive Priority Methods Based on the Analysis of Fire Accident Causes in Construction Site (건설현장 화재 발생 요인 분석에 따른 예방우선순위 연구)

  • Kim, Hee-su;Jang, Sang-chul;Joo, Jin-gyu
    • Journal of the Korea Institute of Construction Safety
    • /
    • v.2 no.2
    • /
    • pp.50-55
    • /
    • 2019
  • Currently, safety management is becoming important at domestic construction sites. Despite the importance of safety management, accidents at construction sites are steadily increasing. Fire accidents among safety accidents cause not only negative effects on schedule delay or work plans at construction sites, but also huge casualties. Therefore, the purpose of this research is to extract the causes of fire at the construction site through the case of fire at the construction site, and to prioritize prevention through the analysis of the factors to contribute to the prevention of fire. As a research method, we select fire factors through case, conduct surveys through expert group, and analyze survey through AHP technique. The results of the AHP analysis of the survey of expert groups showed that the workers and their sub-item ranked high. Therefore, the priority for fire prevention was given, and this research is believed to help prevent fire.