• Title/Summary/Keyword: Access prevention

Search Result 376, Processing Time 0.024 seconds

A Study on Conditional Access System for Data Confidential using Smart-Card (스마트 카드를 이용한 자료 유출 제한 시스템에 대한 연구)

  • 김신홍;이광제
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.37 no.5
    • /
    • pp.125-131
    • /
    • 2000
  • In this paper, we proposed conditional access algorithm for data confidential using smart card. This algorithm is constructed smart card and E-mail gateway for restricting of user's illegal confidential data transmission. After processing of certification procedure in smart card, each E-mail forwarded to E-mail gateway(EG). The EG selects outgoing E-mail and it is sent to fire-wall E-mail processing program, it is checked attached file in transmission mail and if it is attached file, it writes to database. This time, it can be used evidence data about user's illegal confidential data transmission, because of using registered content and smart card certification data in database. in addition to, we can get psychologically effect of prevention to send illegally, and this system can prevent spam mail in EG, also.

  • PDF

Using Sustainable Agriculture to Improve Human Nutrition and Health

  • Cullum, Christine-Mc
    • Journal of Community Nutrition
    • /
    • v.6 no.1
    • /
    • pp.18-25
    • /
    • 2004
  • The purpose of this article is twofold: 1) to provide nutrition professionals with the history of how the concept of sustainable diets was introduced to the nutrition profession and 2) to describe how different sustainable agricultural practices offer potential for improving human nutrition and health. The idea of connecting sustainable agriculture With the promotion of human nutrition and health is not new. It is a concept that was introduced to the nutrition profession more than 20 years ago. To foster healthful, sustainable diets, consumers need to choose more whole foods. From the standpoint of nutrition and health, whole foods are naturally higher in fiber and lower in fat, sodium, sugar and additives compared to highly processed foods. From the standpoint of agricultural sustainability, whole foods bypass the high-energy costs of food processing and transportation. Organic farming systems offer potential benefits to human health through reducing farmers' exposure to pesticides and by increasing the total phenolic content in selected food crops. Participation in farmers' market nutrition programs and gardening has been associated with increased fruit and vegetable intake. Gardening may also be a way to increase access to fresh produce in low-income populations that do not have access to nutritious food outlets and to increase physical activity. Further research is needed to assess the human nutrition and health benefits of other types of sustainable agriculture strategies and to investigate the links among different agricultural practices with nutrient and total phenolic content in a wider variety of important food crops.

isMAC: An Adaptive and Energy-Efficient MAC Protocol Based on Multi-Channel Communication for Wireless Body Area Networks

  • Kirbas, Ismail;Karahan, Alper;Sevin, Abdullah;Bayilmis, Cuneyt
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.8
    • /
    • pp.1805-1824
    • /
    • 2013
  • Recently, the use of wireless body area networks (WBAN) has been increasing rapidly in medical healthcare applications. WBANs consist of smart nodes that can be used to sense and transmit vital data such as heart rate, temperature and ECG from a human body to a medical centre. WBANs depend on limited resources such as energy and bandwidth. In order to utilise these resources efficiently, a very well organized medium access control (MAC) protocol must be considered. In this paper, a new, adaptive and energy-efficient MAC protocol, entitled isMAC, is proposed for WBANs. The proposed MAC is based on multi-channel communication and aims to prolong the network lifetime by effectively employing (i) a collision prevention mechanism, (ii) a coordinator node (WCN) selection algorithm and (iii) a transmission power adjustment approach. The isMAC protocol has been developed and modelled, by using OPNET Modeler simulation software. It is based on a networking scenario that requires especially high data rates such as ECG, for performance evaluation purposes. Packet delay, network throughput and energy consumption have been chosen as performance metrics. The comparison between the simulation results of isMAC and classical IEEE 802.15.4 (ZigBee) protocol shows that isMAC significantly outperforms IEEE 802.15.4 in terms of packet delay, throughput and energy consumption.

A Study on The Protection of Industrial Technology based on LDAP (LDAP기반의 산업기술 유출방지에 관한 연구)

  • Kim, Do-Hyeoung;Yoo, Jae-Hyung;Lee, Dong-Hwi;Ki, Jae-Seok;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.21-30
    • /
    • 2008
  • This study researched into the method that allows only the certified user and computational engineer to possibly use network resources and computing resources by implementing the system of the intensified certification and security based on LDAP(Lightweight Directory Access Protocol) directory service, that copes with incapacitation in security program due to making the security program forcibly installed, and that can correctly track down the industrial-technology exporter along with applying the user-based security policy through inter-working with the existing method for the protection of industrial technology. Through this study, the intensified method for the protection of industrial technology can be embodied by implementing the integrated infra system through strengthening the existing system of managing the protection of industrial technology, and through supplementing vulnerability to the method for the protection of industrial technology.

  • PDF

Mobile u-healthcare system in IEEE 802.15.4 WSN and CDMA network environments

  • Toh, Sing-Hui;Lee, Seung-Chul;Lee, Hoon-Jae;Do, Kyeong-Hoon;Chung, Wan-Young
    • Journal of Sensor Science and Technology
    • /
    • v.18 no.5
    • /
    • pp.337-342
    • /
    • 2009
  • This paper describes a robust mobile u-healthcare system with multiple physiological signs measurement capability in real time with integration of WSN(wireless sensor network) technology and CDMA(code division multiple access) network. A cellular phone receives health data in WSN and performs local physiological signs analysis at a phone processor, and then transmits abnormal data to server for further detail or precise health signal evaluation by a medical doctor over a CDMA network. Physiological signs of the patients are continuously monitored, processed and analyzed locally at cellular phone process to produce useful medical information for diagnosis and tracking purposes. By local simple analysis in cellular phone processor we can save the data transmission cost in CDMA network. By using the developed integrate ubiquitous healthcare service architecture, patients can realize self-health checking so that the prevention actions can be taken earlier. Appropriate self-monitoring and self-management can cure disease and relieve pain especially for patients who suffer from chronic diseases that need long term observation.

Can central venous access device care bundles and regular feedback reduce central line-associated complications in pediatric patients?

  • Chaiyakulsil, Chanapai;Pharadornuwat, Onsuthi
    • Clinical and Experimental Pediatrics
    • /
    • v.64 no.3
    • /
    • pp.123-129
    • /
    • 2021
  • Background: The use of indwelling central venous access devices (CVADs) in children can result in complications such as infection, occlusion, and dislodgement. Purpose: To evaluate whether reinforcing CVAD care bundles by using a regular direct feedback system could reduce such complications in children. Methods: The intervention in this retrospective interrupted time-series study was initiated in January 2019. The study was divided into the preintervention (October-December 2018), 3-month postintervention (January-March 2019), and 6-month postintervention (April-June 2019) phases. Risk difference and Poisson regression analyses were used to illustrate the effectiveness of the intervention. Results: The hospital-wide central line-related bloodstream infection rate decreased from 10.0/1,000 catheter-days to 4.5/1,000 catheter-days at 3-month postintervention (P=0.39) and to 1.4/1,000 catheter-days at 6-month postintervention (P=0.047). The central line occlusion rate significantly decreased from 30% to 12.8% (P=0.04) and 8.3% (P=0.002) at 3 and 6 months, respectively. Approximately 7% of CVADs became dislodged during the preintervention phase versus 8.5% (P=0.364) and 3.3% (P=0.378) at 3 and 6 months, respectively. Conclusion: Reinforcing CVAD care bundles with direct feedback could significantly decrease CVAD-associated complications in terms of infection at 6-month postintervention, and occlusion at 3- and 6-month postintervention. Thus, reinforcement and regular direct feedback might improve care quality in children with CVADs.

Analysis of the Problem of fire Qualification Information and Employment Information Due to Incomplete Information in the Job Search Process

  • Kong, Ha-Sung
    • International Journal of Advanced Culture Technology
    • /
    • v.7 no.3
    • /
    • pp.92-96
    • /
    • 2019
  • This study analyzes the problems of fire qualification information websites and job search websites due to incomplete information in the job search process and suggests an improvement plan. It has been confirmed that the main reason for the cost of job searching is incomplete information required for a job search and job search through existing analysis. As a result, it is suggested to construct a smooth information system for economic entities and to provide easy access to information by mitigating the incompleteness of information. Based on this, analysis of the problems of Korean qualifications in the firefighting realm reveals that there is a qualification holder information and a job information site, and a qualification holder management system is established but only information of either qualification acquisition information or employment information is provided. In addition, it is easy to access information through a qualification acquisition information and employment information site via the Internet, but there are inconveniences that qualification acquisition information and employment information are dualized. In order to improve this, it is necessary to build a new customized integrated qualification management system that covers existing Q-net qualification acquisition information and worknet employment information.

Analysis of Web Browser Security Configuration Options

  • Jillepalli, Ananth A.;de Leon, Daniel Conte;Steiner, Stuart;Alves-Foss, Jim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.6139-6160
    • /
    • 2018
  • For ease of use and access, web browsers are now being used to access and modify sensitive data and systems including critical control systems. Due to their computational capabilities and network connectivity, browsers are vulnerable to several types of attacks, even when fully updated. Browsers are also the main target of phishing attacks. Many browser attacks, including phishing, could be prevented or mitigated by using site-, user-, and device-specific security configurations. However, we discovered that all major browsers expose disparate security configuration procedures, option names, values, and semantics. This results in an extremely hard to secure web browsing ecosystem. We analyzed more than a 1000 browser security configuration options in three major browsers and found that only 13 configuration options had syntactic and semantic similarity, while 4 configuration options had semantic similarity, but not syntactic similarity. We: a) describe the results of our in-depth analysis of browser security configuration options; b) demonstrate the complexity of policy-based configuration of web browsers; c) describe a knowledge-based solution that would enable organizations to implement highly-granular and policy-level secure configurations for their information and operational technology browsing infrastructures at the enterprise scale; and d) argue for necessity of developing a common language and semantics for web browser configurations.

Design for Access Control System based on Voice Recognition for Infectious Disease Prevention (전염성 확산 차단을 위한 음성인식 기반의 출입통제시스템 설계)

  • Mun, Hyung-Jin;Han, Kun-Hee
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.7
    • /
    • pp.19-24
    • /
    • 2020
  • WHO declared a global pandemic on March 11th for Corona 19. However, there is a situation where you have to go to building for face-to-face education or seminars for economic and social activities. The first check method of COVID-19 infection is to measure body temperature, so the primary entrance and exit is blocked for near-field body temperature measurement. However, since it is troublesome to check directly, thermal camera is installed at the entrance of the building, and body temperature is measured indirectly using the infrared camera to control access. In case of middle and high schools, universities, and lifelong education center, we need a system that is possible to interoperate with attendance checks and automatically recognizes whether to wear masks and can authenticate students. We proposed the system that is to confirm whether to wear a mask with a camera that is embedded in a smart mirror, and that authenticates the user through voice recognition of the user who wants to enter the building by using voice recognition technology and determines whether to enter them or not. The proposed system can check attendance if it is linked with near-field temperature measurement and attendance check APP of student's smart phone.

A Study on the Space Composition for Department of Delivery in Regional Public Hospital (지역거점 공공병원의 분만부 공간구성에 관한 연구(1))

  • Park, Kyeong Hyeon;Shin, Hwa Kyoung;Chai, Choul Gyun
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.28 no.3
    • /
    • pp.47-54
    • /
    • 2022
  • Purpose: This study presents the analysis on space usage of delivery departments in regional public hospitals. The results intention is to achieve improvement of the delivery environment for the mothers and newborns regarding exposure prevention and efficient infection control. The purpose of this study is to provide fundamental data for architectural plans and guidelines for the delivery department. Method: The investigation and analysis were based on research papers, legal systems, public medical statistical data, and the architectural floor plan drawing. For research, 20 regional public hospitals with an operating delivery room were excluded. Regarding data accessibility, 15 regional public hospitals were selected. Results: To overcome the increased vulnerability of the delivery department, the research results of basic data is provided for the establishment to address urgent needs and rapid response. Thus, the research results are as follows: Firstly, the delivery department needs to respond promptly according to the type of patients. For example, in a case of emergency surgery, a connected circulation plan with the related departments is needed. Secondly, for the environment of the delivery area, alleviating anxiety is imperative for pregnant patients and guardians, labor, childbirth, and recovery. Therefore, these needs must be addressed for treatment space and circulation. Lastly, the delivery department is classified into three areas for analysis: access area, treatment area, and support area. In most of the delivery departments of the 15 selected hospitals, there is no space for the access and support area except for the labor and delivery rooms in the treatment area. For the access area, a waiting area, changing room for pregnant women and guardians, and a storage space for contaminated linens are required for infection prevention, safety, and efficiency. For the treatment area, childbirth processes and circulation should have space reserved for labor, delivery, recovery, examination, and treatment. In preparation for an emergency during childbirth, emergency response measures and supporting space needs to be established. For the support area, circulation and rooms are to be designed for medical staff support, activity space, storage and transportation of equipment, and urgent medical treatment. Implications: Along with the low fertility rate and the decrease of medical institutions that operate delivery departments, for the purpose of establishing a public medical service system and a healthy medical environment for mothers and newborns, the researched information demonstrates basic data on space plan of delivery departments in regional public hospitals.