• Title/Summary/Keyword: Agency support

Search Result 1,252, Processing Time 0.029 seconds

Healthcare Robots in the New Normal era; Outlook for the Post-Corona era (뉴노멀 시대의 의료 로봇; Post-Corona 시대를 위한 전망)

  • Moon, Jeong Eun;Cho, Yong Jin
    • Journal of Digital Convergence
    • /
    • v.19 no.2
    • /
    • pp.509-514
    • /
    • 2021
  • The pandemic of COVID-19 is driving the demand for non-face-to-face diagnosis, observation, and treatment in the healthcare environment, which has led to increased interest in helathcare robots. The authors intend to predict the direction in which the quarantine healthcare robots should be utilized in the post-corona era through analysis of national agency reports, on-offline press reports, and domestic and foreign robot company press releases. The COVID-19 pandemic has raised interest in medical robots. And there is a need to apply healthcare robots that can perform tasks such as disinfection, logistics transfer, screening tests, monitoring of patients, remote medical treatment support for isolated patients, and video calls with family members. Therefore, it is considered that future correct development and application of healthcare robots and empirical research to verify them should be continued based on sufficient consideration for various problems associated with the practical application of robots.

Development of Item Mounting System for Effective Operation of Bulletproof Test (방탄시험의 효과적 운영을 위한 시료거치 시스템 개발)

  • Gu, Seung-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.1
    • /
    • pp.338-344
    • /
    • 2021
  • In this study, an actual test procedure was considered for the effective operation of a bulletproof test. The problems of the existing system were drawn in two ways. First, it is difficult to mount items of various shapes. Second, various test standards cannot be applied. To improve these problems, an automated and standardized mounting system was designed/applied to mount various items. The multi-purpose mount was compatible with the backing support for body armor testing. The sample holding frame was located inside and was designed to mount samples of various sizes and shapes through vertical movement and fixation without a separate detachment/attachment process. A comparison of the economics before and after the introduction of the item mounting system confirmed the effectiveness of the system by the increased number of daily tests and equipment utilization and reduced hourly cost.

A Study on the Automated Payment System for Artificial Intelligence-Based Product Recognition in the Age of Contactless Services

  • Kim, Heeyoung;Hong, Hotak;Ryu, Gihwan;Kim, Dongmin
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.2
    • /
    • pp.100-105
    • /
    • 2021
  • Contactless service is rapidly emerging as a new growth strategy due to consumers who are reluctant to the face-to-face situation in the global pandemic of coronavirus disease 2019 (COVID-19), and various technologies are being developed to support the fast-growing contactless service market. In particular, the restaurant industry is one of the most desperate industrial fields requiring technologies for contactless service, and the representative technical case should be a kiosk, which has the advantage of reducing labor costs for the restaurant owners and provides psychological relaxation and satisfaction to the customer. In this paper, we propose a solution to the restaurant's store operation through the unmanned kiosk using a state-of-the-art artificial intelligence (AI) technology of image recognition. Especially, for the products that do not have barcodes in bakeries, fresh foods (fruits, vegetables, etc.), and autonomous restaurants on highways, which cause increased labor costs and many hassles, our proposed system should be very useful. The proposed system recognizes products without barcodes on the ground of image-based AI algorithm technology and makes automatic payments. To test the proposed system feasibility, we established an AI vision system using a commercial camera and conducted an image recognition test by training object detection AI models using donut images. The proposed system has a self-learning system with mismatched information in operation. The self-learning AI technology allows us to upgrade the recognition performance continuously. We proposed a fully automated payment system with AI vision technology and showed system feasibility by the performance test. The system realizes contactless service for self-checkout in the restaurant business area and improves the cost-saving in managing human resources.

Analysis of the Efficiency of National SW R&D Projects Using DEA (DEA를 활용한 SW 국가연구개발사업 효율성 분석)

  • Ro, Seok-Hyun;Cho, Nam-Wook
    • The Journal of Society for e-Business Studies
    • /
    • v.26 no.2
    • /
    • pp.45-59
    • /
    • 2021
  • As software(SW) has been considered as a key driver of the fourth industrial revolution, significant R&D investment has been made by Korean government. Despite the attention and support by the government, systematic analysis on the SW R&D efficiency has not been fully addressed. In this study, the efficiency of SW national research and development projects was analyzed using Data Envelopment Analysis(DEA) techniques. Efficiency was measured from both static and dynamic perspectives based on 1,463 projects conducted by the National IT Industry Promotion Agency(NIPA) from 2008 to 2018. The static efficiency analysis identified the causes of inefficiency as scale and technology problems. As a result of dynamic efficiency analysis, we present a sector-specific response model using an efficiency-stability matrix. This study is meaningful in that efficiency analysis was conducted on the entire SW national R&D project, and static/dynamic efficiency analysis results are expected to be used as a guideline for planning SW national R&D project.

The Problem of Self-Limitation in Therapeutic Culture: Focusing on Misery Memoirs (치유문화에서 나타나는 자아 제한성의 문제: 고통수기들을 중심으로)

  • Seoh, Gilwan
    • English & American cultural studies
    • /
    • v.14 no.1
    • /
    • pp.73-94
    • /
    • 2014
  • Accounts from therapeutic culture seem often to associate the selfish, or at least self-centered quest for self-fulfillment with individual choice or satisfaction, self-expression, expressive individualism, and emotionalism. These associations point to the downside of therapy as they present it as constituting a culture of narcissism, selfishness, or irresponsibility. While some of these characterizations contain useful insights, they overlook what are maybe some of the most important features of a therapeutic outlook. This paper aims to reveal that the therapeutic imperative is not so much geared towards the realization of self-fulfillment, as it is the promotion of self-limitation. Therapeutic culture tends to posit the self in a fragile and feeble form and insist that the management of life requires the continuous intervention of therapeutic expertise. Because of this, the elevated concern with the self is underpinned by anxiety, pain, suffering, and survival, rather than seen as a positive vision of realizing the human potential. Therapeutic culture has in this way helped to construct a diminished sense of self by which one is seen as suffering from an emotional deficit and vulnerability. This paper demonstrates this downside of therapeutic culture concerning self-limitation and the sense of a diminished self by examining popular "misery memoirs." Misery memoirs are widely consumed by the general public, therefore tend to be treated by contemporary therapeutic culture as a gospel on the therapeutic ideal for self-fulfillment and self-discovery. This is, despite the existence of hidden evidence to the contrary, because of their redemptive, happy endings that show individuals overcoming difficult trials such as child abuse, incestuous rape, and domestic violence. Individual self-fulfillment and self-discovery in such stories are not achieved through the active agency of the subject but through the passive endurance of pathological symptoms and with the aid of expertise and outside support. Therefore, such stories put victims in the limited position.

A Government Agency Environment Protects Information System Design using Intrusion Prevention System and Role-Base Security Policy (침입방지시스템과 역할기반 보안정책을 이용한 정부기관 정보보호 시스템 설계)

  • Ahn Joung Choul
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.91-103
    • /
    • 2004
  • The survey of network firewall system has been focused on the deny policy that protects information from the unlicensed and the intrusion detection system. Government has solved several firewall problems as building the intranet separated from the intranet. However, the new firewall system would been satisfied both the denialpolicy and information share with the public, according as government recently emphasizes electronic service. Namely, it has to provide the functions such as the information exchange among divisions, partial share of information with the public, network connection and the interception of illegal access. Also, it considers the solution that protects system from hacking by inner user and damage of virus such as Worm. This Paper suggests the protects information system using the intrusion prevention system and role-based security policy to support the partial opennessand the security that satisfied information share among governments and public service.

Role based XML Encryption for Enforcing Access Control Policy (접근제어 정책구현을 위한 역할기반 XML 암호화)

  • Choi Dong-Hee;Park Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.1
    • /
    • pp.3-15
    • /
    • 2005
  • As a large quantity of information is presented in XML format on the web, there are increasing demands for XML security. Research area or n security is about Encryption Digital signature, Key management and Access control. until now research on U security has been focused on the security of data network using digital signature and encryption technology. As XML data become extensive and complex XML security comes to involve not only network security but also managerial security. Managerial security is guaranteed through access control. But XML Encryption supports simple network security. So it can't support multiple users and multiple access control policies. In this paper, we propose an integration method of encryption and access control policy for securing XML documents. This methodology can supper multiple authorizations of multiple users with integrating access control. And this can reduce the cost of evaluation process of the existing complicated access authorization with pre-processing.

A Study on Minimizing Infection of Web-based Malware through Distributed & Dynamic Detection Method of Malicious Websites (악성코드 은닉사이트의 분산적, 동적 탐지를 통한 감염피해 최소화 방안 연구)

  • Shin, Hwa-Su;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.89-100
    • /
    • 2011
  • As the Internet usage with web browser is more increasing, the web-based malware which is distributed in websites is going to more serious problem than ever. The central type malicious website detection method based on crawling has the problem that the cost of detection is increasing geometrically if the crawling level is lowered more. In this paper, we proposed a security tool based on web browser which can detect the malicious web pages dynamically and support user's safe web browsing by stopping navigation to a certain malicious URL injected to those web pages. By applying these tools with many distributed web browser users, all those users get to participate in malicious website detection and feedback. As a result, we can detect the lower link level of websites distributed and dynamically.

Comparison of The ISMS Difference for Private and Public Sector (민간기업과 공공기관의 정보보호 관리체계 차이 비교)

  • Kim, Ji-Sook;Lee, Soo-Yeun;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.117-129
    • /
    • 2010
  • To support the establishment of Information Security Management System, the private sector and the public sector have taken some measures. In the private sector, KISA(Korea Internet & Security Agency) has certified ISMS system based on "The Act on Communication Network Use Promotion and Information Security etc.". In the public sector, No authentication system has been established. Instead, NIS(National Intelligence Service) has enforced 'Information Security Management Condition Evaluation' based on "Electronic Government Act". This article compared ISMS control parts of the private sector with that of the public sector and analyzed the non-enforcement parts of ISMS implementing two sectors for years. Based on this, I would like to consider the method of establishment for efficient ISMS.

Influence Factors of Innovation Resistance of Cloud Computing Service: Focus on Small and Medium Enterprises (클라우드 컴퓨팅 서비스의 혁신저항 영향요인: 중소기업을 대상으로)

  • Lee, Sanghoon;Choi, Jeong Min
    • Journal of Digital Convergence
    • /
    • v.18 no.12
    • /
    • pp.105-115
    • /
    • 2020
  • The purpose of this study is to investigate the factors influencing the innovation resistance of cloud computing services and to suggest policy alternatives to increase the use of domestic cloud computing services. For this, a survey was conducted on 178 SMEs that introduced cloud computing services with government support. As a result, technostress, CEO informatization leadership and organizational structure concentration had a significant influence on innovation resistance. Therefore, in the future, first, it is necessary to provide user-centered cloud computing services in the direction of reducing technostress. Second, it is necessary to apply cloud computing services through a deeper understanding of the organizational characteristics of each small and medium enterprise. Third, there is a need for advanced security authentication and a compensation system. In order to promote the use of cloud computing services, an environment in which users can safely use should be prepared first.