• Title/Summary/Keyword: Discovery Service

Search Result 412, Processing Time 0.031 seconds

Study on Distributed Ledger Technology using Thing-user Group Management of Network of Everything (만물네트워크의 사물유저 그룹 관리 기반의 분산원장 기술에 대한 연구)

  • Kim, Suyeon;Kahng, Hyun Kook
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.77-85
    • /
    • 2020
  • In this paper, We studied the operation of distributed ledger technology used as a core technology for smart contracts and the components of distributed ledger technology. As a solution applying the entity of distributed ledger technology to NoE, we proposed the protocol of the distributed ledger technology using the thing user social group management function of NoE protocols being standardized in ISO/IEC JTC1 SC6. The management function of things user social group in NoE provides stable protocol functions and data transmission management, and provides group management functions such as member discovery function and data transmission channel management function. It is expected to be useful for member management functions of distributed ledger nodes by providing a service that apply the component of distributed ledger technology. We intend to actively reflect this technology in the future network functions of ISO/IEC JTC1 SC6, which is undergoing standardization.

Role and Task of Nurses in the Visiting Health Services at the Public Health Center: Focusing on the Elderly (노인대상 보건소 방문건강관리사업 간호사의 역할과 직무)

  • Han, Young Ran;Park, Eun A;Bang, Mi Ran;An, Na Won
    • Journal of Korean Public Health Nursing
    • /
    • v.35 no.3
    • /
    • pp.430-447
    • /
    • 2021
  • Purpose: The purpose of this study was to analyze the role and tasks of nurses who were working for the elderly in the visiting health services at the public health centers. Methods: Literature reviews, two rounds of meetings with 5 experts and a two-round Delphi technique with 15 experts were performed in this study. Results: The nurses' role and job analysis revealed 5 roles, 16 duties and, 71 tasks. The nurses' roles, including discovery and registration of households/groups in visiting health service in the community, case manager, administrative management, program planning, operation and evaluation, and development of job competency. Sixteen duties included client registration and management, need assessment and plan establishment, education, consultation and support, seasonal health care, prevention and monitoring of infectious diseases, basic nursing care, chronic disease management, linkage and utilization of resources, team cooperation and coordination, home environment management, monitoring and support for intervention outcomes, evaluation, administrative management, program planning, operation and evaluation, development of professional competency and, adoption of fourth industrial revolution technology. Conclusions: Based on the results, the government should provide sufficient nursing personnel to provide universal preventive health services for the elderly and a job training program to perform these roles well.

Efforts against Cybersecurity Attack of Space Systems

  • Jin-Keun Hong
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.4
    • /
    • pp.437-445
    • /
    • 2023
  • A space system refers to a network of sensors, ground systems, and space-craft operating in space. The security of space systems relies on information systems and networks that support the design, launch, and operation of space missions. Characteristics of space operations, including command and control (C2) between space-craft (including satellites) and ground communication, also depend on wireless frequency and communication channels. Attackers can potentially engage in malicious activities such as destruction, disruption, and degradation of systems, networks, communication channels, and space operations. These malicious cyber activities include sensor spoofing, system damage, denial of service attacks, jamming of unauthorized commands, and injection of malicious code. Such activities ultimately lead to a decrease in the lifespan and functionality of space systems, and may result in damage to space-craft and, lead to loss of control. The Cybersecurity Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) matrix, proposed by Massachusetts Institute of Technology Research and Engineering (MITRE), consists of the following stages: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command & Control, Exfiltration, and Impact. This paper identifies cybersecurity activities in space systems and satellite navigation systems through the National Institute of Standards and Technology (NIST)'s standard documents, former U.S. President Trump's executive orders, and presents risk management activities. This paper also explores cybersecurity's tactics attack techniques within the context of space systems (space-craft) by referencing the Sparta ATT&CK Matrix. In this paper, security threats in space systems analyzed, focusing on the cybersecurity attack tactics, techniques, and countermeasures of space-craft presented by Space Attack Research and Tactic Analysis (SPARTA). Through this study, cybersecurity attack tactics, techniques, and countermeasures existing in space-craft are identified, and an understanding of the direction of application in the design and implementation of safe small satellites is provided.

Changes in Research Paradigms in Data Intensive Environments

  • Minsoo Park
    • International journal of advanced smart convergence
    • /
    • v.12 no.4
    • /
    • pp.98-103
    • /
    • 2023
  • As technology advanced dramatically in the late 20th century, a new era of science arrived. The emerging era of scientific discovery, variously described as e-Science, cyberscience, and the fourth paradigm, uses technologies required for computation, data curation, analysis, and visualization. The emergence of the fourth research paradigm will have such a huge impact that it will shake the foundations of science, and will also have a huge impact on the role of data-information infrastructure. In the digital age, the roles of data-information professionals are becoming more diverse. As eScience emerges as a sustainable and growing part of research, data-information professionals and centeres are exploring new roles to address the issues that arise from new forms of research. The functions that data-information professionals and centeres can fundamentally provide in the e-Science area are data curation, preservation, access, and metadata. Basically, it involves discovering and using available technical infrastructure and tools, finding relevant data, establishing a data management plan, and developing tools to support research. A further advanced service is archiving and curating relevant data for long-term preservation and integration of datasets and providing curating and data management services as part of a data management plan. Adaptation and change to the new information environment of the 21st century require strong and future-responsive leadership. There is a strong need to effectively respond to future challenges by exploring the role and function of data-information professionals in the future environment. Understanding what types of data-information professionals and skills will be needed in the future is essential to developing the talent that will lead the transformation. The new values and roles of data-information professionals and centers for 21st century researchers in STEAM are discussed.

A Study on Ways to Improve Catalog Enriched Content Services in Domestic Public Libraries (국내 공공도서관의 목록 보강콘텐츠 서비스 개선방안에 관한 연구)

  • So-Hyun Joo;Soo-Sang Lee
    • Journal of Korean Library and Information Science Society
    • /
    • v.54 no.4
    • /
    • pp.255-279
    • /
    • 2023
  • The purpose of this study is to derive implications through a comparison of the current status of catalog enriched content services provision in U.S. public libraries and domestic public libraries. In addition, we are seeking ways to improve the catalog enriched content services for domestic public libraries in the future. From early September to mid-October 2023, specific books were searched on public library websites in the U.S. and Korea, and the functions of the enriched content services shown in the search results were compared. The results are as follows: First, domestic public library enriched content services require a separate company to develop and provide an enriched content services solution. Second, the enriched content services platform must discover domestic information sources that can be utilized in the areas of book-centered, book recommendation, and community engagement. Third, it is necessary to develop enriched content using public data such as the Library Information Naru. Fourth, each integrated library must that data generated from local community engagement services can be utilized as an enriced content service.

Genotoxic Effects on Gas Station Attendants in South-southeastern México due to Prolonged and Chronic Exposure to Gasoline

  • Rebeca I. Martinez-Salinas;Irene Sanchez-Moreno;Juan J. Morales Lopez;Benito Salvatierra Izaba;Everardo Barba Macias;Anahi Armas-Tizapantzi;Arturo Torres-Dosal
    • Safety and Health at Work
    • /
    • v.15 no.2
    • /
    • pp.236-241
    • /
    • 2024
  • Background: Gasoline, a complex mixture of volatile organic compounds is classified as possibly carcinogenic to humans. Gasoline station attendants, consistently exposed to its hazardous components, may face genotoxic effects. This study aimed to assess the influence of varying work shift durations on DNA damage in gasoline station attendants. Methods: Ninety individuals from three locations in southern México were studied. Peripheral blood mononuclear cells (PBMCs) were isolated, and DNA damage was assessed using the comet assay. Demographic, occupational, and lifestyle data were collected. Statistical analyses included t-tests, ANOVA, and Pearson correlation. Results: Significant differences in DNA damage parameters were observed between exposed and unexposed groups. The impact of tobacco, alcohol, and exercise on DNA damage was negligible. Extended work shifts (12 and 24 hours) showed heightened DNA damage compared to 8-hour shifts and the unexposed group. A novel finding revealed a modest but significant correlation between DNA damage and job seniority. Conclusion: The study highlights the intricate relationship between occupational exposure to gasoline components, DNA damage, and work shift lengths. Extended shifts correlate with heightened genotoxic effects, emphasizing the importance of personalized safety measures. The significant correlation between DNA damage and job seniority introduces occupational longevity as a determinant in the genetic health of gasoline station attendants. This discovery has implications for implementing targeted interventions and preventive strategies to safeguard workers' genetic integrity throughout their years of service. The study calls for further exploration of unconsidered factors in understanding the multifactorial nature of DNA damage in this occupational setting.

A Systematic Review and Meta-analysis of Acupuncture Trials in Republic of Korea that Used Sham Acupuncture as a Control Group (거짓침을 대조군으로 사용한 국내 침 임상시험에 대한 체계적 고찰과 메타분석)

  • Kim, Jung-Eun;Kang, Kyung-Won;Kim, Tae-Hun;Lee, Seung-Hoon;Kim, Joo-Hee;Baek, Seung-Min;Choi, Sun-Mi
    • Journal of Acupuncture Research
    • /
    • v.28 no.6
    • /
    • pp.1-17
    • /
    • 2011
  • Objectives : This study aimed to review randomized controlled trials of acupuncture performed in South Korea that used sham acupuncture as a control group. Methods : The following databases were searched through the end of September 2011: Koreanstudies information service system (KISS), Korean medical database (KMbase), national discovery OR science leaders (NDSL), oriental medicine advance searching integrated system (OASIS), and research information service system (RISS). The following search terms were used: acupuncture AND (sham or placebo). The reference lists of searched articles and Korea institute of oriental medicine (KIOM) reports(2005~2009) were identified. The following data were extracted: year/first author, disease, number of participants, blinding, intervention, outcome, and result. Where appropriate, we performed meta-analysis. The methodological quality was assessed according to the Jadad scale and 'risk of bias' by Cochrane Handbook procedure. Results : Twenty-nine studies were included in this review. In eighteen studies, penetrating sham controls were used as the control intervention, whereas the remaining eleven studies adopted non-penetrating sham controls such as the Park Sham Device or blunt auricular acupuncture. Nine studies showed statistically significant difference in outcomes. Twelve studies concerning insomnia after stroke, chronic tension-type headache, idiopathic Parkinson's disease, Hwa-Byung, and smoking cessation were included in meta-analysis. A meta-analysis of insomnia after stroke only found significant difference(MD -4.31, 95% Cl -6.19 to -2.42, $p$<0.00001). In general, all of the studies showed low methodological quality(Jadad score: mean 2.1). Risk of bias by Cochrane Handbook procedure varied. Conclusions : The results of this study could not suggest conclusive evidence that acupuncture is more effective than sham acupuncture in several diseases. In the future, more studies with rigorous acupuncture trials using sham controls should be conducted.

XML Web Services for Learning ContentsBased on a Pedagogical Design Model (교수법적 설계 모델링에 기반한 학습 컨텐츠의 XML 웹 서비스 구축)

  • Shin, Haeng-Ja;Park, Kyung-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.8
    • /
    • pp.1131-1144
    • /
    • 2004
  • In this paper, we investigate a problem with an e-learning system for e-business environments and introduce the solving method of the problem. To be more accurate, existing Web-hosted and ASP (Application Service Provider)-oriented service model is difficult to cooperate and integrate among the different kinds of systems. So we have produced sharable and reusable learning object, they have extracted a principle from pedagogical designs for units of reuse. We call LIO (Learning Item Object). This modeling makes use of a constructing for XML Web Services. So to speak, units of reuse from pedagogical designs are test tutorial, resource, case example, simulation, problem, test, discovery and discussion and then map introduction, fact, try, quiz, test, link-more, tell-more LIO learning object. These typed LIOs are stored in metadata along with the information for a content location. Each one of LIOs is designed with components and exposed in an interface for XML Web services. These services are module applications, which are used a standard SOAP (Simple Object Access Protocol) and locate any computer over Internet and publish, find and bind to services. This guarantees the interoperation and integration of the different kinds of systems. As a result, the problem of e-learning systems for e-business environments was resolved and then the power of understanding about learning objects based on pedagogical design was increased for learner and instruction designers. And organizations of education hope for particular decreased costs in constructing e-learning systems.

  • PDF

Design and Implementation of DNS Name Autoconfiguration for Internet of Things Devices (사물인터넷 디바이스를 위한 DNS 네임 자동설정의 설계 및 구현)

  • Lee, Sejun;Jeong, Jaehoon
    • Journal of KIISE
    • /
    • v.42 no.11
    • /
    • pp.1441-1451
    • /
    • 2015
  • As one of the most spotlighted research areas, these days, the Internet of Things (IoT) aims to provide users with various services through many devices. Since there exist so many devices in IoT environments, it is inefficient to manually configure the domain name system (DNS) names of such devices. Thus, for IPv6-based IoT environments, this paper proposes a scheme called the DNS Name Autoconfiguration (DNSNA) that autoconfigures an IoT device's DNS name and manages it. In the procedure for generating and registering an IoT device's DNS name, the standard protocols of the Internet Engineering Task Force (IETF) are used. Since the proposed scheme resolves an IoT device's DNS name into an IPv6 address in unicast through a DNS server, it generates less traffic than multicast-based mDNS (Multicast DNS) which is a legacy DNS application for the DNS name service in the smart home. Thus, the proposed scheme is more appropriate in multi-hop IoT networks than mDNS. This paper explains the design of the proposed scheme and its service scenarios, such as smart home and smart road. It also explains the implementation and testing of the proposed scheme in the smart grid.

A Study on Improved Method of Self-Employment Adequacy Analysis in Korea (한국의 자영업 적정규모 분석방법 개선에 관한 연구)

  • Suh, Geunha;Kim, Sungho;Suh, Changsoo
    • Journal of Distribution Science
    • /
    • v.17 no.3
    • /
    • pp.107-116
    • /
    • 2019
  • Purpose - Why, why is it difficult to predict the appropriateness of self-employment, and what are the countermeasures and policy proposals to overcome. This study intends to further develop the field of statistical variables. It is necessary to overcome the limitation of existing proper scale research in Korea. We need to find statistical variables that can determine the appropriateness of self-employment in Korea. These efforts will be helpful in evaluating OECD countries and statistics and developing domestic economic indicators. Research design, data, and methodology - It is the discovery of statistical indicators and complementary indicators that have not been revealed in previous studies. Therefore, we sought to find new statistical parameters based on the statistics of the Korea National Statistical Office, the Bank of Korea, and overseas OECD statistics. (Proper Size of Adequacy) is defined as the specific gravity or number of the self-employed in Korea, which is shown as "Out Put" by statistical analysis of STATA panel statistical data. It is possible to further develop variables such as gross domestic product, gross national product, economic growth rate, unemployment rate, income tax rate, consumer price, tax level, exports, import amount, bill default I want to dig. Results - In addition to expanding economic indicators that can be explained by self-employment determinants, we have developed a variety of methods such as linear and non-linear (U-shaped, inverted U-shaped). It is the improvement of the self-employment determinants and the analysis method to estimate the appropriate scale. Conclusions - The proposed contents are reflected in self - employment appropriateness evaluation data and hope to help the government to select the policy support and to evaluate the government business after the policy support. These efforts are expected to be of great help to operators operating their own businesses, and to government and related institutional practitioners who support them. In this way, self-employment will be created in accordance with the Korean situation, where the happy life of all the people becomes the premise and the inclusive economic activities are guaranteed. It will improve the method of analyzing proper scale of small business owners and self-employed in Korea.