• Title/Summary/Keyword: Leakage management

Search Result 662, Processing Time 0.027 seconds

An Efficiency Management Scheme using Big Data of Healthcare Patients using Puzzy AHP (퍼지 AHP를 이용한 헬스케어 환자의 빅 데이터 사용의 효율적 관리 기법)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.227-233
    • /
    • 2015
  • The recent health care is growing rapidly want to receive offers users a variety of medical services, can be exploited easily exposed to a third party information on the role of the patient's hospital staff (doctors, nurses, pharmacists, etc.) depending on the patient clearly may have to be classified. In this paper, in order to ensure safe use by third parties in the health care environment, classify the attributes of patient information and patient privacy protection technique using hierarchical multi-property rights proposed to classify information according to the role of patient hospital officials The. Hospital patients and to prevent the proposed method is represented by a mathematical model, the information (the data consumer, time, sensor, an object, duty, and the delegation circumstances, and so on) the privacy attribute of a patient from being exploited illegally patient information from a third party the prevention of the leakage of the privacy information of the patient in synchronization with the attribute information between the parties.

A Study of Prevention Model the Spread of Phishing Attack for Protection the Medical Information (의료정보 보호를 위한 피싱공격 확산방지모델 연구)

  • Choi, Kyong-Ho;Chung, Kyung-Yong;Shin, Dong-Kun
    • Journal of Digital Convergence
    • /
    • v.11 no.3
    • /
    • pp.273-277
    • /
    • 2013
  • Phishing attacks have been implemented in smarter, more advanced ways with the passage of time. Hackers use intelligent phishing attacks to take over computers and to penetrate internal networks in major organizations. So, in this paper, a model for a prevention of phishing attack spread is conceptual designed in order to protect internal users and sensitive or important information from sophisticated phishing attacks. Internal users simultaneously utilize both external web and organizational mail services. And hackers can take the both side equally as a vector. Thus, packets in each service must be monitored and stored to recognize threatening elements from both sides. The model designed in this paper extends the mail server based security structure used in conventional studies for the protection of Internet mail services accessed by intranet users. This model can build a list of phishing sites as the system checks e-mails compared to that of the method that directly intercepts accesses to phishing sites using a proxy server, so it represents no standby time for request and response processes.

Water Balance Analysis of Pumped-Storage Reservoir during Non-Irrigation Period for Recurrent Irrigation Water Management (순환형 농업용수관리를 위한 농업용 저수지의 비관개기 양수저류 추정)

  • Bang, Na-Kyoung;Nam, Won-Ho;Shin, Ji-Hyeon;Kim, Han-Joong;Kang, Ku;Baek, Seung-Chool;Lee, Kwang-Ya
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.62 no.4
    • /
    • pp.1-12
    • /
    • 2020
  • The extreme 2017 spring drought affected a large portion of South Korea in the Southern Gyeonggi-do and Chungcheongnam-do districts. This drought event was one of the climatologically driest spring seasons over the 1961-2016 period of record. It was characterized by exceptionally low reservoir water levels, with the average water level being 36% lower over most of western South Korea. In this study, we consider drought response methods to alleviate the shortage of agricultural water in times of drought. It could be to store water from a stream into a reservoir. There is a cyclical method for reusing water supplied from a reservoir into streams through drainage. We intended to present a decision-making plan for water supply based on the calculation of the quantity of water supply and leakage. We compared the rainfall-runoff equation with the TANK model, which is a long-term run-off model. Estimations of reservoir inflow during non-irrigation seasons applied to the Madun, Daesa, and Pungjeon reservoirs. We applied the run-off flow to the last 30 years of rainfall data to estimate reservoir storage. We calculated the available water in the river during the non-irrigation season. The daily average inflow from 2003 to 2018 was calculated from October to April. Simulation results show that an average of 67,000 tons of water is obtained during the non-irrigation season. The report shows that about 53,000 tons of water are available except during the winter season from December to February. The Madun Reservoir began in early October with a 10 percent storage rate. In the starting ratio, a simulated rate of 4 K, 6 K, and 8 K tons is predicted to be 44%, 50%, and 60%. We can estimate the amount of water needed and the timing of water pump operations during the non-irrigation season that focuses on fresh water reservoirs and improve decision making for efficient water supplies.

Analysis of Defect Risk by Work Types based on Warranty Liability Period in Apartments (공동주택 하자보수보증기간에 기초한 공종별 하자위험 분석)

  • Kim, Sang-Hyeon;Kim, Jae-Jun
    • Korean Journal of Construction Engineering and Management
    • /
    • v.19 no.4
    • /
    • pp.34-42
    • /
    • 2018
  • Apartment is a typical type of housing preferred by the majority of people. However, and defect disputes occur because various defects such as cracks, subsidence, breakage, water leakage, dew condensation and dropout are confirmed with numerous structures and finishing materials. From this point of view, this paper analyzes defect frequency and costs of each warranty period by work types, and estimates defect risks by using defect dispute cases. It examined about 5,337 defect items for 32 apartment over ten years old. In this paper, there are 10 types of work types and the warranty liability period is divided into 6 categories. Based on these categories, defect frequency and costs are investigated, and finally defect risk of the warranty liability period by work types confirmed. As a result of this analysis, it was found that defect risk in RC and finishing work is very high. Especially the RC work revealed that there is a high risk of trying from the third year onwards and it was found that the defect risk up to the second year is high in the finishing work. Due to aging of RC structure, the defect risk gradually increases, and finishing work initially cause defect disputes because of the housing environment.

Clinical Reviews of Spontaneous Hemopneumothorax (자연성 혈기흉의 임상 양상)

  • Kim, Jung-Tae;Chang, Woon-Ha
    • Journal of Chest Surgery
    • /
    • v.40 no.9
    • /
    • pp.613-616
    • /
    • 2007
  • Background: Spontaneous hemopneumothorax is a rare disease and can be life threatening; it occurs in $1{\sim}12%$ of patients with spontaneous pneumothorax. We analyzed clinical reviews and treatments, as well as complications of spontaneous hemopneumothorax patients that were treated to aid in the optimal management. Material and Method: We studied retrospectively 30 cases with spontaneous hemopneumothorax for 11 years, from 1995 to 2006, at our hospital. Result: All the patients were male and most of the patients were under 30 years. The sides with the disorder were as follows: right in 15 cases and left in 15 cases. Patients showed mostly initial symptoms of chest pain, dyspnea and hypovolemic shock. All patients underwent a closed thoracostomy and 27 patients underwent surgery. Chemical pleurodesis was peformed because of postoperative persistent air leakage and one case was treated in the ICU due to re-expansion pulmonary edema, There were no other complications such as fibrothorax seen during the follow-up periods. Conclusion: The most important finding is proper initial management, as the spontaneous hemopneumothorax can potentially lead to a life-threatening condition. Recently, video assisted thoracoscopic surgery (VATS) is common procedure for general thoracic surgery and overcomes the weak points of performing a thoracotomy. The results of VATS are encouraging.

Risk Management-Based Application of Anti-Tampering Methods in Weapon Systems Development (무기 시스템 개발에서 기술보호를 위한 위험관리 기반의 Anti-Tampering 적용 기법)

  • Lee, Min-Woo;Lee, Jae-Chon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.12
    • /
    • pp.99-109
    • /
    • 2018
  • Tampering involves illegally removing technologies from a protected system through reverse engineering or developing a system without proper authorization. As tampering of a weapon system is a threat to national security, anti-tampering measures are required. Precedent studies on anti-tampering have discussed the necessity, related trends, application cases, and recent cybersecurity-based or other protection methods. In a domestic situation, the Defense Technology Protection Act focuses on how to prevent technology leakage occurring in related organizations through personnel, facilities and information systems. Anti-tampering design needs to determine which technologies are protected while considering the effects of development cost and schedule. The objective of our study is to develop methods of how to select target technologies and determine counter-measures to protect these technologies. Specifically, an evaluation matrix was derived based on the risk analysis concept to select the protection of target technologies. Also, based on the concept of risk mitigation, the classification of anti-tampering techniques was performed according to its applicability and determination of application levels. Results of the case study revealed that the methods proposed can be systematically applied for anti-tampering in weapon system development.

Secure Key Exchange Protocols against Leakage of Long-tenn Private Keys for Financial Security Servers (금융 보안 서버의 개인키 유출 사고에 안전한 키 교환 프로토콜)

  • Kim, Seon-Jong;Kwon, Jeong-Ok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.119-131
    • /
    • 2009
  • The world's widely used key exchange protocols are open cryptographic communication protocols, such as TLS/SSL, whereas in the financial field in Korea, key exchange protocols developed by industrial classification group have been used that are based on PKI(Public Key Infrastructure) which is suitable for the financial environments of Korea. However, the key exchange protocols are not only vulnerable to client impersonation attacks and known-key attacks, but also do not provide forward secrecy. Especially, an attacker with the private keys of the financial security server can easily get an old session-key that can decrypt the encrypted messages between the clients and the server. The exposure of the server's private keys by internal management problems, etc, results in a huge problem, such as exposure of a lot of private information and financial information of clients. In this paper, we analyze the weaknesses of the cryptographic communication protocols in use in Korea. We then propose two key exchange protocols which reduce the replacement cost of protocols and are also secure against client impersonation attacks and session-key and private key reveal attacks. The forward secrecy of the second protocol is reduced to the HDH(Hash Diffie-Hellman) problem.

A Study on the application method of UPS's Battery Safety for battleship Command and Fire Control System (지휘무장통제체계용 UPS 배터리의 안전성 확보방안 연구)

  • Park, Gun-Sang;Kim, Jae-Yun;Kim, Dong-Gyu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.3
    • /
    • pp.587-596
    • /
    • 2021
  • Naval battleships have systems to perform special purposes, such as the Command and Fire Control System (CFCS). Some of the this equipment should be equipped with an Uninterruptible Power System (UPS ) to ensure operational continuity and the backup of important data, even during unexpected power outages caused by problems with the ship's power generator. Heavy combat losses can occur if the equipment cannot satisfy the function. Therefore, it is important to design a stable UPS. The battery and Battery Management System (BMS) are two of the most important factors for designing a stable UPS. A power outage will be encountered if the battery and BMS are not stable. The customer will be exposed to abnormal situations, loss of important tactical data, and inability to operate some of the CFCS. As a result, an enhanced safety system should be designed. Thus, this study implemented and verified the improved system in terms of three methods, such as comparative analysis of the batteries, improvement about leakage current of the circuit, and tests of the aggressive environmental resistance to improve the UPS for CFCS.

Research to Predict the Thermal Characteristics of Electro Hydrostatic Actuator for Aircraft (항공기용 전기-정유압식 작동기(Dual Redundant Asymmetric Tandem EHA)의 열특성 예측을 위한 연구)

  • Kim, Sang Seok;Park, Hyung Jun;Kim, Daeyeon;Kim, Dae Hyun;Kim, Sang Beom;Lee, Junwon;Choi, Jong Yoon
    • Journal of Aerospace System Engineering
    • /
    • v.16 no.3
    • /
    • pp.84-92
    • /
    • 2022
  • The electro-hydrostatic actuator (EHA) recently has been used in flight control fields for aircraft because of its benefits of minimizing oil leakage and weight, improving safety, and etc. while independently operating the hydraulic power source and eliminating complex hydraulic piping. The aircraft of which EHA is installed inside, has the thermal management issue of EHA, because of its limited cooling source as compared with the aircraft which installs the traditional central hydraulic system. So, the thermal analysis model which predicts the thermal characteristics of EHA, is required to resolve this thermal management issue. In this study, an oil circulation circuit inside the hydraulic power module comprised of hydraulic pump and electrical motor for EHA was applied. This is for the purpose of developing the internal rotary group of hydraulic power module, which operates under the conditions of high rotation speed and hydraulic pressure. After formulating an appropriate thermal analysis model, the thermal analysis results with oil cooled or no oil cooled hydraulic control module were compared and reviewed, for the purpose of predicting the thermal characteristics of EHA.

A Study on Acceptance of Blockchain-Based Genetic Information Platform (블록체인 기반 유전자분석 정보플랫폼의 수용에 대한 연구)

  • In Seon Choi;Dong Chan Park;Doo Hee Chung
    • Information Systems Review
    • /
    • v.23 no.3
    • /
    • pp.97-125
    • /
    • 2021
  • Blockchain is a core technology to solve personal information leakage and data management issues, which are limitations of existing Genomic Sequencing services. Due to continuous cost reduction and deregulation, the market size of Genomic Sequencing has been increasing, also the potential of services is expected to increase when Blockchain's security and connectivity are combined. We created our research model by combining the Technology Acceptance Model (TAM) and the Innovation Resistance Theory also analyzed the factors affecting the acceptance intention and innovation resistance of the Blockchain Based Genomic Sequencing Information Platform. A survey was conducted on 150 potential users of Blockchain and Genomic Sequencing services. The analysis was conducted by setting the four Blockchain variables: Security, transparency, availability, and diversity). Also, we set the Perceived Usefulness, Perceived risk, and Perceived Complexity for Technology Acceptance and Innovation Resistance variables and analyzed the effect of the characteristics of the Blockchain on acceptance intention and innovation resistance through these variables. Through this analysis, key variables that need to be considered important to reduce resistance and increase acceptance intention could be identified. This study presents innovation factors that should be considered in companies preparing a new Blockchain Based Genomic Sequencing Information Platform.