• Title/Summary/Keyword: Mandatory Systems

Search Result 232, Processing Time 0.027 seconds

A Basic Study on the Derivation of Vulnerability Factors for Safety Management of old Buildings (노후 건축물의 안전관리를 위한 취약성 요소 도출 기본연구)

  • Oh, Gyuho;Cha, Inhyuck;Ahn, Sungjin
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2023.05a
    • /
    • pp.275-276
    • /
    • 2023
  • In order to prevent disaster risks caused by building aging in advance, the prevailing opinion is that it is urgent to actively improve systems such as mandatory safety inspections, and to calculate risks and develop safety management systems due to building aging. The need for systematic risk management continues to be emphasized in the process of safety inspection and repair of old buildings, but the risk management and safety management techniques of each construction entity have not been established in practice. Accordingly, this study aims to analyze the vulnerability factors of aging buildings and provide basic data on the development of a risk rating calculation model for old buildings and the efficiency of safety management systems in the future.

  • PDF

TPM-Based Anti-Tampering Solutions to Protect Weapon Systems Technologies (TPM 기반 안티탬퍼링 솔루션을 통한 무기체계 기술 보호)

  • J.H. Lee;D.H. Kim;H.S. Lee;J.H. Han;Y.S. Kim;C. Ryu;Y.S. Choi;Y.K. Lee;J.N. Kim
    • Electronics and Telecommunications Trends
    • /
    • v.39 no.5
    • /
    • pp.49-60
    • /
    • 2024
  • Protecting weapon system technologies is essential for national security. Advancements in artificial intelligence and South Korea's growing role in the global defense market underscore the importance of anti-tampering technologies. TPM-based anti-tampering ensures the integrity and confidentiality of weapon systems. This paper analyzes the concept of anti-tampering and the current standards and technologies related to TCG's TPM/TSS. With mandatory integration requirements for exported weapon systems, TPM-based anti-tampering solutions provide cost-effective, high-level security while effectively safeguarding K-Defense technologies.

The Effectiveness for Consolidating Fitment of Safety Belt Reminder (좌석안전띠 미착용 경고장치의 의무 장착에 따른 효과분석)

  • Jang, Jeong Ah;Shim, Sojung;Kim, Young Sun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.15 no.6
    • /
    • pp.127-137
    • /
    • 2016
  • It is widely recognised that the safety-belt is one of the most important and effective vehicle safety features. Nevertheless, actual safety-belt wearing rates are low in Korea, especially rear seats. In Korea, rear seat safety-belt use can be as low as 20%. Consolidating fitment of Safety Belt Reminder(SBR) is one of means to improve belt wearing rates. In this paper, we use the effect of wearing seat belt model as Evans(1991) model. As a key parameter, intial wearing seat belt rates is studied and final wearing seat belt rates is used as scenario related a human compliance variables. In this study, benefit analysis is performed when the effective SBR is made mandatory for all passenger car seat. According to study results, when the fitment of SBR is made mandatory for all passenger car seats in Korea, 119 lives are expected to be saved annually with a 90% observance rate of the SBR. In the same condition, benefit-cost ratio will be 1.84.

Impact of Complex Hemodynamics to the Management of ArterioVenous(AV) Fistula (동정맥루의 복합성 혈류학 소견이 그 관리에 미치는 영향)

  • Lee Byung-Boons
    • Proceedings of the KSME Conference
    • /
    • 2002.08a
    • /
    • pp.9-10
    • /
    • 2002
  • Human circulatory system between heart and tissue is not directly connected in normal condition but mandatory to go through the capillary system in order to fulfill its physiologic aim to deliver oxygen and nutrients, etc. to the tissue and retrieve used blood together with waste products from the tissue properly. When abnormal connection between arterial and venous system (AV fistula), these two circulatory systems respond differently to the hemodynamic impact of this abnormal connection between high pressure (artery) and low pressure (vein) system. Depending upon the location and/or degree (e.g. size and flow) of fistulous condition, each circulatory system exerts different compensatory hemodynamic response to this newly developed abnormal inter-relationship between two systems in order to minimize its hemodynamic impact to own system of different hemodynamic characteristics. Pump action of the heart can assist the failing arterial system directly to maintain arterial circulation against newly established low peripheral resistance by the AV fistula during the compensation period, while it affects venous system in negative way with increased venous loading. However, the negative impact of increased heart action to the venous system is partly compensated by the lymphatic system which is the third circulatory system to assist venous system independently with different hemodynamics. The lymphatic system with own unique Iymphodynamics based on peristaltic circulation from low resistance to high resistance condition, also increases its circulation to assist the compensation of overloaded venous system. Once these compensation mechanisms should fail to fight to newly established hemodynamic condition due to this abnormal AV connection, each system start to show different physiologic ${\underline{de}compensation}$ including heart and lymphatic system. The vicious cycle of decompensation between arterial and vein, two circulatory system affecting each other by mutually negative way steadily progresses to show series of hemodynamic change throughout entire circulation system altogether including heart. Clinical outcome of AV fistula from the compensated status to decompensated status is closely affected by various biological and mechanical factors to make the hemodynmic status more complicated. Proper understanding of these crucial biomechanical factors iii particular on hemodyanmic point of view is mandatory for the advanced assessment of biomechanical impact of AV fistula, since this new advanced concept of AY fistula based on blomechanical information will be able to improve clinical control of the complicated AV fistula, either congenital or acquired.

  • PDF

A Suggestion to Develop a Nutrition Policy on Food and Nutrition Labeling and Education Systems for Fast Food and Carbonated Soft Drinks in Korea (한국의 패스트푸드 및 탄산음료에 관한 영양정책 방안제시)

  • 정상진;김주현;이정숙;이다희;김숙희;유춘희
    • Journal of Nutrition and Health
    • /
    • v.37 no.5
    • /
    • pp.394-405
    • /
    • 2004
  • The objective of this study is to develop a nutrition policy on food and nutrition labeling and education systems for fast food and carbonated soft drinks in Korea by identifying the fast food and soft drink use and by examining nutrition policies and labeling in Korea and other countries. Fast food is defined as food dispensed quickly at a restaurant generally offering a limited menu of inexpensive items, which may be mostly not nutritious. It is a growing component of the Korean diet, especially on children and adolescent population. Low nutrient dense beverages such as carbonated drinks are also increasing in the children and adolescent's diet in Korea and concern has been raised that these beverages may replace more nutritious beverage and provide empty calories. According to 2001 Korean national health and nutrition survey, fast food and carbonated soft drinks were most popular among 13 - 19 years old adolescents. Thirty six and 72 percent of adolescents consumed hamburger and carbonated beverage equal to or more than once a week, respectively. In United States, all processed food including soft drinks should disclose full nutrition information by nutrition labeling requirement.. Restaurant foods are not required to provide nutrition information currently, but legislation on mandatory nutrition labeling of fast foods with other restaurant foods has been proposed currently in US. The sales of foods of minimal nutritional value, such as soft drinks, in the nation's schools is regulated by the United States Department of Agriculture. Nutrition information about fast food in US has been provided by fast food companies, non-profit organizations, hospitals and government through internet, booklet and brochure, etc, but the information is available from only a few resources in Korea. This study suggests a nutrition policy on fast food and soft drink use which includes establishing mandatory nutrition labeling and developing nutrition education materials and programs by web-site, booklet and government and school programs in Korea.

Metadata Registry Management System for Science and Technology Information (과학기술정보를 위한 메타데이타 레지스트리 관리 시스템)

  • Jeong Dongwon;Shin Dongkil;Jeong Eunju;Kim Young-Gab;Lee Jeong Oog;Baik Doo-Kwon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.6
    • /
    • pp.472-483
    • /
    • 2004
  • Many metadata registry management systems have been developed, which are based on ISO/IEC ll179. However, they do not follow the international standard, ISO/IEC ll179 nor provide some of mandatory functions. It is difficult to a develop metadata registry management system for domestic environment because of their hidden implementations. The goals of this paper are to solve the problems of the existing systems and to develop a metadata registry management systems for accumulation of primitive technologies. This paper also shows the metadata registry building process for the science and technology information field using the developed system. This system consists of Metadata Registry Layer, Core Component Layer, Extension Layer, and Service Interface Layer. The developed metadata registry management system follows ISO/IEC ll179 and contains mandatory functions for practical use. Therefore, it can be used as a guideline for building metadata registries and a development process of metadata registry management systems. We can easily reuse its components for development of metadata registry management systems in various fields because the system is designed and implemented based on the component-based development methodology. It also decreases time and cost for developing systems.

The Process Analysis and Application Methods for PLC Code Programming (PLC 코드 작성을 위한 공정 분석 및 적용 방법)

  • Koo, Lock-Jo;Yeo, Sung-Joo;Lee, Kang-Gu;Hong, Sang-Hyun;Park, Chang-Mok;Park, Sang-Chul;Wang, Gi-Nam
    • IE interfaces
    • /
    • v.21 no.3
    • /
    • pp.294-301
    • /
    • 2008
  • Agile and flexible manufacturing systems make it mandatory that a control program should have features such as agility, flexibility, and reusability in order to run manufacturing unit smoothly. PLCs are the most frequently used control program in manufacturing systems. PLC programs are mostly programmed by subcontraction, which makes correction of code very difficult. As a result, it may cause delay during down time and ramp up time which leads to big loss of revenue and goodwill. To prevent delay during the times, this paper proposes systematic process analysis and application method for programmable logic controller like LLD (Ladder Logic Diagram). The proposed method uses modified human-error investing techniques for documentation and transforming technique to program LLD from the documentation. Furthermore, this paper demonstrates an example of piston mechanism to explain the proposed method.

A Role-driven Security and Access Control Model for Secured Business Process Management Systems

  • Won Jae-Kang;Kim Kwang-Hoon
    • The Journal of Information Systems
    • /
    • v.14 no.3
    • /
    • pp.1-8
    • /
    • 2005
  • This paper formally defines a role-driven security and access control model of a business process in order eventually to provide a theoretical basis for realizing the secured business process management systems. That is, we propose a graphical representation and formal description of the mechanism that generates a set of role-driven security and access control models from a business process modeled by the information control net(ICN) modeling methodology that is a typical business process modeling approach for defining and specifying business processes. Based upon the mechanism, we are able to design and accomplish a secured business process management system that provides an unified resource access control mechanism of the business process management engine domain's and the application domain's. Finally, we strongly believe that the secured access control policies from the role-driven security and access control model can be easily transformed into the RBAC(Role-based Access Control) model that is a standardized security technology for computer and communications systems of commercial and civilian government organizations.

  • PDF

An Enhanced Role-Based Access Control Model using Static Separation of Duty Concept

  • Yenmunkong, Burin;Sathitwiriyawong, Chanboon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.1350-1354
    • /
    • 2004
  • This paper proposes a simple but practically useful model for preventing fraud of users called "ERBAC03". The new model consists of qualified mandatory and discretionary features for roles and locations, including the assignment of permissions for the appropriate roles and the assignment of roles for the appropriate locations. Moreover, a static separation of duty (SSoD) principle is applied to the new model for integrity requirements of security systems. The paper also explores some extensions of ERBAC03 including the new model using the SSoD concept from some experiments. The experimental results prove the efficiency improvement of the proposed model that can make benefits for large enterprises.

  • PDF

The Factors Affecting the Performance of Knowledge Management Systems: Focused on the Quality of Community-of-Practice (지식경영시스템의 사용자 성과에 영향을 미치는 요인: 실행공동체 특성요인을 중심으로)

  • Ryu, Il;Koh, Joon;Kim, Jaejon;Park, Seong-Jong
    • Knowledge Management Research
    • /
    • v.7 no.1
    • /
    • pp.31-47
    • /
    • 2006
  • In order to manage organizational knowledge efficiently, Knowledge Management System(KMS) is considered as mandatory. This study aims at developing a KMS performance model to predict user satisfaction as well as KMS usage, considering the unique features of KMS. By analyzing 261 surveys with LISREL, we found that community of practice(CoP) characteristics - participation and interactivity among users - significantly affects KMS user satisfaction. This implies that the development of KMS should focus on facilitating users' interactivity and participations such as CoP activity, which differs from the general information system context. We also found that KMS usage is influenced by CoP interactivity, not by CoP participation, and that KMS usage as well as user satisfaction leads to user performance. Interpretations and implications of the findings are discussed.

  • PDF