• Title/Summary/Keyword: New Address Information

Search Result 690, Processing Time 0.027 seconds

Factors Influencing Vaccination in Korea: Findings From Focus Group Interviews

  • Park, Bomi;Choi, Eun Jeong;Park, Bohyun;Han, Hyejin;Cho, Su Jin;Choi, Hee Jung;Lee, Seonhwa;Park, Hyesook
    • Journal of Preventive Medicine and Public Health
    • /
    • v.51 no.4
    • /
    • pp.173-180
    • /
    • 2018
  • Objectives: Immunization is considered one of the most successful and cost-effective public health interventions protecting communities from preventable infectious diseases. The Korean government set up a dedicated workforce for national immunization in 2003, and since then has made strides in improving vaccination coverage across the nation. However, some groups remain relatively vulnerable and require intervention, and it is necessary to address unmet needs to prevent outbreaks of communicable diseases. This study was conducted to characterize persistent challenges to vaccination. Methods: The study adopted a qualitative method in accordance with the Consolidated Criteria for Reporting Qualitative Research checklist. Three focus group interviews were conducted with 15 professionals in charge of vaccination-related duties. The interviews were conducted according to a semi-structured guideline, and thematic analysis was carried out. Data saturation was confirmed when the researchers agreed that no more new codes could be found. Results: A total of 4 main topics and 11 subtopics were introduced regarding barriers to vaccination. The main topics were vaccine hesitancy, personal circumstances, lack of information, and misclassification. Among them, vaccine hesitancy was confirmed to be the most significant factor impeding vaccination. It was also found that the factors hindering vaccination had changed over time and disproportionately affected certain groups. Conclusions: The study identified ongoing unmet needs and barriers to vaccination despite the accomplishments of the National Immunization Program. The results have implications for establishing tailored interventions that target context- and group-specific barriers to improve timely and complete vaccination coverage.

DNS-based Dynamic Load Balancing Method on a Distributed Web-server System (분산 웹 서버 시스템에서의 DNS 기반 동적 부하분산 기법)

  • Moon, Jong-Bae;Kim, Myung-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.3
    • /
    • pp.193-204
    • /
    • 2006
  • In most existing distributed Web systems, incoming requests are distributed to servers via Domain Name System (DNS). Although such systems are simple to implement, the address caching mechanism easily results in load unbalancing among servers. Moreover, modification of the DNS is necessary to load considering the server's state. In this paper, we propose a new dynamic load balancing method using dynamic DNS update and round-robin mechanism. The proposed method performs effective load balancing without modification of the DNS. In this method, a server can dynamically be added to or removed from the DNS list according to the server's load. By removing the overloaded server from the DNS list, the response time becomes faster. For dynamic scheduling, we propose a scheduling algorithm that considers the CPU, memory, and network usage. We can select a scheduling policy based on resources usage. The proposed system can easily be managed by a GUI-based management tool. Experiments show that modules implemented in this paper have low impact on the proposed system. Furthermore, experiments show that both the response time and the file transfer rate of the proposed system are faster than those of a pure Round-Robin DNS.

Critical Discussion for Digital Divide Research (정보격차 연구에 대한 비판적 논의)

  • Seo, Hyung-Jun
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.11
    • /
    • pp.657-666
    • /
    • 2014
  • The development of ICT are turning information society into smart society which focus on mobile environment. The effect of ICT influence not only technical aspects but also societal and economic aspects. But we can't ignore the side effects of ICT, especially digital divide can cause social elimination. Digital divide is related to redistribution of wealth, so there are too many studies which deal with digital divide. But Most of these studies are focusing on physical accessibility. Also most of digital divide studies address digital divide based on demographic factors such as gender, age, income and education. Of course, these studies are important, but we expect that the aspect of digital divide is different from past digital divide. This paper deal with exploratory discussion for necessity of new digital divide conception by reviewing limitations of existing digital divide research.

A new method for automatic areal feature matching based on shape similarity using CRITIC method (CRITIC 방법을 이용한 형상유사도 기반의 면 객체 자동매칭 방법)

  • Kim, Ji-Young;Huh, Yong;Kim, Doe-Sung;Yu, Ki-Yun
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.29 no.2
    • /
    • pp.113-121
    • /
    • 2011
  • In this paper, we proposed the method automatically to match areal feature based on similarity using spatial information. For this, we extracted candidate matching pairs intersected between two different spatial datasets, and then measured a shape similarity, which is calculated by an weight sum method of each matching criterion automatically derived from CRITIC method. In this time, matching pairs were selected when similarity is more than a threshold determined by outliers detection of adjusted boxplot from training data. After applying this method to two distinct spatial datasets: a digital topographic map and street-name address base map, we conformed that buildings were matched, that shape is similar and a large area is overlaid in visual evaluation, and F-Measure is highly 0.932 in statistical evaluation.

Challenges of VOD Market of Korean Film Industry: Legislative and Policy Alternatives to Improve its Distribution Structure (국내 영화 온라인 부가시장의 유통구조 합리화 방안)

  • Kim, HwiJung
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.6
    • /
    • pp.354-364
    • /
    • 2016
  • With the advancement of the digital convergence of content and platform, Korean film industry sees good opportunities of maximizing the profits and increased distribution opportunities by independent film makers. Nevertheless, the domestic film market almost entirely relies on the box office sales, which seems to be caused by the stagnation of new additional copyright market. The study aims to address the following problems: First, information asymmetry of the revenues to which the contents providers and the service providers are exposed leads to the distrust among digital film contents businesses and the disadvantages to film makers and investors, in particular. Secondly, the VOD(Video on Demand) market of film industry is adversely affected by the illegal uploads and downloads of film contents, which harms the formation of paid additional market. Based on the examination of current legislation and policy options addressing these issues, the study suggests legislative accomodations and cultural industry policy alternatives to promote the additional market of film industry.

Storage System Performance Enhancement Using Duplicated Data Management Scheme (중복 데이터 관리 기법을 통한 저장 시스템 성능 개선)

  • Jung, Ho-Min;Ko, Young-Woong
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.37 no.1
    • /
    • pp.8-18
    • /
    • 2010
  • Traditional storage server suffers from duplicated data blocks which cause an waste of storage space and network bandwidth. To address this problem, various de-duplication mechanisms are proposed. Especially, lots of works are limited to backup server that exploits Contents-Defined Chunking (CDC). In backup server, duplicated blocks can be easily traced by using Anchor, therefore CDC scheme is widely used for backup server. In this paper, we propose a new de-duplication mechanism for improving a storage system. We focus on efficient algorithm for supporting general purpose de-duplication server including backup server, P2P server, and FTP server. The key idea is to adapt stride scheme on traditional fixed block duplication checking mechanism. Experimental result shows that the proposed mechanism can minimize computation time for detecting duplicated region of blocks and efficiently manage storage systems.

Privilege Delegation Protocol Providing Delegation Traceability Using ID-based Cryptosystem in X.509 Proxy Certificate Environment (X.509 대리 인증서 환경에서 위임 추적 기능을 제공하는 ID 기반 암호 시스템 기반 권한 위임 프로토콜)

  • Lee, Youn-Ho;Kim, Byung-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.9_10
    • /
    • pp.441-451
    • /
    • 2008
  • Currently, the X.509 proxy certificate is widely used to delegate an entity's right to another entity in the computational grid environment. However it has two drawbacks: the potential security threat caused by intraceability of a delegation chain and the inefficiency caused by an interactive communication between the right grantor and the right grantee on the delegation protocol. To address these problems for computational grids, we propose a new delegation protocol without additional cost. We use an ID-based key generation technique to generate a proxy private key which is a means to exercise the delegated signing right. By applying the ID-based key generation technique, the proposed protocol has the delegation traceability and the non-interactive delegation property. Since the right delegation occurs massively in the computational grid environment, our protocol can contribute the security enhancement by providing the delegation traceability and the efficiency enhancement by reducing the inter-domain communication cost.

Study on the Security R&R of OT-IT for Control System Network Boundaries (제어 네트워크 경계에 대한 OT-IT 책임 역할 연구)

  • WOO, Young Han;Kwon, Hun Yeong
    • Journal of Information Technology Services
    • /
    • v.19 no.5
    • /
    • pp.33-47
    • /
    • 2020
  • In recent years, due to the demand for operating efficiency and cost reduction of industrial facilities, remote access via the Internet is expanding. the control network accelerates from network separation to network connection due to the development of IIoT (Industrial Internet of Things) technology. Transition of control network is a new opportunity, but concerns about cybersecurity are also growing. Therefore, manufacturers must reflect security compliance and standards in consideration of the Internet connection environment, and enterprises must newly recognize the connection area of the control network as a security management target. In this study, the core target of the control system security threat is defined as the network boundary, and issues regarding the security architecture configuration for the boundary and the role & responsibility of the working organization are covered. Enterprises do not integrate the design organization with the operation organization after go-live, and are not consistently reflecting security considerations from design to operation. At this point, the expansion of the control network is a big transition that calls for the establishment of a responsible organization and reinforcement of the role of the network boundary area where there is a concern about lack of management. Thus, through the organization of the facility network and the analysis of the roles between each organization, an static perspective and difference in perception were derived. In addition, standards and guidelines required for reinforcing network boundary security were studied to address essential operational standards that required the Internet connection of the control network. This study will help establish a network boundary management system that should be considered at the enterprise level in the future.

Accuracy Evaluation of DEM generated from Satellite Images Using Automated Geo-positioning Approach

  • Oh, Kwan-Young;Jung, Hyung-Sup;Lee, Moung-Jin
    • Korean Journal of Remote Sensing
    • /
    • v.33 no.1
    • /
    • pp.69-77
    • /
    • 2017
  • S The need for an automated geo-positioning approach for near real-time results and to boost cost-effectiveness has become increasingly urgent. Following this trend, a new approach to automatically compensate for the bias of the rational function model (RFM) was proposed. The core idea of this approach is to remove the bias of RFM only using tie points, which are corrected by matching with the digital elevation model (DEM) without any additional ground control points (GCPs). However, there has to be a additional evaluation according to the quality of DEM because DEM is used as a core element in this approach. To address this issue, this paper compared the quality effects of DEM in the conduct of the this approach using the Shuttle Radar Topographic Mission (SRTM) DEM with the spatial resolution of 90m. and the National Geographic Information Institute (NGII) DEM with the spatial resolution of 5m. One KOMPSAT-2 stereo-pair image acquired at Busan, Korea was used as experimental data. The accuracy was compared to 29 check points acquired by GPS surveying. After bias-compensation using the two DEMs, the Root Mean Square (RMS) errors were less than 6 m in all coordinate components. When SRTM DEM was used, the RMSE vector was about 11.2m. On the other hand, when NGII DEM was used, the RMSE vector was about 7.8 m. The experimental results showed that automated geo-positioning approach can be accomplished more effectively by using NGII DEM with higher resolution than SRTM DEM.

A Performance Evaluation of a RISC-Based Digital Signal Processor Architecture (RISC 기반 DSP 프로세서 아키텍쳐의 성능 평가)

  • Kang, Ji-Yang;Lee, Jong-Bok;Sung, Won-Yong
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.36C no.2
    • /
    • pp.1-13
    • /
    • 1999
  • As the complexity of DSP (Digital Signal Processing) applications increases, the need for new architectures supporting efficient high-level language compilers also grows. By combining several DSP processor specific features, such as single cycle MAC (Multiply-and-ACcumulate), direct memory access, automatic address generation, and hardware looping, with a RISC core having many general purpose registers and orthogonal instructions, a high-performance and compiler-friendly RISC-based DSP processors can be designed. In this study, we develop a code-converter that can exploit these DSP architectural features by post-processing compiler-generated assembly code, and evaluate the performance effects of each feature using seven DSP-kernel benchmarks and a QCELP vocoder program. Finally, we also compare the performances with several existing DSP processors, such as TMS320C3x, TMS320C54x, and TMS320C5x.

  • PDF