• Title/Summary/Keyword: Physical security

Search Result 1,047, Processing Time 0.027 seconds

A Qualitative Study on Successful Aging and Optimization by Selection and Compensation Strategy: Focusing on the Social Activity Elderly Participants (성공적 노화와 선택과 보상 책략에 의한 최적화의 질적 연구: 사회 활동 참여 노인을 중심으로)

  • Cho, Yoon-Joo
    • Journal of the Korean Home Economics Association
    • /
    • v.48 no.6
    • /
    • pp.133-147
    • /
    • 2010
  • This study aimed to identify the dimensions of successful aging, as perceived by elderly Koreans, and to test qualitatively the elders' optimization of selection and compensation strategies in a social activity context. The results were as follows: First, the most important part of life fulfillment and regret was family and work. Second, social activity played a role in self-actualization and physiological needs. Moreover, it contributed to the elders' physical and mental health maintenance. Third, the elderly effectively participated in social activities by optimizing their selection and compensation strategies. Fourth, the elderly realized they are growing old, but considered it as a natural process. In addition, some participants suggested retirement age should be raised, but others were against this idea. Finally, elders thought successful aging means having a sufficient and independent life in old age. Thus, the elderly required good health, economic security, and a positive attitude for aging successfully.

An Empirical Analysis of the Impact of the Institution-based Trust Factors on the Survival of E-commerce Companies in Korea (제도기반 신뢰요소가 한국 전자상거래 기업의 생존에 미치는 영향에 관한 실증 분석 연구)

  • Park, Sho Yun;Kim, Seung Hyun
    • Knowledge Management Research
    • /
    • v.20 no.4
    • /
    • pp.131-148
    • /
    • 2019
  • E-commerce in Korea has grown steadily in recent years. E-commerce has provided firms with an effective method to approach potential customers by overcoming geographical and physical barriers. However, despite the rapid growth, many e-commerce businesses closed their businesses and were not able to survive. This study aims to empirically examine the factors that determine the survival of e-commerce businesses in Korea. In particular, this study focuses on the factors related to the notion of institution-based trust that includes delivery, privacy, and security management. This research used the data set about 31,295 e-commerce businesses that have been registered in Seoul. We found that the e-commerce business that does not require extra personal information beyond the standard terms and conditions or provides a feedback mechanism by having an online board to submit a complaint has a higher chance of survival. In addition, the e-commerce business that has a secured web server, shows the specific information about the date of delivery, or provides escrow services is likely to survive longer than others. The research has extended the extant literature on the importance of trust in e-commerce by empirically examining the effects of the institution-based trust factors on the actual survival of e-commerce businesses.

Digital Voice Ground Wave Range Analysis of HF Radios that Applied MELPe CODEC Using GRWAVE Program (MELPe 코덱이 적용된 HF 무전기의 GRWAVE 분석 툴을 이용한 디지털 음성 지상파 통달거리 분석)

  • Heo, Jin;Lee, Sangjin;Lee, Kangchun;Seo, Sungwon;Kim, Jungsup;Han, Sungwoo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.3
    • /
    • pp.431-440
    • /
    • 2017
  • HF communications are used as a last means of long distance communications without any relay node in NLOS (Non Line-Of-Sight) environment. Conventional analog voice communication in the HF band is vulnerable to security as well as severe background noise. To overcome these shortcoming, digital voice was introduced into HF radios in the early 1980s. In this paper, we analyze avaliable digital voice communication ground wave range of HF radios that applied MELPe CODEC and MIL-STD-188-110B physical layer standard using GRWAVE program. And we evaluate usefulness of digital voice communication in HF band.

Smart Services of the Bathroom Reflecting the Behavior Patterns of the Elderly (고령자 행위 패턴 기반 욕실의 지능형 서비스 패턴 개발)

  • Lee, HyunSoo;Jung, Ji Yea;Park, Sung Jun
    • Korean Institute of Interior Design Journal
    • /
    • v.22 no.1
    • /
    • pp.256-264
    • /
    • 2013
  • A bathroom in house has been stressed not only as a space for physiology and hygiene but also leisure and healthcare. However, the bathroom is the most likely space where an elderly person can have an accident and it is uncomfortable space for them because of their deteriorating physical ability. So the purpose of this study is to help the elderly use their bathroom conveniently by providing smart service. Therefore, we carry out 18 smart service patterns that contain assistive devices and sensors for bathroom. Considering applicability and frequency, from among these service patterns, we suggest 4 service patterns. First is a fall prevention service. This service helps elderly use the bathroom safely at night. Second is a getting ready to go out service. This service helps the situation that elderly use the bathroom after getting up in the morning. Third is a security service in daily life especially before or after meals. And final is a service regarding personal hygiene service after returning home. This service helps to shower or bathe after return home. These services have positive influence in medical expense reductions, good health care and self-reliance of elderly.

A Study of TRM and ATC Determination for Electricity Market Restructuring (전력산업 구조개편에 대비한 적정 TRM 및 ATC 결정에 관한 연구)

  • 이효상;최진규;신동준;김진오
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.53 no.3
    • /
    • pp.129-134
    • /
    • 2004
  • The Available Transfer Capability (ATC) is defined as the measure of the transfer capability remaining in the physical transmission network for further commercial activity above already committed uses. The ATC determination s related with Total Transfer Capability (TTC) and two reliability margins-Transmission Reliability Capability (TRM) and Capacity Benefit Margin(CBM) The TRM is the component of ATC that accounts for uncertainties and safety margins. Also the TRM is the amount of transmission capability necessary to ensure that the interconnected network is secure under a reasonable range of uncertainties in system conditions. The CBM is the translation of generator capacity reserve margin determined by the Load Serving Entities. This paper describes a method for determining the TTC and TRM to calculate the ATC in the Bulk power system (HL II). TTC and TRM are calculated using Power Transfer Distribution Factor (PTDF). PTDF is implemented to find generation quantifies without violating system security and to identify the most limiting facilities in determining the network’s TTC. Reactive power is also considered to more accurate TTC calculation. TRM is calculated by alternative cases. CBM is calculated by LOLE. This paper compares ATC and TRM using suggested PTDF with using CPF. The method is illustrated using the IEEE 24 bus RTS (MRTS) in case study.

A review of big data analytics and healthcare (빅데이터 분석과 헬스케어에 대한 동향)

  • Moon, Seok-Jae;Lee, Namju
    • Journal of the Korean Applied Science and Technology
    • /
    • v.37 no.1
    • /
    • pp.76-82
    • /
    • 2020
  • Big data analysis in healthcare research seems to be a necessary strategy for the convergence of sports science and technology in the era of the Fourth Industrial Revolution. The purpose of this study is to provide the basic review to secure the diversity of big data and healthcare convergence by discussing the concept, analysis method, and application examples of big data and by exploring the application. Text mining, data mining, opinion mining, process mining, cluster analysis, and social network analysis is currently used. Identifying high-risk factor for a certain condition, determining specific health determinants for diseases, monitoring bio signals, predicting diseases, providing training and treatments, and analyzing healthcare measurements would be possible via big data analysis. As a further work, the big data characteristics provide very appropriate basis to use promising software platforms for development of applications that can handle big data in healthcare and even more in sports science.

A Study of the Boring Bar Vibration Measurement using Optical Fiber Sensor (보링바 고유진동 계측을 위한 광섬유 진동센서 연구)

  • Song, Doo-Sang;Hong, Jun-Hee;Jeong, Hwang-Young;Kang, Dae-Hwa;Kim, Byung-In
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.26 no.4
    • /
    • pp.107-113
    • /
    • 2009
  • In this paper, we studied of measurement the vibration of natural frequency using optical fiber sensor. The boring bar for measurement of vibration in use optical fiber sensor has the advantage of direct measure for the frequency than accelerometer. Because it deal with output value on electrical signal of optical fiber in physical disturbance when it measures the frequency of vibration. The optical fiber sensor measured the vibration of boring bar by the gap in sensing jig while optical fiber just kept contact with boring bar. A prototype system was composed of jig part with gap and optical system part. In this paper, we found out the possibility to measurement of vibration by the gap in use optical fiber.

A wireless sensor network approach to enable location awareness in ubiquitous healthcare applications

  • Singh, Vinay Kumar;Lim, Hyo-Taek;Chung, Wan-Young
    • Journal of Sensor Science and Technology
    • /
    • v.16 no.4
    • /
    • pp.277-285
    • /
    • 2007
  • In this paper, we outline the research issues that we are pursuing towards building of location aware environments for mainly ubiquitous healthcare applications. Such location aware application can provide what is happening in this space. To locate an object, such as patient or elderly person, the active ceiling-mounted reference beacons were placed throughout the building. Reference beacons periodically publish location information on RF and ultrasonic signals to allow application running on mobile or static nodes to study and determine their physical location. Once object-carried passive listener receives the information, it subsequently determines it's location from reference beacons. The cost of the system was reduced while the accuracy in our experiments was fairly good and fine grained between 7 and 12 cm for location awareness in indoor environments by using only the sensor nodes and wireless sensor network technology. Passive architecture used here provides the security of the user privacy while at the server the privacy was secured by providing the authentication using Geopriv approach. This information from sensor nodes is further forwarded to base station where further computation is performed to determine the current position of object.

An Improved Two-Factor Mutual Authentication Scheme with Key Agreement in Wireless Sensor Networks

  • Li, Jiping;Ding, Yaoming;Xiong, Zenggang;Liu, Shouyin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5556-5573
    • /
    • 2017
  • As a main component of Internet of Things (IoTs), the wireless sensor networks (WSNs) have been widely applied to various areas, including environment monitoring, health monitoring of human body, farming, commercial manufacture, reconnaissance mission in military, and calamity alert etc. Meanwhile, the privacy concerns also arise when the users are required to get the real-time data from the sensor nodes directly. To solve this problem, several user authentication and key agreement schemes with a smart card and a password have been proposed in the past years. However, these schemes are vulnerable to some attacks such as offline password guessing attack, user impersonation attack by using attacker's own smart card, sensor node impersonation attack and gateway node bypassing attack. In this paper, we propose an improved scheme which can resist a wide variety of attacks in WSNs. Cryptanalysis and performance analysis show that our scheme can solve the weaknesses of previously proposed schemes and enhance security requirements while maintaining low computational cost.

Enhanced Operator Authentication Method in SCADA Control Network (SCADA제어망에서 강화된 운용자 인증 방안)

  • Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.12
    • /
    • pp.416-424
    • /
    • 2019
  • The authentication technologies used to access computers in both IT and operational technology (OT) network areas include ID/PW, public certificate, and OTP. These authentication technologies can be seen as reflecting the nature of the business-driven IT network. The same authentication technologies is used in SCADA control networks where the operational technology is centered. However, these authentication technologies do not reflect the characteristics of the OT control network environment, which requires strict control. In this paper, we proposed a new enhanced user authentication method suitable for the OT SCADA control network centered on control information processing, utilizing the physical terminal address and operator location information characteristics of the operator's mobile terminal and control network.