• Title/Summary/Keyword: Private Technical

Search Result 300, Processing Time 0.029 seconds

Design of the Template System for Cyber Education (사이버교육을 위한 기반구조 시스템의 설계)

  • 허미영;이종화;김용진;진병문
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.12B
    • /
    • pp.2225-2232
    • /
    • 1999
  • We designed the template system for cyber education, which is a software infrastructure for knowledge information society. First, we defined the common functions of our system based on the design principles of cyber education and working results of international standardization group. Second, we think that template system will make a big role in order to deploy the cyber education system. Therefore, we designed the template system for cyber education. Our designed template system is able to implement cyber education system easily such as normal education, technical education, re-education, private education etc. Therefore, This paper describes the practical use environment, configuration of system components, design technique, expected effects on our cyber education template system.

  • PDF

An Analysis on the Korean Rural Health Care Delivery System (농촌의료(農村醫療)의 문제점(問題點)과 대책(對策) - 의료제도(醫療制度)를 중심(中心)으로-)

  • Song, Oh-Dal
    • Journal of agricultural medicine and community health
    • /
    • v.2 no.1
    • /
    • pp.30-35
    • /
    • 1977
  • Health care conditions in Korea are gradually improving along with the economic and social development. However, the volume of disease is still great, especially in rural areas. This study attempts, therefore, to initiate a comprehensive proposal of rural health care delivery system. The proposal is constructed three parts, problem of health care system, medical cost, medical education system. The proposal consist of the following components: I. The health care system 1. health sub-center is required to be locate in "Myun" the basis administrative unit of local government for delivering primary health care. But, in the viewpoint of medical economics, the primary health care is operated cautiously. 2. Health center is desirable to provide health services in coordinating the health sub-center and other private health institution. 3. The secondary health care is performed in regional combination hospitals, and the attitude that doctors accomodate this system is required. II. The medical cost, Insurance In the expenditure of medical care, the method of a third person's payment is required absolutely. III. The medical education system. 1. The medical education system (process) is changed from the medical education to regional doctor education. 2 In the nurse education system. nursing technical high school is resurrected.

  • PDF

A Seamless Lawful Interception Architecture for Mobile Users in IEEE 802.16e Networks

  • Lee, Myoung-Rak;Lee, Taek;Yoon, Byung-Sik;Kim, Hyo-Gon;In, Hoh Peter
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.626-633
    • /
    • 2009
  • Lawful interception (LI) involves legally accessing private communication such as telephone calls or email messages. Numerous countries have been drafting and enacting laws concerning the LI procedures. With the proliferation of portable Internet services such as the IEEE 802.16e wireless mobile networks, surveillance over illegal users is an emerging technical issue in LI. The evermigrating users and their changing IP's make it harder to provide support for seamless LI procedures on 802.16e networks. Few studies, however, on seamless LI support have been conducted on the 802.16e mobile networks environments. Proposed in this paper are a seamless LI architecture and algorithms for the 802.16e networks. The simulation results demonstrate that the proposed architecture improves recall rates in intercepting mobile user, when compared to the existing LI architectures.

A Study on Access Authorization Inference Modes for Information Security of Specialized Private Networks (특성화 사설 네트워크 정보보호를 위한 접근권한 추론모드에 관한 연구)

  • Seo, Woo Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.99-106
    • /
    • 2014
  • The most significant change and trend in the information security market in the year of 2014 is in relation to the issue and incidents of personal information security, which leads the area of information security to a new phase. With the year of 2011 as the turning point, the security technology advanced based on the policies and conditions that combine personal information and information security in the same category. Such technical changes in information security involve various types of information, rapidly changing security policies in response to emerging illegal techniques, and embracing consistent changes in the network configuration accordingly. This study presents the result of standardization and quantification of external access inference by utilizing the measurements to fathom the access authorization performance in advance for information security in specialized networks designed to carry out certain tasks for a group of clients in the easiest and most simple manner. The findings will provide the realistic data available with the access authorization inference modes to control illegal access to the edge of a client network.

Enhanced Standardization Process and Reform Discussions in ITU-T (ITU의 정보통신표준화 절차 개선과 개혁 논의)

  • Sohn, Hong;Song, Gi-Pyeung;Park, Ki-Shik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.532-536
    • /
    • 2001
  • In responding to rapid technological change, ITU standardization activities is changing. For example, ITU-T has established new approval process for technical Recommendations, named Alternative Approval Process. This process shortens standard approval period form 9 months to 2 months. In this paper, we analyze the new approval process, AAP, step by step. And finally, we discuss .ITU reform issues such as decision making right of private industry organizations which is ongoing.

  • PDF

Present Condition and Direction of Improvement for Future Technology on the Prevention and Reclamation of Mining Induced Subsidences (지반침하 방지기술의 현황 및 발전방향)

  • Bang, Ki Mun
    • Tunnel and Underground Space
    • /
    • v.27 no.6
    • /
    • pp.377-386
    • /
    • 2017
  • This study was carried out to predict the future technology on the prevention and reclamation of mining induced subsidences in Korea. We summarized the technical improvement of ground surveys and investigation, ground stability assessment, ground reinforcement, ground monitoring system and so on. It is essential to improve the technology that we try to collect and review all the data that is implemented on the site of mined area in Korea and collaborate all the members of public and private business sectors. We, also, try to expand our business area to related industry such as tunnelling, civil infrastructure, underground environmental assessment etc, and continue to develop oversea's market.

IT Architecture: Is It a Brand-new Paradigm? (IT 아키텍처, 과연 새로운 접근방법인가?: 미국과 국내 사례의 비교분석을 중심으로)

  • Jang, Si-Young;Lee, Chung-Seop;Choi, Young-Jin
    • Information Systems Review
    • /
    • v.4 no.2
    • /
    • pp.59-80
    • /
    • 2002
  • Today the theme of "IT Architecture" has become a topic of special interest in both public and private sectors. Based on the literature survey on information systems planning and information architecture, IT architecture may be viewed as the outcome of evolution, rather than revolution. A case study was conducted in order to compare the tasks and deliverables of U.S. IT architecture and Korean Information Strategy Planning. No significant differences were found in tasks or deliverables. Implications of the study were discussed.

Technology for the Multi-layer Nanoimprint Lithography Equipments and Nanoscale Measurement (다층 나노임프린트 리소그래피 시스템 및 나노측정기술)

  • Lee, JaeJong;Choi, KeeBong;Kim, GeeHong;Lim, HyungJun
    • Vacuum Magazine
    • /
    • v.2 no.1
    • /
    • pp.10-16
    • /
    • 2015
  • With the recognition of nanotechnology as one of the future strategic technologies, the R&D efforts have been performed under exclusive supports of governments and private sectors. At present, nanotechnology is at the focus of research and public attention in almost every advanced country including USA, Japan, and many others in EU. Keeping tracks of such technical trends, center for nanoscale mechatronics and manufacturing (CNMM) was established in 2002 as a part of national nanotechnology promotion policy led by ministry of science and technology (MOST) in Korea. It will hold widespread potential applications in electronics, optical electronics, biotechnology, micro systems, etc, with the promises of commercial visibility and competitiveness. In this paper, wafer scale multilayer nanoimprint lithography technology which is well-known the next generation lithography, roll-typed nanoimprint lithography (R-NIL), roll-typed liquid transfer imprint lithography (R-LTIL), the key technology for nanomanufacturing and nanoscale measurement technology will be introduced. Additionally, its applications and some achievements such as solar cell, biosensor, hard disk drive, and MOSFET, etc by means of the developed multilayer nanoimprint lithography system are introduced.

Research on Naval Weapons Systems MRO by analyzing Aerospace MRO Industry (항공 MRO 산업 사례를 통한 해군 무기체계 정비방안 고찰)

  • Oh, Kyungwon;Choi, Heonnsik;Kong, Changduk;Park, Hyunbum
    • Journal of Aerospace System Engineering
    • /
    • v.8 no.2
    • /
    • pp.14-20
    • /
    • 2014
  • MRO is important concept in military logistics. It is required to reforming military budget and manpower because of decreasing troops and other factors. For this reason, military logistics needs to change and improvement. MRO is necessary concept in this situation. In that case, How improve Naval Weapons Systems MRO for this changing time? For example, ROK air force applies Aerospace MRO industries in their Weapons Systems. But, ROK navy's MRO concept is uncertain and current MRO is divided just three step, Organizational Maintenance, Field Maintenance, Depot Maintenance. So it is time to develop systematic MRO concept for improving Naval Weapons Systems and Logistics. In this research, This0 study is about expanded application of PBL and the need to make relationship between Private enterprise and Military.

Privacy and Security on the Web (웹에서의 개인정보보호 방안)

  • Woo, Sung-hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.657-660
    • /
    • 2013
  • The Internet is referred as sea of information, which provides huge information, but personal information is collected for malicious behavior and provided to various web sites via internet. This can lead to economic losses as well as the disclosure of personal information. We can easily get personal information from device, such as mobile and private terminal, as well as internet, and then it can be spread very quickly. The personal information leakage and damage cases are also increasing, while the importance of personal information on the web page to distinguish the individual as the basic information is growing. In this paper we review and analyse recent invasion of privacy practices on the web and its causes, and technical and administrative protections.

  • PDF