• Title/Summary/Keyword: Research Information Systems

Search Result 12,220, Processing Time 0.047 seconds

For the Protection of Infant Life Development and Support of Social-Linked App

  • Yoon Soo Lee
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.261-268
    • /
    • 2024
  • This study focused on social connection apps and support among various measures to prevent 'killing and abandonment of infants', which has recently become a social issue. The research method attempted to show the necessity of a social-linked app by analyzing the contents of 12 cases with peculiarities in the infant murder process in the judgment after 2021. Infanticide mothers were found to be economically and socially vulnerable, and they killed infants to continue their lives. Focusing on the mind of human respect rather than the judicial meaning of punishing crime, the development of social connection apps and support services that allow both mothers and infants to be healthy and socially protected were proposed. The first is a great transformation of economic support and awareness for pregnancy, childbirth, and parenting. Second, it is necessary to develop a confidentiality counseling and information app that can comprehensively support medical directions and social welfare in consideration of the health status of the fetus and women and the socio-economic situation. Third, it is proposed to promote the use of the Internet such as joint childcare facilities of social communities, child protection institutions, and adoption systems. The government should investigate the reasons for not being able to register birth, the root causes of killing and abandonment of infants, and come up with practical plans and policies for them.

Analytic Hierarchy Process for Prioritizing Radiation Safety Measures in Medical Institutions

  • Hyun Suk Kim;Heejeong Jeong;Hyungbin Moon;Sang Hyun Park
    • Journal of Radiation Protection and Research
    • /
    • v.49 no.1
    • /
    • pp.40-49
    • /
    • 2024
  • Background: This study aimed to prioritize policy measures to improve radiation safety management in medical institutions using the analytic hierarchy process. Materials and Methods: It adopted three policy options-engineering, education, and enforcement-to categorize safety management measures, the so-called Harvey's 3Es. Then, the radiation safety management measures obtained from the current system and other studies were organized into action plan categories. Using the derived model, this study surveyed 33 stakeholders of radiation safety management in medical institutions and analyzed the importance of each measure. Results and Discussion: As a result, these stakeholders generally identified enforcement as the most important factor for improving the safety management system. The study also found that radiation safety officers and medical physicists perceived different measures as important, indicating clear differences in opinions among stakeholders, especially in improving quality assurance in radiation therapy. Hence, the process of coordination and consensus is likely to be critical in improving the radiation safety management system. Conclusion: Stakeholders in the medical field consider enforcement as the most critical factor in improving their safety management systems. Specifically, the most crucial among the six specific action plans was the "reinforcement of the organization and workforce for safety management," with a relative importance of 25.7%.

A Study of the Safety Facilities Operation Strategies for Performing Arts Workers Evacuation (공연종사자 피난을 위한 안전시설의 운영전략 연구)

  • Sung-Hak Chung;Yong-Gyu Park
    • Journal of the Korea Safety Management & Science
    • /
    • v.26 no.1
    • /
    • pp.63-74
    • /
    • 2024
  • The objectives of this study is to classify evacuation types, derive the characteristics of 4 types, develop and discover evacuation routes within the performance hall space, and present the statistical classification results of the evacuation classification model by classification type. To achieve this purpose, the characteristics of each evacuation type's four types are applied through a network reliability analysis method and utilized for institutional improvement and policy. This study applies for the building law, evacuation and relief safety standards when establishing a performance hall safety management plan, and reflects it in safety-related laws, safety standards, and policy systems. Statistical data by evacuation type were analyzed, and measurement characteristics were compared and analyzed by evacuation types. Evaluate the morphological similarity and reliability of evacuation types according to door width and passage length and propose the install position of evacuation guidance sign boards. The results of this study are expected to be used as basic data to provide operation strategies for safety facility evacuation information sign boards according to evacuation route classification types when taking a safety management plan. The operation strategy for the evacuation sign boards installation that integrates employee guidance and safety training is applied to the performance hall safety management plan. It will contribute to establishing an operational strategy for performance space safety when constructing performance facilities in the future.

Research on Comparing the Size of the Data Workforce Across Countries (국가간 데이터직무 인력 규모 비교 연구)

  • Hyemi Um
    • Journal of Information Technology Applications and Management
    • /
    • v.31 no.1
    • /
    • pp.79-95
    • /
    • 2024
  • In modern society, as data plays a crucial role at the levels of businesses, industries, and nations, the utilization of data becomes increasingly important. Consequently, governments are prioritizing the development and implementation of plans to cultivate data workforce, viewing the data industry as a cornerstone of national strategy. To enhance domestic capabilities and nurture workforce in the data industry, it is deemed necessary to conduct an objective comparative analysis with major foreign countries. Therefore, this study aims to analyze cases of domestic and international data industries and explore methods for quantitatively comparing data industry workforce across nations. Initially, the study distinguishes between "data industry workforce" and "data job-related workforce," particularly focusing on professionals handling data-related tasks. Subsequently, it compares the workforce sizes of data job-related workforce across nations, utilizing standardized occupational classification codes based on the International Standard Classification of Occupations(ISCO). However, it should be noted that countries employing their own unique occupational classification systems often require matching job titles with similar meanings for accurate comparison. Through this study, it is anticipated that policymakers will be able to establish future directions for cultivating data workforce based on comparable status.

Real-time online damage localisation using vibration measurements of structures under variable environmental conditions

  • K. Lakshmi
    • Smart Structures and Systems
    • /
    • v.33 no.3
    • /
    • pp.227-241
    • /
    • 2024
  • Safety and structural integrity of civil structures, like bridges and buildings, can be substantially enhanced by employing appropriate structural health monitoring (SHM) techniques for timely diagnosis of incipient damages. The information gathered from health monitoring of important infrastructure helps in making informed decisions on their maintenance. This ensures smooth, uninterrupted operation of the civil infrastructure and also cuts down the overall maintenance cost. With an early warning system, SHM can protect human life during major structural failures. A real-time online damage localization technique is proposed using only the vibration measurements in this paper. The concept of the 'Degree of Scatter' (DoS) of the vibration measurements is used to generate a spatial profile, and fractal dimension theory is used for damage detection and localization in the proposed two-phase algorithm. Further, it ensures robustness against environmental and operational variability (EoV). The proposed method works only with output-only responses and does not require correlated finite element models. Investigations are carried out to test the presented algorithm, using the synthetic data generated from a simply supported beam, a 25-storey shear building model, and also experimental data obtained from the lab-level experiments on a steel I-beam and a ten-storey framed structure. The investigations suggest that the proposed damage localization algorithm is capable of isolating the influence of the confounding factors associated with EoV while detecting and localizing damage even with noisy measurements.

An efficient dual layer data aggregation scheme in clustered wireless sensor networks

  • Fenting Yang;Zhen Xu;Lei Yang
    • ETRI Journal
    • /
    • v.46 no.4
    • /
    • pp.604-618
    • /
    • 2024
  • In wireless sensor network (WSN) monitoring systems, redundant data from sluggish environmental changes and overlapping sensing ranges can increase the volume of data sent by nodes, degrade the efficiency of information collection, and lead to the death of sensor nodes. To reduce the energy consumption of sensor nodes and prolong the life of WSNs, this study proposes a dual layer intracluster data fusion scheme based on ring buffer. To reduce redundant data and temporary anomalous data while guaranteeing the temporal coherence of data, the source nodes employ a binarized similarity function and sliding quartile detection based on the ring buffer. Based on the improved support degree function of weighted Pearson distance, the cluster head node performs a weighted fusion on the data received from the source nodes. Experimental results reveal that the scheme proposed in this study has clear advantages in three aspects: the number of remaining nodes, residual energy, and the number of packets transmitted. The data fusion of the proposed scheme is confined to the data fusion of the same attribute environment parameters.

Technology Acceptance Model for Direct-to-Consumer Genetic Testing Service (소비자대상직접시행 유전자검사서비스의 기술수용모델)

  • Hyunjin Choi;Daecheol Kim
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.47 no.3
    • /
    • pp.191-201
    • /
    • 2024
  • The purpose of this study is to identify factors that influence consumers' acceptance intentions towards Direct-to-Consumer (DTC) Genetic Testing service. DTC genetic testing service can be considered in two aspects: the application of new technology in genetic testing customers can directly purchase and the services for receiving the test results customer can't directly analyze. Existing technology-based acceptance models have difficulty fully explaining consumers' acceptance intentions towards DTC genetic testing services. Therefore, this study aims to propose a new acceptance model considering these two characteristics. A survey was conducted with 377 potential consumers for this research. The analysis revealed that health interest, prior knowledge, subjective norms, innovativeness, perceived usefulness, and perceived value affect consumers' acceptance intentions. The results obtained through this study can help establish strategies and marketing plans necessary for the diffusion of services, such as DTC genetic testing services, that combine a new technology and a service. In the long term, the accumulated DTC genetic testing results data can contribute to the development of national genetic information infrastructure and preventive medical applications, as well as improve individuals' quality of life.

Strategies for Cybersecurity in Universities from Institutional and Technical Perspectives (대학 내 사이버 보안을 위한 제도·기술적 관점에서의 전략)

  • Ki-Ho Lee;Yong-Joon Lee
    • Convergence Security Journal
    • /
    • v.24 no.3
    • /
    • pp.187-193
    • /
    • 2024
  • With the advancement of AI and IoT, cybersecurity threats have increased dramatically. As the methods and objectives of cyber-attacks evolve, universities, like all major industries, are facing serious cybersecurity issues. Universities hold vast amounts of sensitive information such as students' personal data, research data, and intellectual property, making them prime targets for cyber threats. Therefore, this paper aims to present cybersecurity strategies from both institutional and technical perspectives to help university leaders and policymakers enhance their cybersecurity posture. The study reviews current trends through the flow of cyber-attacks and proposes governance, policy development, risk management, and the establishment of FIDO and AI-based security systems to respond to the increase in sophisticated threats such as ransomware and AI-based malware.

A Study on the the U.S. military's STE case and Research on application methods to the South Korean military (미군의 STE 사례 분석과 한국군 적용방안 연구)

  • Jungsub Lee;Yeonseung Ryu;Changgeun Son
    • Journal of The Korean Institute of Defense Technology
    • /
    • v.6 no.1
    • /
    • pp.7-12
    • /
    • 2024
  • In March 2023, the Ministry of National Defense highlighted the Synthetic Training Environment (STE) platform for practical training of combatants between training exercises in its Defense Innovation 4.0 Basic Plan. However, there are many issues to be resolved, such as the use of different simulators and terrain information systems for each military. Therefore, this study examined the cases of the U.S. Army, Air Force, and Navy, each of which has an advanced synthetic training environment, to derive suggestions for the ROK military.

  • PDF

Research on the Necessity and Measures for Protecting Local Storage Data of Homecam Devices

  • Ga. Hyeon. LEE;Hoon. Jae. Lee
    • International journal of advanced smart convergence
    • /
    • v.13 no.3
    • /
    • pp.13-17
    • /
    • 2024
  • The local storage method for home cameras, which relies on inserting an SD card into the device to store data, offers a convenient and cost-effective solution, as there are no recurring expenses after purchasing the SD card. However, we recognize that this method comes with significant security challenges. In particular, the ease with which third parties can access the SD card makes it vulnerable to both physical and software tampering. As the acceptance rate of home camera footage as evidence in courts has increased, we have become increasingly aware of the critical nature of these security issues. Digital data from home cameras, unlike other types of physical evidence, can be more easily tampered with and altered. To ensure that such data is recognized as valid legal evidence, we must prove its integrity and demonstrate that it has not been tampered with. In response to these challenges, we are committed to strengthening the security measures for both the home camera device and its local storage. By doing so, we aim to ensure the integrity and reliability of the data, thereby enhancing the overall security and trustworthiness of home camera systems.