• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.027 seconds

Housing Improvement Elements Depended on the Analysis of Urban Residents' Perceived Korean Housing Quality Related to Mental Health (거주자가 지각한 정신건강 관련 주거의 질 분석에 기초한 주거 개선요소)

  • Choi, Byungsook;Park, Jung-A
    • Journal of the Korean housing association
    • /
    • v.24 no.6
    • /
    • pp.189-197
    • /
    • 2013
  • The purpose of the study was to analyze the improvement elements depended on housing quality measurement tool related to mental health. The data for the analysis was collected through questionnaire survey method from November 1, 2012 to January 17, 2013, and the sample consisted of 720 respondents living in single detached houses, multi-families detached houses, apartments, and town houses in 4 cities, Seoul, Busan, Daejeon, and Kwangju. The data were analyzed using descriptive statistics. The results of improvement elements are as follows: 1) Pedestrian-threaten street from cars in physical safety 2) A secluded or dark spot and fear of walking at night in social security, 3) Indoor noise, outdoor noise, and evidence of abandoned trash heap/bottle in neighborhood in health & sanitation, 4) Illegal parking and heating control system in facility convenience, 5) Extra kitchen, number of bathrooms, and community spaces in space convenience, 6) Openness and spaciousness of indoor room, and satisfaction of house and neighborhood in comfort, 7) Management common/sharing space in maintenance, 8) Energy saving facility and environment friendly materials use in sustainability, 9) Burden on housing cost, asset value on house, and school district in economic value, 10) Reflection of residents style, surrounding building's number of layers, and neighborhood appearance of preference in housing environment image.

Methodological Issues in Nursing Research using IT Technology: A Discussion Paper

  • Im, Eun-Ok;Chee, Wonshik
    • Research in Community and Public Health Nursing
    • /
    • v.30 no.4
    • /
    • pp.391-399
    • /
    • 2019
  • Purpose: Recent advances in computer and mobile technologies have brought increasing usages of IT technology in nursing research across nursing fields. Despite the increasing usages, there has been little discussion on methodological issues involved in nursing research using IT technology. This is a discussion paper to identify methodological issues in IT technology-based nursing research. Methods: An analysis was done using content analysis on research team meeting minutes and research team members' research diaries in a clinical trial that tested the efficacy of a technology-based intervention. First, several major categories of IT technology-based nursing research are concisely summarized. Then, the method that was used for this analysis is presented. Results: The findings are presented as themes reflecting methodological issues in IT technology-based research: (a) difficulties in recruitment due to necessary technology literacy; (b) facilitating recruitment through allowing the use of multiple languages; (c) participants' preferences for specific IT technology; (d) efforts needed to ensure technological security; (e) participants' preferences for design; and (f) necessary considerations on timing. Conclusion: Finally, future directions for nursing research using IT technology are proposed based on the identified issues.

Computing Method of Cross-Correlation of Non-Linear Sequences Using Subfield (부분체를 이용한 비선형 수열의 상호상관관계의 효율적인 계산방법)

  • Choi, Un-Sook;Cho, Sung-Jin;Kim, Seok-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.8
    • /
    • pp.1686-1692
    • /
    • 2012
  • Spreading sequence play an important role in wireless communications, such as in a CDMA(code division multiple access) communication system and multi-carrier spectrum communication system. Spreading sequences with low cross-correlation, in a direct-sequence spread spectrum communication system, help to minimize multiple access interference and to increase security degree of system. Analysis of cross-correlations between the sequences is a necessary process to design sequences. However it require lots of computing time for analysis of cross-correlations between sequences. In this paper we propose a method which is possible to compute effectively cross-correlation using subfield in the process of practical computation of cross-correlation between nonlinear binary sequences.

An Authentication Protocol Design in RFID System for Mobility (유동성을 지닌 RFID 시스템을 위한 인증 프로토콜 설계)

  • Kim, Young-Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.1
    • /
    • pp.122-128
    • /
    • 2010
  • RFID is method used on wireless system. However, this mechanism is not used for authentication and security. Therefore, it is very vulnerable to attacks such as dropping attacks and traffic attacks. the RFID Tags are of the limited nature due to environment factors and there is greater constraints in designing authentication protocol. If we do not RFID to secure corporate information and product all the information will be exposed. The attacker will break into the RFID system and stop the distribution system. So, this paper proposes a new authentication protocol which provides not only unlimited access to Tag and Reader of mobile and connection between Tag and Reader bet also provides authentication mechanism by defining the key distribution.

Digital Control Unit Design for Power Amplifier Performance Improvement (전력증폭기 성능개선을 위한 디지털 제어장치 설계)

  • Lee, Byung-Sun;Roh, Hee-Jung
    • 전자공학회논문지 IE
    • /
    • v.47 no.4
    • /
    • pp.34-38
    • /
    • 2010
  • In this paper, we suggest DCU(Digital Control Unit) for performance improvement and stability security of base station power amplifier. The designed DCU controls electric power that is supplied to power amplifier. When the regular input is 10dBm, the regular output is measured 47.8dBm and the results are compared between the case of the applying and the non-applying the DCU. We got the result that PA system is very stable as DCU are very well operating in the boundary degradation of IMD by the over-power level input.

Preschooler's Behavior Problems and Relating Factors in Poverty Group (학령전기 빈곤 아동의 행동문제와 관련 요인)

  • Bang, Kyung-Sook
    • The Journal of Korean Academic Society of Nursing Education
    • /
    • v.15 no.2
    • /
    • pp.321-328
    • /
    • 2009
  • Purpose: The aim of this study was to examine the relationship between caregivers' child rearing characteristics including discipline method, child rearing confidence, attitude, burden, attachment, and cognitive stimulation and preschooler's behavior problems in poor, urban group. Method: A cross-section study design was used. Conveniently selected one hundreds and three preschool aged children and their caregivers who are under National Security Act were recruited. Data was collected using Korean Child Behavior Checklist (K-CBC) comprised of nine sub-dimensions and caregivers' self report questionnaires. Results: Caregivers' discipline method was associated with behavior problems of child. The internalizing and externalizing behavior problem scores including aggressive behavior of children who experienced spanking were significantly higher than children who did not. In addition, Caregivers' child rearing confidence also showed associations with the children's behavior problems. Child behavior problems showed positive relationships with caregivers' child rearing burden, and negative relationships with child rearing attitude, attachment, and cognitive stimulation. Conclusion: Caregivers' negative discipline methods and low child rearing confidence showed significant relationships with children's behavior problems of poor, urban children. Nurses working in primary care and community-based settings are in key positions to address this problem and improve the parenting attitude of low-income caregivers and positively affect the behavior of their children.

On Encryption of a Petri Net based Multi-Stage-Encryption Public-Key Cryptography

  • Ge, Qi-Wei;Chie Shigenaga;Mitsuru Nakata;Ren Wu
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.975-978
    • /
    • 2002
  • A new conception of public-key cryptography MEPKC, Petri net based Multi-stage-Encryption Public-Key Cryptography, has been proposed in onder to guarantee stronger network communication security. Different from an ordinary public-key cryptography that opens only a single public key to the public, MEPKC opens a key-generator that can generate multiple encryption keys and uses these keys to encrypt a plain text to a cipher text stage by stage. In this paper, we propose the methods how to carry out the encryption operations. First, we describe how to design a hash function H that is used to conceal the encryption keys from attack. Then, given with a key-generator (a Petri net supposed to possess a large number of elementary T-invariants), we discuss how to randomly generate a series of encryption keys, the elementary T-invariants. Finally, we show how to use these encryption keys to encrypt a plain text to a cipher text by applying a private key cryptography, say DES.

  • PDF

An Adaptive Agent Approach to Micropayment System

  • Chaiyarangkitrat, Surachai;Permpoontanalarp,Yongyuth
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.1331-1334
    • /
    • 2002
  • Micropayment is an electronic payment system for small value transaction. It needs to use a little amount of resources, such as communication and computation due to its small value. In other words, the processing cost for the micropayment must be less than the value of the payment. Several kinds of transactions are suitable for micropayment, eg. the purchasing of train tickets or digital newspapers. Since micropayment systems are designed for small-amount payment the key factor for any micropayment system design is believed to be the minimization of resource consumption without compromising the standard security. In this paper, we propose an adaptive agent approach to credit-based micropayment system, which employs the concept of dynamic balancing between the resource consumption and the risk in the system. As a result of the dynamic balancing, our system not only solves the problem of global overspending but also uses fewer amount of resources than existing approaches. Our approach limits the amount of money spent by untrusted customers to all merchants. Thus, our approach provides a boundary of the global overspending. In addition, for trusted customers, our approach requires less scale of communication for verifying authorizations than all existing approaches.

  • PDF

Design of Irrigation Pumping System Controller for Operational Instrument of Articulation (관절경 수술을 위한 관주(灌注)시스 (Irrigation Pumping System) 제어기의 개발)

  • 김민수;이순걸
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2003.06a
    • /
    • pp.1294-1297
    • /
    • 2003
  • With the development of medical field, many kinds of operations have been performed on human articulation. Arthroscopic surgery, which has Irrigation Pumping System for security of operator vision and washing spaces of operation, has been used for more merits than others. In this paper, it is presented that the research on a reliable control algorithm of the pumping system instrument for arthroscopic surgery. Before clinical operation, the flexible artificial articulation model is used for realizing the model the most same as human's and the algorithm has been exploited for it. This system is considered of the following; limited sensing point, dynamic effect by compliance, time delay by fluid flow and so on. The system is composed with a pressure controller, a regulator for keeping air pressure, an airtight tank that can have distilled water packs, artificial articulation and a measuring system, and has controlled by the feedback of pressure sensor on the artificial articulation. Also the system has applied to Smith Predictor for time delay and the parameter estimation method for the most suitable system with both the experiment data and modeling. In this paper, the pressure error that is between an air pressure tank and an artificial articulation was measured so that the system could be presumed and then the controller had developed for performing State-Feedback. Finally, the controller with a real microprocessor has realized. The confidence of system can be proved by applying this control algorithm to an artificial articulation experiment material.

  • PDF

An Efficient Blast Design using Reliability Index (신뢰성지수를 이용한 효율적인 발파설계)

  • 박연수;박선준;강성후
    • Journal of KSNVE
    • /
    • v.8 no.5
    • /
    • pp.821-831
    • /
    • 1998
  • The actual ground vibrations due to NATM and foundation blasting at Seoul(weathered rock), Pusan(weathered rock) and Youngkwang(quartz andesite) have been measured, and the data were analyzed using reliability index($\beta$) to determinate the vibration equations and the maximum charge weight for efficient blast. These were suggested with the division of ultimate limit state($\beta$=0), serviceability limit state($\beta$=1.28) and safety state($\beta$=3), respectively. The reliability index 0 mean 50% data line obtained by the least squares best-fit line. The reliability index 1.28 and 3 represent bounds below 90% and 99.9% of the data, respectively. In this study, reliability index $\beta$=1.28 with security and economy was suggested. The maximum charge weight equations for efficient blast were obtained in W=(Vc/384.90)1.5151.D3(Seoul), W=(Vc/579.82)1.4706.D3(Pusan). W=(Vc/1654.01)1.3456.D3(Youngkwang), and the blast vibration equatiions in V=385(SD)-1.98(Seoul), V=580(SD)-2.04(Pusan), V=1654(SD)-2.23(Youngkwang), respectively. From this study, inference and analysis methods of vibration equations using reliability theory were established.

  • PDF