• Title/Summary/Keyword: Security level management

Search Result 802, Processing Time 0.03 seconds

The Effect of Mental Health on the Health-Related Quality of Life among the Elderly in Busan (부산시 노인의 정신건강이 건강관련 삶의 질에 미치는 영향)

  • Kim, Mi-Jin;Song, Gab-Sun
    • Journal of Digital Convergence
    • /
    • v.18 no.5
    • /
    • pp.269-277
    • /
    • 2020
  • The purpose of this study is to identify the factors affecting Health-related Quality of Life of Elderly in Busan. Then this study would like to present basic data that can be used in research into specific measures to improve Health-related Quality of Life of Elderly in Busan. The subjects of this study were a total of 3452 elders aged 65 or higher in 2016 Community Health Survey. Data were analyzed using descriptive statistics, Mann-Whitney U test, Kruskal-Wallis test and multiple linear. The results showed that subjective health status perception, depression, stress, education level, the national basic livelihood security, sleep duration, BMI, Marital status, hypertension were found to be the influencing factors of subjective happiness and explained 28.8% of Health-related Quality of Life.

A Comparative Study on the Economics of Reprocessing and Direct Disposal of Nuclear Spent Fuel (사용후 핵연료의 제처리와 직접 처분의 경제성 비교 연구)

  • Kang, Seong-Ku;Song, Jong-Soon
    • Journal of Radiation Protection and Research
    • /
    • v.25 no.2
    • /
    • pp.89-96
    • /
    • 2000
  • Nuclear fuel cycle choices and costs are important in considering energy policies, fuel diversity, security of supply and associated social and environmental impacts. Particularly, the nuclear spent fuel is very important in view of high activity and the need of long term management. This study focuses on the comparison of reprocessing and direct disposal of nuclear spent fuel in terms of cost, safety and public acceptability. The results of the study show that the direct disposal is about 7% more economical than the reprocessing. In terms of safety, the results show that the risk of vitrified HLW (high-level radioactive waste) is less than directly disposed spent fuel. For the public acceptability, both of the methods are not well understood and therefore they are not accepted. In conclusion, it is necessary to guarantee the safety of the both spent fuel processing methods through continuous development of associated technology and to have a fuel cycle policy which should consider not only the economics but also social and environmental impacts.

  • PDF

Evaluation of Rainwater Utilization for Miscellaneous Water Demands in Different Types of Buildings Using Geographic Information System

  • Kim, Jinyoung;An, Kyoungjin;Furumai, Hiroaki
    • Environmental Engineering Research
    • /
    • v.18 no.2
    • /
    • pp.85-90
    • /
    • 2013
  • This study is an attempt to quantify rainwater utilization and miscellaneous water demand in Tokyo's 23 special wards, the core of the urban area in Tokyo, Japan, in order to elucidate the potential of further rainwater utilization. The rainwater utilization for miscellaneous appropriate water demands, including toilet flushing, air conditioning, and garden irrigation, were calculated for six different types of building: residential house, office, department store, supermarket, restaurant, and accommodation. Miscellaneous water demands in these different types of building were expressed in terms of equivalent rainfall of 767, 1,133, 3,318, 1,887, 16,574, and 2,227 (mm/yr), respectively, compared with 1,528 mm of Tokyo's average annual precipitation. Building types, numbers and its height were considered in this study area using geographic information system data to quantify miscellaneous water demands and the amount of rainwater utilization in each ward. Area precipitation-demand ratio was used to measure rainwater utilization potential for miscellaneous water demands. Office and commercial areas, such as Chiyoda ward, showed rainwater utilization potentials of <0.3, which was relatively low compared to those wards where many residential houses are located. This is attributed to the relatively high miscellaneous water demand. In light of rainwater utilization based on building level, the introduction of rainwater storage mechanisms with a storage depth of 50 mm for six different types of buildings was considered, and calculated as rainfall of 573, 679, 819, 766, 930, and 787 (mm), respectively. Total rainwater utilization using such storage facilities in each building from 23 wards resulted in the retention of 102,760,000 $m^3$ of water for use in miscellaneous applications annually, and this volume corresponded to 26.3% of annual miscellaneous water demand.

Implications of Five Laws of Library Science on Dr. S. R. Ranganathan's Colon Classification: An Explorative Study

  • Kumar, S.K. Asok;Babu, B. Ramesh;Rao, P. Nageswara
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.45 no.4
    • /
    • pp.309-326
    • /
    • 2011
  • There have been several milestones in the history of library classification but most of the schemes failed to meet the new challenges in the organisation of information. Dr. S. R. Ranganathan tried to revolutionise the whole thinking on classificatory approach, when he devised the Colon Classification (CC) in 1933. He developed the Colon Classification scheme with a sound theoretical background based on normative principles, Five laws of Library science, canons, etc. One important feature of CC is that, its use is not confined to information storage and retrieval alone. This paper presents an over view of different editions of the CC highlighting the salient features of the editions. Further the implication of Five Laws of Library Science has been described. The authors stressed that the features of such as greater hospitality, specificity and mixed notation has paved the way to design and develop the depth schedules on various micro level subjects and so far about 130 micro schedules have been published. The impressions by the leading LIS professionals during and after Ranganathan's time have been highlighted. The authors expressed the fear that when the library world would see the complete version of the seventh edition of CC? It may be due to lack of institutional support engaging in the research or financial constraints. The authors are of the opinion that any scheme to flourish needs a sound research body to bring out the revised editions as done in the case of Dewey Decimal Classification. The relevance of the CC in the contemporary world of Librarianship is discussed. Finally concludes that CC needs to be resuscitated as it is a precious national heritage; and still a force for the management of libraries.

Evaluation Criteria for Suitable Authentication Method for IoT Service Provider in Industry 4.0 Environment (4차 산업혁명 시대의 IoT 서비스 참여 주체에 대한 적합한 인증수단 선택을 위한 평가기준)

  • Jeong, Kwang Seob;Bae, Sukjoo;Kim, Hyoungtae
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.40 no.3
    • /
    • pp.116-122
    • /
    • 2017
  • Advances in information technology, communication and network technology are radically facilitating digital convergences as the integration of human, equipment, and space in the current industry 4.0 era. In industry 4.0 environment, the vast amount of information with networked computing technology can be simultaneously accessible even in limited physical space. Two main benefit points out of these information are the convenience and efficiency in their online transactions either buying things online or selling online. Even though there exist so many benefits that information technology can create for the people doing business over the internet there is a critical problem to be answered. In spite of many such advantages, however, online transactions have many dysfunctions such as personal information leakage, account hacking, and cybercrime. Without preparing the appropriate protection methods or schema people reluctantly use the transaction or would find some other partners with enhanced information security environment. In this paper we suggested a novel selection criteria that can be used to evaluate the reliable means of authentication against the expected risks under on-going IoT based environment. Our selection criteria consists of 4 steps. The first step is services and risk identification step. The second step is evaluation of risk occurrence step. The third step includes the evaluation of the extent of damage. And the final step is the assessment of the level of risk. With the help of the above 4 step-approach people can systematically identify potential risks hiding in the online transactions and effectively avoid by taking appropriate counter actions.

MPICH-GP : An MPI Extension to Supporting Private IP Clusters in Grid Environments (MPICH-GP : 그리드 상에서 사설 IP 클러스터 지원을 위한 MPI 확장)

  • Park, Kum-Rye;Yun, Hyun-Jun;Park, Sung-Yong;Kwon, Oh-Young;Kwon, Oh-Kyoung
    • The KIPS Transactions:PartA
    • /
    • v.14A no.1 s.105
    • /
    • pp.1-14
    • /
    • 2007
  • MPICH-G2 is an MPI implementation to solve complex computational problems by utilizing geographically dispersed computing resources in grid environments. However, the computation nodes in MPICH-G2 are exposed to the external network due to the lack of supporting the private IP clusters, which raises the possibility of malicious security attacks. In order to address this problem, we propose MPICH-GP with a new relay scheme combining NAT(Network Address Translation) service and an user-level proxy. The proxy running on the front-end system of private IP clusters forwards the incoming connection requests to the systems inside the clusters. The outgoing connection requests out of the cluster are forwarded through the NAT service on the front-end system. Through the connection path between the pair of processes, the requested MPI jobs can be successfully executed in grid environments with various clusters including private IP clusters. By simulations, we show that the performance of MPICH-GP reaches over 80% of the performance of MPICH-G2, and over 95% in ease of using RANK management method.

A Study of IWRM Guideline Application at River Basin Level (유역 수준 통합수자원관리 가이드라인의 적용방안 연구)

  • Lee, Jong-Keun;Park, Sung-Je;Yi, Young-Kune;Kim, Jae-Joon
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2010.05a
    • /
    • pp.411-415
    • /
    • 2010
  • 통합수자원관리(Integrated Water Resource Management, 이하 IWRM)는 물관리에 대한 시각을 기존의 지역개발이나 수자원개발이라는 관점에서 생태계 회복 및 종합적인 자원관리라는 관점으로 전환된 개념이다. 통합수자원관리 기법의 적용은 기후변화에 대한 물 안보(Water security) 확보 측면에서도 긍정적인 역할이 기대되고 있다. 국내의 IWRM에 관련한 연구는 수자원의 지속적 확보기술 개발 사업단을 비롯한 다양한 기관과 학술단체에서 지속적인 연구가 이루어져 왔다. 기후변화에 의한 영향과 이에 대한 물 안보 측면에서 정책 및 관리 측면에서의 제도적인 IWRM 도입은 추진전략의 방향설정이 우선되어야 할 것이다. 하지만, 기존의 연구에서는 기술의 적용 및 추진 전략체계 등에 있어 많은 연구가 진행되지 않은 것이 현실이다. 해당 연구는 2009년 세계 물 포럼에서 제시된 유역수준의 통합수자원관리 가이드라인의 체계를 분석하였다. 해당 가이드라인 Part 1의 '원칙'과 Part 2-1의 '통합수자원관리의 조정을 위한 가이드라인'에 대한 분석을 통하여, 유역단위 적용을 위한 기존 관리체계의 개선 및 적용 프로세스, 그리고 관리조직의 구성과 조정 방침에 대한 전반적인 내용을 정리하였다. 해당 결과는 기존 우리나라 물관리체계의 문제점을 바탕으로 적용 프로세스 등과 같은 실제 적용전략의 방향을 제시하는데 활용되었다. 실제 적용 프로세스 도출은 위해 각 국가별 사례의 특징 및 문제점을 각 사례의 비교분석을 통해 수행하였다. 통합수자원관리 방안은 수자원 분야에서의 적응능력을 개선하는 효과를 가진 대안이다. 본 연구의 결과가 통해 앞으로 생산되는 다양한 물관리 기법 및 적용 방안들이 보다 효율적인 IWRM을 실현할 수 있는 자료로서 활용되기를 기대한다.

  • PDF

A Spatial Transformation Scheme Supporting Data Privacy and Query Integrity for Outsourced Databases (아웃소싱 데이터베이스에서 데이터 프라이버시 및 질의 무결성을 지원하는 공간 변환 기법)

  • Kim, Hyeong-Il;Song, Young-Ho;Chang, Jaewoo
    • Journal of KIISE
    • /
    • v.42 no.5
    • /
    • pp.652-663
    • /
    • 2015
  • Due to the popularity of location-based services, the amount of generated spatial data in daily life has been dramatically increasing. Therefore, spatial database outsourcing has become popular for data owners to reduce the spatial database management cost. The most important consideration in database outsourcing is meeting the privacy requirements and guarantying the integrity of the query result. However, most of existing database transformation techniques do not support both of the data privacy and integrity of the query result. To solve this problem, we propose a spatial data transformation scheme that utilizes the shearing transformation with rotation shifting. In addition, we described the attack models to measure the data privacy of database transformation schemes. Finally, we demonstrated through the experimental evaluations that our scheme provides high level of data protection against different kinds of attack models, compared to the existing schemes, while guaranteeing the integrity of the query result sets.

Fuzzy Deterministic Relations (퍼지 디터미니스틱 관계)

  • Sung, Yeoul Ouk;Lee, Hyun Kyu;Yang, Eunmok
    • Journal of Digital Convergence
    • /
    • v.19 no.10
    • /
    • pp.377-382
    • /
    • 2021
  • A fuzzy relation between X and Y as fuzzy subset of X × Y was proposed by Zadeh. Subsequently, several researchers have applied the notion of fuzzy subsets to various branches of mathematics and computer sciences. Murali an Nemitz have studied fuzzy relations connected with fuzzy equivalence relations and fuzzy functions. Ounalli and Jaoua defined a fuzzy difunctional relation on a set. difunctional relations are versatile mathematical tool, which can be used in software design and in database theory. Their work have revealed the usefulness of difunctional relations in program specification and in defining program correctness. The main goal of this paper is to define a fuzzy deterministic relation on a set, characterize the fuzzy deterministic relation as its level subsets and investigate some properties in connection with fuzzy deterministic relation. In particular we prove that a fuzzy relation R is fuzzy deterministic iff R is a fuzzy function.

Case Analysis for Introduction of Machine Learning Technology to the Mining Industry (머신러닝 기술의 광업 분야 도입을 위한 활용사례 분석)

  • Lee, Chaeyoung;Kim, Sung-Min;Choi, Yosoon
    • Tunnel and Underground Space
    • /
    • v.29 no.1
    • /
    • pp.1-11
    • /
    • 2019
  • This study investigated use cases of machine learning technology in domestic medical, manufacturing, finance, automobile, urban sectors and those in overseas mining industry. Through a literature survey, it was found that the machine learning technology has been widely utilized for developing medical image information system, real-time monitoring and fault diagnosis system, security level of information system, autonomous vehicle and integrated city management system. Until now, the use cases have not found in the domestic mining industry, however, several overseas projects have found that introduce the machine learning technology to the mining industry for improving the productivity and safety of mineral exploration or mine development. In the future, the introduction of the machine learning technology to the mining industry is expected to spread gradually.