• 제목/요약/키워드: audit environment

Search Result 152, Processing Time 0.025 seconds

Comparison of Measured and Predicted $^3H$ Concentrations in Environmental Media around the Wolsung Site for the Validation of INDAC Code (주면피폭선량 평가코드(INDAC)의 검증을 위한 월성원전 주면 삼중수소 농도 실측치와 예측치의 비교 평가)

  • Jang, Si-Young;Kim, Chang-Kyu;Rho, Byung-Hwan
    • Journal of Radiation Protection and Research
    • /
    • v.25 no.2
    • /
    • pp.75-80
    • /
    • 2000
  • The predicted results of INDAC code were compared with measured $^3H$ concentrations in air and pine-needle around the Wolsung site. The optimal sets of input data to INDAC were in addition selected by comparing the measured values with the predicted values of INDAC based on various conditions such as the release modes of effluents into the environment, the classification of wind classes, and the consideration of terrain. The predicted $^3H$ concentrations in air and pine-needle were shown to have good agreement with measured values, although there are some limitations such as uncertainties in measured values, complex topology around the site, and the land-sea breeze effects. The assumption on the $^3H$ behavior in vegetables or plants that the ratio of $^3H$ concentration in plant water to $^3H$ concentration in atmospheric water is 1/2 was shown to be conservative in terms of the audit calculation performed by the regulator. It was also found that data sets based on mixed mode and no terrain data were not appropriate for the audit calculation ensuring the compliance with regulations. Thus, if the mixed mode is considered as the release mode of effluents into the environment, meteorological data measured at 58 m height and terrain data should be used to evaluate the atmospheric dispersion factor.

  • PDF

A case study on productivity improvement through the analysis of Traffic Safety System (교통안전제도분석을 통한 생산성향상에 관한 사례연구)

  • Kim, Ha-Gon;Sin, Jae-Cheon;Kim, Bu-Yeol;Choe, Jong-Su;Choe, Chun-Ho;Gang, Gyeong-Sik
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2010.11a
    • /
    • pp.41-61
    • /
    • 2010
  • With increasing the quality of life in proportion to the national income, we have had cars as more convenient and safe means of transportation for a long time. The more we have the benefits from cars, the more seriously we should consider problems such as the destruction of the environment by air pollution, traffic accidents, parking problems, traffic congestion, etc. as social cost caused by the increase of cars. Among them, the traffic accidents are very serious, especially the accidents of the business cars occurs five times more than those of the private cars. Therefore if we analyze the cases of the various kinds of syst.em, test the results and apply them to business cars, we will reduce the traffic accidents of business cars.

  • PDF

An Intelligent Intrusion Detection Model

  • Han, Myung-Mook
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.224-227
    • /
    • 2003
  • The Intrsuion Detecion Systems(IDS) are required the accuracy, the adaptability, and the expansion in the information society to be changed quickly. Also, it is required the more structured, and intelligent IDS to protect the resource which is important and maintains a secret in the complicated network environment. The research has the purpose to build the model for the intelligent IDS, which creates the intrusion patterns. The intrusion pattern has extracted from the vast amount of data. To manage the large size of data accurately and efficiently, the link analysis and sequence analysis among the data mining techniqes are used to build the model creating the intrusion patterns. The model is consist of "Time based Traffic Model", "Host based Traffic Model", and "Content Model", which is produced the different intrusion patterns with each model. The model can be created the stable patterns efficiently. That is, we can build the intrusion detection model based on the intelligent systems. The rules prodeuced by the model become the rule to be represented the intrusion data, and classify the normal and abnormal users. The data to be used are KDD audit data.

  • PDF

A Study on the use of Automotive Testing Data for Updating Quality Assurance Models (새로운 품질보증(品質保證)을 위한 자동검사(自動檢査)데이터의 활용(活用)에 관(關)한 연구(硏究))

  • Jo, Jae-Ip
    • Journal of Korean Society for Quality Management
    • /
    • v.11 no.2
    • /
    • pp.25-31
    • /
    • 1983
  • Often arrangement for effective product assessment and audit have not been completely satisfactory. The underlying reasons are: (a) The lack of early evidence of new unit quality. (b) The collection and processing of data. (c) Ineffective data analysis techniques. (d) The variability of information on which decision making is based. Because of the nature of the product the essential outputs from an affective QA organization would be: (a) Confirmation of new unit quality. (b) Detection of failures which are either epidemic or slowly degradatory. (c) Identification of failure cases. (d) Provision of management information at the right time to effect the necessary corrective action. The heart of an effective QA scheme is the acquisition and processing of data. With the advent of data processing for quality monitoring becomes feasible in an automotive testing environment. This paper shows how the method enables us to use Automotive Testing data for the cost benefits of QA management.

  • PDF

Compression-Friendly Low Power Test Application Based on Scan Slices Reusing

  • Wang, Weizheng;Wang, JinCheng;Cai, Shuo;Su, Wei;Xiang, Lingyun
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.16 no.4
    • /
    • pp.463-469
    • /
    • 2016
  • This paper presents a compression-friendly low power test scheme in EDT environment. The proposed approach exploits scan slices reusing to reduce the switching activity during shifting for test scheme based on linear decompressor. To avoid the impact on encoding efficiency from resulting control data, a counter is utilized to generate control signals. Experimental results obtained for some larger ISCAS'89 and ITC'99 benchmark circuits illustrate that the proposed test application scheme can improve significantly the encoding efficiency of linear decompressor.

Development of Educational Components of Managerial Cost Accounting for Nurses

  • Lim, Ji Young;Noh, Wonjung
    • Journal of Korean Academic Society of Home Health Care Nursing
    • /
    • v.26 no.1
    • /
    • pp.81-90
    • /
    • 2019
  • Purpose: In accordance with changes in the healthcare environment, it is necessary to understand managerial cost accounting for nurses. This study aimed to develop educational components of managerial cost accounting for nurses. Methods: This study is comprised of a comprehensive literature review, nominal group technique using focus group interview, audit by an expert group, and priority analysis. Results: The comprehensive literature review identified 15 educational components of managerial cost accounting. In the nominal group technique, the participants finally agreed on eight educational components of managerial cost accounting for nurses. The average content validity index of these components was 0.99. "Activity-based costing" scored the highest for relative importance (15.7%). Conclusions: These results can be used to develop an education program to strengthen nurses' managerial cost accounting competencies. Furthermore, it will be helpful to use a basis for the development of cost management curricula for nursing students and on-the-job training courses of nurse managers and executives.

Optimization of the Educational Environment Using Information Technologies

  • Sherman, Mykhailo;Martynyshyn, Yaroslav;Khlystun, Olena;Chukhrai, Liubov;Kliuchko, Yuliia;Savkiv, Uliana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.80-83
    • /
    • 2021
  • The article analyzes and shows the rapid development information and telecommunication technologies, and their capabilities are becoming unprecedented for human development, effective solutions to many professional problems. The analysis of information and communication technologies of education used in higher educational institutions of Ukraine confirmed that for the effective use of special teaching methods, as well as software and technical teaching aids, it is necessary to have a trained teaching staff and students.

A Study on Security of Virtualization in Cloud Computing Environment for Convergence Services (융합서비스를 위한 클라우드 컴퓨팅 환경에서 가상화 보안에 관한 연구)

  • Lee, Bo-Kyung
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.4
    • /
    • pp.93-99
    • /
    • 2014
  • Cloud computing refers to borrow IT resources as needed by leveraging Internet technology and pay as much as you used by supporting real-time scalability depending on the service load. Virtualization which is the main technology of cloud computing is a technology that server, storage and hardware are regarded as not separate system but one system area and are allocated as needed. However, the security mechanisms provided by virtualized environments are difficult to cope with the traditional security mechanisms, having basic levels of visibility, control and audit function, on which the server is designed to monitor the traffic between the servers. In this paper, the security vulnerabilities of virtualization are analysed in the cloud computing environment and cloud virtualization security recommendations are proposed.

Business Information Visuals and User Learning : A Case of Companies Listed on the Stock Exchange of Thailand

  • Tanlamai, Uthai;Tangsiri, Kittisak
    • Journal of Information Technology Applications and Management
    • /
    • v.17 no.1
    • /
    • pp.11-33
    • /
    • 2010
  • The majority of graphs and visuals made publicly available by Thai listed companies tend to be disjointed and minimal. Only a little over fifty percent of the total 478 companies included graphic representations of their business operations and performance in the form of two or three dimensional spreadsheet based graphs in their annual reports, investor relations documents, websites and so on. For novice users, these visual representations are unlikely to give the big picture of what is the company's financial position and performance. Neither will they tell where the company stands in its own operating environment. The existing graphics and visuals, in very rare cases, can provide a sense of the company's future outlook. For boundary users such as audit committees whose duty is to promote good governance through transparency and disclosure, preliminary interview results show that there is some doubt as to whether the inclusion of big-picture visuals can really be of use to minority shareholders. These boundary users expect to see more insightful visuals beyond those produced by traditional spreadsheets which will enable them to learn to cope with the on-going turbulence in today's business environment more quickly. However, the debate is still going on as to where to draw the line between internal or external reporting visuals.

  • PDF

Test on the Security and Performance on the Basis of the Access Control Policy Implemented by Secure OS (안전한 운영체제 접근제어 정책에 대한 보안성 및 성능 시험)

  • Kim, Jeong-Nyeo;Sohn, Sung-Won;Lee, Chelo-Hoon
    • The KIPS Transactions:PartD
    • /
    • v.10D no.5
    • /
    • pp.773-780
    • /
    • 2003
  • SecuROS(Secure & Reliable Operating System) prevents and blocks possible system cracking by implementing additional security functions in FreeBSD 4.3 operating system (OS) kernel, including access control, user authentication, audit trail, encryption file system and trusted channel. This paper describes access control technique, which is one of core technologies of SecuROS, introduces the implementations of DAC, MAC and RBAC, all of which are corresponding access control policies, and show security and results of performance measurement on the basis of application of access control policies. Finally, security and performance between conventional OS environment and environment adopting access control policy is described.