Existing security solutions such as Firewell and IDS (Intrusion Detection System) have a trouble in getting accurate detection rate about new attack and can not block interior attack. That is, existing securuty solutions have various shortcomings. Shortcomings of these security solutions can be supplemented with mechanism which guarantees an availability of systems. The mechanism which guarantees the survivability of node is various, we approachintrusion telerance using real time response mechanism. The monitoring code monitors related resources of system for survivability of vulnerable systm continuously. When realted resources exceed threshold, monitoring and response code is deployed to run. These mechanism guarantees the availability of system. We propose control mathod about resource monitoring. The monitoring code operates with this method. The response code may be resident in active node for availability or execute a job when a request is occurred. We suggest the node survivability mechanism that integrates the intrusion tolerance mechanism that complements the problems of existing security solutions. The mechanism takes asvantage of the automated service distribution supported by Active Network infrastructure instead of passive solutions. The mechanism takes advantage of the automated service distribution supported by Active Network infrastructure instead of passive system reconfiguration and patch.
The purpose of this study was to develop a nursing management case simulation (NMCS) framework based on the five components of nursing management process and to apply it to clinical nursing practice of nursing college students. The subjects of this study were NMCS reports submitted by the 4th grade 105 nursing students of an university. The research tool is a simulation framework for nursing management practice. It reflects the brainstorming and debriefing process used in the previous simulation exercise based on the five elements of planning, organization, human resource management, directing and control of the nursing management process respectively. As a result of the study, 32 nursing management cases were found to have 79.6% correct rate, 11.6% concept error rate, and 5.6% classification error rate in the first brainstorming and debriefing process for the five components of nursing management process. On the other hand, in the second brainstorming and debriefing process, 94.6% correct rate, 0.0% concept error rate, and 4.4% classification error rate. Based on these results, the NMCS framework developed in this study can be applied to the nursing management theory and practice course of nursing college students as well as simulation based job training and maintenance educations for clinical nurses. Therefore, we propose follow-up studies in various clinical nursing settings and a longitudinal cohort study to investigate the effect of nursing management job skills of nursing college students after graduation.
Lee, Sang-Woo;Ham, Sun Nyeoo;Shin, Taek-Soo;Kim, Hye-Kyung;Yeon, Ik-Jun;Kim, Kawng-Yul
Journal of Korean Society of Environmental Engineers
/
v.31
no.1
/
pp.35-41
/
2009
This study was conducted to investigate feasibility of feedstuff for animal using food waste by fermentation mechanism of indigenous microorganism. To achieve this purpose, indigenous bacteria was isolated from soils to use as an inoculant. Enzyme test was performed to verify activity of amylase, protease and lipase using isolated bacteria. Bacteria(H1, D1), which vigorously express the enzyme activity, was selected and used in the fermentation experiments of food waste. From the analysis of 16s rDNA sequencing, H1 and D1 were identified as Bacillus subtilis and Paenibacillus polymyxa, respectively. In the fermentation experiment, food waste was mixed with rice bran and popped rice to control moisture and nutrient content. Isolated bacteria(B. subtilis and P. polymyxa) was used as an inoculant. From the measured data such as temperature, pH and ORP, it can be verified that food waste adding the indigenous bacteria was effectively fermented. From the nutritional analysis of manufactured feedstuff, it showed that the contents of crude protein, crude fat and crude fiber were enough to use as feedstuff for animal. In addition, harmful components such as Pb, Hg, Cd, aflatoxin and salmonella concentration were not exceeded permitted standards. Therefore, fermented food waste using indigenous bacteria can be used as feedstuff.
Streptomyces spp. isolated from turfgrass rhizosphere and tested for their response to large-patch control fungicides. The tested fungicides were actually used in golf course or turfgrass cultivation to prevent large-patch disease. Tolerance to 3 triazole group of the strains was the highest to the PR fungicide, and following the SR fungicide, whereas the isolated strains were no tolerance to HR fungicide. Tolerances to three kind of Strobilurin group were similar for the all of the tested Streptomyces spp.. Growth and sporulation of the all strain was normal in CB and AP fungicide treatments. However no spore formulated in double concentration. Strains, tolerance to acetanilide fungicides, appeared that KT fungicide tolerance was higher than MK fungicide. The selected strains showed strong tolerance against AT fungicide but have no tolerance to ATR fungicides. In conclusion, the bacterial strains showed tolerance against 1 carbamate, 1 organophosphate and 1 cyanopyrrole group, while have no tolerance against two mixture formulations (1 Quinone + Strobilurin and 1 Imidazole + Triazole).
Recently, as network environment has broadened, the demands on VOD have been increased. The VOD services can be categorized into two types, RVOD and NVOD. Practical VOD services adopt one of them exclusively. Since a method using only one of RVOD and NVOD is not able to deal with frequently variable demand of clients, it leads to a result of overload on a server and a waste of server bandwidth. The efficiency of the network resource usage becomes lower. Hence this paper presents a study on the protocol for efficient VOD services. We propose a new protocol appliable for the existing VOD service algorithm, analyze its performance through simulation, and developed server/client systems applying the new protocol. We propose a mode switching protocol combined with protocols used in RVOD and NVOD. The proposed protocol is not able only to control both RVOD and NVOD but also to change the mode between RVOD and NVOD. As a result of using the proposed protocol to meet frequently variable demand, server bandwidth can be used efficiently. Especially, it can be applied to the existing VOD service algorithms. Therefore, we expect that the proposed protocol in this paper will be widely used in emerging VOD markets.
Hwangbo J.;Hong E. C.;Lee B. S.;Bae H. D.;Kim W.;Nho W. G.;Kim J. H.;Kim I. H.
Korean Journal of Poultry Science
/
v.32
no.4
/
pp.275-279
/
2005
This study investigated the effect of dried food-waste diets (FW) fermented by Aspergillus oryzae (AEW), on egg Production and egg qualify in laying hens. One hundred sixty eight laying hens, 50 week old, ISA-Brown wtrain were randomly distributed into 7 treatments with 3 relpicates of 8 birds per replicate and fed with standards laying hen diet replaced with FW and AFW at die=rent level Basal Diet, 25, 10, $75\%$, respectively. There was a significant decrease in feed intake for FW $50\%$ diet and egg Production was statistically lower in all W diet treatments(p<0.05). Water consumption was increased as the replacement increased. Egg weight, egg shell thickness and strength were similar among treatments. However, egg yolk color and Haugh unit showed distinct differences when W were added to their diets(p<0.05). No difference was observed in egg yolk cholesterol. It seems that FW diet could decrease the egg Production, but would be able to improve egg Quality. From this results, AO seemed applicable to laying hen diet as supplements.
Jeon H. Y.;Son J. H.;Lee K. W.;Kim S. K.;Kang H. S.;Shin T. S.;Cho B. W.
Korean Journal of Poultry Science
/
v.32
no.4
/
pp.255-260
/
2005
This study was conducted to evaluate the feasibility of spent bleaching clay(SBC) as an energy resource for meat type chicks. A total of one hundred twenty 1-d old broiler chicks(Han-hyop, No. 3) were divided into four groups and each group was assigned to one of the following diets: 0(T1), 2.0(T2), 4.0(T3) and $6.0\%$ SBC(T4). Each treatment had 3 replications of 10 birds. Before feeding experimental diets, they were fed a commercial diet for a week Body weight gain and feed intake tended to increase in T3 and T4, respectively. Feed efficiency(feed intake/ gain) tended to decrease in T3 compared to other groups. Fatty acid composition of breast and thigh meat was not significantly affected by feeding SBC. Utilization of dry matter, energy, crude protein and crude fat was lower in T4 than in the other groups during both starter and finisher periods(p<0.05). Crude ash utilization was not significantly affected by feeding dietary SBC. These results indicate that broiler diets may be supplemented with 2 to $4\%$ SBC without adverse effect on growth.
In the several decades, various storage facilities have been developed and operated to supply water resource, flood control or environmental preservation etc. Then, how those man-maid storage facilities affect on the downstream water and environment and how the hydrologists can evaluate those features for water resources problem-solving are high-concentrated problems in this field. Most large watersheds in Korea contain various types of artificial facilities such dams, reservoirs, in-land ponds, wetlands etc. But the study to develop the technology for achieving the effect of the variances and properties of the long term streamflow caused by the artificial storage facilities have been on the simple watershed models and experimental modeling in the real fields. In this paper, we introduce the procedure and methods to consider the above problems based on continuous and semi-distributed featured SWAT model. At the first, we describe the elements and mechanisms of storage facilities in SWAT model to see how we can apply that in proper and appropriate manner for real field problems. Then, we applied the process to a sample watershed, Taewha River basin which covers the most of Ulsan region. Specially, we concentrate on our effort to the effect of upper reservoirs on down stream long term flows based on various scenario basis. The result was described and analysed in spacial and temporal variations on that basin using the precise manner.
Kim, Yong-Jin;Nam, Ki-Chan;Song, Jae-Ki;Koo, Chul-Mo
Asia pacific journal of information systems
/
v.17
no.3
/
pp.131-146
/
2007
Recently, the role of IT service providers has been enlarged from managing a single function or system to reconstructing entire information management processes in new ways to contribute to shareholder value across the enterprise. This movement toward extensive and complex outsourcing agreements has been driven by the assumption that outsourcing information technology functions is a reliable approach to maximizing resource productivity. Hiring external IT service providers to manage part or all of its information-related services helps a firm focus on its core business and provides better services to its clients, thus obtaining sustainable competitive advantage. This practice of focusing on the strategic aspect of outsourcing is referred to as strategic sourcing where the focus is capability sourcing, not procurement. Given the importance of the strategic outsourcing, however, to our knowledge, there is little empirical research on the relationship between the strategic outsourcing orientation and outsourcing performance. Moreover, there is little research on the factor that makes the strategic outsourcing effective. This study is designed to investigate the relationship between strategic IT outsourcing orientation and IT outsourcing performance and the process through which strategic IT outsourcing orientation influences outsourcing performance, Based on the framework of strategic orientation-performance and core competence based management, this study first identifies core competency orientation as a proper strategic orientation pertinent to IT outsourcing and IT outsourcing process management capability as the mediator to affect IT outsourcing performance. The proposed research model is then tested with a sample of 200 firms. The findings of this study may contribute to the literature in two ways. First, it draws on the strategic orientation - performance framework in developing its research model so that it can provide a new perspective to the well studied phenomena. This perspective allows practitioners and researchers to look at outsourcing from an angle that emphasizes the strategic decision making to outsource its IT functions. Second, by separating the concept of strategic orientation and outsourcing process management capability, this study provides practices with insight into how the strategic orientation can work effectively to achieve an expected result. In addition, the current study provides a basis for future studies that examine the factors affecting IT outsourcing performance with more controllable factors such as IT outsourcing process management capability rather than external hard-to-control factors including trust and relationship management. This study investigates the major factors that determine IT outsourcing success. Based on strategic orientation and core competency theories, we develop the proposed research model to investigate the relationship between core competency orientation and IT outsourcing performance and the mediating role of IT outsourcing process management capability on IT outsourcing performance. The model consists of two independent variables (core-competency-orientation and IT outsourcing process management capability), and two dependent variables (outsourced task complexity and IT outsourcing performance). Comprehensive data collection was conducted through an outsourcing association. The survey data were analyzed using a structural analysis method. IT outsourcing process management capability was found to mediate the effect of core competency orientation on both outsourced task complexity and IT outsourcing performance. Further analysis and findings are discussed.
According to the development of new Information Technologies, firms consistently invest a significant amount of money in IT activities, such as establishing internal and external information systems. However, several anti-Information activities-such as hacking, leakage of information and system destruction-are also rapidly increasing, thus many firms are exposed to direct and indirect threats. Therefore, firms try to establish information security systems and manage these systems more effectively via an enterprise perspective. However, stakeholders or some managers have negative opinions about information security systems. Therefore, in this research, we study the relationship between multibusiness firms' performance and information security systems. Information security indicates physical and logical correspondence of information system department against threats and disaster. Studies on information security systems suggested frameworks such as IT Governance Cube and COBIT Framework to identify information security systems. Thus, this study define that information security systems is a controlled system on enterprise IT process and resource on IT Governance perspective rather than independent domain of IT. Thus, Information Security Systems should be understood as a subordinate concept of IT and business processes. In addition, this study incorporates information capability to information security system literature to show the positive relationship between Information Security Systems and Corporate Performance. The concept of information capability suggested that an interaction of human, information, technical and an effect on corporate performance using three types of capability (IT Practice, Information Management Practice, Information Behaviors and Values). Information capability is about firms' capability to manage IT infrastructure and information as well as individual employees who use IT infrastructure and information. Thus, this study uses information capability as a mediating variable for the relationship between information security systems and firms' performance. To investigate the relationship between Information Security Systems and multibusiness firms' performance, this study extends the IT relatedness concept into Information Security Systems. IT relatedness provides understanding of how corporations cope with conflicts between headquarters and business units to create a synergy effect and achieve high performance using IT resources. Based on the previous literature, this study develops the IT Security Relatedness model. IT Security Relatedness is our main independent variable, while Information Capability and Information Security Performance are mediating variables. To control for the common method bias, we collect each multibusiness firm's financial performance and use it as our dependent variable. We find that Information Security Systems influence Information Capability and Information Security Performance positively, and these two variables consequently influence Corporate Performance positively. In addition, this result indirectly shows that corporations under a multibusiness environment can obtain synergy effects using the integrated Information Security Systems. This positive impact of Information Security Systems on multibusiness firms' performance has an important implication to various stakeholders. Therefore, multibusiness firms need to establish Information Security Systems to achieve better financial performance.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.