• Title/Summary/Keyword: vulnerability factor

Search Result 181, Processing Time 0.027 seconds

A research paper for e-government's role for public Big Data application (공공의 빅데이터 활용을 위한 전자정부 역할 연구)

  • Bae, Yong-guen;Cho, Young-Ju;Choung, Young-chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.11
    • /
    • pp.2176-2183
    • /
    • 2017
  • The value of Big-Data which is a main factor of the fourth Industrial Revolution enhances industrial productivity in private sector and provides administrative services for nations and corporates in public sector. ICT-developed countries are coming up with Big-Data application in public sector rapidly. Especially, when it comes to social crisis management, they are equipped with pre-forcasting system. Korean Government also emphasizes Big-Data application in public sector for the social crisis management. But the reality where the overall infrastructure vulnerability reveals requires preparation and operation of measurement for social problems. Accordingly, we need to analyze Big-Data application problem and benchmark the precedented cases, thereby, direct policy diversity. Hence, this paper proposes the roles and rules of E-government analyzing problems from Big-Data application. The following policy proposes open Information and legal&institutional improvement, Big-Data service considerations threatening privacy issues in Big-Data ecosystem, necessity of operational and analytical technology for Big-Data and related technology in technical implication of Big-Data.

Development Direction, Actual Condition and Location of the Auto Industry in Jeon-Buk Province (전북지역 자동차산업 입지와 지역산업 실태 및 발전방향)

  • 문남철
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.7 no.2
    • /
    • pp.261-281
    • /
    • 2004
  • The location of auto industry in Jeon-buk is due to the strategies for secure a low-priced industrial site of the auto assembly companies, which attained to quantitative growth stage in the early part 1990's, and the regional balanced development policy by the location of leader enterprise of the government. As a consequence of the reversal development pattern that is located the auto parts firm after locating the auto assembly companies, the Jeon-buk auto industry has many structural vulnerability. First, because of the lack development of auto parts industries, the auto assembly companies located in Jeon-buk are dependent many auto parts at a external region. Second, most of auto parts firm belongs to the singular assembly company exclusively. And the majority of auto parts industries are the low value-added products that are necessary a simple labor power. Third, the agglomeration undeveloped of associated industries with automobile caused a low competitiveness of invitation a manufacturing company as against other provinces. For a regional economic development by the auto industry, it is necessary a flexible regional structure of production through an agglomeration of associated industries. The geographical proximity between an assembly company and a parts firms is an important locational factor with the induction of Just-in-Time production system and a modularization in the auto industry. And a modularization applies to more new factory than the existing factories. So that, Jeon-buk self-government has to create an amicable industrial environment, try to attract an auto parts enterprises and plan an agglomerated industrial complex that is able to supply a parts modulated to assembly company.

  • PDF

An Experimental Study on the Early Strength Development Properties of Concrete According to Curing Condition and Used Materials (사용재료 및 양생조건에 따른 콘크리트의 조기강도발현 특성에 관한 실험적 연구)

  • Lee, Sang-Soo;Song, Ha-Young;Lee, Ji-Hwan
    • Journal of the Korea Concrete Institute
    • /
    • v.20 no.6
    • /
    • pp.721-729
    • /
    • 2008
  • The purpose of this study is to investigate the engineering properties of concrete for the early strength development. As a result of reviewing it by establishing each experimental factor and level, the cement had more excellent quality performance in CHC and HESPC than OPC. This study has shown that the PC series admixture was more excellent in side of elapsed time (aging) and early strength development than PNS series admixture. In addition, there was much difference according to the curing temperature, but the early strength development showed the considerable vulnerability in curing temperature below $12^{\circ}C$. To satisfy the strength requirements of 5 MPa/18 hr this study has shown that it needed the curing temperature over $17^{\circ}C$ to the minimum in OPC, over $14^{\circ}C$ in CHC, and over $11^{\circ}C$ in HESPC. On the other hand, as to the strength properties according to W/C, the less W/C was, the more strength development was excellent. If this study is to be used in construction filed on a basis of this result, this researcher is considered as possible of the economic execution of construction by advancing the early strength and by the reduction of construction cost according to shortening construction duration.

Direct Relationship between Angiographic Characteristics of Carotid Atherosclerotic Plaque and Filling Defect in the Cerebral Protection Filters : Based on the Conventional Angiography

  • Choi, Jae-Hyung;Park, Hyun-Seok;Kim, Dae-Hyun;Cha, Jae-Kwan;Huh, Jae-Taeck;Kang, Myongjin
    • Journal of Korean Neurosurgical Society
    • /
    • v.54 no.2
    • /
    • pp.93-99
    • /
    • 2013
  • Objective : Neurologic complications during carotid artery stenting (CAS) are usually associated with distal embolic event. These embolic incident during CAS are highly associated with the carotid plaque instability. The current study was undertaken to identify the angiographic characteristics of carotid plaque vulnerability, which was represented as filling defect in the cerebral protection filters during CAS. Methods : A total of 107 patients underwent CAS with use of a distal protection filter. Angiographic carotid plaque surface morphology was classified as smooth, irregular, and ulcerated. To determine predictable factors of filling defect in the protection filters, 11 variables were retrospectively analyzed which might influence filling defect in the protection filters during CAS. Results : Filling defects during CAS were presented in the 33 cerebral protection filters. In multivariate analysis, angiographic ulceration [odds ratio (OR), 6.60; 95% confidence interval (CI) : 2.24, 19.4; p=0.001], higher stenosis degree (OR, 1.06; 95% CI : 1.00, 1.12; p=0.039), and coexistent thrombus (OR, 7.58; 95% CI : 1.69, 34.05; p=0.08) were highly associated with filling defect in the cerebral protection devices during CAS. Among several variables, angiographic surface ulceration was the only significant factor associated with flow stagnation during CAS (OR, 4.11; 95% CI : 1.33, 12.72; p=0.014). Conclusion : Plaque surface morphology on carotid angiography can be a highly sensitive marker of plaque instability during CAS. The independent risk factors for filling defect in the filter devices during CAS were plaque ulceration, stenosis degree, and coexistent thrombus.

The effects of emotional labor of dental hygienist on the job stress, anxiety and sleep (치과위생사의 감정노동이 직무스트레스와 불안, 수면에 미치는 영향)

  • Park, Hye-Young;Jang, Gye-Won;Lee, Gung-Hwa;Lee, Min-Kyung;Lee, Geong-Won;Iim, Yong;Lee, Jong-Ryol;Kim, Hye-Jin
    • Journal of Korean society of Dental Hygiene
    • /
    • v.17 no.3
    • /
    • pp.449-463
    • /
    • 2017
  • Objectives: The objective of this study was to identify the relationship between emotional labor and occupational stress of the dental hygienists, and the effects of emotional labor on their occupational stress and health problems including depression, anxiety and sleep. Methods: The survey was conducted using the questionnaires about dental hygienists' working in medical institutions in Busan, Gyeongsangnam-do from August 19th and October 7th, 2016. Total of 225 participants were selected for data analyses. Frequency analysis, t-test, ANOVA, Pearson's correlation coefficient analysis, and regression analysis were conducted using SPSS Windows ver. 21.0 program(SPSS Inc., Chicago, IL. USA). Results: The analysis of the factors affecting emotional labor, occupational stress, anxiety, and sleep by participants' characteristics showed that those with higher education level, work position and annual salary had higher emotional labor. In addition, participants who worked 5 days every other week and were responsible for patient consultation had higher emotional labor. The analysis of correlations among emotional labor occupational stress, anxiety, and sleep showed positive correlations between emotional experience and emotional expression, occupational stress and emotional expression, and anxiety and emotional expression. On the other hand, negative correlation was found between anxiety and emotional experience. Regression analysis was conducted to examine the effect of emotional labor on job stress. Emotional labor was a factor affecting job stress and anxiety. Conclusions: In order to improve emotional control and vulnerability to stress among dental hygienists, intra-organizational training opportunities and mental health care strategies are needed. Additional broad-based studies are required to identify the factors affecting the occupational stress and emotional labor and to develop relevant intervention measures.

Immunostimulation of C6 Glioma Cells Induces Nitric Oxide-Dependent Cell Death in Serum-Free, Glucose-Deprived Condition

  • Shin, Chan-Young;Choi, Ji-Woong;Ryu, Jae-Ryun;Ryu, Jong-Hoon;Kim, Won-Ki;Kim, Hyong-Chun;Ko, Kwang-Ho
    • Biomolecules & Therapeutics
    • /
    • v.8 no.2
    • /
    • pp.140-146
    • /
    • 2000
  • Recently, we reported that immunostimulation of primary rat cortical astrocyte caused stimulation of glucose deprivation induced apoptotic cell death. To enhance the understanding of the mechanism of the potentiated cell death of clucose-deprived astrocyte by immunostimulation, we investigated the effect of immunostimulation on the glucose deprivation induced cell death of rat C6 glioma cells. Co-treatment of C6 glioma cells with lipopolysaccharide (LPS, $1\;{\mu}\textrm{g}/ml$) and interferon ${\gamma}(IFN{\gamma},\;100U/ml)$ is serum free condition caused marked elevationo f nitric oxide production ($>50\;{\mu}M$). In this condition, glucose deprivation caused significant release of lactate dehdrogenase (LDH) from C6 glioma cells while control cells did not show LDH release. To investigate whether elevated level of nitric oxide is responsible for the enhanced LDH release in glucose-deprived condition, C6 glioma cells were treated with 3-morphorinosydnonimine (SIN-1) and it was observed that SIN-1 caused increase in LDH release from glucose-deprived C6 glioma cells. Treatment of C6 glioma cells with $25\;{\mu}M$ of pyrrolidinedithiocarbamate (PDTC) which inhibit Nuclear factor kB (NF-kB) activation, caused complete inhibition of nitric oxide production. Treatment of C6 glioma cells with NO synthase inhibitors, $N^{G}$-nitro-L-arginine (NNA) or L-$N{\omega}$-nitro-L-arginine methyl ester (L-NAME), caused inhibition of nitric oxide production and also glucose deprivation induced cell death of cytokine-stimulated C6 glioma cells. In addition, diaminohydroxypyrimidine (DAHP, 5 mM) which inhibits the synthesis of tetrahydrobiopterine (BH4), one of essential cofactors for iNOS activity, caused complete inhibition of NO production from immunostimulated C6 glioma cells. The results from the present study suggest that immunostimulation causes potentiation of glucose deprivation induced death of C6 glioma cells which is mediated at least in part by the increased production of nitric oxide. The vulnerability of immunostimulated C6 glioma cells to hypoglycemic insults may implicate that the elevated level of cytokines in various ischemic and neurodegenerative diseases may play a role in their pathogenesis.

  • PDF

Comparison of Predicted and Measured ASF (ASF 예측치와 실측치 비교)

  • Shin, Mi-Young;Hwang, Sang-Wook;Yu, Dong-Hui;Park, Chan-Sik;Lee, Chang-Bok;Lee, Sang-Jeong
    • Journal of Navigation and Port Research
    • /
    • v.34 no.3
    • /
    • pp.175-180
    • /
    • 2010
  • In the almost application parts, GNSS being used the primary navigation system on world-widely. However, some of nations attempt or deliberate to enhance current Loran system, as a backup to satellite navigation system because of the vulnerability to the disturbance signal. Loran interests in supplemental navigation system by the development and enhancement, which is called eLoran, and that consists of advancement of receiver and transmitter and of differential Loran in order to increase the accuracy of current Loran-C. A significant factor limiting the ranging accuracy of the eLoran signal is the ASF in the TOAs observed by the receiver. The ASF is mostly due to the fact that the ground-wave signal is likely to propagate over paths of varying conductivity and topography. This paper presents comparison results between the predicted ASF and the measured ASF in a southern east region of Korea. For predicting ASF, the Monteath model is used. Actual ASF is measured from the legacy Loran signal transmitted Pohang station in the GRI 9930 chain. The test results showed the repeatability of the measured ASF and the consistent characteristics between the predicted and the measured ASF values.

A Study on The Preference Analysis of Personal Information Security Certification Systems: Focused on SMEs and SBs (개인정보보호 인증제도 선호도 분석에 관한 연구: 중소기업 및 소상공인을 중심으로)

  • Park, Kyeong-Tae;Kim, Sehun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.911-918
    • /
    • 2014
  • Over the past few years, security breaches have been consistently reported around the world. Especially, people's personal information are at risk of being breached as the firms gather and utilize the information for their marketing purposes. As an effort to revamp their data infrastructures, companies have rebuilt their system that almost every data, including the personal information, are stored within the digital database. However, this migration provides easier access to the database but it has also increased the system vulnerability. As the data can be easily exposed to the unauthorized personnel both intentionally and unintentionally, it is necessary for companies to establish a set of security protocol and operate the personal information protection system. There are two major certified security system in South Korea; PIMS from KISA and PIPL from NIA. This paper analyzes the preferences of SMEs and small business using conjoint attributes of PIMS and PIPL. The study shows that the business owners take post certification rewards as the most important factor. It also shows that the attributes that have the highest utility rates are the following; 1) KISA certification, 2) 79 points of protection counter measurements, 3) 28 items of life cycle, 3) 50 percent discount on certification fee, and 4) Reduced amount of fine for personal information leakage incident.

Design of Intrusion Detection System to be Suitable at the Information System Organized by Homogeneous Hosts (동질형 호스트들로 구성된 정보시스템에 적합한 침입탐지시스템의 설계)

  • 이종성;조성언;조경룡
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.4 no.1
    • /
    • pp.267-282
    • /
    • 2000
  • With the development of computer&network technology and the growth of its dependance, computer failures not only lose human and material resources but also make organization's competition weak as a side-effect of information society. Therefore, people consider computer security as important factor. Intrusion Detection Systems (IDS) detect intrusions and take an appropriate action against them in order to protect a computer from system failure due to illegal intrusion. A variety of methods and models for IDS have been developed until now, but the existing methods or models aren't enough to detect intrusions because of the complexity of computer network the vulnerability of the object system, insufficient understanding for information security and the appearance of new illegal intrusion method. We propose a new IDS model to be suitable at the information system organized by homogeneous hosts and design for the IDS model and implement the prototype of it for feasibility study. The IDS model consist of many distributed unit sensor IDSs at homogeneous hosts and if any of distributed unit sensor IDSs detect anomaly system call among system call sequences generated by a process, the anomaly system call can be dynamically shared with other unit sensor IDSs. This makes the IDS model can effectively detect new intruders about whole information system.

  • PDF

Evaluation of Basin-Specific Water Use through Development of Water Use Assessment Index (이수평가지수 개발을 통한 유역별 물이용 특성 평가)

  • Baeck, Seung Hyub;Choi, Si Jung
    • Journal of Wetlands Research
    • /
    • v.15 no.3
    • /
    • pp.367-380
    • /
    • 2013
  • In this study, sub-indicators, and thematic mid-indexes to evaluate the water use characteristics were selected through historical data analysis and factor analysis, and consisted of the subject approach framework. And the integrated index was developed to evaluate water use characteristics of the watershed. Using developed index, the water use characteristics were assessed for 812 standard basins with the exception for North Korea using data of 1990 to 2007 from the relevant agencies. A sensitivity analysis is conducted for this study to determine the proper way through various normalization and weighting methods. To increase the objectivity of developed index, the history of the damage indicators are excluded in the analysis. In addition, in order to ensure its reliability, results from index with and without consideration of the damage history were compared. Also, the index is also applied to real data for 2008 Gangwon region to verify its field applicability. Through the validation process this index confirmed the adequacy for the indicators selection and calculation method. The results of this study were analyzed based on the spatial and time vulnerability of the basin's water use, which can be applied to various parts such as priority decision-making for water business or policy, mitigations for the vulnerable components of the basin, and supporting measures to establishment by providing relevant information about it.