• Title/Summary/Keyword: 가이드라인 업데이트

Search Result 8, Processing Time 0.023 seconds

성인병 뉴스 제317호

  • The Korea Association of Chronic Disease
    • The Korean Chronic Disease News
    • /
    • no.317
    • /
    • pp.1-18
    • /
    • 2007
  • 경북 고령군 보건소 안순기 소장/“만성질환관리 건강투자 전략의 핵심”/‘보호자 없는 병원’시범사업/치매?뇌혈관질환?파킨슨병 등/“만성질환관리는 미래의료의 핵심”/한방보건 최우수기관‘익산보건소’/공공보건 EHR선진화 1577억 투입/전국비만학회연합회 비만 가이드라인 제시/맞춤의학 실현 KARE 프로젝트 착수/“신약개발.보건의료 연구투자 협력”/지난해 국내 의약품 생산 12조원 돌파/식욕억제제 관리 위반 의원?약국 적발/“well-dying”...사랑의 공동체 실현/가정호스피스.완화의료사업/신장내과 외래환자 58.4%가 40~60대/“천식 등 호흡기질환 예방관리 총력”/WHO 국제암연, 학술위원에 방영주 교수/30대 이상 70% 남성‘성관계’실패 경험/부실한 인적 자본, 미래 위한 건강투자 시급/2005년 시도별 생명표 및 사망원인통계 결과/유럽 고혈압학회 가이드라인 업데이트/

  • PDF

ITU-T SG17에서의 ITS 보안 기술 표준화 동향

  • Lee, Sang-Woo;Kwon, Hyeok-Chan;Na, Jung Chan
    • Review of KIISC
    • /
    • v.27 no.5
    • /
    • pp.21-25
    • /
    • 2017
  • 최근 자율주행차량 기술의 상용화가 임박함에 따라, 차량통신보안 기술의 중요성도 부각되고 있다. 이와 더불어 차량통신보안 표준화의 중요성도 대두되고 있으며, 그 일환으로 ITU-T SG17에서는 2017년 ITS 보안 연구반을 신설하여 표준화를 활발히 추진하고 있다. 특히, 최근 차량 소프트웨어 업데이트 규격이 표준 승인되었으며, V2X 통신 보안 가이드라인의 표준화가 활발히 진행되고 있다. 또한, 최근 회의에서 차내망 침입탐지시스템, 차량 접속 디바이스 보안 요구사항, 차량에지 컴퓨팅 보안 가이드라인 등이 신규 표준화 과제로 선정되었다. 본 논문에서는 SG17에서 신설된 ITS 보안 연구반에서의 표준화 동향을 살펴 본다.

A Study on Safety Guideline of Level 4 Automated Driving Vehicles (레벨 4 자율주행자동차의 제작 안전 가이드라인에 대한 고찰)

  • Lee, Gwang Goo;Woo, Hyungu
    • Journal of Auto-vehicle Safety Association
    • /
    • v.13 no.3
    • /
    • pp.86-94
    • /
    • 2021
  • Since automated driving system (ADS) has great potential to innovate various fields of automobile and mobility industries, major countries are establishing safety standards for autonomous vehicles to support technology development. However, in order to prevent technology development from being hampered by the safety standards for technologies still under development, safety guidelines are applied until the technologies are mature. For example, the safety 'guideline' for level 4 ADS was published in December 2020 by the Ministry of Land, Infrastructure and Transport of Korea, while the safety 'standards' for level 3 ADS was promulgated in December 2019. In this study, the domestic safety guideline for level 4 ADS is analyzed with the guidelines of major advanced countries in terms of safety elements. As it takes a lot of time before the safety standards of level 4 ADS is introduced, it is expected that the safety guideline will be updated several times. As necessary considerations when updating the safety guideline, industry acceptance, harmonization between safety elements, validation methods of system performance, and the user options are discussed.

The study of security management for application of blockchain technology in the Internet of Things environment (Focusing on security cases in autonomous vehicles including driving environment sensing data and occupant data) (사물인터넷 환경에서 블록체인 기술을 이용한 보안 관리에 관한 소고(주행 환경 센싱 데이터 및 탑승자 데이터를 포함한 자율주행차량에서의 보안 사례를 중심으로))

  • Jang Mook KANG
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.161-168
    • /
    • 2022
  • After the corona virus, as non-face-to-face services are activated, domain services that guarantee integrity by embedding sensing information of the Internet of Things (IoT) with block chain technology are expanding. For example, in areas such as safety and security using CCTV, a process is required to safely update firmware in real time and to confirm that there is no malicious intrusion. In the existing safe security processing procedures, in many cases, the person in charge performing official duties carried a USB device and directly updated the firmware. However, when private blockchain technology such as Hyperledger is used, the convenience and work efficiency of the Internet of Things environment can be expected to increase. This article describes scenarios in how to prevent vulnerabilities in the operating environment of various customers such as firmware updates and device changes in a non-face-to-face environment. In particular, we introduced the optimal blockchain technique for the Internet of Things (IoT), which is easily exposed to malicious security risks such as hacking and information leakage. In this article, we tried to present the necessity and implications of security management that guarantees integrity through operation applying block chain technology in the increasingly expanding Internet of Things environment. If this is used, it is expected to gain insight into how to apply the blockchain technique to guidelines for strengthening the security of the IoT environment in the future.

A Selective Compression Strategy for Performance Improvement of Database Compression (데이터베이스 압축 성능 향상을 위한 선택적 압축 전략)

  • Lee, Ki-Hoon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.9
    • /
    • pp.371-376
    • /
    • 2015
  • The Internet of Things (IoT) significantly increases the amount of data. Database compression is important for big data because it can reduce costs for storage systems and save I/O bandwidth. However, it could show low performance for write-intensive workloads such as OLTP due to the updates of compressed pages. In this paper, we present practical guidelines for the performance improvement of database compression. Especially, we propose the SELECTIVE strategy, which compresses only tables whose space savings are close to the expected space savings calculated by the compressed page size. Experimental results using the TPC-C benchmark and MySQL show that the strategy can achieve 1.1 times better performance than the uncompressed counterpart with 17.3% space savings.

A Case Study on the Application of RMF to Domestic Weapon System (국내 무기체계에 대한 RMF 적용 실 사례 연구)

  • Cho, Hyun-suk;Cha, Sung-yong;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1463-1475
    • /
    • 2019
  • Unlike the past, modern high-tech weapons systems are complex and many components are combined to form a weapons system. In addition, unlike the past, where hardware was the main component, the proportion of software is increasing every year, making the security assurance activities of weapon systems more difficult than in the past. The United States has been working to ensure the security of the weapons systems they develop since the 1960s. The findings were made to US internal standards, updated regularly, and are now being applied as RMF. In Korea, research activities have been conducted since 2010 based on the RMF of the United States. However, actual RMF application cases in the United States cannot be classified and obtained, and there are no official cases in Korea. In this paper, we apply Korean RMF research that has been studied so far to apply to the recently developed real weapon system. Thus, detailed guidelines for applying the RMF are presented.

BLE Beacon Based Online Offline Tourism and Solutions for Regional Tourism Activation (지역관광 활성화를 위한 비콘 기반의 온오프라인 관광 솔루션)

  • Ryu, Gab-Sang
    • Journal of Internet of Things and Convergence
    • /
    • v.2 no.2
    • /
    • pp.21-26
    • /
    • 2016
  • In this paper, it is possible to update the tourist information in real time, on/off-line tour proposes a solution(BBTS) based on a bluetooth beacon can provide tourist information without the need for wireless data network. BBTS consists of a bluetooth based data of the low-power supply system and the beacons and interoperable smart applications. Data supply system consists of the BLE & Beacon Pairing-based / non-pairing data transmission module with integral hardware. Smart application modules that provide indoor location of users information, internal server module and tourist information collection and information guide around comprised of applications. The proposed BBTS is possible that indoor service tourism tourist demand due to utilizing the beacon technology. Outdoor tourist information is designed to be downloaded to the smartphone receives the information received from the beacon APK file to provide services. BBTS system is expected to make a big impact on the smart tourism services industry.

Framework for Building Reusable Design Systems (재사용 가능한 디자인 시스템 구축을 위한 프레임워크)

  • Lee, Young-Ju
    • Journal of Digital Convergence
    • /
    • v.19 no.1
    • /
    • pp.343-348
    • /
    • 2021
  • This study investigated the method of constructing and combining blocks based on the atomic design system in order to propose a framework for rescue of a reusable design system. For that, I first looked at the necessity of a design system and examples of snow white, skeuomorphic design, flat design, and material design. In addition, molecules, atoms, organisms, templates and pages of atomic design using the principles of chemistry as metaphors were defined through literature studies. In order to implement a new framework, an interface inventory was constructed, and among them, font, color, image and control elements were extracted as core visual elements, and guidelines were defined, and molecular elements were classified and composed of atoms based on them. Blocks are constructed in the form of blocks based on the design pattern most used in the content inventory, and the framework is constructed to implement a layout based on a visual grid and design a page through a combination of blocks. The significance of this paper is that the new framework helps team consistency and collaboration by reusing blocks and supports file sharing and updating.