• Title/Summary/Keyword: 분만 취약지

Search Result 56, Processing Time 0.022 seconds

Anonymous Electronic Promissory Note System Based on Blockchain (블록체인 기반 익명 전자 어음 시스템)

  • HyunJoo Woo;Hyoseung Kim;Dong Hoon Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.947-960
    • /
    • 2023
  • In Korea, traditional paper promissory notes are currently undergoing a transformation, being gradually replaced by electronic notes. This transformation is being steered under the Korea Financial Telecommunications Institute, a trusted authority. However, existing electronic systems have security vulnerabilities, including the risk of hacking and internal errors within the institute. To this end, we have defined a novel anonymous electronic promissory note system based on blockchain. We have constructed a concrete protocol and conducted security analysis of our protocol. Note that, in our protocol, every note information is committed so that the note remains undisclosed until the point of payment. Once the note information becomes public on the blockchain, it enables the detection of illicit activities, such as money laundering and tax evasion. Furthermore, our protocol incorporates a feature of split endorsement, which is a crucial functionality permitted by the Korean electronic note system. Consequently, our proposed protocol is suitable for practical applications in financial transactions.

A study on Cloud Security based on Network Virtualization (네트워크 가상화 기반 클라우드 보안 구성에 관한 연구)

  • Sang-Beom Hong;Sung-Cheol Kim;Mi-Hwa Lee
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.21-27
    • /
    • 2023
  • In the cloud computing environment, servers and applications can be set up within minutes, and recovery in case of fail ures has also become easier. Particularly, using virtual servers in the cloud is not only convenient but also cost-effective compared to the traditional approach of setting up physical servers just for temporary services. However, most of the und erlying networks and security systems that serve as the foundation for such servers and applications are primarily hardwa re-based, posing challenges when it comes to implementing cloud virtualization. Even within the cloud, there is a growing need for virtualization-based security and protection measures for elements like networks and security infrastructure. This paper discusses research on enhancing the security of cloud networks using network virtualization technology. I configured a secure network by leveraging virtualization technology, creating virtual servers and networks to provide various security benefits. Link virtualization and router virtualization were implemented to enhance security, utilizing the capabilities of virt ualization technology. The application of virtual firewall functionality to the configured network allowed for the isolation of the network. It is expected that based on these results, there will be a contribution towards overcoming security vulnerabil ities in the virtualized environment and proposing a management strategy for establishing a secure network.

Study on Evaluation Method of Task-Specific Adaptive Differential Privacy Mechanism in Federated Learning Environment (연합 학습 환경에서의 Task-Specific Adaptive Differential Privacy 메커니즘 평가 방안 연구)

  • Assem Utaliyeva;Yoon-Ho Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.143-156
    • /
    • 2024
  • Federated Learning (FL) has emerged as a potent methodology for decentralized model training across multiple collaborators, eliminating the need for data sharing. Although FL is lauded for its capacity to preserve data privacy, it is not impervious to various types of privacy attacks. Differential Privacy (DP), recognized as the golden standard in privacy-preservation techniques, is widely employed to counteract these vulnerabilities. This paper makes a specific contribution by applying an existing, task-specific adaptive DP mechanism to the FL environment. Our comprehensive analysis evaluates the impact of this mechanism on the performance of a shared global model, with particular attention to varying data distribution and partitioning schemes. This study deepens the understanding of the complex interplay between privacy and utility in FL, providing a validated methodology for securing data without compromising performance.

The Experience of Cancer Survivor's Return to Everyday Life (암 생존자의 일상생활 복귀 경험)

  • Kim, Seon-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.5
    • /
    • pp.327-336
    • /
    • 2020
  • This study was undertaken to identify ways that enable a successful comeback to everyday life and improvement in the quality of life, by understanding the experiences of cancer survivors in returning to everyday life. Totally, 19 people diagnosed with complete cure after 5 years of cancer treatment, were recruited for the study. Data was collected through in-depth interviews from January 18 to February 25, 2017. One-time interviews took 90 to 120 minutes, and data analysis was achieved by applying the grounded theory. The central phenomenon of 'reality that cannot be escaped' and 'uncertain reality that cannot know tomorrow' was attributed to the causal conditions 'hard reality', 'physical exhaustion', 'psychological exhaustion' and 'economic exhaustion'. Depending on context conditions such as 'lack of family support', 'shift to a vulnerable working class', 'insufficient support system', 'hope for the societal support system', 'daunted gender', 'prejudice against cancer/cancer patients', 'information on life after rare full healing'. The strategy for a successful return was influenced by intervention conditions such as 'robust family fence' and 'effective cancer insurance', which resulted in 'building a new life' or 'enduring'. We conclude that for a successful return to daily lives, cancer survivors require comprehensive information, health and social-welfare interventions.

Conservation Methods and Vascular plants of Oriental Thuja Community in Dodong, Daegu (도동 측백나무군락지의 식물상 및 보전방안)

  • Choi, Byoung-Ki;Lim, Jeong-Cheol;Lee, Chang-Woo
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.33 no.3
    • /
    • pp.72-83
    • /
    • 2015
  • A plant diversity, which consists of indigenous plant community with Orientla thuja community (Natural monument no. 1) in Dodong, Daegu, is identified and analyzed as ecological characteristic to consider worth plants and vegetation resource of the region. The vascular plants of Thuja orientalis community were listed as 219 taxa (3.7% of all 4,881 taxa of Korean vascular plants); 67 families, 147 genera, 199 species, 16 varieties, and 4 forms. Vulnerable species (VU) and least concerned species (LC) were recorded based on IUCN standard; Koelretueria paniculata (VU), Thuja orientalis (LC), and Exochorda serratifolia (LC). Although the study site is a non-limestone area, a total of 15 taxa of calciphilous plants were identified; Cheilanthes argentea, Hypodematium glandulosopilosum, Asplenium retamuraria, Thuja orientalis, Spiraea blumei, Smilax sieboldii, etc. A total of 4 taxa endemic plants were identified; Prunus mandshurica for. barbinervis, Lespedeza maximowiczii var. tomentella, Forythia koreana (artificial origin), and Veronica pyrethrina. Among the list, 8 taxa of naturalized plants were identified; Fallopia dentatoalalta, Rumex crispus, Nasturtium officinale, Bidens frondosa, Erigeron annuus etc. Naturalization rate (NR) was 3.6%, of all 219 taxa of vascular plants and urbanization index (UI) was 2.2% of all 321 taxa of naturalized plants. Thuja orientalis occupies a lot of indigenous landscape in this study area which is the southern-limited part of a natural distribution where it can survive. The T. orientalis community, where indigenous plants have formed a characterful species composition based on habitat, has been confirmed as a worth national vegetation resource in an indigeous flora. It has been considered of plans for persistent conservation.

우리나라의 모자보건사업 (여성과 어린이 건강문제와 증진방안)

  • Park Jeong-Han
    • 대한예방의학회:학술대회논문집
    • /
    • 2002.07b
    • /
    • pp.3-17
    • /
    • 2002
  • 국민건강은 국가발전의 기본조건이다. 국민건강은 건강한 어린이의 출산에서 비롯되고, 건강한 어린이의 출산을 위하여 여성이 건강해야 한다 따라서 여성과 어린이 건강보호와 증진을 위한 모자보건사업은 국가보건사업 중 최우선 사업으로 추진되어야 한다. 우리나라의 모자보건사업은 1960대부터 보건소를 통하여 가족계획, 산전관리, 안전분만유도, 예방접종을 중심으로 하였다. 1980년대에 들어와 전국민의료보험의 실현과 국민생활수준의 향상 등으로 산전관리 수진율과 시설분만율이 급격히 증가하여 1990년대 후반에는 거의 100%에 도달하였고, 가족계획실천율도 1991년에 79.4%까지 증가하여 합계출산율이 1.6으로 감소하였고, 어린이 기본예방접종률도 90%이상이 되어 전염병 발생률이 현저히 감소하였다. 전통적인 모자보건사업 관련 지표들이 이렇게 향상되자 일선 보건요원에서부터 중앙정부의 정책결정권자에 이러기까지 모자보건사업에 대한 관심도가 떨어져 중앙부처의 모자보건업무 담당 부서도 축소되고, 모자보건 사업도 쇠퇴하였다. 그러나 어린이와 여성의 건강실태를 자세히 들여다보면 심각한 문제들이 대두되고 있다. 시설 분만율의 증가에 따라 제왕절개분만율이 40%대까지 급증하였고, 모유수유률은 10%대로 떨어졌다. 어린이의 체격은 커지고 있으나 체력은 떨어지고, 비만한 어린이가 급증하여 당뇨병과 같은 성인병 유병률이 어린이들에게 증가하고, 사고에 의한 어린이 사망과 장애가 늘고 있다. 또한 청소년들의 흡연율과 음주률이 증가하고, 성적 성숙이 빨라지고 사회의 개방풍조로 성(性)활동 연령이 낮아지고 성활동이 증가하여 혼전임신과 성폭력이 증가하고 있다. 여성들은 일찍 단산하고, 폐경 연령은 높아지고, 평균수명은 길어져 중년기와 장년기 그리고 노년기가 길어져 각종 만성질환에 이환될 기회가 늘어났다. 이러한 시기의 중요 건강문제들은 뇌혈관질환, 폐암, 유방암, 골다공증, 뇨실금 등과 같이 해결하기 어려운 것들이다. 이렇게 어린이와 여성들에게 새로운 건강문제들이 대두되고 있으나 이에 대한 대응정책이 없었고, 따라서 새로운 모자보건사업이 개발되지 않았으며 일선 보건요원의 훈련도 없었다. 그리고 이러한 건강실태를 파악하여 대책을 마련하고, 보건사업을 평가할 수 있는 보건정보체계가 없는 실정이다. 1990년대 중반에 소수의 학자들이 어린이와 여성건강문제의 심각성을 제기하고, 모자보건사업 활성화의 필요성을 주장하여 보건복지부가 '모자보건선도보건사업'이라는 이름으로 1999년부터 2001년까지 3년간 23개 보건소에서 시범사업을 시행하였다. 이 시범사업에서는 한정된 자원으로 여성과 어린이 보건문제를 효과적으로 해결하기 위해 새로운 보건사업의 개발과 효율적으로 수행하는 방법의 개발에 역점을 두어 많은 성과를 거두었다. 시범사업의 경험을 바탕으로 2002년에는 전국의 45개 보건소로 확대해나가고 있다. 모자보건선도보건사업에서는 임산부가 대상이었던 기존의 모자보건사업과는 달리 신생아, 영유아, 학동기 어린이, 청소년, 그리고 신혼부부에서부터 장년기 여성에 이르기까지 사업대상을 확대하고 생애주기에 따라 지역사회 건강문제해결을 목표로 한 보건사업을 수행하도록 하였다. 사업수행 과정에서 보건소는 지역내 대학과 협력체계를 구축하여 기술적 지원을 받고, 보건요원의 교육 훈련을 통해 사업기획 능력과 전문지식과 기술을 향상시켰고, 보건교육에 필요한 시설과 장비를 구입하였고, 민간의료기관과 연계하여 보건서비스의 질을 향상시켰다. 모자보건 선도보건소에서 제공하는 서비스는 취약계층 중심의 보건교육, 상담 및 지도, 고위험대상자 조기발견 및 민간기관 의뢰 및 주구관리, 질병 조기발견을 위한 검진 의뢰, 지역 보건통계 생산과 관리, 그리고 지역내 가용자원 안내 등이며, 저소득층에 대해서는 민간의료기관에 의뢰 또는 검진비용을 지원하였다. 이와 같이 지역사회 민간기관과 협력체계를 구축함에 따라 대상자를 지속적으로 관리할 수 있는 정보를 공유하게 되었고, 건강증진 및 질병예방, 치료, 사후관리를 포함한 지속적이고 포괄적인 서비스를 제공할 수 있게 되었다. 특히 고위험 및 건강의심 대상, 임부와 장년기 여성에 대해서는 건강검진서비스를 과감히 민간기관에 의뢰, 위탁하친 보건소는 상담자, 정보관리자로서의 역할로 전환할 수 있었다. 그러나 사업관리자의 양적 평가에 대한 고정관념과 질적 평가에 대한 인식부족, 기본 생정통계와 정보체계의 미비로 인한 부정확한 통계생산, 사업요원의 전문지식과 기술 부족, 그리고 인력부족 등이 문제점으로 대두되었다. 효율적인 사업확산과 조기 정착을 위해 중앙정부의 일관성 있는 정책과 재정적 지원이 필수적이며, 보건정보체계확립, 그리고 공공보건기관과 민간의료기관간의 공식적인 협력체계확립이 필요하다. 사업추진 모니터링 및 평가, 조정을 위하여 중앙에 '모자보건 선도사업 기술지원단'을 구성하여 운영하고, 프로그램 운영이 잘되는 보건소를 특성화 보건소로 지원 육성하고, 사업요원의 업무 적정화를 위한 보건소 조직과 기존 보건사업체계의 평가와 재편이 필요하다. 보건사업요원의 자질 향상을 위한 지속적인 교육 훈련 시스템과 보건통계생산 관리를 위한 정보체계의 구축이 요구된다. 모자보건사업관련 보건교육자료를 수집하고 개발하여 전국 보건소에 공급하는 중앙 보건교육자료 및 정보센터가 필요하다.

  • PDF

Effect of Various Parameters on Stress Distribution around Holes in Mechanically Fastened Composite Laminates (기계적으로 체결된 복합재료 평판에서 다양한 인자의 영향에 따른 원공 주위의 응력분포)

  • Choi Jae-Min;Chun Heoung-Jae;Byun Joon-Hyung
    • Composites Research
    • /
    • v.18 no.6
    • /
    • pp.9-18
    • /
    • 2005
  • With the wide applications of fiber-reinforced composite material in aero-structures and mechanical parts, the design of composite joints have become a very important research area because the joints are often the weakest areas in composite structures. This paper presents an analytical study of the stress distributions in mechanically single-fastened and multi-fastened composite laminates. The finite element models which treat the pin and hole contact problem using a contact stress analysis are described. A dimensionless stress concentration factor is used to compare the stress distributions in composite laminates quantitatively In the case of single-pin loaded composite laminate, the effects of stacking sequence, the ratio of a hole diameter and the width of a laminate (W/D ratio), the ratio of hole diameter and distance from edge to hole (E/D ratio), friction coefficient and clamping force are considered. In the case of multi-pin loaded composite laminate, the influence of the number of pins, pitch distance, number of rows, row spacing and hole pattern are considered. The results show that P/D ratio and E/D ratio affect more on stress distributions near the hole boundary than the other factors. In the case of multi-pin loaded composite laminate, the stress concentration in the double column case is better than the other cases of multi-pin loaded composite laminate.

Changes of Plasma Creatinine Kinase-BB after Total Circulatory Arrest (총순환정지후 혈중 크레아티닌 카이네이즈 BB의 변화에 관한 연구)

  • 이석재;김용진;김오곤
    • Journal of Chest Surgery
    • /
    • v.31 no.10
    • /
    • pp.945-951
    • /
    • 1998
  • Background: Although profound hypothermia with total circulatory arrest(TCA) is a valuable maneuver in cardiac surgery, its applications have been limited due to serious complications, especially cerebral damage. In this study, the possible role of creatinine kinase-BB(CK-BB), an index enzyme of ischemic cerebral damage, was assayed as a parameter for the assessment of the cerebral complications after TCA. Hemoglobin(Hb), ionized calcium(Ca++), and blood glucose levels were also assessed as clinical parameters involved in cerebral damage. Materials and methods: Among patients with congenital heart disease, 18 patients who had been operated on with TCA were randomly selected and divided into two groups: 6 with acyanotic and 12 with cyanotic heart disease. Arterial blood from each patient was collected before and after TCA at scheduled times(15 min., 30 min, 1, 2, 4, 8, and 12hr). The levels of CK-BB, Hb, Ca++, and blood glucose were assessed in each sample. Results: As a whole, correlation between CK-BB level and blood sampling time after TCA was not statistically significant. Also, the difference in the level of CK-BB after TCA was not significant between the acyanotic and cyanotic groups. The levels of Hb and CK-BB correlated significantly. Conclusions: The results, which showed no correlation between the alterations in CK-BB level and the TCA duration, suggest that the single assay of the CK-BB level is not a representative measurement for the assessment of cerebral damage after TCA. Also, the cyanotic congenital heart disease group is not more vulnerable to cerebral damage induced by TCA.

  • PDF

Development of mobile-application based cognitive training for Menopausal Women with Cognitive Complaints (갱년기 여성을 위한 앱 기반의 인지기능훈련 프로그램 개발)

  • Kim, Ji-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.5
    • /
    • pp.150-166
    • /
    • 2020
  • Based on the theory of cognitive reserve, we undertook this study to develop a cognitive function training program for woman in menopausal transition with complaints of declining in cognitive function. The program was established by applying the analysis, design, and development stages of the network-based instructional system designed by Jung. The cognitive function training program developed by us is an was an 8-week program composed of cognitive and video training using a mobile application. The program consists of 24 sessions, each with 20-30 minutes of duration, to be completed 3 sessions per week. The contents of the cognitive function training comprise of memory, attention, language function, and scenario-based problem-solving for executive functions, all of which are cognitive areas found to be the most vulnerable for menopausal women. The educational contents were developed for eight subject areas, one subject area per week, including the definition of menopause, its causes and symptoms, menopause and brain function, etc. During the pilot test, the cognitive function training program was applied to 10 menopausal women who complained of cognitive function decline. The results indicated that, after eight weeks of training, the overall cognitive function of participants increased, revealing statistically significant differences (t=-3.04, p=.014) after the program was completed. The mobile app-based cognitive function training program might not only improve patients' memory functions but also potentially reduce the incidence of dementia.

Extraversion and Recognition for Emotional Words: Effects of Valence, Frequency, and Task-difficulty (외향성과 정서단어의 재인 기억: 정서가, 빈도, 과제 난이도 효과)

  • Kang, Eunjoo
    • Korean Journal of Cognitive Science
    • /
    • v.25 no.4
    • /
    • pp.385-416
    • /
    • 2014
  • In this study, memory for emotional words was compared between extraverts and introverts, employing signal detection analysis to distinguish differences in discriminative memory and response bias. Subjects were presented with a study list of emotional words in an encoding session, followed by a recognition session. Effects of task difficulty were examined by varying the nature of the encoding task and the intervals between study and test. For an easy task, with a retention interval of 5 minutes (Study I), introverts exhibited better memory (i.e., higher d') than extraverts, particularly for low-frequency words, and response biases did not differ between these two groups. For a difficult task, with a one-month retention period (Study II), performance was poor overall, and only high-frequency words were remembered; also extraverts adopted a more liberal criterion for 'old' responses (i.e., more hits and more false alarms) for positive emotional-valence words. These results suggest that as task difficulty drives down performance, effects of internal control processes become more apparent, revealing differences in response biases for positive words between extraverts and introverts. These results show that extraversion can distort memory performance for words, depending on their emotional valence.