• Title/Summary/Keyword: 사용자등급

Search Result 229, Processing Time 0.025 seconds

Research and consideration on the evaluation of usability formation of focused ultrasonic stimulation systems (집속형 초음파 자극 시스템의 사용적합성 형성평가에 대한 연구 및 고찰)

  • Kim, Jun-tae;Kim, Ju-hee;Joo, Kyu-tai;Kim, Kyung-ah;Ryu, Ok-su;Jo, Jae-hyun;Jeong, Jin-Hyoung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.2
    • /
    • pp.164-177
    • /
    • 2022
  • Medical device usability evaluation refers to the evaluation of medical devices through actual users before the final prototype production is completed. IEC 62366, one of the international safety standards for electronic medical devices, is a standard that must be applied to obtain medical device licenses in major advanced countries such as Europe and the United States. In Korea, through the Ministry of Food and Drug Safety's notice, from January 2021, sequential application by grade has been implemented. In this study, 15 participant specialists were recruited through the Incheon G University Hospital Medical Device Convergence Center for formative evaluation during user suitability evaluation of the focused ultrasound stimulation system being developed by Icleo Co., Ltd., and the test was conducted through joint scenario development. . In the result of task performance, the performance rate was 90.67%, and after the completion of the performance, 86.67% of 'Easy user interface' and 94% of 'Identification/Readability/Understanding of information' questions in the participant survey results analysis by question. The response rate was above average.

Quantitative Fire Risk Assessment and Counter Plans Based on FDS and GIS for National Road Bridges (FDS와 GIS를 이용한 교량 화재 위험도의 정량적 평가 및 적용방안)

  • Ann, Ho June;Park, Cheol Woo;Kim, Yong Jae;Jang, Young Ik;Kong, Jung Sik
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.21 no.6
    • /
    • pp.185-195
    • /
    • 2017
  • In recent years, unexpected bridge fire accidents have increased because of augmenting the number of traffic volumes and hazardous materials by the increment in traffics and distribution business. Furthermore, in accordance with the effort of using the under space of bridges, the ratio of occupied by combustible materials like oil tanker or lorry has been increased. As a result, the occurrence of bridge fire has been growing drastically. In order to mitigate the accident of bridge fire, risk assessment of bridge fire has been studied, however, practical risk models considering safety from users' viewpoints were scarce. This study represented quantitative risk assessment model applicable to national road bridges in Korea. The primary factors with significant impacts on bridge fire accidents was chosen such as clearance height, materials of bridges, arrival time of fire truck and fire intensity. The selected factors were used for Fire Dynamics Simulation (FDS) and the peak temperature calculated by FDS in accordance with the fire duration and fire intensity. The risk assessment model in bridge fire reflected the FDS analysis results, the fire damage criteria, and the grade of fire truck arrival time was established. Response plans for bridge fire accidents according to the risk assessment output has been discussed. Lastly, distances between bridges and fire stations were calculated by GIS network analysis. Based on the suggested assessment model and methodology, sample bridges were selected and graded for the risk assessment.

Development of Evaluation Indicators of Greenhouse for Tomato Cultivation Using Delphi Survey Method (델파이 설문조사를 통한 토마토 재배시설 평가지표 개발)

  • Yu, In Ho;Cho, Myeong Whan;Lee, Eung Ho;Ryu, Hee Ryong;Kim, Young Chul
    • Journal of Bio-Environment Control
    • /
    • v.21 no.4
    • /
    • pp.466-477
    • /
    • 2012
  • This study aimed to develop the comprehensive indicators which can be used for evaluating greenhouse for tomato cultivation. To achieve this aim, the study developed the evaluation indicators composed of evaluation items, grades and criteria by extracting preliminary evaluation items through analyzing the related papers and preceding studies, and conducting Delphi survey on an expert group. During the three surveys, the questions of closed-ended type were given to a panel of 100 experts - professors related to tomato cultivation and facilities, researchers and farmers (practical users). As a result, the finally established evaluation indicators consist of 4 categories and 39 specific evaluation items. The 4 categories are the structural factor of greenhouse, equipment factor of greenhouse, cultivation factor, and infrastructure factor. These factors consist of specific evaluation items of 9, 15, 7 and 8, respectively. In addition, on 39 specific evaluation items, weighted values were calculated and grades and criteria were established by collecting opinions of the experts. The newly developed evaluation indicators through this study will play an important role in developing new greenhouse models, considering things that should be complemented preferentially regarding in-use facilities, and improving the efficiency of projects supported by the government.

A Study of Message Communication Method Using Attribute Based Encryption in IoT Environment (IoT 환경에서 속성기반 암호화 기술을 활용한 메시지 통신 기법에 관한 연구)

  • Park, Jung-Oh
    • Journal of Digital Convergence
    • /
    • v.14 no.10
    • /
    • pp.295-302
    • /
    • 2016
  • Many countries, especially ICT powers, are supporting IoT-based technology at a national level and this technology is actively being researched in the businesses and research institutes in an aim to develop technology and create an ecosystem. Roads in the Seoul city are building public facilities based on IoT to provide various services and conveniences for the users. However, for the full-fledged introduction and development of IoT, there are many cases where infringement on security and privacy and threat for life and safety happen. Also, as the IoT environment includes various environment technologies such as the existing sensor network, heterogeneous communication network, and devices optimized for the IoT environment, it inherits the existing security threat and various attack techniques. This paper researches the attribute based encryption technology for safe communication in the IoT environment. The data collected from the device is transmitted utilizing the attribute based encryption and by designing the key generation protocol, grades and authorities for the device and users are identified to transmit safe messages.

A Study on the Dynamic Encryption Manager for Improved Timeliness in Secure Real-Time Database Systems (보안 실시간 데이터베이스 시스템에서 시간성 향상을 위한 동적 암호화 관리자에 관한 연구)

  • Lee, Soon-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.1
    • /
    • pp.210-216
    • /
    • 2005
  • In many real-time applications, security is another important requirement, since the secure real time database system maintains sensitive information to be shared by multiple users with different levels of security clearance or to be attacked by hackers with ill will. Encryption policies are necessary for the security of secure real-time database systems in addition to the existing security methods, too. However, there has not been much work for the encryption policies in secure real-time database systems, although sensitive information must be safeguarded in real-time systems as well. In this paper, we propose a encryption manager for the purpose of solving the encryption policies of the secure real-time database systems. What is important in the encryption policies of secure real-time database systems is security and timeliness. A significant feature of the proposed encryption manager is the ability to dynamically adapt a encryption algorithm that consider transaction deadline and security level.

Developing Risk Analysis Methods for Realtime RiskMAP System (실시간 위험지도 시스템을 위한 위험분석 기법 개발)

  • Park, Sang Bae;Lee, Chang Jun;Joo, Yu Kyoung;Oh, Jeong Seok
    • Journal of the Korean Institute of Gas
    • /
    • v.24 no.3
    • /
    • pp.27-32
    • /
    • 2020
  • For preventing accident, the risk analysis about gas facilities has been more important since many gas facilities be superannuated. Especially, deriving and simulating risk is very important for preventing and corresponding accidents by means of specific analysis method in complex gas facilities. However, many studies have been not enough not yet in order to derive and simulate risk considering various situations. This paper aims to propose deriving and analyzing risk method around limited area of complex gas facilities. Our study proposes total risk analysis that is composed four methods with individual point of view. The risk analysis system based on RiskMAP immediately informs users changes of e risk in zones according to the status, work and surrounding conditions of the facility. The proposed methods in this research are implemented as software algorithm and applied to risk analysis system using RiskMAP in conjunction with IoT and GPS.

A Study of Security for a Spam Attack of VoIP Vulnerability (VoIP 취약점에 대한 스팸 공격과 보안에 관한 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.215-224
    • /
    • 2006
  • Regarding a spam attack and the interception that a spinoff is largest among Vulnerability of VoIP at these papers study. Write scenario of a spam attack regarding VoIP Vulnerability, and execute Call spam. Instant Messaging spam, Presence spam attack. A spam attack is succeeded in laboratories, and prove. and confirm damage fact of a user in proposals of a spam interception way of VoIP service, 1) INVITE Request Flood Attack 2) Black/White list, 3) Traceback, 4) Black Hole-Sink Hole, 5) Content Filtering, 6) Consent based Communication, 7) Call act pattern investigation, 8) Reputation System Propose, and prove. Test each interception plan proposed in VoIP networks, and confirm security level of a spam interception. Information protection of VoIP service is enlarged at WiBro, BcN. and to realize Ubiquitous Security through result of research of this paper contribute, and may make.

  • PDF

The GNSS Accuracy Analysis according to Data Processing S/W (GNSS 자료처리 S/W에 따른 정확도 분석)

  • Lee, Yong-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.6
    • /
    • pp.628-633
    • /
    • 2018
  • The accuracy of GNSS depends on several factors from the equipment used in data processing because GNSS positioning can be used differently depending on the accuracy required. In the case of the control point surveying requiring high accuracy, GNSS surveying is performed using the relative positioning method, and the observation time and data processing s/w are used differently depending on the class of the control points. On the other hand, the accuracy of academic software depends on the skill of the user, so it may be better to use commercial software in the case of a short baseline. In this study, the results of GNSS survey data were compared using scientific software and commercial software. The results showed that the horizontal position showed a difference of less than 2 cm and the height showed a difference of less than 5 cm. These differences were found to be in the error ranges specified in the unified control point survey regulations. Based on the above results, the commercial s/w can be used for GNSS data processing at the midterm baseline rather than the long baseline.

토양환경정보시스템 '흙토람'

  • Hong, Seok-Yeong;Kim, Lee-Hyeon;Choe, Eun-Yeong;Jang, Yong-Seon;Hyeon, Byeong-Geun;Son, Yeon-Gyu;Park, Chan-Won;Song, Gwan-Cheol;Lee, Ye-Jin;Kim, Myeong-Suk;Jeon, Sang-Ho;Ha, Sang-Geon
    • Magazine of the Korean Society of Agricultural Engineers
    • /
    • v.53 no.1
    • /
    • pp.27-40
    • /
    • 2011
  • 토양정보는 식량생산, 지속적인 토지이용 계획, 종다양성 평가에 사용되는 기본적인 자료이다. 우리나라 토양조사의 역사, 다양한 축척의 토양도 구축과 토양검정, 토양도와 토양검정 자료의 특성, 농업환경변동 모니터링을 통한 일반농경지 및 취약농경지 토양, 토양정보의 전산화에 따른 토양데이터베이스와 토양정보시스템 소개, 구축된 토양정보의 활용과 향후 방향에 대해 논하였다. 40여년 동안 수행되었던 국책 토양조사사업 결과 두 종류의 토양 데이터베이스가 구축되었는데, 다양한 축척의 토양도(1:250,000, 1:50,000, 1:25,000, 1:5,000)를 GIS DB로 전산화한 수치토양도 DB와 필지 단위로 조사된 화학성 위주의 토양분석 성적을 구축한 토양비옥도 DB이다. 흙토람(http://soil.rda.go.kr)에 서 제공하는 토양전자지도는 총 111종으로 토성, 경사, 지형, 모재, 배수등급, 자갈함량, 유효토심 등 토양 GIS 주제도 50종, 사과, 배, 마늘, 수박 등 작물 재배적지 61종이고, 82종의 토양통계 정보를 제공하고 있다. 최근 에는 친환경농업육성법 시행령에 따른 경작형태 및 오염원별 농경지 토양의 이화학성 및 농업용수 수질 조사 자료를 GIS DB로 구축하여 공간적인 분포와 시계열적인 변화를 분석하는 자료로 활용하고 있다. 농업환경변동 정보는 농업환경자원 인벤토리를 기반으로 일반농경지의 화학성과 농업용수의 수질, 토양 미생물 등의 공간적인 분포와 시간적인 변화 정보를 전문가 그룹에 제공하고 있다. 앞으로는 자연자원의 분포와 변동 정보를 바탕으로 보다 일반적이고 알기 쉽게 가공하여 일반인들에게 농업환경과 자연자원 보전의 중요성을 이해시키는 정보로 제공할 예정이다. 기존의 토양정보와 농업환경정보를 통합하여 컨텐츠를 보다 내실있게 하고 정보 수요자별로 손쉽게 목적에 맞는 접근을 할 수 있는 시스템을 만들어 사용자의 편의성을 강화시키는 방향으로 이끌어 가고자 한다.

A Study of Interception for a Spam Attack of VoIP Service (VoIP서비스의 스팸 공격에 대한 차단 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.241-250
    • /
    • 2006
  • Regarding a spam attack and the interception that a spinoff is largest among weakness of VoIP service at these papers study. Write scenario of a spam attack regarding VoIP service, and execute Call spam, Instant Messaging spam, Presence spam attack. A spam attack is succeeded in laboratories, and prove, and confirm damage fact of a user in proposals of a spam interception way of VoIP service, 1) INVITE Request Flood Attack 2) Black/White list, 3) Traceback, 4) Black Hole-Sink Hole, 5) Content Filtering, 6) Consent based Communication, 7) Call act pattern investigation, 8) Reputation System Propose, and prove. Test each interception plan proposed in VoIP networks, and confirm security level of a spam interception. Information protection of VoIP service is enlarged at WiBro, BcN, and to realize Ubiquitous Security through result of research of this paper contribute, and may make.

  • PDF