• Title/Summary/Keyword: 서비스 인증

Search Result 2,199, Processing Time 0.033 seconds

An Analysis of Changes in Social Issues Related to Patient Safety Using Topic Modeling and Word Co-occurrence Analysis (토픽 모델링과 동시출현 단어 분석을 활용한 환자안전 관련 사회적 이슈의 변화)

  • Kim, Nari;Lee, Nam-Ju
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.1
    • /
    • pp.92-104
    • /
    • 2021
  • This study aims to analyze online news articles to identify social issues related to patient safety and compare the changes in these issues before and after the implementation of the Patient Safety Act. This study performed text mining through the R program, wherein 7,600 online news articles were collected from January 1, 2010, to March 5, 2020, and examined using keyword analysis, topic modeling, and word co-occurrence network analysis. A total of 2,609 keywords were categorized into 8 topics: "medical practice", "medical personnel", "infection and facilities", "comprehensive nursing service", "medicine and medical supplies", "system development and establishment for improvement", "Patient Safety Act" and "healthcare accreditation". The study revealed that keywords such as "patient safety awareness", "infection control" and "healthcare accreditation" appeared before the implementation of the Patient Safety Act. Meanwhile, keywords such as "patient safety culture". and "administration and injection" appeared after the act's implementation with improved ranking of importance pertaining to nursing-related terminology. Interest in patient safety has increased in the medical community as well as among the public. In particular, nursing plays an important role in improving patient safety. Therefore, the recognition of patient safety as a core competency of nursing and the persistent education of the public are vital and inevitable.

Introduction and development process of SPS (단체표준(SPS) 소개와 개발 프로세스)

  • Tae Hyeong Kim;Se Hyun Park;Dae Sung Jung
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.6-6
    • /
    • 2023
  • 국토교통부는 R&D 사업인 '분산공유형 건설연구인프라구축사업(2004년~2009년, 6종)'과 '국토교통기술실험인프라 2단계 구축사업(2013년~2019년, 6종)'을 통해 첨단 연구시설·장비를 전국에 분산 구축하여 실험시설이 부족한 중소기업·대학 등이 공동활용할 수 있도록 총 12종의 건설분야 대형실험시설을 구축하였다. 국토교통 R&D 성과(기술·제품)의 품질 및 신뢰성 확보를 통해 개발기술의 상용화 촉진을 위해서는 이러한 국토교통 대형실험시설·장비를 활용한 표준화된 성능평가 시험기반(표준실험절차, 단체표준 등)을 구축하여 연구인프라의 공동활용을 촉진하고 기술개발 성공률 제고와 함께 건설분야 시험인증 산업을 육성할 필요가 있다. 국토교통 대형실험시설을 활용하여 건설분야 기술·제품에 대한 성능평가 기반의 실험절차를 표준화함으로써 성능평가 결과의 신뢰성 확보 및 기술시험서비스 역량 제고를 위한 '건설분야 기술·제품의 검증을 위한 성능기반 표준실험절차 개발(연구기간: '17.06~'22.06, 연구비: 총99억원, 주관기관: 국토교통연구인프라운영원)' 과제가 성공적으로 수행 완료되었다. 이 과제를 통해 총 53개의 표준실험절차서와 20개의 단체표준이 제정되었다. 이어서, 2단계 대형실험시설 준공완료에 따라 '건설분야 성능기반 표준시험절차 개발 사업(연구기간: '21.04~'25.12, 연구비: 총143.8억원)이 수행되고 있다. 현재, 국토교통연구인프라운영원은 이 사업 내 국제융합수리(주관기관: 한국농어촌공사 농어촌연구원), 극한성능(주관기관: 서울대학교) 및 기상환경재현(주관기관: 한국건설기술연구원) 표준실험절차 개발 과제에 공동기관으로 참여하여 단체표준 개발업무를 담당하고 있다. 본 논문에서는 단체표준 소개 및 현황에 대해 설명하고, 1단계 표준실험절차 개발과제를 통해 정립되었고 현재 2단계 표준실험절차 개발과제에도 적용되고 있는 시험관련 단체표준(안) 개발 프로세스에 대해 기술하고자 한다. 개발된 단체표준은 건설관련 실험·시험시설을 보유한 기관(대학, 공공기관, 산업체 연구소 등)의 성능검증 시험, 신기술 및 신제품 인증 표준절차에 활용가능하며, 시방서와 설계기준에 KS표준과 같이 시험 및 검사방법에 있어 참조표준으로도 활용 가능하다.

  • PDF

An Implementation and Evaluation of Improved Anti-DoS IKE Protocol Engine for Interaction with IPsec System (IPsec과 연동되는 개선된 Anti-DoS IKE 프로토콜 엔진의 구현 및 평가)

  • Kim, Sung-Chan;Choun, Jun-Ho;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.11B
    • /
    • pp.1005-1016
    • /
    • 2006
  • As the increment usage of Internet, the security systems's importance is emphasized. The current Internet Key Exchange protocol(IKE) which has been used for key exchange of security system, was pointed out a problem of efficiency and stability. In this research, we try to resolve those problems, and evaluate the newly designed Key Exchange protocol in the IPsec interaction test bed system environment. In this research we implemented the new Key Exchange Protocol as a recommendation of RFC proposal, so as to resolve the problem which was pointed out the key exchange complexity and the speed of authentication process. We also designed the defense mechanism against the Denial of Service attack. We improved the key exchange speed as a result of simplification of complex key exchange phase, and increased efficiency as a result of reuse the preexistence state value when it's renegotiated.

e-C/O under FTA (FTA 체결에 따른 전자원산지증명서 활성화 방안)

  • Lee, Chang-Sook;Kim, Jong-Chill
    • International Commerce and Information Review
    • /
    • v.15 no.3
    • /
    • pp.475-498
    • /
    • 2013
  • The most fundamental reason why FTA Agreement must be concluded is based on the preferential tariff treatment among country parties. In order to get applied by the preferential tariff treatment under an FTA, the parties need to meet the rules of origin and the criteria stipulated under the FTA simultaneously. In addition, Certificate of Origin(C/O) document is required to claim for the preferential treatment under the FTA Agreement. In South Korea, the electronic Certificate of Origin can be issued by the UNI-PASS and FTA-PASS of the Korea Customs Service. The Web Certification System of the Korea Chamber of Commerce & Industry also is established. But the majority cases of requesting the preferential Certificate of Origin are generally performed by the business partners. The settlement and activation of electronic Certificate of Origin are urgently needed to maximize the effects of FTA, First, this paper examines the application situation of electronic Certificate of Origin throughly. Second, the current circumstances related to electronic Certificate Origin are analyzed in the practical and systematic perspectives. Finally, the improvements for activating electronic Certificate of Origin is suggested.

  • PDF

A Study on Fire Extinguishing Performance of Closed Type Water Mist Nozzles for Ship's Accommodation (선박 거주구역의 방호를 위한 폐쇄형 미분무 노즐의 화재진압성능평가 연구)

  • Kwark, Ji-Hyun;Kim, Young-Han
    • Fire Science and Engineering
    • /
    • v.26 no.1
    • /
    • pp.1-9
    • /
    • 2012
  • Since accommodation, public space and service areas where people stay for all day occupy about 70% of a huge cruise ship, they have to be protected from the fire. International Maritime Organization has resolved that a water mist system should be equipped in this cruise ship according to SOLAS II-2 Reg. 10.6 and FSS code Ch. 7. The water mist system consists of mist nozzles, pressure vessels, section valves and pump unit etc. In particular, the water mist nozzles should be recognized by fire tests in accordance with IMO Res. MSC 265(84). In this study, the fire tests for cabin, corridor, public space and storage area have been conducted to develop the water mist nozzles appropriate to the regulation. Totally 5 types of nozzles were developed and have satisfied the whole performance requirements.

Service Management Scheme using Security Identification Information adopt to Big Data Environment (빅데이터 환경에 적합한 보안 인식 정보를 이용한 서비스 관리 기법)

  • Jeong, Yoon-Su;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.393-399
    • /
    • 2013
  • Recently, the quantity and type of data that is being processed in cloud environment are varied. A method for easy access in different network in a heterogeneous environment of big data stored in the device is required. This paper propose security management method for smoothly access to big data in other network environment conjunction with attribute information between big data and user. The proposed method has a high level of safety even if user-generated random bit signal is modulated. The proposed method is sufficient to deliver any number of bits the user to share information used to secure recognition. Also, the security awareness information bit sequence generated by a third party to avoid unnecessary exposure value by passing a hash chain of the user anonymity is to be guaranteed to receive.

Research on DDoS Detection using AI in NFV (인공지능 기술을 이용한 NFV 환경에서의 DDoS 공격 탐지 연구)

  • Kim, HyunJin;Park, Sangho;Ryou, JaeCheol
    • Journal of Digital Contents Society
    • /
    • v.19 no.4
    • /
    • pp.837-844
    • /
    • 2018
  • Recently, the cloud technology has made dynamical network changes by enabling the construction of a logical network without building a physical network. Despite recent research on the cloud, it is necessary to study security functions for the identification of fake virtual network functions and the encryption of communication between entities. Because the VNFs are open to subscribers and able to implement service directly, which can make them an attack target. In this paper, we propose a virtual public key infrastructure mechanism that detects a fake VNFs and guarantees data security through mutual authentication between VNFs. To evaluate the virtual PKI, we built a management and orchestration environment to test the performance of authentication and key generation for data security. And we test the detection of a distributed denial of service by using several AI algorithms to enhance the security in NFV.

A Design Of Role-based Emergency Medical Information Security System REMISS (역할기반 응급의료정보보안시스템 REMISS의 설계)

  • Kim, Hyung-Hoon;Cho, Jeong-Ran
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.10
    • /
    • pp.185-195
    • /
    • 2014
  • In this paper, we designed a role-based emergency medical information security system REMISS added the security concept to the existing emergency medical information system. Also we suggested a REMISS protocol based on HL7 for using the emergency medical information and the security information. The procedure of security consists of user authentication phase and role/permission assign phase in the REMISS. The REMISS can supply proper security service since the REMISS assign proper permissions to each users of emergency medical information system and allow the user to access the permitted emergency medical information by using security information of the REMISS. There are some advantages that REMISS can adapt to the changing of the role of each user by dynamic exchanging the security information and assigning permissions to each user.

A Study of Message Communication Method Using Attribute Based Encryption in IoT Environment (IoT 환경에서 속성기반 암호화 기술을 활용한 메시지 통신 기법에 관한 연구)

  • Park, Jung-Oh
    • Journal of Digital Convergence
    • /
    • v.14 no.10
    • /
    • pp.295-302
    • /
    • 2016
  • Many countries, especially ICT powers, are supporting IoT-based technology at a national level and this technology is actively being researched in the businesses and research institutes in an aim to develop technology and create an ecosystem. Roads in the Seoul city are building public facilities based on IoT to provide various services and conveniences for the users. However, for the full-fledged introduction and development of IoT, there are many cases where infringement on security and privacy and threat for life and safety happen. Also, as the IoT environment includes various environment technologies such as the existing sensor network, heterogeneous communication network, and devices optimized for the IoT environment, it inherits the existing security threat and various attack techniques. This paper researches the attribute based encryption technology for safe communication in the IoT environment. The data collected from the device is transmitted utilizing the attribute based encryption and by designing the key generation protocol, grades and authorities for the device and users are identified to transmit safe messages.

Legal Issues and Policy Implications of Electronic Commerce Chapters of the Korea·China FTA (한·중 FTA 전자상거래 협정의 주요쟁점과 활용과제)

  • Kwon, Soon-Koog
    • Journal of Digital Convergence
    • /
    • v.13 no.10
    • /
    • pp.9-17
    • /
    • 2015
  • China is the largest e-commerce market in the world. The Chinese online retail market is almost 40% larger than the US, and together these markets account for more than 55% of worldwide e-commerce. The Korea China FTA is likely to facilitate e-commerce activity between the two countries, as well as trade in the goods and services that enable e-commerce. Korean consumer goods can enjoy the benefits of the FTA because it has a competitive advantage in the Chinese market in terms of technology and quality. The purpose of this study is to examine legal issues of e-commerce chapters of the Korea China FTA and policy implications. Results of the study show that several implications based on the export vitalization of cross-border e-commerce of Korean products are offered. The Korean government needs to do the following: prepare for the subsequent negotiation of the e-commerce agreement, prepare for the classification issue of electronic transmissions, require mutual recognition of electronic authentication and electronic signatures, prepare for e-commerce dispute settlement mechanism and establish of strategies for the export vitalization of e-commerce.