• Title/Summary/Keyword: 위험 식별

Search Result 381, Processing Time 0.03 seconds

An Analysis of the Professional's Cognition Regarding the Plant Factory Feasibility (식물공장 사업타당성에 관한 전문가 인식 연구)

  • Lee, Ji-Eun;Cha, WoonCheol
    • Journal of Digital Convergence
    • /
    • v.13 no.12
    • /
    • pp.89-97
    • /
    • 2015
  • Plant factory was started in Europe in the 1960. Thanks to the development of seeds science, nutrient study, environment control technology and automated systems, it has developed into the form of full artificial light system. In recent years, productivity of plant factory has increased with the convergence of ICT. An interest in plant factory has increased with several outstanding achievements. However, the plant factory industry is still stuck at an introductory stage and government investment has been reduced. In order to verify the feasibility of the plant factory, we conducted a survey targeting experts in politics, R&D and business field. We analyze the feasibility of investment in plant factory and strategies to enhance the competitiveness of plant factory.

Comparison of the Usefulness of Diagnostic Tests for Rheumatoid Arthritis (류마티스 관절염 진단을 위한 검사의 유용성 비교)

  • Park, Chang-Eun
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.47 no.4
    • /
    • pp.168-174
    • /
    • 2015
  • Rheumatoid arthritis (RA) is a chronic inflammatory disease, which is mainly characterized by disease of joints affected with synovial hyperplasia, pathological immune response, and progressive destruction; all of which represent an important social health problem. These provide new insights in its pathogenesis of rheumatoid arthritis diagnosis and disease progression in molecular changes. This review focuses on new serological and immunological markers which seem to be useful in early diagnosis and prognosis of rheumatoid arthritis. Therefore, such tests are widely conducted for serological biomarkers and the developments with such immunological factors to identify patients who are at risk for disease progression. This evidence of the disease based on laboratory medicine could provide the best outcome for patients. Finally, data from recent studies will help to refine the ultimate usefulness of this novel approach for early diagnosis, treatment, and helping clinicians to optimize therapy by using this approach.

A Study on the Risk Identification Methods for Initial and Mass Production Stage of Military Products Using FMEA (FMEA를 활용한 군수품 초도 생산 및 양산 단계의 위험 식별 방안 연구)

  • Lee, Chang Hee;Yang, Kyung Woo;Park, Du Il;Lee, Il Lang;Kwon, Jun Sig;Choe, Il Hong;Kim, Sang Boo
    • Journal of Korean Society for Quality Management
    • /
    • v.42 no.3
    • /
    • pp.311-324
    • /
    • 2014
  • Purpose: It can deduce improvement plan that recognizes any risk factors in initial production and mass production by using FMEA and through this process, the appropriate criteria for defence items can be established. Methods: It proposes two methodology - Apply DT/OT data achieved from the beginning mass production stage based on FMECA data of the design stage, to risk management, and risk management plan that reflected line and field faliure data in case of is offered. Results: It proposes the risk management plan through Bayesian method and the risk identification that considered MTTF estimated value in case of initial production process. In case of mass production process, both risk identification by using fault occurrence frequency scores and Byaesian method, In case of the Initial production and mass production, it proposes use both two methods. Conclusion: A more realistic risk identification method can be applied, and by this method the quality improvement effect is expected.

A Proposal of Privacy Protection Method for Location Information to Utilize 5G-Based High-Precision Positioning Big Data (5G 기반 고정밀 측위 빅데이터 활용을 위한 위치정보 프라이버시 보호 기법 제안)

  • Lee, Donghyeok;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.679-691
    • /
    • 2020
  • In the future, 5G technology will become the core infrastructure driving the 4th industrial era. For intelligent super-convergence service, it will be necessary to collect various personal information such as location data. If a person's high-precision location information is exposed by a malicious person, it can be a serious privacy risk. In the past, various approaches have been researched through encryption and obfuscation to protect location information privacy. In this paper, we proposed a new technique that enables statistical query and data analysis without exposing location information. The proposed method does not allow the original to be re-identified through polynomial-based transform processing. In addition, since the quality of the original data is not compromised, the usability of positioning big data can be maximized.

Research on the Use of Pseudonym Data - Focusing on Technical Processing Methods and Corporate Utilization Directions - (가명 데이터 활용연구 - 기술적 처리방법 및 기업의 활용방향을 중심으로 -)

  • Kim, Jung-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.253-261
    • /
    • 2020
  • This study examines the technologies and application processes related to the use of pseudonym data of companies after the passage of the Data 3 Act to activate the data economy in earnest, and what companies should prepare to use pseudonym data and what will happen in the process It was intended to contribute to the elimination of uncertainty. In the future, companies will need to extend the information security management system from the perspective of the existing IT system to manage and control data privacy protection and management from a third party provisioning perspective. In addition, proper pseudonym data use control should be implemented even in the data use environment utilized by internal users. The economic effect of market change and heterogeneous data combination due to the use of pseudonymized data will be very large, and standards for appropriate non-identification measures and risk assessment criteria for data utilization and transaction activation should be prepared in a short time.

Security Education Training Program Characteristics needed to Development Task of Security Software in Security Majors of 5 Universities of Seoul Region (서울지역 5개 대학 보안 전공들의 보안소프트웨어의 개발 직무에 필요한 보안 교육 훈련 프로그램 특성)

  • Hong, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.5
    • /
    • pp.16-22
    • /
    • 2020
  • In this paper, the technology and capabilities required for the job of developing security software recommended by the Cybersecurity Human Resources Development Framework of the National Initiative for Cybersecurity Education (NICE) were studied. In this paper, we describe what security skills are needed for the task of developing security software and what security capabilities should be held. The focus of this paper is to analyze the consistency between security technologies (core and specialized technologies) required for security software development tasks and the curriculum of information protection-related departments located in Seoul, Korea. The reason for this analysis is to see how the curriculum at five universities in Seoul is suitable for performing security software development tasks. In conclusion, if the five relevant departments studied are to intensively train developers of development tasks for security software, they are commonly required to train security testing and software debugging, how secure software is developed, risk management, privacy and information assurance.

SOA Vulnerability Evaluation using Run-Time Dependency Measurement (실행시간 의존성 측정을 통한 SOA 취약성 평가)

  • Kim, Yu-Kyong;Doh, Kyung-Goo
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.2
    • /
    • pp.129-142
    • /
    • 2011
  • Traditionally research in Service Oriented Architecture(SOA) security has focused primarily on exploiting standards and solutions separately. There exists no unified methodology for SOA security to manage risks at the enterprise level. It needs to analyze preliminarily security threats and to manage enterprise risks by identifying vulnerabilities of SOA. In this paper, we propose a metric-based vulnerability assessment method using dynamic properties of services in SOA. The method is to assess vulnerability at the architecture level as well as the service level by measuring run-time dependency between services. The run-time dependency between services is an important characteristic to understand which services are affected by a vulnerable service. All services which directly or indirectly depend on the vulnerable service are exposed to the risk. Thus run-time dependency is a good indicator of vulnerability of SOA.

Analysis of Threat Agent for Important Information Systems (중요 정보시스템 위협원에 대한 분석)

  • Kim, Tai-Hoon;Kim, Seok-Soo;Park, Gil-Cheol
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.2
    • /
    • pp.203-208
    • /
    • 2007
  • Because the networks and systems become more complex, the implementation of the security countermeasures for important Information Systems becomes more critical consideration. The designers and developers of the security policy should recognize the importance of building security countermeasures by using both technical and non-technical methods, such as personnel and operational facts. Security countermeasures may be made for formulating an effective overall security solution to address threats at all layers of the information infrastructure. But all these works can be done after assuming who is the threat agent. In this paper we identify the treat agents for information systems, summarize the characteristics of threat agents, and apply weighting factors to them.

  • PDF

A Fundamental Study on Advanced VTS System through Statistic Analyzing Traffic Accidents in VTS area (해양사고 통계분석을 통한 VTS 개선방안에 관한 기초연구)

  • Lee, Hyong-Ki;Chang, Seong-Rok;Park, Young-Soo
    • Journal of Navigation and Port Research
    • /
    • v.33 no.8
    • /
    • pp.519-524
    • /
    • 2009
  • Although it is expected to provide fundamental data for advanced VTS system by analyzing traffic accidents in VTS area, there is no quantitative analysis to find it.. In this research, it is examined and analyzed marine casualties records(1999-2004), data of Port-MIS and data of each VTS center. The results of this research are as below. 1) It is necessary to reduce traffic accident and to improve VTS operating system. 2) It is discovered for statistical discrepancy between vessels controlled by VTS and vessels not controlled by VTS in accident cause, visibility, perception distance and cause of late perception in collision accidents 3) It is necessary for VTS assistance to be positive and to made in ample time consecutively. 4) As the result of traffic accident prediction model, it is necessary to develop a system improving VTS operators' ability to identify dangerous ships.

An Empirical Study on Tracking Table for Consistency and Completeness Validation in the Outputs (산출물의 일관성과 완전성 검증을 위한 추적테이블의 경험적 연구)

  • Kim, Ju-Young;Rhew, Sung-Yul
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.5
    • /
    • pp.419-430
    • /
    • 2007
  • It is very important to track whether software is properly developed according to requirements. This study suggests a method to track requirements by using a tracking table. In this study, the tracking table indicates why such requirements are included by detailing the content of requests for proposals and proposals. The table also facilitates verification of the consistency between outputs and the integrity by having ID codes of each requirement mapped to each output. Furthermore, as this study was conducted, it was found that some factors were required to be added or supplemented to the outputs at the requirement gathering stage of MaRMI-Ⅲ v.4.0 methodology. Thus, this study seeks to present this additional result along with the enhanced tracking table. By verifying outputs, the tracking table presented in this study will help to reduce all kinds of risks and problems that may occur in software development due to the lack of management of requirements. In addition, the output of the requirement-gathering stage of MaRMI-Ⅲ v.4.0 methodology will be improved/supplemented according to the creation of tracking tables; this will increment the applicability of the MaRMI-III methodology.