• Title/Summary/Keyword: 취약지 분석

Search Result 1,623, Processing Time 0.03 seconds

The Experience of Cancer Survivor's Return to Everyday Life (암 생존자의 일상생활 복귀 경험)

  • Kim, Seon-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.5
    • /
    • pp.327-336
    • /
    • 2020
  • This study was undertaken to identify ways that enable a successful comeback to everyday life and improvement in the quality of life, by understanding the experiences of cancer survivors in returning to everyday life. Totally, 19 people diagnosed with complete cure after 5 years of cancer treatment, were recruited for the study. Data was collected through in-depth interviews from January 18 to February 25, 2017. One-time interviews took 90 to 120 minutes, and data analysis was achieved by applying the grounded theory. The central phenomenon of 'reality that cannot be escaped' and 'uncertain reality that cannot know tomorrow' was attributed to the causal conditions 'hard reality', 'physical exhaustion', 'psychological exhaustion' and 'economic exhaustion'. Depending on context conditions such as 'lack of family support', 'shift to a vulnerable working class', 'insufficient support system', 'hope for the societal support system', 'daunted gender', 'prejudice against cancer/cancer patients', 'information on life after rare full healing'. The strategy for a successful return was influenced by intervention conditions such as 'robust family fence' and 'effective cancer insurance', which resulted in 'building a new life' or 'enduring'. We conclude that for a successful return to daily lives, cancer survivors require comprehensive information, health and social-welfare interventions.

Development of mobile-application based cognitive training for Menopausal Women with Cognitive Complaints (갱년기 여성을 위한 앱 기반의 인지기능훈련 프로그램 개발)

  • Kim, Ji-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.5
    • /
    • pp.150-166
    • /
    • 2020
  • Based on the theory of cognitive reserve, we undertook this study to develop a cognitive function training program for woman in menopausal transition with complaints of declining in cognitive function. The program was established by applying the analysis, design, and development stages of the network-based instructional system designed by Jung. The cognitive function training program developed by us is an was an 8-week program composed of cognitive and video training using a mobile application. The program consists of 24 sessions, each with 20-30 minutes of duration, to be completed 3 sessions per week. The contents of the cognitive function training comprise of memory, attention, language function, and scenario-based problem-solving for executive functions, all of which are cognitive areas found to be the most vulnerable for menopausal women. The educational contents were developed for eight subject areas, one subject area per week, including the definition of menopause, its causes and symptoms, menopause and brain function, etc. During the pilot test, the cognitive function training program was applied to 10 menopausal women who complained of cognitive function decline. The results indicated that, after eight weeks of training, the overall cognitive function of participants increased, revealing statistically significant differences (t=-3.04, p=.014) after the program was completed. The mobile app-based cognitive function training program might not only improve patients' memory functions but also potentially reduce the incidence of dementia.

Design of V2I Based Vehicle Identification number In a VANET Environment (VANET 환경에서 차대번호를 활용한 V2I기반의 통신 프로토콜 설계)

  • Lee, Joo-Kwan;Park, Byeong-Il;Park, Jae-Pyo;Jun, Mun-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.12
    • /
    • pp.7292-7301
    • /
    • 2014
  • With the development of IT Info-Communications technology, the vehicle with a combination of wireless-communication technology has resulted in significant research into the convergence of the component of existing traffic with information, electronics and communication technology. Intelligent Vehicle Communication is a Machine-to-Machine (M2M) concept of the Vehicle-to-Vehicle. The Vehicle-to-Infrastructure communication consists of safety and the ease of transportation. Security technologies must precede the effective Intelligent Vehicle Communication Structure, unlike the existing internet environment, where high-speed vehicle communication is with the security threats of a wireless communication environment and can receive unusual vehicle messages. In this paper, the Vehicle Identification number between the V2I and the secure message communication protocol was proposed using hash functions and a time stamp, and the validity of the vehicle was assessed. The proposed system was the performance evaluation section compared to the conventional technique at a rate VPKI aspect showed an approximate 44% reduction. The safety, including authentication, confidentiality, and privacy threats, were analyzed.

A Study on Support Models for Invigoration of Local Socioeconomic Communities - Focused on Ddabok Communities in Gyeonggi Province - (지역 사회적경제공동체의 활성화를 위한 지원모델에 관한 연구 - 경기도 따복공동체를 중심으로 -)

  • Jang, Ji Eun;Kim, Yeon Bok;O, Min-Suk
    • Journal of the Korean Regional Science Association
    • /
    • v.34 no.3
    • /
    • pp.13-28
    • /
    • 2018
  • This study aimed to suggest the tasks which public support groups should fundamentally perceive and develop support models based on it so that socioeconomic activities, which have been spreading in recent years, can settle in local communities. For this aim, this study was proceeded based on Gyeonggi Province, which has established socioeconomic support center at metropolitan councils and local government councils. The demands by Gyeonggi Province residents toward the policies by Ddabok communities and local community invigoration measures have been examined through demand survey. In the analysis, characteristics and support tasks of the demands have been identified based on the survey results and six support models have been developed according to the tasks. The derived tasks are overcoming low understanding of Ddabok communities, low participation in community activities, and poor will to perform socioeconomic practices and satisfying the demand toward community activity areas adjacent to residence. Furthermore, the differences with the residents who have an experience of taking part in the Ddabok Community Project have to be overcome. Based on these study findings, this study suggested that support models of integration style and differentiated style, response to demand style and customization to capability style, and resources-focused style and resources-scattered style are necessary in order for socioeconomic communities like Ddabok communities to settle in local communities.

Proposal of Security Orchestration Service Model based on Cyber Security Framework (사이버보안 프레임워크 기반의 보안 오케스트레이션 서비스 모델 제안)

  • Lee, Se-Ho;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.7
    • /
    • pp.618-628
    • /
    • 2020
  • The purpose of this paper is to propose a new security orchestration service model by combining various security solutions that have been introduced and operated individually as a basis for cyber security framework. At present, in order to respond to various and intelligent cyber attacks, various single security devices and SIEM and AI solutions that integrate and manage them have been built. In addition, a cyber security framework and a security control center were opened for systematic prevention and response. However, due to the document-oriented cybersecurity framework and limited security personnel, the reality is that it is difficult to escape from the control form of fragmentary infringement response of important detection events of TMS / IPS. To improve these problems, based on the model of this paper, select the targets to be protected through work characteristics and vulnerable asset identification, and then collect logs with SIEM. Based on asset information, we established proactive methods and three detection strategies through threat information. AI and SIEM are used to quickly determine whether an attack has occurred, and an automatic blocking function is linked to the firewall and IPS. In addition, through the automatic learning of TMS / IPS detection events through machine learning supervised learning, we improved the efficiency of control work and established a threat hunting work system centered on big data analysis through machine learning unsupervised learning results.

Research on Landscape Plan Strategy of Urban Waterside Space Buffer Zone - Focused on the Case of the Resilient Perspective of Plan - (도시 수변 완충지역의 경관 계획에 관한 연구 - 탄성 (resilient) 관점의 계획 사례분석을 중심으로 -)

  • Yang, Meng;Hong, Kwan-Seon
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.7
    • /
    • pp.404-416
    • /
    • 2020
  • Flooding is an unavoidable natural disaster for the city. Flood disasters seriously undermine the city's economy, safety, and sustained development. In the course of development and construction of waterfront space in the same city, the construction of basic disaster prevention facilities cannot be avoided completely even if huge amounts of capital are invested to reduce the economic damage of flooding. The cost of rebuilding the city after the disaster is much higher than the cost of building disaster prevention facilities. In recent years, the theory of elasticity in urban reconstruction and so on has been a subject of city problem solving, creating widespread discussion and attention in academia. In other words, how to transform the concept of elasticity into practice based on theoretical and empirical factors is a real problem facing urban disaster. Through theoretical literature on the waterfront (space) buffer zone of a city (flood-weak area) and the case study of the city's practice, this paper tries to clarify the element of 5R, the theory of elastomeric fire prevention, and present detailed measures accordingly. In addition, the following two problems are addressed while emphasizing the feasibility of implementing the urban waterfront (space) plan of the elastomeric element around the urban water buffer zone. First, the means of disaster prevention planning are used to mitigate conflicts between individual utility of urban waterfront and disaster prevention functions in waterfront buffer zones, and second, the waterfront buffer zone can respond to flood-causing problems in terms of disaster prevention as much as possible through the elastic disaster prevention plan.

SNMPv3 Security Module Design and Implementation Using Public Key (공개키를 이용한 SNMPv3 보안 모듈 설계 및 구현)

  • Han, Ji-Hun;Park, Gyeong-Bae;Gwak, Seung-Uk;Kim, Jeong-Il;Jeong, Geun-Won;Song, In-Geun;Lee, Gwang-Bae;Kim, Hyeon-Uk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.1
    • /
    • pp.122-133
    • /
    • 1999
  • Uses can share information and use resources effectively by using TCP/IP-based networks. So, a protocol to manage complex networks effectively is needed. For the management of the distributed networks, the SNMP(Simple Network Management Protocol) has been adopted as an international standard in 1989, and the SNMPv2 in which a security function was added was published in 1993. There are two encryption schemes in SNMPv2, the one is a DES using symmetric encryption scheme and the other is a MD5(Message Digest5) hash function for authentication. But the DES has demerits that a key length is a few short and the encryption and the authentication is executed respectively. In order to solve these problems, wer use a RSA cryptography in this paper. In this paper, we examine the items related with SNMP. In addition to DES and MD5 propose in SNMPv3, we chance security functionality by adopting RSA, a public key algorithm executing the encryption and the authentication simultaneously. The proposed SNMPv3 security module is written in JAVA under Windows NT environment.

  • PDF

Economic Inequality in Perceived Oral Health Behavior among Adults in Korea (한국 성인의 경제적 불평등에 따른 구강건강행태)

  • Kim, Mi-Jeong;Lim, Cha-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.4
    • /
    • pp.439-445
    • /
    • 2018
  • This study was conducted to investigate the status of oral health behavior according to economic inequality in Korea. Raw data for the 3rd year (2015) of the 6th national health and nutrition survey were analyzed. Among surveyed individuals, adults over the age of 19 were designated as research subjects. The results indicated that a smaller 'house income' was associated with a higher supply and demand experience for basic living and a higher DMFT. Additionally, a higher DMFT was associated with a lower 'house income', lower 'education level', and the 'experience of basic living security received'. Oral health behavior inequality was caused by economic inequality. Overall, these results indicate that it is necessary for the oral health service of vulnerable groups to strengthen preventive activities through comprehensive arbitration policies regarding the social decision factors of public health projects.

Prediction of Loss of Life in Downstream due to Dam Break Flood (댐 붕괴 홍수로 인한 하류부 인명피해 예측)

  • Lee, Jae Young;Lee, Jong Seok;Kim, Ki Young
    • Journal of Korea Water Resources Association
    • /
    • v.47 no.10
    • /
    • pp.879-889
    • /
    • 2014
  • In this study, to estimate loss of life considered flood characteristics using the relationship derived from analysis of historical dam break cases and the factors determining loss of life, the loss of life module applying in LIFESim and loss of life estimation by means of a mortality function were suggested and applicability for domestic dam watershed was examined. The flood characteristics, such as water depth, flow velocity and arrival time were simulated by FLDWAV model and flood risk area were predicted by using inundation depth. Based on this, the effects of warning, evacuation and shelter were considered to estimate the number of people exposed to the flood. In order to estimate fatality rates based on the exposed population, flood hazard zone is assigned to three different zones. Then, total fatality numbers were predicted after determining lethality or mortality function for each zone. In the future, the prediction of loss of life due to dam break floods will quantitatively evaluate flood risk and employ to establish flood mitigation measures at downstream applying probabilistic flood scenarios.

Constructing Software Structure Graph through Progressive Execution (점진적 실행을 통한 소프트웨어의 구조 그래프 생성)

  • Lee, Hye-Ryun;Shin, Seung-Hun;Choi, Kyung-Hee;Jung, Gi-Hyun;Park, Seung-Kyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.7
    • /
    • pp.111-123
    • /
    • 2013
  • To verify software vulnerability, the method of conjecturing software structure and then testing the software based on the conjectured structure has been highlighted. To utilize the method, an efficient way to conjecture software structure is required. The popular graph and tree methods such as DFG(Data Flow Graph), CFG(Control Flow Graph) and CFA(Control Flow Automata) have a serious drawback. That is, they cannot express software in a hierarchical fashion. In this paper, we propose a method to overcome the drawback. The proposed method applies various input data to a binary code, generate CFG's based on the code output and construct a HCFG (Hierarchical Control Flow Graph) to express the generated CFG's in a hierarchical structure. The components required for HCFG and progressive algorithm to construct HCFG are also proposed. The proposed method is verified through constructing the software architecture of an open SMTP(Simple Mail Transfer Protocol) server program. The structure generated by the proposed method and the real program structure are compared and analyzed.