• Title/Summary/Keyword: Key Management System

Search Result 1,989, Processing Time 0.033 seconds

The Performance and Implication of A Market-oriented Health Care System in United States (미국 시장지향 의료체계의 성과와 시사점)

  • Lee, Key-Hyo
    • Korea Journal of Hospital Management
    • /
    • v.9 no.1
    • /
    • pp.1-21
    • /
    • 2004
  • The United States has a unique health care system, which is unlikely any other health care systems in the world. The major part of basic functional components of the system -financing, insurance, delivery, and payment- is in private hands. A market-oriented economy invites the participation of numerous private entities that are interested in carrying out the key functions of health systems. Due to this central feature, U.S.health care is not delivered through a network of interrelated components designed to work together coherently. For lack of standardization, the various components of the system fit together only loosely. The involvement of numerous players in the key functions leads to duplication, overlap, inadequacy, inconsistency, and waste, which add to the complexity and also make the system inefficient. Hence, cost containment remains an elusive goals. Moreover, the system falls short of delivering equitable services to all americans, though consumption of health care services is the largest in the world. On the other hand, United States leads the world in the latest and the best in medical technology, medical training, and research. It offers some of the most sophisticated institutions, products, and processes of health care delivery. This article discuss the characteristic features of the U.S. health care system. and its performance, trying to seek its implication on Korean health care system.

  • PDF

A Proposition for Smart Warehouse Management System (SWMS) through IoT (IoT를 채용한 스마트 창고관리 시스템 설계 제안)

  • Kim, Jun Yeong;Jeon, Byeong-Woo;Hong, Dae Geun;Suh, Suk-Hwan
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.11 no.2
    • /
    • pp.85-93
    • /
    • 2015
  • Warehouse Management System (WMS) is a key control for Material Handling System (MHS) and Inventory Control System (ICS). How to design and implement for WMS is crucial factor for achieving the key performance index for Manufacturing Industry. In particular, iron and steel making industry, where the volume and weight is large and hence FIFO (First Input First Out) is not working, how to design WMS is a key factor. In this paper, we systematically define the problem of WMS via developing StR (Stakeholders' Requirements) or ORD (Operational Requirement Documents), SyR (System Requirement), and SA (System Architecture) based on the emerging technologies. In particular, IoT (Internet of Things), CPS (Cyber Physical System) concepts and enabling technologies haves been incorporated in developing Smart WMS. The deliverables of the research can provide a conceptual framework for developing the next generation industrial WMS.

Enhancement of Signal-to-noise Ratio Based on Multiplication Function for Phi-OTDR

  • Li, Meng;Xiong, Xinglong;Zhao, Yifei;Ma, Yuzhao
    • Current Optics and Photonics
    • /
    • v.2 no.5
    • /
    • pp.413-421
    • /
    • 2018
  • We propose a novel methodology based on the multiplication function to improve the signal-to-noise ratio (SNR) for vibration detection in a phi optical time-domain reflectometer system (phi-OTDR). The extreme-mean complementary empirical mode decomposition (ECEMD) is designed to break down the original signal into a set of inherent mode functions (IMFs). The multiplication function in terms of selected IMFs is used to determine a vibration's position. By this method, the SNR of a phi-OTDR system is enhanced by several orders of magnitude. Simulations and experiments applying the method to real data prove the validity of the proposed approach.

An Information System Architecture for Extracting Key Performance Indicators from PDM Databases (PDM 데이터베이스로부터 핵심성과지표를 추출하기 위한 정보 시스템 아키텍쳐)

  • Do, Namchul
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.39 no.1
    • /
    • pp.1-9
    • /
    • 2013
  • The current manufacturers have generated tremendous amount of digitized product data to efficiently share and exchange it with other stakeholders or various software systems for product development. The digitized product data is a valuable asset for manufacturers, and has a potential to support high level strategic decision makings needed at many stages in product development. However, the lack of studies on extraction of key performance indicators(KPIs) from product data management(PDM) databases has prohibited manufacturers to use the product data to support the decision makings. Therefore this paper examines a possibility of an architecture that supports KPIs for evaluation of product development performances, by applying multidimensional product data model and on-line analytic processing(OLAP) to operational databases of product data management. To validate the architecture, the paper provides a prototype product data management system and OLAP applications that implement the multidimensional product data model and analytic processing.

A Case Study on the Analysis of Success and Fail Factors for ERP System Build-up (ERP 구축의 성공/실패요인 분석에 관한 사례연구)

  • 박종만;한상찬
    • Journal of the Korea Safety Management & Science
    • /
    • v.2 no.4
    • /
    • pp.71-90
    • /
    • 2000
  • This study proposes strategical, practical guide to build up ERP system through several case studies to large company and comparative analysis of success and fail factors. Key words in paper .is in summary of previous BPR and ERP studies, try to clarify relationship between BPR and ERP, derivative seeking of practical key success factors through several real cases studies to build up ERP system which is in-house development or customization of commercial package.

  • PDF

Actual Condition and Issues for Mobile Security System

  • Sakurai, Kouichi;Fukushima, Kazuhide
    • Journal of Information Processing Systems
    • /
    • v.3 no.2
    • /
    • pp.54-63
    • /
    • 2007
  • The high-speed mobile Internet has recently been expanded, many attractive services are provided. However, these services require some form of security-related technology. This paper outlines Japanese mobile services and exposits some mobile security topics including mobile spam, mobile malware, mobile DRM system, mobile WiMAX security, and mobile key management.

Overview of SAE/LTE security

  • Prasad, Anand R.;Zhang, Xiaowei
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.2 no.1
    • /
    • pp.36-43
    • /
    • 2013
  • This paper provides an overview of the security in the System Architecture Evolution (SAE) / Long-Term Evolution (LTE) system. Security is an integral part of SAE/LTE with improvements over the Third Generation (3G) system. This paper reviews the SAE/LTE system architecture, and discusses the security requirements, algorithms, Authentication and Key Agreement (AKA), Security Mode Command (SMC), key hierarchy and security for mobility.

  • PDF

A Study on the Application of QFD Application Model for Target Performance and Cost Setting of The Weapon System (무기체계 목표성능과 목표비용 설정을 위한 품질기능전개(QFD) 응용모델 연구)

  • Lee, Tae Hwa;Hong, Sung Hoon;Kwon, Hyuck Moo;Lee, Min Koo
    • Journal of Korean Society for Quality Management
    • /
    • v.46 no.4
    • /
    • pp.821-842
    • /
    • 2018
  • Purpose: To derive key requirements and key technologies for weapon system acquisition business by using Qualify Function Deployment (QFD), and to reduce business cost by setting the target performance and key expense of weapon system. Methods: We propose a QFD methodology that can induce rational decision-making by translating analyst's subjective opinions into quantitative values when analyzing requirements at the initial stage of weapon system development project. Based on QFD methodology, QFD application model combining house of quality, value engineering, and analogy cost estimating technique is presented. Results: It was possible to analyze the specific requirements necessary for the development of the weapon system, to solve the communication problem of the participants, to set clear development direction and target. Conclusion: By applying the QFD application model at the early stage of the weapon system acquisition project, it is possible to reduce the business cost by establishing clear development direction and goal through the procedural analysis process.

Secure Key Management Framework in USN Environment using Certificateless Public Keys (USN 환경에서 비인증서 공개키를 사용하는 보안키 관리 프레임워크)

  • Heo, Joon;Hong, Choong-Seon
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.6
    • /
    • pp.545-551
    • /
    • 2009
  • In this paper, we propose the secure key management framework to connect USN with different network. Although connected USN with different network has no CA (Certificate Authority), it is important to use public key based cryptography system because this network consists of numerous devices. The proposed mechanisms focus on device authentication and public/private key management without existing PKI system of IP network. To solve no CA and certificate problems, the IDC (Identity Based Cryptography) concept is adopted in our proposed mechanism. To verify the possibility of realization, we make an effort to implement the proposed mechanisms to real system. In the test bed, both USN and PLC network are connected to IP network; and proposed mechanisms are implemented to PLC and sensor devices. Through this test using the proposed mechanism, we met the similar performance with symmetric algorithms on key generation and update process. Also, we confirmed possibility of connection between different network and device authentication.

Advanced Key Management Architecture Based on Tree Structure for Secure SCADA Communications (안전한 SCADA 통신을 위한 트리 기반의 효율적인 키 관리 구조)

  • Choi, Dong-Hyun;Lee, Sung-Jin;Jeong, Han-Jae;Kang, Dong-Joo;Kim, Hak-Man;Kim, Kyung-Sin;Won, Dong-Ho;Kim, Seung-Joo
    • The KIPS Transactions:PartC
    • /
    • v.16C no.1
    • /
    • pp.37-50
    • /
    • 2009
  • The SCADA(Supervisory Control And Data Acquisition) system is a control system for infrastructure of nation. In the past, the SCADA system was designed without security function because of its closed operating environment. However, the security of the SCADA system has become an issue with connection to the open network caused by improved technology. In this paper we review the constraints and security requirements for SCADA system and propose advanced key management architecture for secure SCADA communications. The contributions of the present work are that our scheme support both message broadcasting and secure communications, while the existing key management schemes for SCADA system don't support message broadcasting. Moreover, by evenly spreading much of the total amount of computation across high power nodes (MTU or SUB-MTU), our protocol avoids any potential performance bottleneck of the system while keeping the burden on low power (RTU) nodes at minimal.