• Title/Summary/Keyword: Key sharing

Search Result 611, Processing Time 0.028 seconds

The Competency in Disaster Nursing of Korean Nurses: Scoping Review (국내 간호사의 재난간호 역량: 주제범위 문헌고찰)

  • Lee, Eunja;Yang, Jungeun
    • Journal of East-West Nursing Research
    • /
    • v.27 no.2
    • /
    • pp.153-165
    • /
    • 2021
  • Purpose: The aim of study was to identify ranges of Korean nurses' competency in disaster nursing. Methods: A scoping review was conducted using the Joanna Briggs Institute methodology. The review used information from four databases: RISS, ScienceON, EBSCO Discovery Service, and CINAHL. In this review, key words were 'disaster', 'nurs*', 'competenc*', 'ability' and 'preparedness'. Inclusion and exclusion criteria were identified as strategies to use in this review. The inclusion criteria for this review focused on the following: Korean nurse, articles related to disaster nursing competency, peer-review articles published in the full text in Korean and English. Review articles were excluded. Results: Nineteen studies were eligible for result extraction. A total of 10 categories of disaster nursing competency were identified: Knowledge of disaster nursing, crisis management, disaster preparation, information collection and sharing, nursing record and document management, communication, disaster plan, nursing activities in disaster response, infection management, and chemical, biological, radiation, nuclear, and explosive management. Conclusion: It is necessary to distinguish between Korean nurses' common disaster nursing competency, professional disaster nursing competency, and disaster nursing competency required in nursing practice. Therefore, future research will be needed to explore and describe disaster nursing competency.

A Dynamic QoS Adjustment Enabled and Load-balancing-aware Service Composition Method for Multiple Requests

  • Wu, Xiaozhu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.3
    • /
    • pp.891-910
    • /
    • 2021
  • Previous QoS-aware service composition methods mainly focus on how to generate composite service with the optimal QoS efficiently for a single request. However, in the real application scenarios, there are multiple service requests and multiple service providers. It is more important to compose services with suboptimal QoS and maintain the load balance between services. To solve this problem, in this paper, we propose a service composition method, named as dynamically change and balancing composition method (DCBC). It assumes that the QoS of service is not static, and the services can adjust the value of QoS to gain more opportunities to be selected for composition. The method mainly includes two steps, which are the preprocessing step and the service selection step. In the preprocessing step, a backward global best QoS calculation is performed which regarding the static and dynamic QoS respectively; then guided by the global QoS, the feasible services can be selected efficiently in the service selection step. The experiments show that the DCBC method can not only improve the overall quality of composite services but also guarantee the fulfill ratio of requests and the load balance of services.

Analysis of Blockchain Software Vulnerability against OS Command Injection Attack (블록체인 소프트웨어의 취약점을 이용한 OS 커맨드 인젝션 공격에 대한 연구)

  • Kim, Byoungkuk;Hur, Junbeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.309-320
    • /
    • 2019
  • Blockchain has been developed as a key technology for many cryptocurrency systems such as Bitcoin. These days, blockchain technology attracts many people to adopt it to various fields beyond cryptocurrency systems for their information sharing and processing. However, with the development and increasing adoption of the blockchain, security incidents frequently happen in the blockchain systems due to their implementation flaws. In order to solve this problem, in this paper, we analyze the software vulnerabilities of Bitcoin and Ethereum, which are the most widely used blockchain applications in real world. For that purpose, we conduct an in-depth analysis of source code of them to detect software vulnerabilities, and examine an OS command injection attack exploiting the detected ones.

Energy Efficiency Optimization for multiuser OFDM-based Cognitive Heterogeneous networks

  • Ning, Bing;Zhang, Aihua;Hao, Wanming;Li, Jianjun;Yang, Shouyi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.2873-2892
    • /
    • 2019
  • Reducing the interference to the licensed mobile users and obtaining the energy efficiency are key issues in cognitive heterogeneous networks. A corresponding rate loss constraint is proposed to be used for the sensing-based spectrum sharing (SBSS) model in cognitive heterogeneous networks in this paper. Resource allocation optimization strategy is designed for the maximum energy efficiency under the proposed interference constraint together with average transmission power constraint. An efficiency algorithm is studied to maximize energy efficiency due to the nonconvex optimal problem. Furthermore, the relationship between the proposed protection criterion and the conventional interference constraint strategy under imperfect sensing condition for the SBSS model is also investigated, and we found that the conventional interference threshold can be regarded as the upper bound of the maximum rate loss that the primary user could tolerate. Simulation results have shown the effectiveness of the proposed protection criterion overcome the conventional interference power constraint.

Evolution of PKI Internet Banking in Korea

  • Park, Seungchul
    • International journal of advanced smart convergence
    • /
    • v.8 no.1
    • /
    • pp.44-57
    • /
    • 2019
  • Most banks in Korea have provided Internet banking services based on PKI(Public Key Infrastructure) certificates since the early 2000s when Internet banking began in Korea. To support PKI Internet banking, the Korean government backed the electronic signature law and supported the rapid spread of PKI-based Internet banking by regulating the application of PKI certificates to be compulsory in Internet banking until 2015. PKI Internet Banking in Korea has been developed as a pioneer in this field through many challenges and responses until its present success. Korea's PKI banking, which started with soft-token-based closed banking, has responded to various types of cyber attack attempts and promoted the transition to open banking by accepting various criticisms due to lack of compatibility with international standards. In order to improve the convenience and security of PKI Internet banking, various attempts have been made, such as biometric-integrated smartphone-based PKI authentication. In this paper, we primarily aim to share the experience and lessons of PKI banking by analyzing the evolution process of PKI Internet banking in Korea. It also has the purpose of presenting the challenges of Korea's PKI Internet banking and sharing its development vision.

HPC Technology Through SC20 (SC20를 통해 본 HPC 기술 동향)

  • Eo, I.S.;Mo, H.S.;Park, Y.M.;Han, W.J.
    • Electronics and Telecommunications Trends
    • /
    • v.36 no.3
    • /
    • pp.133-144
    • /
    • 2021
  • High-performance computing (HPC) is the underpinning for many of today's most exciting new research areas, to name a few, from big science to new ways of fighting the disease, to artificial intelligence (AI), to big data analytics, to quantum computing. This report captures the summary of a 9-day program of presentations, keynotes, and workshops at the SC20 conference, one of the most prominent events on sharing ideas and results in HPC technology R&D. Because of the exceptional situation caused by COVID-19, the conference was held entirely online from 11/9 to 11/19 2020, and interestingly caught more attention on using HPC to make a breakthrough in the area of vaccine and cure for COVID-19. The program brought together 103 papers from 21 countries, along with 163 presentations in 24 workshop sessions. The event has covered several key areas in HPC technology, including new memory hierarchy and interconnects for different accelerators, evaluation of parallel programming models, as well as simulation and modeling in traditional science applications. Notably, there was increasing interest in AI and Big Data analytics as well. With this summary of the recent HPC trend readers may find useful information to guide the R&D directions for challenging new technologies and applications in the area of HPC.

Chuna Manual Therapy for Lateral Epicondylitis: A Systematic Review (외측상과염의 추나 치료에 대한 체계적 문헌 고찰)

  • Han, Dayoung;Lee, Jiyoon;Nam, Suhyun;Son, Jungmin;Jung, Dahae;Jo, Hyemi
    • Journal of Korean Medicine Rehabilitation
    • /
    • v.32 no.3
    • /
    • pp.65-75
    • /
    • 2022
  • Objectives This study was conducted to analyze the therapeutic effect of Chuna therapy for lateral epicondylitis. Methods Key words such as lateral epicondylitis and Chuna were searched in 10 databases (National Digital Science Library [NDSL], Oriental Medicine Advanced Searching Integrated System [OASIS], Research Information Sharing Service [RISS], Koreanstudies Information Service [KISS], KMBASE, Cochrane Library, PubMed, EMBASE, J-STAGE, China Academic Jurnals [CAJ]), and only suitable randomized controlled trials (RCTs) were selected. Results 8 RCTs were finally selected, and Chuna therapy showed positive results for lateral epicondylitis compared to western medicine, acupuncture, warm-acupuncture and Chinese medicine iontophoresis. Conclusions In this study, we finally reviewed 8 studies about Chuna therpay used for lateral epicondylitis. The studies showed that Chuna therapy is effective in treating lateral epicondylitis. However, because all of selected studies were found in Chinese database, more high-quality clinical trials about Chuna therapy for lateral epicondylitis are needed in Korea.

A Study on the Organizational Resilience of Netflix

  • Song, Minzheong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.40-50
    • /
    • 2022
  • The purpose of this study is to prove the global OTT, Netflix's organizational resilience (OR). For this, we review previous literatures regarding Netflix's OR and the theoretical logic of the OR. Then, we investigate Netflix's organizational culture (OC), corporate structure and business strategies based on the five levers of the OR. As a result, the first lever, the coordination makes Netflix to get rid of the inner wall by creating Netflix terms like 'sunshining,' and 'postmortem,' which makes their employees extraordinarily candid with each other. The second lever, the cooperation provides employees with understanding customers by sharing company and service information openly and broadly through transparent board system, billboard advertising, etc. The third lever, the clout allows Netflix to encourage independent decision-making by their employees. Netflix customers are under scrutiny and served 24/7 via live chat or phone by supporting a high-performance workplace. The fourth lever, the capabilities are related to Netflix's keeping highly effective people and it establishes a culture of highly motivated employees. The "dream team" policy is run by what is known as the "keeper test." The last lever, the connections make Netflix to forge external strategic partnership to stay agile. There is no rule for partnering with key content producers by allowing creative freedom to them.

Development Direction of the Military Intelligent Platform Infrastructure (국방 지능형 플랫폼 기반체계 발전방향)

  • Pyeon, Dohoo;Kim, Sungtae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.58-61
    • /
    • 2022
  • As data is evaluated as a key asset for digital transformation, efficient and stable management of data, smooth sharing data, and provision of services using data are also required in the defense. To support this, the Korean military is laying the foundation for the Military Artificial Intelligence Platform which is a defense data management infrastructure. In this paper, we examine the data strategies and data platform promotion directions of Korea and major advanced groups, and we look for suggestion and present the direction of development of the Military Intelligent Platform. We are expected that it can contribute to the establishment of a safe and efficient defense data management infrastructure for the Korean military.

  • PDF

CBDC Model with Enhanced Anonymity Using ID Certificate andBlockchain Encryption (익명인증서 및 블록체인 암호화로 익명성이 강화된 디지털화폐 모델)

  • Jae-ho Yoon;Yong-min Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.139-149
    • /
    • 2023
  • CBDC has characteristics similar to e-payments in which all records are kept by logs, so it is difficult to satisfy the anonymity level of cash. Therefore, in this study, the CBDC model that encrypts all transaction contents using the Diffie-Hellman key sharing algorithm was presented to enhance anonymity. The proposed model provides unlinkability anduntraceability. In addition, a CBDC certificate that uses pseudonym is used. Through this certificate, illegal transactions that require tracking can be tracked later by authorized institutions.