• Title/Summary/Keyword: Non-Public Network

Search Result 151, Processing Time 0.025 seconds

Surveillance Programme of Work-related Diseases (WRD) in France

  • Valenty, Madeleine;Homere, Julie;Mevel, Maelaig;Dourlat, Thomas;Garras, Loic;Brom, Magdeleine;Imbernon, Ellen
    • Safety and Health at Work
    • /
    • v.3 no.1
    • /
    • pp.67-70
    • /
    • 2012
  • The surveillance programme of work-related diseases (WRD) is based on a network of occupational physicians who notify all WRD diagnosed during a two-week observation period. The aims are mainly to estimate the prevalence of non-compensated WRD in the working population according to socio economic factors; to determine new indicators of occupational health; to update the lists of compensable occupational diseases; to understand and assess under-compensation and under-notification. The participation rate for occupational physicians is around 33% in 2008. The main WRD are the musculoskeletal disorders, followed by the mental disorders. This 2-week protocol, repeated regularly, provides useful data on frequency of pathologies linked to employment as well as an estimate of unreported WRD subject to compensation or non-compensated WRDs, and the trends of WRDs over the time.

Analysis of Policies in Activating the Infectious Disease Specialist Network (IDSN) for Bioterrorism Events (생물테러 대비 감염전문가 네트워크 운영 활성화 방안 연구)

  • Kim, Yang-Soo
    • Journal of Preventive Medicine and Public Health
    • /
    • v.41 no.4
    • /
    • pp.214-218
    • /
    • 2008
  • Bioterrorism events have worldwide impacts, not only in terms of security and public health policy, but also in other related sectors. Many countries, including Korea, have set up new administrative and operational structures and adapted their preparedness and response plans in order to deal with new kinds of threats. Korea has dual surveillance systems for the early detection of bioterrorism. The first is syndromic surveillance that typically monitors non-specific clinical information that may indicate possible bioterrorism-associated diseases before specific diagnoses are made. The other is infectious disease specialist network that diagnoses and responds to specific illnesses caused by intentional release of biologic agents. Infectious disease physicians, clinical microbiologists, and infection control professionals play critical and complementary roles in these networks. Infectious disease specialists should develop practical and realistic response plans for their institutions in partnership with local and state health departments, in preparation for a real or suspected bioterrorism attack.

Assessment on Location Characteristics of Urban Park as Public Service Using Geographic Information Analysis System: Focused on Cheongju City (지리정보분석시스템을 활용한 공공서비스로서의 도시공원 입지특성 평가 - 충북 청주시를 대상으로 -)

  • Bae, Min-Ki
    • Journal of Environmental Impact Assessment
    • /
    • v.22 no.3
    • /
    • pp.231-240
    • /
    • 2013
  • The Purpose of this research was to propose positioning strategies of urban park (UP) based on the assessment of location characteristics at cheongju city. To do that, this research found out urban park service area (UPSA) using GIS network analysis and built socio-economic attribute database, UP map, and other public service thematic maps such as public transportation, education, child-care, and convenience services. And this research analyzed spatial and attribute data using Pearson's correlation analysis, multiple linear regression, and binary logistic regression methods. As a result of this analysis, 1) the nearer neighborhood park and children's park, the higher land price and assumption income level (AIL). 2) children's parks were closed to living convenience facilities such as bank, hospital, and convenience store. 3) land price, AIL, population, and other public services level (PSL) in UPSA were higher than that of non-UPSA. 4) The higher land price, AIL, population, and other PSL, the higher urban park service level. The results of this research may contribute to resolve the regional UP unbalance and to improve UP service level as public service.

Access Control of Visiting Mobile Node on the Foreign Domain Network in Mobile IPv6

  • Park, Sugil;Masayuki Abe;Kim, Kwangjo
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.495-498
    • /
    • 2002
  • The need for network protection, accounting and resource management in foreign administrative domain requires appropriate security services. In this paper, we propose an access control protocol to support the authentication between mobile node and visiting subnet. Our hybrid way of approach aims to reduce computational overhead and minimize the use of network bandwidth. We also propose non-certificate based public-key cryptography to provide non-repudiation, which does not require CRL retrieval and certificate validation.

  • PDF

A Study on the Mixed-use Educational Facilities by Private Investment - focused on the Non Benefits Public-Private Partnerships - (민간투자사업을 통한 학교시설복합화 방안에 관한 연구 - 비영리 공공민간협력(n-BPPP)방식을 중심으로 -)

  • Park, Yeol;Yang, Kwan-Mok
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.24 no.6
    • /
    • pp.19-26
    • /
    • 2017
  • The aim of this study is to suggest an improvement of BTL in Educational Facilities applying the concept of n-BPPP(non-Benefits Public-Private Partnerships). The research is based on four of ninety-nine completed projects of Mixed-use Educational Facilities since 2001. Ninety-nine projects are analyzed and categorized to the typology of architectural program. The architectural programs planned are uniform in function, such as gym, swimming pool, library, info-center, parking etc. The public parking is a main program in the BTL projects, where district offices are involved as partner. The difference between BTL and n-BPPP for educational facilities is the business units. The n-BPPP concerns in regional or district units in order to expand public infrastructure facilities based on the network of schools and local community. And the fund for n-BPPP does not come from the government but from the investors. The economic interest is to reinvest on the maintenance of the facilities. The benefits of n-BPPP will be not only for the Governments in terms of social welfare budgets but also for local residents and students in terms of a variety of high-quality public services. The concept of n-BPPP can be an alternative way for the Mixed-use Educational Facilities.

A study on a security model for the establishment of a non-face-to-face smart work working environment in a physical network separation environment of public institutions (공공기관 물리적 망분리 환경에서의 비대면 스마트워크 근무 환경구축을 위한 보안 모델 연구)

  • Park, Sang-Kil;Kim, Gi-Bong;Son, Gyeong-Ja;Lee, Won-Suk;Park, Jae-Pyo
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.10
    • /
    • pp.37-44
    • /
    • 2020
  • Due to the recent COVID 19 pandemic, public institutions are increasingly working from home. Working in public institutions is rapidly changing into a smart work environment where time and space constraints disappear. However, many public institutions currently lack a security model for an efficient smart work environment due to the physical network separation system that separates the Internet network and the business network. Therefore, in this paper, we describe the current limitations for implementing smart work in a physical network separation environment of public institutions, and propose a security model necessary for a work environment to supplement them. As a related study, explain SSL VPN and explain smart work business model through security model research of SDP (Software Defined Perimeter), RDP (Remote Desktop Protocol), and VDI (Virtual Desktop Infrastructure) to overcome the security limitations of SSL VPN. As a result, we intend to propose a security model for a smart work environment suitable for public institutions while complying with the physical network separation security guide.

Improving Disaster Response System Using Network - Focused on Korea and Japan's Disaster Cases - (네트워크를 통한 효율적 재난대응체계 구축 - 한국과 일본의 재난 사례를 중심으로 -)

  • Ryu, Sang-Il;Ahn, Hye-Won
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.2
    • /
    • pp.170-179
    • /
    • 2007
  • The present study purposed to establish a network for building an efficient disaster response system and for this purpose, we compared cases of disaster response in Japan and Korea. In Japan, disasters are responded jointly through the network of the central government, local self governing bodies and non governmental organizations. In Korea, however, the cooperative network among different areas is weak and this is aggravating damages caused by disasters. That is, in Korea, disaster response services have been mainly carried out by the public sector. The public sector can operate a powerful disaster management system using its extensive management resources, compelling power, and legal authorities. However, it was found that, due to the characteristics of contemporary society, efforts by the public sector including the central government and the local self government bodies have limitations in managing disasters effectively. Thus, for efficient disaster response in Korea, it is urgently required to establish a national disaster response network as well as a private sector cooperation system and to induce NGOs to participate in the disaster response system through institutional devices.

Latest Trends of ISDN (ISDN의 최근동향)

  • Park, Hang-Gu
    • Electronics and Telecommunications Trends
    • /
    • v.4 no.1
    • /
    • pp.35-43
    • /
    • 1989
  • The evolution of telecommunications has raised the profile of many segments of the network that were not previously considered important. Until recently, basic telephony existed with the extension of passive cables without any particular user network interface. In the area of data communications, the introduction of flexible packet switching has allowed the network to evolve in a far more efficient manner. To overcome such separated network problems and business needs of both users and network providers, the integrated narrowband ISDN concept is being developed in most countries for implementation in the public switched telephone network (PSTN). The targets of ISDN, in my opinion, can be explained as follows : To the user, ISDN should provide the services at any time, at any place, through any media. To the business customer using PABX or LAN applications, ISDN should introduce customized services rapidly and also, ISDN should be developed by the modular hardware and software design approach in order for new services to be introduced rapidly and effectively. Software can be also developed by non-expert local staff to cater for adopting new user's service requirements immediately. Finally, ISDN will be able to increase business chances and benefit both users and operating companies.

Generalized K Path Searching in Seoul Metropolitan Railway Network Considering Entry-Exit Toll (진입-진출 요금을 반영한 수도권 도시철도망의 일반화 K-경로탐색)

  • Meeyoung Lee
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.6
    • /
    • pp.1-20
    • /
    • 2022
  • The basic way to charge vehicles for using road and public transport networks is the entry-exit toll system. This system works by reading Hi-Pass and public transportation cards of the vehicles using card readers. However, the problems of navigating a route in consideration of entry-exit toll systems include the non-additive costs of enumerating routes. This problem is known as an NP-complete task that enumerates all paths and derives the optimal path. So far, the solution to the entry-exit toll system charging has been proposed in the form of transforming the road network. However, unlike in the public transport network where the cards are generalized, this solution has not been found in situations where network expansion is required with a transfer, multi-modes and multiple card readers. Hence, this study introduced the Link Label for a public transportation network composed of card readers in which network expansion is bypassed in selecting the optimal path by enumerating the paths through a one-to-one k-path search. Since the method proposed in this study constructs a relatively small set of paths, finding the optimal path is not burdensome in terms of computing power. In addition, the ease of comparison of sensitivity between paths indicates the possibility of using this method as a generalized means of deriving an optimal path.

Implementation of an RFID Key Management System for DASH7

  • Vegendla, Aparna;Seo, Hwajeong;Lee, Donggeon;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.1
    • /
    • pp.19-25
    • /
    • 2014
  • The wireless sensor networking standard DASH7 operates in low-power communication with a better transmission quality in active RFID networks. The DASH7 security standard supports public key cryptography. At present, the DASH7 standard uses the message authentication code in the network layer for authentication and integrity. However, its security standard is still in an incubation stage with respect to the implementation of a crypto exchange over a DASH7 network. Effective key management is an important factor for privacy and security. If organizations are not careful about where and how keys are stored, they leave the encrypted data vulnerable to theft. In this regard, we present a key management system designed for efficient key management through public key infrastructure authentication as well as a non-repudiation feature for the DASH7 standard. We analyze the performance of the proposed system on a basis of various performance criteria such as latency and throughput.