• Title/Summary/Keyword: Permission System

Search Result 277, Processing Time 0.023 seconds

Development of A System for Registration of Korean Terminology on The Electropedia

  • Moon, Bonghee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.8
    • /
    • pp.105-111
    • /
    • 2019
  • In this paper, I introduce the development of a system to register Korean standard technical terms which are corresponded with English electronical terminologies on the Electropedia of the International Electronical Committee(IEC). In 2016, this project was started with the permission of registration at the Technical Committee 1 of the $80^{th}$ IEC General Meeting in Frankfurt, Germany. The work was consisted of 3 parts, the 1st step was gathering Korean vocabularies and building a databse for the translation of English terms of International Electronical Vocabulary(IEV) into Korean terms, the 2nd step was to find correct or proper Korean term which is in accord with each English term of IEV on the Electropedia. In this step, members of Korean TC 1 worked for search proper Korean terms using developed computer programs and databases which were made of Korean electronical dictionaries. After selection of proper terms, they did the cross-checking work for Korean terms each other. The last step was to register all of these Korean terms on the Electropedia. As a result, 20,766 Korean electronical terms were registered on the Electropedia in 2017. In the future, it is needed that the definition of English technical terms are translated into Korean.

A Study on Improvement of Aeronautical Study System for Potential Obstacles in the Vicinity of Aerodromes (공항 주변 잠재적 장애물에 대한 항공학적 검토 제도 개선 연구)

  • Lee, Daekyum;Yun, Seokjae;Park, Bomi;Kim, Jechul;Kim, Jun-Hyuk
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.29 no.4
    • /
    • pp.166-172
    • /
    • 2021
  • Obstacle Limitation Surfaces (OLS) are set to protect a certain amount of airspace to limit objects, such as building, other structures, penetrating OLS for safety and regularity of aircraft operations in the vicinity of aerodromes. However, many civil petitions have been raising for effective utilization of lands and permission of building construction which penetrating OLS. While Republic of Korea are limiting installation of penetrating objects based on the National law of airport facilities, such objects are possibly permitted, only if, the possible risks coming from objects are acceptable or negligible in terms of safety and regularity in aircraft operations through the evaluation process, called as an aeronautical study. However, many countries are currently applying their own criteria, processes resulting in failing secure reliable results in aeronautical study. This research aims to establish the framework on criteria, process, and methodologies how the aeronautical study works including work flows between many stakeholder and responsibilities to be specified in national regulation system.

Seismic Fragility of Low-rise Piloti Buildings Designed According to KDS 41 17 00 (KDS 41 17 00에 따라 설계된 저층 필로티 건물의 지진 취약도)

  • Joo, Changhyeok;Kim, Taewan
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.26 no.2
    • /
    • pp.49-58
    • /
    • 2022
  • The 2017 Pohang earthquake caused severe damage to low-rise piloti buildings. The damage was caused mainly by column shear failure, and some core walls were as well. The damaged piloti buildings in Pohang City could be relieved if they were designed correctly according to the standards at that time. However, the post-earthquake investigation revealed design, construction, and permission problems. To solve the problems, the Piloti Building Structure Design Guidelines that include strict specifications were published in 2018. Separately, KDS 41 17 00, the seismic design standard for buildings, was enacted in 2019 and it included the guideline contents. Therefore, at least after the publication of the guidelines, piloti buildings, designed by the standard and guidelines, can be expected to possess better seismic performance than existing piloti buildings. To confirm this, the probability of exceedance for several damage state thresholds was estimated for existing and designed piloti buildings. As a result, the probability of damage of designed piloti buildings was very low compared to existing ones. Consequently, it was confirmed that the guideline and standard adequately supplement the structural fragility of existing piloti buildings.

Android Malware Detection using Machine Learning Techniques KNN-SVM, DBN and GRU

  • Sk Heena Kauser;V.Maria Anu
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.202-209
    • /
    • 2023
  • Android malware is now on the rise, because of the rising interest in the Android operating system. Machine learning models may be used to classify unknown Android malware utilizing characteristics gathered from the dynamic and static analysis of an Android applications. Anti-virus software simply searches for the signs of the virus instance in a specific programme to detect it while scanning. Anti-virus software that competes with it keeps these in large databases and examines each file for all existing virus and malware signatures. The proposed model aims to provide a machine learning method that depend on the malware detection method for Android inability to detect malware apps and improve phone users' security and privacy. This system tracks numerous permission-based characteristics and events collected from Android apps and analyses them using a classifier model to determine whether the program is good ware or malware. This method used the machine learning techniques KNN-SVM, DBN, and GRU in which help to find the accuracy which gives the different values like KNN gives 87.20 percents accuracy, SVM gives 91.40 accuracy, Naive Bayes gives 85.10 and DBN-GRU Gives 97.90. Furthermore, in this paper, we simply employ standard machine learning techniques; but, in future work, we will attempt to improve those machine learning algorithms in order to develop a better detection algorithm.

Referral Patterns and Needs for Specialist Care among Patient Referred from Health Center (보건소의 진료의뢰 양상과 의뢰환자들의 전문과목 요구도)

  • Hwang, Tae-Yoon;Kim, Chang-Yoon;Kang, Pock-Soo
    • Journal of Preventive Medicine and Public Health
    • /
    • v.29 no.1 s.52
    • /
    • pp.133-143
    • /
    • 1996
  • This study was conducted to assess the referral patterns to specialist from general practitioners in health center and perceived needs of referred patients for specialist care in health center. The study subjects were 249 patients who visited to health centers and were referred to other medical facilities. The data were obtained from questionnaire survey which was conducted in Kyongju-City Health Center, Seongju-Gun Health Center and Koryong-Gun Health Center in Kyongsangbuk-Do, from June 10 to October 17, 1995. The total referral rate was 2.7%. The proportion of patients who wished to be referred to medical specialists was 85.9%, and the proportion of patients referred by general practitioners in health centers was 14.1%. Among the patients who wished to be referred to medical specialists, 45.9% visited directly to health centers, 34.6% visited health centers via local clinics and 19.5% visited health centers to get referral permission only. The reasons for getting referral permission in health centers were easy geographical accessibility(34.6%), easy to get referral permission in health centers(27.1%), and very difficult to get referral permission in local clinics(16.4%). Among the diseases of referred patients, diseases of the musculoskeletal system and connective tissue were most prevalent on a whole, but diseases of nervous system and sensory organs were comparatively high among the patients who wished to be referred to medical specialists and infectious and parasitic diseases were comparatively high among the patients referred by general practitioners in health centers. The most favorable medical facility was general hospital including university hospital in both groups of patients who wished to be referred to medical specialist and the patient referred by general practitioners in health centers. Regarding the needs for specialist care in health center, 75.2% of patients who wished to be referred to medical specialists and 74.3% of patients referred by general practitioners in health center wanted the specialist care. The most frequently requested specialty is internal medicine(47.1%), and then orthopedics and general surgery. Based on above results, this study revealed that the majority of patients referred from health center wished to be referred to medical specialists at their own will, so, referral system at health center level should be changed. And if specialist care in health center be provided, the medical care by internist could be provided first, and then that of orthopedics and general surgery could be provided. These kinds of medical cares could be covered by local clinicians as a part-time job on a voluntary basis.

  • PDF

A Design Of Role-based Emergency Medical Information Security System REMISS (역할기반 응급의료정보보안시스템 REMISS의 설계)

  • Kim, Hyung-Hoon;Cho, Jeong-Ran
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.10
    • /
    • pp.185-195
    • /
    • 2014
  • In this paper, we designed a role-based emergency medical information security system REMISS added the security concept to the existing emergency medical information system. Also we suggested a REMISS protocol based on HL7 for using the emergency medical information and the security information. The procedure of security consists of user authentication phase and role/permission assign phase in the REMISS. The REMISS can supply proper security service since the REMISS assign proper permissions to each users of emergency medical information system and allow the user to access the permitted emergency medical information by using security information of the REMISS. There are some advantages that REMISS can adapt to the changing of the role of each user by dynamic exchanging the security information and assigning permissions to each user.

Permission Management System for Secure IoT Devices in Android-Based IoT Environment (안드로이드 기반 IoT 환경에서 안전한 IoT 디바이스를 위한 권한 관리 시스템)

  • Park, In Kyu;Kwak, Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.2
    • /
    • pp.59-66
    • /
    • 2018
  • Android Things is an Android-based platform running in Google's IoT environment. Android smartphones require permissions from application users to use certain features, but in the case of Android Things, there is no display to send request notifications to users. Therefore Does not make a request to use the permissions and automatically accepts the permissions from the system. If the privilege is used indiscriminately, malicious behavior such as system failure or leakage of personal information can be performed by a function which is not related to the function originally. Therefore, By monitoring the privileges that a device uses in an Android-based IoT system, users can proactively respond to security threats that can arise through unauthorized use of the IoT system. This paper proposes a system that manages the rights currently being used by IoT devices in the Android Things based IoT environment, so that Android-based IoT devices can cope with irrelevant use of rights.

Research on Subject Business of Prior Review System on the Influence of Disasters - Based on Quarrying Industry - (사전재해영향성검토협의 대상사업에 관한 연구 - 채석사업을 중심으로 -)

  • Na, Young;Kim, Hwan-Gi
    • Journal of Environmental Impact Assessment
    • /
    • v.16 no.5
    • /
    • pp.319-325
    • /
    • 2007
  • Recently, since the risk on natural disasters is increasing due to abnormal weather such as the global warming, a need for a system on prior review on the influence of disasters has emerged in order to establish a solution by analyzing elements of disaster in advance. However, since the inherently destroying business namely the quarrying business is excluded from the range of subject business of Prior Review System on the influence of disasters, a correction for this is required. In order to actually explore how much risk it contains, actual outflow of soil and flood in the quarrying block where quarrying is being currently carried out was examined and the required undercurrent facility capacity which is also used as a grit chamber was investigated. In addition, by comparing the soil outflow of industrial complexes and golf courses which are current subject businesses of Prior Review on the Influence of Disasters and that of rock mountains relative risk level was examined. After investigation, it was found that the risk on occurrence of disasters was increased due to increase in outflow of soil and flood because of the change of land condition during and after development thus an adequate solution to decrease is required. In addition, after comparison with other business groups it was found that a significantly higher amount of soil is outflown in case of rock mountains thus it was analyzed that a solution to decrease is required. Therefore, a correction is immediately required in order to include quarrying business in the subject business of Prior Review System on the Influence of Disasters.

The Development of Evaluation Criteria Model for Discriminating Specialized General Hospital (종합전문요양기관 인정기준 모형 개발)

  • Chun Ki Hong;Kang Hye-Young;Kang Dae Ryong;Nam Chung Mo;Lee Gye-Cheol
    • Health Policy and Management
    • /
    • v.15 no.4
    • /
    • pp.46-64
    • /
    • 2005
  • This study was conducted to verify the current criteria and classification system used to determine specialized general hospitals status. In this study, we proposed a new classification system which Is simpler and more convenient than the current one. In the new classification system clinical procedure was chosen as the unit of analysis in order to reflect all the resource consumption and the complexities and degree of medical technologies in determining specialized general hospitals. We developed a statistical model and applied this model to 117 general hospitals which claim their national insurance through electronic data interchange(EDI). Analysis based on 984 clinical procedures and medical facilities' characteristic variable discriminated specialized general hospital in present without misclassification. It means that we can determine specialized general hospital's permission In new way without using the current complicated criteria. This study discriminated specialized general hospital by the new proposed model based on clinical procedures provided by each hospital. For clustering the same types of medical facilities using 984 clinical procedures, we executed multidimensional scale analysis and divided 117 hospitals into 4 groups by two axises : a variety of procedure and the Proportion of high technology Procedure. Therefore, we divided 117 hospitals into 4 groups and one of them was considered as specialized general hospital. In discriminating analysis, we abstracted proportion of 16 clinical procedures which effect on discriminating the specialized general hospital in statistical system also we identify discriminating function which include these variables. As a result, we identify 2 discriminating functions, one is for current discriminating system and the other two is for new discriminating system of specialized general hospital.

Design of the Access Control System for MS-WORD Document System (MS-Word 문서 접근 제어시스템 설계)

  • Jang, Seung-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.10
    • /
    • pp.1405-1411
    • /
    • 2018
  • This paper designs access control system for MS-word(Microsoft-word) document system. The system designed in this paper uses the document-related information by analyzing the MS-word document structure. It is designed to block access to users who can not access the modified information by partially modifying MS-word document information. This makes it impossible to read documents other than those who have access to the MS-word document. This allows you to control access to the MS-word document. A user with access to the MS-word document will be able to retrieve the modified information back to the original information so that the document can be read normally. In this paper, we design and implement experiments. In the experiment, we performed document access if MS-word document information was modified. Experimental results show that the MS-word access control system operates normally.