• Title/Summary/Keyword: Secure

Search Result 9,557, Processing Time 0.04 seconds

A Study on the Necessity of Verification and Certification System of Inspection and Diagnostic Equipment for Infrastructure using Advanced Technologies (첨단 시설물 점검 및 진단장비 검·인증제도 도입 필요성에 대한 연구)

  • Hong, Sung-Ho;Kim, Jung-Gon;Cho, Jae-Young;Kim, Twae-Hwan
    • Journal of the Society of Disaster Information
    • /
    • v.16 no.1
    • /
    • pp.163-177
    • /
    • 2020
  • Purpose: While it is very important to maintain facilities recently, the introduction and its application of high technology in the facility maintenance industry has increased. It is necessary for high technology to secure reliability through the verification and certification system of diagnostic equipment to have an effective impact in the field, but there is difference between the industry's perspective and realistic level of technology apart from social demand for the system of the system. This paper dealt with the introduction of a verification and certification system for rational facility diagnostic equipment with the opinion survey on managers about the current situation. Method: Survey is carried out targeting managers in the maintenance and construction regarding the necessity and urgency of introducing a verification and certification system to promote the introduction and its application of high technology of diagnostic equipment and facility inspection. Also, the introduction to a verification and certification system was reviewed for advanced facility diagnostic equipment through foreign research about similar systems and comparative analysis of similar systems related to the certification of 21 domestic equipment. Result: It showed that, regarding the application of high technology, it is necessary for most managers to introduce high technology such as drones, robots, etc., in the maintenance industry, and when high technology is introduced, it will have a considerable effect in the field. On the other hand, the current technology level in Korea is relatively low, so it turned out to take a certain amount of time for the application of technology. Also, it was found that the management of reliable facility diagnostic equipment will be possible through the introduction of the verification and certification system for facility diagnosis equipment. Meanwhile, the survey is conducted on similar systems about foreign and domestic diagnosis and measuring equipment, etc., but there is no system to verify and certify equipment applied with high technology directly to facility diagnosis maintenance. However, because Japan has a system of verifying the performance of diagnostic equipment and South Korea has 21 similar inspection and diagnostic equipment certification systems among 186 certification systems, it is considered to be possible to design systems which utilize them. Conclusion: According to the managers' opinion, it seems that the introduction of the system supporting the application of 4th industrial technology for the equipment and the use of the equipment with high reliability has sufficient validity. However, because our high technology level is undervalued compared to the urgency, the system for checking high technology facilities and certifying diagnostic equipment should be to be implemented in form of escalation considering technical use and verification level. Apart from the introduction of the verification and certification system, it is necessary for special investment, support and efforts to promote advanced facility diagnostic equipment.

Relationship between Stomach Volume and Tumor Location in Radiation Treatment for Hepatic Tumors (간 종양의 방사선치료에서 위내용적과 종양 위치 간의 관계)

  • Jeon, Mi-Jin;Lee, Chang-Geol;Lee, Ik-Jae;Choi, Won-Hoon;Choi, Yun-Sun;Shin, Dong-Bong;Kim, Jong-Dae;Kim, Sei-Joon;Ha, Jin-Suk;Cho, Yoon-Jin
    • The Journal of Korean Society for Radiation Therapy
    • /
    • v.22 no.2
    • /
    • pp.75-83
    • /
    • 2010
  • Purpose: It aims to evaluate the location change and tendency of hepatic and intrahepatic tumors according to gastric volume and change of location. Materials and Methods: It studied 9 patients with hepatic tumors who visited Gangnam Severance Hospital from March 2009 to April 2010 and who underwent CT or PET (Positron Emission Tomography) within 2 weeks before CT-simulation. The patients fasted for 6 hours before CT-simulation and drank 240~250 cc of water just before CT or PET for image fusion. Those two types of images were fused to RTP (Radiation Treatment Planning, Pinnacle 8.0h) focusing on bone structure of individual patients. Results: They drank 240~260 cc of water but their stomach volume after drinking water varied from 259.3 cc to 495.4 cc. Even though individual differences existed in the change of stomach volume before and after drinking water, the volume was increased by 130 cc (174%) on average. The change in absolute distance between the centers of tumors ranged from 0.52 cm to 3.04 cm (1.52 cm on average); from 0.1 cm to 1.35 cm (0.44 cm on average) in cranial-caudal direction; from 0.05 cm to 2.75 cm (1.22 cm on average) in left-right direction; and from 0.05 cm to 1.85 cm (0.33 cm on average) in ventral-dorsal direction. Conclusion: It is hard to predict the movement of tumors by observing stomach movement, due to great individual differences; however, it was observed that the location of hepatic tumors was right-sided as the stomach was filled with water. Thus, it is recommended to maintain the fastened state to secure the accuracy of hepatic tumor treatment. If it cannot maintain the fastened state, it is recommended to measure stomach volumes and movement in the patient to consider the movement of hepatic tumors before radiation treatment.

  • PDF

A Study on the Stereotype of ICT SMEs' R&D: Empirical Evidence from Korea (ICT 중소기업 R&D의 스테레오타입에 대한 연구 : 한국의 사례를 중심으로)

  • Jun, Seung-pyo;Choi, San;Jung, JaeOong
    • Journal of Korea Technology Innovation Society
    • /
    • v.20 no.2
    • /
    • pp.334-367
    • /
    • 2017
  • The ICT industry has been the main driver of Korea's economy with international competitiveness and is expected to be the growth engine that will revitalize the currently depressed economy. A broad range of different perspectives and opinions on the industry exist in Korea and overseas. Some of these are stereotypes, not all of which are based on objective evidence. Stereotypes refer to widely-held fixed opinions on a specific group and do not necessarily have negative connotations. However, they should not be viewed lightly because they can substantially affect decision-making process. In this regard, this study sought to review the stereotypes of ICT industry and identify objective and relative stereotypes. In the study, a decision-tree analysis was conducted on a survey result of 3,300 small and medium-sized enterprises (SMEs) in order to identify Korean ICT companies' characteristics that distinguish them from other technology companies. The decision-tree analysis, a data mining process based on machine learning, took a total of 291 variables into account in 10 subjects such as: corporate business in general, technology development activities as well as organization and people in technology development. Identifying the variables that distinguish ICT companies from other technology companies with the decision-tree analysis, the study then came up with a list of objective stereotypes of ICT companies. The findings from the stereotypes of Korean ICT companies are as follows. First, the companies are in need of technology policies that help R&D planning and market penetration. Second, policies must better support the companies working to sell new products or explore new business. Third, the companies need policies that support secure protection of development outcomes and proper management of IP rights. Fourth, the administrative procedures related to governmental support for ICT companies' R&D projects must be simplified. It is hoped that the outcome of this study will provide meaningful guidance in establishment, implementation and evaluation of technology policies for ICT SMEs, particularly to policymakers or researchers in relevant government agencies who determine R&D policies for ICT SMEs.

Anchor Hole Augmentation with Bone Cement in Arthroscopic Rotator Cuff Repair (관절경적 회전근 개 봉합술에서 골 시멘트를 이용한 봉합 나사 구멍 보강술)

  • Lee, Ho-Min;Tae, Suk-Kee;Park, Jeong-Min
    • Clinics in Shoulder and Elbow
    • /
    • v.13 no.2
    • /
    • pp.237-243
    • /
    • 2010
  • Purpose: In arthroscopic rotator cuff repair, the crucial step is secure fixation of Anchor to bone. However, osteoporosis of the tuberosity is frequently encountered in old patients, and can cause insecure fixation of anchors. The Aim of our study was to introduce a technique for anchor hole augmentation with bone cement when fixation failure of an anchor occurs, and to investigate the outcome. Materials and methods: Among 223 rotator cuff repairs performed between 2005 and 2009, anchor hole augmentation with polymethylmethacrylate was performed in 15 cases (all females; mean age of 65 years: range 49~77). Bone cement was injected into the anchor hole in a thick fluid state and the procedure was repeated to make a pot-like cement mantle. The anchor was inserted into the cement mantle while the cement hardened. The outcome was investigated, on average, at 16 months (6~32). Results: Radiographs showed cystic changes of the tuberosity. On follow-up radiographs and MRI, a change in the cement mantle was not noted. The final average UCLA score was 31 (28~35); 6 had excellent, 8 good and 1 fair results (p=0.008). Age-sex matched Constants score was 90 (74~98) (p=0.008). Conclusion: Anchor hole augmentation with bone cement is useful when fixation failure of an anchor is encountered due to bone atrophy. Anchor hole augmentation with bone cement does not negatively influence the outcome.

A Study on the RFID's Application Environment and Application Measure for Security (RFID의 보안업무 적용환경과 적용방안에 관한 연구)

  • Chung, Tae-Hwang
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.155-175
    • /
    • 2009
  • RFID that provide automatic identification by reading a tag attached to material through radio frequency without direct touch has some specification, such as rapid identification, long distance identification and penetration, so it is being used for distribution, transportation and safety by using the frequency of 125KHz, 134KHz, 13.56MHz, 433.92MHz, 900MHz, and 2.45GHz. Also it is one of main part of Ubiquitous that means connecting to net-work any time and any place they want. RFID is expected to be new growth industry worldwide, so Korean government think it as prospective field and promote research project and exhibition business program to linked with industry effectively. RFID could be used for access control of person and vehicle according to section and for personal certify with password. RFID can provide more confident security than magnetic card, so it could be used to prevent forgery of register card, passport and the others. Active RFID could be used for protecting operation service using it's long distance date transmission by application with positioning system. And RFID's identification and tracking function can provide effective visitor management through visitor's register, personal identification, position check and can control visitor's movement in the secure area without their approval. Also RFID can make possible of the efficient management and prevention of loss of carrying equipments and others. RFID could be applied to copying machine to manager and control it's user, copying quantity and It could provide some function such as observation of copy content, access control of user. RFID tag adhered to small storage device prevent carrying out of item using the position tracking function and control carrying-in and carrying-out of material efficiently. magnetic card and smart card have been doing good job in identification and control of person, but RFID can do above functions. RFID is very useful device but we should consider the prevention of privacy during its application.

  • PDF

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Semi-automated Tractography Analysis using a Allen Mouse Brain Atlas : Comparing DTI Acquisition between NEX and SNR (알렌 마우스 브레인 아틀라스를 이용한 반자동 신경섬유지도 분석 : 여기수와 신호대잡음비간의 DTI 획득 비교)

  • Im, Sang-Jin;Baek, Hyeon-Man
    • Journal of the Korean Society of Radiology
    • /
    • v.14 no.2
    • /
    • pp.157-168
    • /
    • 2020
  • Advancements in segmentation methodology has made automatic segmentation of brain structures using structural images accurate and consistent. One method of automatic segmentation, which involves registering atlas information from template space to subject space, requires a high quality atlas with accurate boundaries for consistent segmentation. The Allen Mouse Brain Atlas, which has been widely accepted as a high quality reference of the mouse brain, has been used in various segmentations and can provide accurate coordinates and boundaries of mouse brain structures for tractography. Through probabilistic tractography, diffusion tensor images can be used to map comprehensive neuronal network of white matter pathways of the brain. Comparisons between neural networks of mouse and human brains showed that various clinical tests on mouse models were able to simulate disease pathology of human brains, increasing the importance of clinical mouse brain studies. However, differences between brain size of human and mouse brain has made it difficult to achieve the necessary image quality for analysis and the conditions for sufficient image quality such as a long scan time makes using live samples unrealistic. In order to secure a mouse brain image with a sufficient scan time, an Ex-vivo experiment of a mouse brain was conducted for this study. Using FSL, a tool for analyzing tensor images, we proposed a semi-automated segmentation and tractography analysis pipeline of the mouse brain and applied it to various mouse models. Also, in order to determine the useful signal-to-noise ratio of the diffusion tensor image acquired for the tractography analysis, images with various excitation numbers were compared.

The Impact of Perceived Risks Upon Consumer Trust and Purchase Intentions (인지된 위험의 유형이 소비자 신뢰 및 온라인 구매의도에 미치는 영향)

  • Hong, Il-Yoo B.;Kim, Woo-Sung;Lim, Byung-Ha
    • Asia pacific journal of information systems
    • /
    • v.21 no.4
    • /
    • pp.1-25
    • /
    • 2011
  • Internet-based commerce has undergone an explosive growth over the past decade as consumers today find it more economical as well as more convenient to shop online. Nevertheless, the shift in the common mode of shopping from offline to online commerce has caused consumers to have worries over such issues as private information leakage, online fraud, discrepancy in product quality and grade, unsuccessful delivery, and so forth, Numerous studies have been undertaken to examine the role of perceived risk as a chief barrier to online purchases and to understand the theoretical relationships among perceived risk, trust and purchase intentions, However, most studies focus on empirically investigating the effects of trust on perceived risk, with little attention devoted to the effects of perceived risk on trust, While the influence trust has on perceived risk is worth studying, the influence in the opposite direction is equally important, enabling insights into the potential of perceived risk as a prohibitor of trust, According to Pavlou (2003), the primary source of the perceived risk is either the technological uncertainty of the Internet environment or the behavioral uncertainty of the transaction partner. Due to such types of uncertainty, an increase in the worries over the perceived risk may negatively affect trust, For example, if a consumer who sends sensitive transaction data over Internet is concerned that his or her private information may leak out because of the lack of security, trust may decrease (Olivero and Lunt, 2004), By the same token, if the consumer feels that the online merchant has the potential to profit by behaving in an opportunistic manner taking advantage of the remote, impersonal nature of online commerce, then it is unlikely that the merchant will be trusted, That is, the more the probable danger is likely to occur, the less trust and the greater need to control the transaction (Olivero and Lunt, 2004), In summary, a review of the related studies indicates that while some researchers looked at the influence of overall perceived risk on trust level, not much attention has been given to the effects of different types of perceived risk, In this context the present research aims at addressing the need to study how trust is affected by different types of perceived risk, We classified perceived risk into six different types based on the literature, and empirically analyzed the impact of each type of perceived risk upon consumer trust in an online merchant and further its impact upon purchase intentions. To meet our research objectives, we developed a conceptual model depicting the nomological structure of the relationships among our research variables, and also formulated a total of seven hypotheses. The model and hypotheses were tested using an empirical analysis based on a questionnaire survey of 206 college students. The reliability was evaluated via Cronbach's alphas, the minimum of which was found to be 0.73, and therefore the questionnaire items are all deemed reliable. In addition, the results of confirmatory factor analysis (CFA) designed to check the validity of the measurement model indicate that the convergent, discriminate, and nomological validities of the model are all acceptable. The structural equation modeling analysis to test the hypotheses yielded the following results. Of the first six hypotheses (H1-1 through H1-6) designed to examine the relationships between each risk type and trust, three hypotheses including H1-1 (performance risk ${\rightarrow}$ trust), H1-2 (psychological risk ${\rightarrow}$ trust) and H1-5 (online payment risk ${\rightarrow}$ trust) were supported with path coefficients of -0.30, -0.27 and -0.16 respectively. Finally, H2 (trust ${\rightarrow}$ purchase intentions) was supported with relatively high path coefficients of 0.73. Results of the empirical study offer the following findings and implications. First. it was found that it was performance risk, psychological risk and online payment risk that have a statistically significant influence upon consumer trust in an online merchant. It implies that a consumer may find an online merchant untrustworthy if either the product quality or the product grade does not match his or her expectations. For that reason, online merchants including digital storefronts and e-marketplaces are suggested to pursue a strategy focusing on identifying the target customers and offering products that they feel best meet performance and psychological needs of those customers. Thus, they should do their best to make it widely known that their products are of as good quality and grade as those purchased from offline department stores. In addition, it may be inferred that today's online consumers remain concerned about the security of the online commerce environment due to the repeated occurrences of hacking or private information leakage. Online merchants should take steps to remove potential vulnerabilities and provide online notices to emphasize that their website is secure. Second, consumer's overall trust was found to have a statistically significant influence on purchase intentions. This finding, which is consistent with the results of numerous prior studies, suggests that increased sales will become a reality only with enhanced consumer trust.

Changes in Soil Physical Properties in Various Sizes of Container as Influenced by Packing Amount of Coir Dust Containing Root Media (다양한 규격의 포트에서 코이어더스트를 포함한 혼합상토의 충전밀도 차이에 의해 유발된 물리성 변화)

  • Park, Eun Young;Choi, Jong Myung
    • Horticultural Science & Technology
    • /
    • v.31 no.6
    • /
    • pp.720-725
    • /
    • 2013
  • When highly shrinkable materials such as coir dust are major component of root media, the degrees of compaction during container filling of root media severely influences the physical properties of root media. It results in the changes in total porosity (TP), container capacity (CC) and air-filled porosity (AFP). This research was conducted to secure the fundamental information in changes of soil physical properties as influenced by the compaction of root media during container filling. To achieve this, three root media were formulated by blending coir dust (CD) with expanded rice hull (CD + ERH, 8:2, v/v), carbonized rice hull (CD + CRH, 6:4) and ground and raw pine bark (CD + GRPB, 8:2). Based on the optimum bulk density, the amount of root media filled into 6.0, 7.5, 8.5, 10.5 and 12.5 cm were adjusted to 90, 100, 110, 120 and 130% based on the weight of root media. Then the changes in TP, CC, and AFP were measured. Elevation of the packing amount of root media in all sizes of pot resulted in the decrease of TP. But the decrease was more severe in CD + ERH and CD + CRH than those in CD + GRPB. The CC also decreased gradually as the packing amounts were elevated in three root media, but the decreases were severe as the container sizes became larger. The AFP decreased drastically by the elevation of the packing amount of root media in all sizes of pot. The AFP was the highest in CD + CRH medium when pot sizes were smaller than 7 cm, but that was the highest in CD + ERH when the pot sizes were larger than 8.5 cm among the 3 root media tested. In this research, the elevation of packing amount of three root media influenced more severely the AFP rather than CC. This result indicates that the packing amount should be controlled to maintain appropriate level of AFP because AFP rather than CC influence severely crop growth. The results obtained through this study can be used to predict the changes in physical properties of root media as influenced by packing amount in various sizes of pots.

Study on Characteristics of Community and Ecology of Fishes in the Newly Constructed Gunwi Dam Reservoir (신규로 건설된 군위댐 호내 어류 군집 및 생태적 특성에 관한 연구)

  • Lee, Jin-Woong;Yoon, Ju-Duk;Kim, Jeong-Hui;Park, Sang-Hyeon;Baek, Seung-Ho;Chang, Kwang-Hyeon;Jang, Min-Ho
    • Korean Journal of Ecology and Environment
    • /
    • v.48 no.4
    • /
    • pp.219-228
    • /
    • 2015
  • To secure water resources, dams are normally constructed on the upper - middle part of streams, and it generates physical disturbances such as habitat alteration and stream fragmentation. Such construction can restrict movement of aquatic organisms, especially for freshwater fish which is one of top predator in aquatic ecosystem, and cause genetic fragmentation and community change. In this study, to investigate impact of habitat alteration after dam construction on freshwater fish, we monitored fish community changes, and compared fish fauna between dam reservoir and inflows. Additionally, movement characteristics and habitat boundaries of four species were identified by radio telemetry method. The study was conducted in the Gunwi Dam which was constructed in December 2010. Radio telemetry was applied to Pungtungia herzi, Zacco platypus (living lotic and lentic), Silurus asotus (lentic preferred species) and Zacco koreanus (lotic preferred species). The number of species was remarkably decreased (4 family, 10 species) comparing with before the dam construction (7 family, 15 species). Specifically, Coreoleuciscus splendidus, Niwaella multifasciata, Liobagrus mediadiposalis, Coreoperca herzi and Odontobutis platycephala that inhabit in the lotic environment were not collected in the study area. A total of 8 species were caught in both the dam reservoir and tributaries except 2 species (C. auratus and S. asotus). Sorenson's similarity between the reservoir and its tributaries was high (0.842). All of the radio tagged species stayed in the reservoir except S. asotus which moved to the tributary. These species mainly utilized the shallow littoral zone as a habitat. These results could be useful as a baseline data for efficient management of fishes in lakes.