• Title/Summary/Keyword: Security Agents

Search Result 211, Processing Time 0.031 seconds

Analysis of Factors Related to the Prescription of Antibiotics for the Acute Upper Respiratory Infection (급성상기도감염 환자의 항생제 처방에 영향을 주는 요인)

  • Choi, Won Jung;Yim, Eunshil;Kim, Tae Hyun;Suh, Hae Sun;Choi, Ki Chun;Chung, Woojin
    • Health Policy and Management
    • /
    • v.25 no.4
    • /
    • pp.256-263
    • /
    • 2015
  • Background: Initial treatment of acute upper respiratory infection (AURI) should not include antibiotics because most AURIs are caused by virus. However, the prescription rate of antibiotics in Korea is higher than in any other countries. Inappropriate use of antibiotics in Korea accelerated the emergence of antibiotics resistance and increased the social and economic burden. The objective of this study was to investigate the factors related to antibiotics use for the AURI among children-adolescents and adults. Methods: This study analyzed the Health Insurance Review and Assessment Service-National Patient Sample data which was nationally representative sampling stratified by sex and age. Results: The influencing factors of antibiotics use for AURI are gender, age, types of medical security, primary disease, existence of concomitant disease, treatment seasons, first visit or revisit, indicated specialty, types of medical institution, and location of medical institution. Conclusion: The results showed health policy makers are required to place more efforts to resolve inappropriate antibiotics use. Especially they need to establish a health policy to reduce the gap between areas and specialties and recommend standardized clinical guidelines according to the subgroup code of AURI and the age group of patients.

Information Needs and Behavior of North Korean Refugees (북한이탈주민의 정보요구와 정보행태에 관한 연구 - 부산지역 거주자를 중심으로 -)

  • Cho Yong-Wan
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.40 no.3
    • /
    • pp.121-149
    • /
    • 2006
  • In recent days North Korean refugees. who hope to move into and settle in South Korea, have been rapidly increasing. However their adaptation to South Korea is reported to have not been so much successful as they expected. Considering such situations, this study attempts to investigate their information needs and behavior. North Korean refugees have various and strong information needs for settlement and daily life. The strongest were information needs related to economic Problem, specifically job and business related information needs. It was followed by information needs related to social welfare, health and security child care and education, and North Korean situation In order to meet their information needs. North Korean refugees were heavily dependent on informal interpersonal information sources such as their family members. friends. and their own neighborhoods. as compared to such formal interpersonal information sources as Public officers. social welfare agents, and NGOs members. Meanwhile. their usage of mass media such as TV. newspapers, and internet as information sources was also heavy However the overall information environment surrounding them appeared to be relatively inferior to that of average South Koreans.

A Study on the Design of Secure Messenger Using ECC of ElGamal Method in PKI Environment (PKI환경에서 ElGamal 방식의 ECC를 이용한 안전한 메신저 설계에 관한 연구)

  • Park Su-Young;Choi Kwang-Mi;Jung Choi-Yeoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.8
    • /
    • pp.1443-1448
    • /
    • 2006
  • As computers and networks become popular, distributing information on the Internet is common in our daily life. In the past, e-mail has been the primary choice of exchanging information but messengers are gaining popularity abroad and domestically because of their nature of getting immediate responses. Information leakage by invasion that is enemy of evil in communication of communications division Server and Agent between each agents that become burden of communication for effective administration of data for most of existing messenger is becoming an issue. In this paper, we design a secure messenger system that could be obtained maximum security. It use ECC based on ElGamal methodology using PKI for secure communication. For the message encryption and decryption between the same group non, each group is kept distinct by drawing an elliptic curve and an arbitrary point is chosen on the curve.

Potential Roles of Essential Oils on Controlling Plant Pathogenic Bacteria Xanthomonas Species: A Review

  • Bajpai, Vivek K.;Kang, So-Ra;Xu, Houjuan;Lee, Soon-Gu;Baek, Kwang-Hyun;Kang, Sun-Chul
    • The Plant Pathology Journal
    • /
    • v.27 no.3
    • /
    • pp.207-224
    • /
    • 2011
  • Diseases caused by plant pathogenic bacteria constitute an emerging threat to global food security. Xanthomonas is a large genus of Gram-negative bacteria that cause disease in several host plants leading to considerable losses in productivity and quality of harvests. Despite the ranges of controlling techniques available, the microbiological safety of economically important crops and crop plants including fruits and vegetables continues to be a major concern to the agriculture industry. On the other hand, many of the currently available antimicrobial agents for agriculture are highly toxic, non-biodegradable and cause extended environmental pollution. Besides, the use of antibiotics has provoked an increased resistance among the bacterial pathogens and their pathovars. Thus, novel efficient and safe remedies for controlling plant bacterial diseases are necessary. There has been an increasing interest worldwide on therapeutic values of natural products such as essential oils, hence the purpose of this review is to provide an overview of the published data on the antibacterial efficacy of essential oils that could be considered suitable for application in agriculture as biocontrol measures against plant pathogenic bacteria of Xanthomonas species. The current knowledge on the use of essential oils to control Xanthomonas bacteria in vitro and in vivo models has been discussed. A brief description on the legal aspects on the use of essential oils against bacterial pathogens has also been presented. Through this review, a mode of antibacterial action of essential oils along with their chemical nature and the area for future research have been thoroughly discussed.

A Study on a Illegal Copy Protection model using Hidden Agent in Embedded Computing Environment (임베디드 컴퓨팅 환경에서 은닉 에이전트를 이용한 불법복사 방지 모델에 관한 연구)

  • Lee, Deok-Gyu;Kim, Tai-Hoon;Yeo, Sang-Soo;Kim, Seok-Soo;Park, Gil-Cheol;Cho, Seong-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.2
    • /
    • pp.180-190
    • /
    • 2008
  • There have been researches into digital Watermarking technology or Fingerprinting vigorously to safeguard Protective rights for knowledge and poverty for digital contents. DRM(Digital Rights Management) is not only Protective rights for knowledge and poverty, but also management and systems that are necessary to put out, circulate and use for contents. This paper proposes two kinds of ideas. One is protecting contents from illegal acts such as illegal copies when the contents are in the process of circulation. The other is the protocol that can give users convenience. Hidden Agents are used so that contents are protected from illegal copies and illegal use in the contents and cuts off those illegal acts. The Agent will be installed without any special setup. In addition, it can replace roles of Watermarking as a protection. Therefore, this paper shows the solution of illegal copies that happens frequently.

  • PDF

Distributed Intrusion Detection System for Safe E-Business Model (안전한 E-Business 모델을 위한 분산 침입 탐지 시스템)

  • 이기준;정채영
    • Journal of Internet Computing and Services
    • /
    • v.2 no.4
    • /
    • pp.41-53
    • /
    • 2001
  • Multi-distributed web cluster model built for high availability E-Business model exposes internal system nodes on its structural characteristics and has a potential that normal job performance is impossible due to the intentional prevention and attack by an illegal third party. Therefore, the security system which protects the structured system nodes and can correspond to the outflow of information from illegal users and unfair service requirements effectively is needed. Therefore the suggested distributed invasion detection system is the technology which detects the illegal requirement or resource access of system node distributed on open network through organic control between SC-Agents based on the shared memory of SC-Server. Distributed invasion detection system performs the examination of job requirement packet using Detection Agent primarily for detecting illegal invasion, observes the job process through monitoring agent when job is progressed and then judges the invasion through close cooperative works with other system nodes when there is access or demand of resource not permitted.

  • PDF

Communication Models and Performance Evaluation for the Delivery of Data and Policy in a Hybrid-Type Intrusion Detection System (혼합형 침입 탐지 시스템에서 데이터 및 정책 전달 통신 모델과 성능 평가)

  • Jang, Jung-Sook;Jeon, Yong-Hee;Jang, Jong-Soo;Sohn, Seung-Won
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.727-738
    • /
    • 2003
  • Much research efforts are being exerted for the study of intrusion detection system(IDS). However little work has been for the communication medels and performance eveluation of the IDS. Here we present a communication framework for doing hybrid intrusion detection in which agents are used for local intrusion detections with a centralized data anaysis componenta for a global intrusion detection at multiple domains environment. We also assume the combination of host-based and network-based intrusion detection systems in the oberall framework. From the local domain, a set of information such as alert, and / or log data are reported to the upper level. At the root of the hierarchy, there is a global manager where data coalescing is performed. The global manager delivers a security policy to its lower levels as the result of aggregation and correlation of intrusion detection alerts. In this paper, we model the communication mechanisms for the hybrid IDS and develop a simular using OPNET modeller for the performance evaluation of transmission capabillities for the delivery of data and policy. We present and compare simulation results based on several scenarios focuding on communication delay.

The Design and Implementation of Web Agents for vCard Service in Mobile Enviromnent (모바일 환경에서 vCard 서비스를 위한 웹 에이전트의 설계 및 구현)

  • Yun, Se-Mi;Jo, Ik-Seong
    • The KIPS Transactions:PartD
    • /
    • v.9D no.3
    • /
    • pp.477-486
    • /
    • 2002
  • vCard that is the electronic business card automates the exchange of personal information typically found on a traditional business card. vCard information contains not only simple text, but also graphics and multimedia data like pictures, company logos, Web addresses, and so on. This paper describes the design and implementation of Web-based vCard agent system for exchanging vCard, an electronic business card and searching another user's vCard in mobile phone environment. In today's business environment, such as that this information is typically exchanged on business cards. Our web agent system in this paper connect web server which provide vCard service and search, edit vCard information displayed by web browser of mobile phone and exchange vCard with another user through internet. Considering characteristics of wireless devices that have limited storage space, It also saves constructed XML documents that include user's informations in a web server and solves the security problem by exchanging not personal data or XML but encrypted directory name where XML document exits as exchanging vcard.

Biocontrol of Maize Diseases by Microorganisms (미생물을 활용한 옥수수병의 생물학적 방제)

  • Jung-Ae, Kim;Jeong-Sup, Song;Min-Hye, Jeong;Sook-Young, Park;Yangseon, Kim
    • Research in Plant Disease
    • /
    • v.28 no.4
    • /
    • pp.195-203
    • /
    • 2022
  • Zea mays, known as maize or corn, is a major staple crop and an important source of energy for humans and animals, thus ensuring global food security. Approximately 9.4% of the loss of total annual corn production is caused by pathogens including fungi, bacteria, and viruses, resulting in economic losses. Although the use of fungicides is one of the most common strategies to control corn diseases, the frequent use of fungicides causes various health problems in humans and animals. In order to overcome this problem, an eco-friendly control strategy has recently emerged as an alternative way. One such eco-friendly control strategy is the use of beneficial microorganisms in the control of plant pathogens. The beneficial microorganisms can control the plant pathogens in various ways, such as spatial competition with plant pathogens, inhibition of fungal or bacterial growth via the production of secondary metabolites or antibiotics, and direct attack to plant pathogens via enzyme activity. Here, we reviewed microorganisms as biocontrol agents against corn diseases.

A Study on the Improvement of Patent Agent's Role in Patent Infringement Litigation (특허침해소송에서 변리사의 역할 개선 방안에 대한 연구)

  • Cho, Myunggeun;Lee, Hwansoo
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.4
    • /
    • pp.35-44
    • /
    • 2018
  • Unlike other lawsuits, patent infringement litigation is a very difficult case to grasp without expert knowledge of the patented technology. The Patent Agent Act seems to recognize the legal representation of patent agent in Article 8, but the Constitutional Court and the Court have refused to recognize patent agent's legal representation right in the patent infringement suit. In this regard, constant controversy is taking place among patent agents and lawyers. This study examines the measures to enhance the effectiveness and professionalism of patent litigation in patent infringement litigation. This study analyzes the role of patent attorneys in patent infringement lawsuits in major countries and derive rational alternatives. As a result, it is inappropriate to restrict the attorneys' automatic acquisition of patent attorneys' qualifications or revise the patent attorneys' law in relation to the patent attorney's right of proxy. In the case of litigation parties, it is a desirable alternative to introduce a revised patent attorney system for the fundamental problem solving and to allow the litigants to reasonably choose the litigation agent.