• Title/Summary/Keyword: Service block

Search Result 440, Processing Time 0.026 seconds

An Analysis of Dwelling Environment of Public Retirement(Silver) Housing Based on Post Occupancy Evaluation (거주 후 평가(P.O.E)에 의한 공공실버주택의 거주환경 분석)

  • Bak, Da-Hye;Kim, Young-Hwa;Lee, Sang-Hong
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.34 no.12
    • /
    • pp.65-76
    • /
    • 2018
  • Due to the rapid demographic and structural changes, Korea has faced a variety of social issues and quickly entered the aged society since the 2000s. In order deal with this reality, diverse types of welfare policies are emerging in the society as a whole. The government began to supply domestic public silver housing in 2016 to provide against the quickly growing aged society and now, the government is planning to supply approximately 50,000 housing by 2022 for quantitative growth of aged society, by selecting 1st and 2nd designated areas for the project additionally. This public retirement(silver) housing combines 'space' with 'service'. The lower floors are a public silver welfare Facilities and the upper floors are a housing spaces. This type of housing is to deal with requirements of rental housing residents by combining physical space with supporting service. Based on barrier-free design, the complex and unit house have safety handles and alarm bells in the bathroom, undulating washstands, bathroom sliding doors, corridor safety handles, and emergency safety exit lamps in each housing unit so the aged and the disabled can use easily and conveniently. Also, hand rails are installed and stepped pulleys are removed to promote convenience. Currently, the government is planning to increase the supply, focusing on low-income groups, such as beneficiaries of national basic livelihood and the working poor. Recognizing that the public retirement(silver) housing project is at its early stage, this study examined satisfaction, based on evaluations of real residents. This study aimed to obtain more empirical research data and apply them to public retirement(silver) house space analysis. For analysis, this study targeted Wirye public retirement(silver) housing and Magnolia public retirement(silver) housing that are in operation, and literature review, previous research review, and field survey were conducted to examine the present state. Using the questionnaires consisting of four large classification items; Block Layout, Housing Unit, Welfare Facilities, and Barrier-free Design, and sub-details, a survey was conducted to analyze residents' satisfaction. In conclusion, it is anticipated that this study would serve as basic research data about public retirement(silver) housing to increase continuously in future by analyzing public retirement(silver) housing spaces, on the basis of the analyzed data.

HFN-Based Right Management for IoT Health Data Sharing (IoT 헬스 데이터 공유를 위한 HFN 기반 권한 관리)

  • Kim, Mi-sun;Park, Yongsuk;Seo, Jae-Hyun
    • Smart Media Journal
    • /
    • v.10 no.1
    • /
    • pp.88-98
    • /
    • 2021
  • As blockchain technology has emerged as a security issue for IoT, technology which integrates block chain into IoT is being studied. In this paper is a research concerning token-based IoT service access control technology for data sharing, which propose a possessor focused data sharing technic by using the permissioned blockchain. To share IoT health data, a Hyperledger Fabric Network consisting of three organizations was designed to provide a way to share data by applying different access control policies centered on device owners for different services. In the proposed system, the device owner issues access control tokens with different security levels applied to the participants in the organization, and the token issue information is shared through the distributed ledger of the HFN. In IoT, it is possible to lightweight the access control processing of IoT devices by granting tokens to service requesters who request access to data. Furthmore, by sharing token issuance information among network participants using HFN, the integrity of the token is guaranteed and all network participants can trust the token. The device owners can trust that their data is being used within their authorized rights, and control the collection and use of data.

Blocking Intelligent Dos Attack with SDN (SDN과 허니팟 기반 동적 파라미터 조절을 통한 지능적 서비스 거부 공격 차단)

  • Yun, Junhyeok;Mun, Sungsik;Kim, Mihui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.1
    • /
    • pp.23-34
    • /
    • 2022
  • With the development of network technology, the application area has also been diversified, and protocols for various purposes have been developed and the amount of traffic has exploded. Therefore, it is difficult for the network administrator to meet the stability and security standards of the network with the existing traditional switching and routing methods. Software Defined Networking (SDN) is a new networking paradigm proposed to solve this problem. SDN enables efficient network management by programming network operations. This has the advantage that network administrators can flexibly respond to various types of attacks. In this paper, we design a threat level management module, an attack detection module, a packet statistics module, and a flow rule generator that collects attack information through the controller and switch, which are components of SDN, and detects attacks based on these attributes of SDN. It proposes a method to block denial of service attacks (DoS) of advanced attackers by programming and applying honeypot. In the proposed system, the attack packet can be quickly delivered to the honeypot according to the modifiable flow rule, and the honeypot that received the attack packets analyzed the intelligent attack pattern based on this. According to the analysis results, the attack detection module and the threat level management module are adjusted to respond to intelligent attacks. The performance and feasibility of the proposed system was shown by actually implementing the proposed system, performing intelligent attacks with various attack patterns and attack levels, and checking the attack detection rate compared to the existing system.

A case study of blockchain-based public performance video platform establishment: Focusing on Gyeonggi Art On, a new media art broadcasting station in Gyeonggi-do (블록체인 기반 공연영상 공공 플랫폼 구축 사례 연구: 경기도 뉴미디어 예술방송국 경기아트온을 중심으로)

  • Lee, Seung Hyun
    • Journal of Service Research and Studies
    • /
    • v.13 no.1
    • /
    • pp.108-126
    • /
    • 2023
  • This study explored the sustainability of a blockchain-based cultural art performance video platform through the construction of Gyeonggi Art On, a new media art broadcasting station in Gyeonggi-do. In addition, the technical limitations of video content transaction using block chain, legal and institutional issues, and the protection of personal information and intellectual property rights were reviewed. As for the research method, participatory observation methods such as in-depth interviews with developers and operators and participation in meetings were conducted. The researcher participated in and observed the entire development process, including designing and developing blockchain nodes, smart contracts, APIs, UI/UX, and testing interworking between blockchain and content distribution services. Research Question 1: The results of the study on 'Which technology model is suitable for a blockchain-based performance video content distribution public platform?' are as follows. 1) The blockchain type suitable for the public platform for distribution of art performance video contents based on the blockchain is the private type that can be intervened only when the blockchain manager directly invites it. 2) In public platforms such as Gyeonggi ArtOn, among the copyright management model, which is an art based on NFT issuance, and the BC token and cloud-based content distribution model, the model that provides content to external demand organizations through API and uses K-token for fee settlement is suitable. 3) For public platform initial services such as Gyeonggi ArtOn, a closed blockchain that provides services only to users who have been granted the right to use content is suitable. Research question 2: What legal and institutional problems should be reviewed when operating a blockchain-based performance video distribution public platform? The results of the study are as follows. 1) Blockchain-based smart contracts have a party eligibility problem due to the nature of blockchain technology in which the identities of transaction parties may not be revealed. 2) When a security incident occurs in the block chain, it is difficult to recover the loss because it is unclear how to compensate or remedy the user's loss. 3) The concept of default cannot be applied to smart contracts, and even if the obligations under the smart contract have already been fulfilled, the possibility of incomplete performance must be reviewed.

Treatment Pattern of Patients with Neuropathic Pain in Korea (한국인 신경병성 동통 환자의 치료 양태 연구)

  • Han, Sung-Hee;Lee, Ki-Ho;Kim, Mee-Eun;Kim, Ki-Suk
    • Journal of Oral Medicine and Pain
    • /
    • v.34 no.2
    • /
    • pp.197-205
    • /
    • 2009
  • The purpose of this study was to investigate the treatment pattern of patients with neuropathic pain (NeP) in Korea through computerized database of Health Insurance Review and Assessment Service (HIRAS) over three years' period from 2003 to 2005. The results showed that the numbers of treatment visits were the highest for diabetic neuropathy (DN), followed by postherpetic neuralgia (PHN) and trigeminal neuralgia (TN) in order. Top 3 specialties for treatment visits due to NeP conditions were neurology, neurosurgery and anesthesiology. While cost of a treatment visit was higher in anesthesiology and emergency clinics compared to other clinics, there was a tendency to increase costs for visits to clinics of rehabilitation medicine and family medicine over the three years. Cost of dental visits was relatively high for TN, atypical facial pain (AFP) and atypical odontalgia (AO). Surgeries frequently applied to patients with NeP were sympathetic plexus or ganglion block, block of peripheral branch of spinal nerve and cranial nerve or its peripheral branch block. Most common prescribed medication were anticonvulsants, anti-inflammatory analgesics and anti-psychotic drugs while anti-inflammatory analgesics were overwhelmingly frequently prescribed for AO and glossodynia. Based on the results of this study, NeP disorders more relevant to dentists were AO, TN and AFP, TN of which seems to be the most important in terms of patients' number and cost for treatment visits. This indicates that dentists, especially oral medicine specialists should actively participate in management of TN, AO and AFP and share relevant information with patients and community.

A Study on the Strategy of IoT Industry Development in the 4th Industrial Revolution: Focusing on the direction of business model innovation (4차 산업혁명 시대의 사물인터넷 산업 발전전략에 관한 연구: 기업측면의 비즈니스 모델혁신 방향을 중심으로)

  • Joeng, Min Eui;Yu, Song-Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.2
    • /
    • pp.57-75
    • /
    • 2019
  • In this paper, we conducted a study focusing on the innovation direction of the documentary model on the Internet of Things industry, which is the most actively industrialized among the core technologies of the 4th Industrial Revolution. Policy, economic, social, and technical issues were derived using PEST analysis for global trend analysis. It also presented future prospects for the Internet of Things industry of ICT-related global research institutes such as Gartner and International Data Corporation. Global research institutes predicted that competition in network technologies will be an issue for industrial Internet (IIoST) and IoT (Internet of Things) based on infrastructure and platforms. As a result of the PEST analysis, developed countries are pushing policies to respond to the fourth industrial revolution through cooperation of private (business/ research institutes) led by the government. It was also in the process of expanding related R&D budgets and establishing related policies in South Korea. On the economic side, the growth tax of the related industries (based on the aggregate value of the market) and the performance of the entity were reviewed. The growth of industries related to the fourth industrial revolution in advanced countries overseas was found to be faster than other industries, while in Korea, the growth of the "technical hardware and equipment" and "communication service" sectors was relatively low among industries related to the fourth industrial revolution. On the social side, it is expected to cause enormous ripple effects across society, largely due to changes in technology and industrial structure, changes in employment structure, changes in job volume, etc. On the technical side, changes were taking place in each industry, representing the health and medical sectors and manufacturing sectors, which were rapidly changing as they merged with the technology of the Fourth Industrial Revolution. In this paper, various management methodologies for innovation of existing business model were reviewed to cope with rapidly changing industrial environment due to the fourth industrial revolution. In addition, four criteria were established to select a management model to cope with the new business environment: 'Applicability', 'Agility', 'Diversity' and 'Connectivity'. The expert survey results in an AHP analysis showing that Business Model Canvas is best suited for business model innovation methodology. The results showed very high importance, 42.5 percent in terms of "Applicability", 48.1 percent in terms of "Agility", 47.6 percent in terms of "diversity" and 42.9 percent in terms of "connectivity." Thus, it was selected as a model that could be diversely applied according to the industrial ecology and paradigm shift. Business Model Canvas is a relatively recent management strategy that identifies the value of a business model through a nine-block approach as a methodology for business model innovation. It identifies the value of a business model through nine block approaches and covers the four key areas of business: customer, order, infrastructure, and business feasibility analysis. In the paper, the expansion and application direction of the nine blocks were presented from the perspective of the IoT company (ICT). In conclusion, the discussion of which Business Model Canvas models will be applied in the ICT convergence industry is described. Based on the nine blocks, if appropriate applications are carried out to suit the characteristics of the target company, various applications are possible, such as integration and removal of five blocks, seven blocks and so on, and segmentation of blocks that fit the characteristics. Future research needs to develop customized business innovation methodologies for Internet of Things companies, or those that are performing Internet-based services. In addition, in this study, the Business Model Canvas model was derived from expert opinion as a useful tool for innovation. For the expansion and demonstration of the research, a study on the usability of presenting detailed implementation strategies, such as various model application cases and application models for actual companies, is needed.

Generation of Pseudo Porosity Logs from Seismic Data Using a Polynomial Neural Network Method (다항식 신경망 기법을 이용한 탄성파 탐사 자료로부터의 유사공극률 검층자료 생성)

  • Choi, Jae-Won;Byun, Joong-Moo;Seol, Soon-Jee
    • Journal of the Korean earth science society
    • /
    • v.32 no.6
    • /
    • pp.665-673
    • /
    • 2011
  • In order to estimate the hydrocarbon reserves, the porosity of the reservoir must be determined. The porosity of the area without a well is generally calculated by extrapolating the porosity logs measured at wells. However, if not only well logs but also seismic data exist on the same site, the more accurate pseudo porosity log can be obtained through artificial neural network technique by extracting the relations between the seismic data and well logs at the site. In this study, we have developed a module which creates pseudo porosity logs by using the polynomial neural network method. In order to obtain more accurate pseudo porosity logs, we selected the seismic attributes which have high correlation values in the correlation analysis between the seismic attributes and the porosity logs. Through the training procedure between selected seismic attributes and well logs, our module produces the correlation weights which can be used to generate the pseudo porosity log in the well free area. To verify the reliability and the applicability of the developed module, we have applied the module to the field data acquired from F3 Block in the North Sea and compared the results to those from the probabilistic neural network method in a commercial program. We could confirm the reliability of our module because both results showed similar trend. Moreover, since the pseudo porosity logs from polynomial neural network method are closer to the true porosity logs at the wells than those from probabilistic method, we concluded that the polynomial neural network method is effective for the data sets with insufficient wells such as F3 Block in the North Sea.

금융사고 실태 조사

  • Lee, Sang-Kyung
    • Journal of the Korea society of information convergence
    • /
    • v.7 no.1
    • /
    • pp.25-46
    • /
    • 2014
  • After examining the current situations of financial frauds and the reasons for their occurrence in the financial institutions through examples of financial frauds in domestic and abroad, this study presents ways to prevent such financial scams. The preventive measures consist of activities before and after the occurrence of financial frauds and during normal financial operations. The activities are as follows: 1. Preventive activity should be strengthened before the occurrence of financial frauds. That is, first, the enforcement of consistent internal control is needed. Second, in order to block the probability of financial frauds involved with employees, ethics education and a reward program for inside tippers need to be run. Third, financial institutions need to apply for comprehensive insurance policy to minimize the lost in case. 2. Preventive activity should be strengthened during normal financial operations. First, self authentication system for customers needs to be introduced. Second, dealings of day, week, and month need to be thoroughly checked and the system of audit needs to be expanded. Third, message service for the information on financial frauds and their preventive measures needs to be expanded. Fourth, public notification system against examples of financial frauds needs to be expanded. 3. Preventive activity after the occurrence of financial frauds should be strengthened. First, awareness for preventive measures such as imposing penalty on the manager needs to be enhanced. Second, strict restrictions on financial frauders such as a criminal charge needs to be strengthened. Third, there should be legal devices and resolutions in order to retrieve all the money deceived by financial frauds.

  • PDF

Government position, failure causes over 9.11 terror, Iraq war (9.11 테러와 이라크전에 미친 정보의 역할, 실패원인)

  • Baek, Jong-Kap;Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.13
    • /
    • pp.207-234
    • /
    • 2007
  • This study examines the roles of government and reasons of defeat on 9.11 terror, iraq war between 2001 and 2003. The administration functions critical role of national security. And punctual, accurate information supply capability helps policymaker's decision-making. Hence, information of punctuality and accuracy should be given to policymakers. And without two above written factors, it will result in failing. Information concoction on policymaker's pressure, biased informant, inaccurate information and lack of assembly means under the extensive organization and technologized spying means, Fail to keep information objectivity, leads to information failure. In the context of a series of facts, we shall cover the position of government and reasons of calamities. Two incidents deem as information failure by national security service, but concoction of Iraqi mass destruction weaponry is believed as bush administration's deception on account of political gains. For fully functional government role, governing body should reinforce all aspects of gathering, analyzing, and making use of information more objectively in the first place. In particular, information concoction involving policymakers post massive stumbling block to organized outcome. The thesis presents a prospective view of government position under the U.S. secret agent over 9.11 terror and Iraq war.

  • PDF

Evaluation of Adhesion Characteristics of Crack Sealants Used in Asphalt Concrete Pavement (아스팔트 콘크리트 포장용 균열실링재의 부착특성 평가)

  • Lee, Jae-Jun;Kim, Seung-Hoon;Baek, Jong-Eun;Lim, Jae-Kyu;Kim, Yong-Joo
    • International Journal of Highway Engineering
    • /
    • v.17 no.2
    • /
    • pp.55-62
    • /
    • 2015
  • Cracking is an inevitable fact of asphalt concrete pavements and plays a major role in pavement deterioration. Pavement cracking is one of the main factors determining the frequency and method of repair. Cracks can be treated with a number of preventative maintenance actions, including overlay surface treatments such as slurry sealing, crack sealing, or crack filling. Pavement cracks can show up as one or all of the following types: transverse, longitudinal, fatigue, block, reflective, edge, and slippage. Crack sealing is a frequently used pavement maintenance treatment because it significantly extends the pavement service life. However, crack sealant often fails prematurely due to a loss of adhesion. Because current test methods are mostly empirical and only provide a qualitative measure of the bond strength, they cannot accurately predict the adhesive failure of the sealant. This study introduces a laboratory test aimed at assessing the bonding of hot-poured crack sealant to the walls of pavement cracks. A pneumatic adhesion tensile testing instrument (PATTI) was adopted to measure the bonding strength of the hot-poured crack sealant as a function of the curing time and temperature. Based on a limited number of test results, the hot-poured crack sealants have very different bonding performances. Therefore, this test method can be proposed as part of a newly developed performance-based standard specification for hot-poured crack sealants for use in the future. PURPOSES : The purpose of this study was to evaluate both the adhesion and failure performance of a crack sealant as a function of its curing time and curing temperature. METHODS: A pneumatic adhesion tensile testing instrument (PATTI) was adopted to measure the adhesion performance of a crack sealant as a function of the curing time and curing temperature. RESULTS: With changes in the curing time, curing temperature, and sealant type, the bond strengths were found to be significantly different. Also, higher bond strengths were measured at lower temperatures. Different sealant types produced completely different bond strengths and failure behaviors. CONCLUSIONS: The bonding strength of an evaluated crack sealant was shown to differ depending on various factors. Two sealant types, which were composed of different raw materials, were shown to perform differently. The newly proposed test offers the possibility of evaluating and differentiating between different crack sealants. Based on alimited number of test results, this test method can be proposed as part of a newly developed performance-based standard specification for crack sealants or as part of a guideline for the selection of hot-poured crack sealant in the future.