• Title/Summary/Keyword: certificates

Search Result 436, Processing Time 0.024 seconds

Analysis of Health Problems among Airline Pilots in Korea (2016~2018) (민간 항공기 운항승무원의 건강문제 분석(2016~2018))

  • Kim, Ji Seon;Choi, Yun Young
    • Korean journal of aerospace and environmental medicine
    • /
    • v.30 no.1
    • /
    • pp.34-39
    • /
    • 2020
  • The medical fitness of pilots is part of the civil aviation safety scenery. This study aimed to analyze the health problems occurring among Korean commercial pilots. Three data sources were used to identify the health problems: 7,574 aviation medical examination data, 5,400 sick leaves and 39 cases of a decrease in medical fitness during flight duty period and layover of Korean commercial pilots who have been working for K airline from Jan. 1, 2016 to Dec. 31, 2018. This study was retrospectively analyzed using SPSS 22 statistical program. Waiver of medical certificates was an average 11.9% of total issuance for 3 years, with a denial of 0.1%. The leading cause of denial of medical certificates was predominantly of cardiovascular cause (55.6%). Mild respiratory and digestive disease accounted for 82% of total sick prevalence and 68% of total sick days. The psychiatric and cardiovascular disease were ranked high according to the number of days lost per case. The most common cause of decrease in medical fitness during flight duty period was acute abdominal pain (36.4%) and musculoskeletal disorder (40%) when staying abroad. Aeromedical emphasis on minimizing cardiovascular risk remains appropriate. Major pilot health problems identified in this study should be considered in establishing pilot health promotion programs for aviation safety.

Technology trend of Smart-home Security System (스마트 홈 시큐리티 기술 동향)

  • Jang, Ye-Jin;Jeon, Yong-Tae
    • Korean Security Journal
    • /
    • no.30
    • /
    • pp.117-138
    • /
    • 2012
  • To cope with rapidly increasing crimes, the Smart-home system has become common to minimize and prevent crimes in the residential space. Accordingly, the interest on the security-related Smart-home system is also increasing. First is the establishment of Smart-home security standard. At present, the Smart-home security systems are implemented by individual policies of construction companies or by the requirement of residents. Each construction company has their own characteristics in the Smart-home security system; while there is no standardized system. Second is the introduction of Smart-home security certificate system. Like people have certificates, now the residential spaces may also need certificates. A certificate system that represents the performance of residential spaces cannot be an absolute criterion in the evaluation of apartment quality, however, it can be a basic requirement for the convenient residential environment and policies being implemented by the government. If a certificate system would be introduced, construction companies will compete with each other to provide with better security system and apartment operation companies will hire more specialized security personnel in order to get higher certificates. Consequently, better security of residential space will be secured. It is also required to develop and establish response measures by studying the key changes and trends of Smart-home security system. The advance in mechanical security devices will bring about more changes in the future. Therefore, more various in-depth studies are required on the basic specifications of security system in the residential spaces.

  • PDF

Management State of Career Education in the Model After-school Class of a Vocational High School (전문계 고등학교에서 방과후학교 시범학교의 진로교육 운영실태)

  • Jun, Moon-Young;Eun, Tae-Uk;Kim, Jinsoo
    • 대한공업교육학회지
    • /
    • v.34 no.2
    • /
    • pp.62-86
    • /
    • 2009
  • The major purpose of this study is to contribute to activating the career education. To realize the goal, the study has investigated and analyzed an actual condition of the career instruction, which was conducted by the after-school class in the vocational high school. Based on such a research, it has also diagnosed the problems and suggested the plans in order to improve the troubles and manage the career instruction effectively. There are some summarized results of the study as follows. First, Students hope that as well. Students tend to prefer the career educational program for subject-related further study, career experience courses and getting certificates of qualification in order to choose their proper job. Second, the career instruction of after-school in the vocational school focuses on the entrance of universities and gaining certificates of qualification. Third, students have participated in the career educational program to enter the universities and get some certificates of qualification. Forth, teachers have considered the overwork of teachers attributed to the program and the lack of the cost as a major factor to interrupt the effective progress of the program. Finally, most teachers and students hope to have the program after school during weekday.Therefore, for more effective management of career education in the after-school of the vocational high school, the administrative and financial support should be required, and it is necessary to have good qualified teachers and consistently keep investing the funds in improving the program.

A Countermeasures on Credit Card Crime Using Personal Credit Information (개인신용정보이용 신용카드범죄에 대한 대처방안)

  • Kim, Jong-Soo
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.27-68
    • /
    • 2005
  • Recently, because credit card crime using a personal credit information is increasing, professionalizing, and spreading the area, the loss occurring from credit card crime is enormous and is difficult to arrest and punish the criminals. At past, crime from forging and counterfeiting the credit card was originated by minority criminals, but at present, the types and appearance of credit card crime is very different to contrasting past crime. The numbers of people using credit card in the middle of 1990's was increasing and barometer of living conditions was evaluated by the number having credit card, therefore this bad phenomenon occurring from credit card crime was affected by abnormal consumption patterns. There is no need emphasizing the importance of personal credit card in this credit society. so, because credit card crime using personal credit card information has a bad effect, and brings the economic loss and harms to individuals, credit card company, and members joining credit card. Credit card crime using personal credit card information means the conduct using another people's credit card information(card number, expiring duration, secret number) that detected by unlawful means. And crime using dishonest means from another people's credit information is called a crime profiting money-making and a crime lending an illegal advance by making false documents. A findings on countermeasures of this study are as follows: Firstly, Diverting user's mind, improving the art of printing, and legitimating password from payment gateway was suggested. Secondly, Complementing input of password, disseminating the system of key-board protection, and promoting legitimations of immediate notification duty was suggested. Thirdly, Certificating the electronic certificates as a personal certificates, assuring the recognition by sense organ of organism, and lessening the ratio of crime occurrence, and restricting the ratio of the credit card crime was suggested.

  • PDF

A Study of Wireless LAN Cryptosystem for Supporting Realtime Mutual Authentication (실시간 상호인증 지원을 위한 무선랜 보안시스템에 관한 연구)

  • Lee Sang-Ryul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.5 s.37
    • /
    • pp.161-170
    • /
    • 2005
  • The Certificate Revocation List(CRL) or the Online Certificate Status Protocol(OCSP)has been used to validate certificates. However, the CRL cannot validate certificates in realtime because of the Time-Gap problem and the OCSP server overloads in a large scale secure system. In addition, the client cannot access a wired LAN until the client has been authenticated by the authentication server on the IEEE 802. 1x framework. Therefore, the client cannot validate the authentication server's certificate using a certificate validation server. Thus, the client cannot authenticate the authentication server in realtime. To solve these problems this paper designed a secure system that can protect the content of communications and authenticate users in realtime on a wireless LAN The designed certificate validation protocol was proved that the stability and efficiency of the system was very high, the result of the validation had the presence, the speed of the validation was not affected by the system scale, the number of authorities user must trust was reduced to one, and the overload of the validation server was Protected. And the designed user authentication and key exchange protocols were Proved that the mutual authentication was possible in realtime and the fact of the authentication could be authorized by the CA because of using the authorized certificates.

  • PDF

방정식의 해법에 관한 소고

  • 이대현
    • Journal for History of Mathematics
    • /
    • v.17 no.1
    • /
    • pp.61-68
    • /
    • 2004
  • This paper aims at investigating the algebraic solution of cubic and quartic equation and eliciting the didactical meanings of them. First, I examine the event which relates to the equation in the history of mathematics and investigate the algebraic solution of cubic and quartic equation. And then I elicit the didactical suggestions which are required of teachers and students when they investigate the algebraic solution of cubic and quartic equation. In general, the investigation of these solutions is the valuable task which requires the algebraic intuition and technique for students and certificates expert knowledge for teachers.

  • PDF

A study on roll eccentricity controller of hot rolling mill (열간 압연기의 롤 편심 제어기에 관한 연구)

  • 지창운
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1996.10b
    • /
    • pp.1480-1483
    • /
    • 1996
  • A set of approaches suggested to control the eccentricity is discussed in this paper. Among these, filter-integrator method is used to design the controller, which also includes the input signal synchronization, stabilizing filter and eccentricity source discrimination. Using the S/W that is coded for real time application of that controller, we simulated the operations of that one. The simulation results show the characteristics of eccentricity compensation and eccentricity discrimination. However, from these results, we can see that only proper stabilization strategy certificates the safe eccentricity control.

  • PDF

Compliance and Verification Mechanism of STCW'95 and Its Implementation in China

  • Hao, Yong
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2000.06a
    • /
    • pp.33-40
    • /
    • 2000
  • To improve the compliance and verification mechanism is one of the important reasons to revise the STCW Convention. The mechanism includes the assessment of competence, control, precision of description of competence, quality standard system, communication of information and so on. Chinese seaman's education an training institute & the organization of evaluating and issuing certificates should enhance realizing the importance of compliance and verification mechanism and carry out it down to earth. The current work that should be reinforced is to control the qualified evaluation effectively.

  • PDF

Delegation using X.509 Certificates in PKI Based (PKI 기반에서 X.509 인증서를 사용한 권한위임)

  • 유정각;이건희;이상하;김동규
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.262-265
    • /
    • 2001
  • 분산 시스템에서 사용자가 시스템에 로그인 상태에서 자신의 시스템에 존재하지 않는 자원을 이용하기 위한 방안으로 권한위임이 필수적이다. 이러한 권한위임은 다양하게 요구되는 정보보호 응용 서비스의 가용성을 증대시킨다. 본 논문에서는 권한위임을 처리하기 위해서 권한위임 인증서를 생성하여 안전하게 인증서를 중개자에게 전달해야한다. 개시자와 중개자 최종 목적지까지 다단계 권한위임이 발생하는 연결고리에서 PKI 기반 X.509의 공개키를 이용한 효율적이고 추적 및 검증이 가능한 프로토콜을 제안한다.

  • PDF

PKI based Certificates (PKI 기반의 공인인증서)

  • Hong, Kuk-Pyo;Kim, Jung-Hyun;Lee, Dong-Hoon;Choi, Song-Hwa
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2009.05a
    • /
    • pp.201-204
    • /
    • 2009
  • 정보통신 기술의 발달로 우리가 이용하는 많은 부분에서 전자문서를 이용한 전자거래가 사용되고 있다. 비대면 방식의 특성상 전자거래는 신원확인 문제가 존재한다. 본 논문에서는 이 문제에 대한 해결책인 PKI기반의 공인인증서의 개념과 구조, 활용방안 그리고 그에 따른 취약점을 살펴보고자 한다.

  • PDF