• Title/Summary/Keyword: digital risk

Search Result 825, Processing Time 0.022 seconds

The development standard research for railway safety software (철도 안전 소프트웨어를 위한 개발 기준 연구)

  • Lee, Young-Jun;Kim, Jang-Yoel;Cha, Kyung-Ho;Cheon, Se-Woo;Lee, Jang-Soo;Kwon, Ki-Choon;Jung, Ui-Jin
    • Proceedings of the KSR Conference
    • /
    • 2007.05a
    • /
    • pp.968-973
    • /
    • 2007
  • The systems such as the railway control system, satellite control system and nuclear power plant control system are the safety critical systems because the failure of them could lead to risk significant events. These softwares of digital systems must follow the life cycle process from the beginning of software development to guarantee their safety and reliability. The NRC(Nuclear Regulatory Commission) Reg Guide of nuclear fields, the RTCA/DO-178B standard which is used to acquire the certification for software in industrial aero field in European Union and United State, the DEF STAN 00-55 standard for the safety of electronic weapon in England, the IEC 601-1-4 for medical equipment and the IEC 62279 for railway system recommended the development life cycle. This paper introduces the development process and compares each other. Also it indicates applicable development criteria for the software of systems related to railway fields and describes the detailed procedure of development criteria. We describe the procedure to make the software development criteria in nuclear filed. For the software development related to railways, the process from plan phase to maintenance phase must be satisfied. The safety and reliability is guaranteed through these standards.

  • PDF

A Review of Cigarette Smoking-related Behaviors and Health Problems among University Students (대학생 흡연 관련 행태 및 흡연에 의한 건강문제)

  • Park, Soon-Woo
    • Korean Journal of Health Education and Promotion
    • /
    • v.28 no.5
    • /
    • pp.35-49
    • /
    • 2011
  • Objectives: This article reviewed research on smoking behaviors and smoking-related health problems among university students to suggest evidences for developing smoking control strategies for them. Methods: Domestic research papers were screened through Research Information Sharing Service (RISS), Koreanstudies Information Service System (KISS), Medical Library Information System (MEDLIS), Korean Medical Database (KMbase), and digital national assembly library. International papers were searched mainly via PubMed. Results: Smoking prevalence among male college students were found to be over 50% in majority of Korean studies. While studies on smoking-related health problems were scant in Korea, several recent studies overseas showed possible effects of smoking on health among young adults, including decreased lung function, respiratory symptoms, cardiovascular problems, glucose intolerance, buccal disease, depressive symptoms, and so forth. Besides, smoking behaviors were closely related with other risk behaviors including drinking, and several psychosocial factors. Conclusions: To explore the smoking problem among college students, the first step should be a national representative survey with scientific methods. More research should be focused on the smoking-related problems among college students. To prevent smoking among college students, smoking prevention education, and smoking cessation counseling, and the initiatives of smoke free campus are needed.

Towards Cyber Security Risks Assessment in Electric Utility SCADA Systems

  • Woo, Pil Sung;Kim, Balho H.;Hur, Don
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.3
    • /
    • pp.888-894
    • /
    • 2015
  • This paper presents a unified model based assessment framework to quantify threats and vulnerabilities associated with control systems, especially in the SCADA (Supervisory Control and Data Acquisition) system. In the past, this system was primarily utilized as an isolated facility on a local basis, and then it started to be integrated with wide-area networks as the communication technology would make rapid progress. The introduction of smart grid, which is an innovative application of digital processing and communications to the power grid, might lead to more and more cyber threats originated from IT systems. However, an up-to-date power system often requires the real-time operations, which clearly implies that the cyber security would turn out to be a complicated but also crucial issue for the power system. In short, the purpose of this paper is to streamline a comprehensive approach to prioritizing cyber security risks which are expressed by the combination of threats, vulnerabilities, and values in the SCADA components.

제조업과 정보통신 산업 클러스터 특성 비교분석 - 국내외 사례연구를 중심으로 -

  • Lee, Gi-Dong;Park, Jeong-Hui;Kim, Hak-Hui
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2003.12a
    • /
    • pp.489-505
    • /
    • 2003
  • 본 연구는 정보통신 산업 클러스터의 사례분석을 통해 제조업과 비교.분석하여 정책적 방향을 제안하고자 한다. 국내외 정보통신 산업 클러스터의 사례로 미국의 실리콘밸리, 일본의 테크노폴리스, 중국의 중관촌, 스웨덴의 시스 타와 국내의 대덕 밸리를 중심으로 특성을 도출하고자 한다. 산업 클러스터는 마이클 포터의 연구를 시작으로 하여 OECD 에서 국가혁신체제의 주요 주제로 제안하면서 국가 경쟁력의 핵심으로 등장하게 된다. 정보통신의 발달은 지역에 기반한 글로벌 경쟁력을 가진 산업 클러스터에 대한 체계적인 연구와 이에 대한 정책개발의 필요성이 증대되고 있다. 정보통신 산업 제품의 특성상 기술혁신 속도가 빠르고 제품의 라이플 사이클이 제조업 제품에 비해 짧은 특징을 지니고 있어, 투자에 대한 위험 (risk)이 발생한다. 또한 지식창조산업으로서 생산위주의 제조업과는 다른 지리적, 공간적 특성에 차이가 있으며, 고급 인력기술자의 활용도가 높아 안정적인 환경이 요구된다. 따라서 통신, 교통 등의 물리적인 기반시설뿐만 아니라 정보통신 관련 업체간 연계와 독특한 사회.문화적인 분위기 등이 어울려져 있음을 살펴볼 수 있다. 이러한 정보통신 산업 클러스터의 특성을 통해 본 연구는 경제의 신 성장동력 중에 하나인 정보 통신산업의 경쟁력을 높이고 세계적 수출산업으로 육성, 정보통신 중심지로서의 역할 수행 및 동북아 경제 중심 실현을 위해 정책적인 제안을 한다.

  • PDF

The Efficacy of Moxibustion for Female Stress Urinary Incontinence: a Systematic Review (여성 복압성 요실금에 대한 뜸 치료의 효과 : 체계적 문헌 고찰)

  • Park, Hye-Rin;Jo, Hee-Geun
    • The Journal of Korean Obstetrics and Gynecology
    • /
    • v.33 no.4
    • /
    • pp.1-22
    • /
    • 2020
  • Objectives: The purpose of this review is to evaluate the efficacy of moxibustion for stress urinary incontinence (SUI) in women. Methods: For relevant randomized controlled trials (RCTs), we searched the following databases from their inception to September 1, 2020: The Cochrane Library, PubMed, EMBASE, Chinese National Knowledge Infrastructure Database (CNKI), Koreanstudies Information Service System (KISS), Research Information Sharing Service (RISS), and National Digital Science Library (NDSL). The key search terms were 'stress urinary incontinence' and 'moxibustion'. Data extraction and assessment of risk of bias were conducted by two authors independently. Results: A total of 11 RCTs were finally included in this systematic review. In all studies, moxibustion treatment was applied as an adjuvant therapy to the conventional treatment, and the most common conventional treatment was pelvic floor muscle training (PFMT). The treatment group (conventional treatment plus moxibustion) showed statistically more significant effect than the control group (conventional treatment only) in various evaluation indicators including urinary incontinence frequency, 1 hour urine pad test, quality of life, the clinical efficacy rate, and pelvic muscle strength. Conclusions: In this study, we investigated the efficacy of moxibustion as an adjuvant therapy for female SUI patients. Further studies are needed to supplement the safety of moxibustion and the evaluation of moxibustion dose.

EFFECT OF TIN COATING OF ABUTMENT SCREW ON DETORQUE FORCE

  • Kim, Hee-Jung;Choe, Han-Cheol;Chung, Chae-Heon
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.45 no.3
    • /
    • pp.329-338
    • /
    • 2007
  • Purpose. The aim of this study is to evaluate the effect of TiN coating of abutment screw on the unscrewing torque. Material and methods. Titanium and Gold-Tite abutment screws were classified into two groups, Group A and C respectively, as control groups. Titanium abutment screws with TiN coatings were also classified into two groups, Group B and D, as experimental ones. Group A and B were tightened to 20 Ncm input torque, and Group C and D were tightened to 32 Ncm torque. Detorque values were measured with digital torque gauge during repeated closing and opening experiment. Results. Abutment screws with TiN coating (Group B and D) showed statistically significant higher mean detorque values than those of Group A and C. Discussion. Physical properties of TiN coating, such as low friction coefficient, high hardness and wear resistance, might contribute to higher detorque values. Conclusion. It is suggested that TiN coating of abutment screw help to reduce the risk of screw loosening and improve the stability of screw joint.

Implementation of Adult Authentication System Using Smartphone and Near-Field Communication (스마트폰과 근거리 무선 통신을 이용한 성인 인증 시스템의 개발)

  • Lee, Chongho;Lee, Seongsoo
    • Journal of IKEEE
    • /
    • v.19 no.4
    • /
    • pp.617-624
    • /
    • 2015
  • In this paper, an adult authentication system based on authentication certificate was designed and implemented using smartphone and near-field communication. It has three advantages. First, it achieves easy, convenient, and fast authentication by using smartphone and near-field communication. Second, it achieves extremely high security and reliability by exploiting authentication certificate. Third, it achieves extremely low risk of personal information leakage by generating and sending only virtual identification code. Finally, it has a proper legal basis by Digital Signature Act. It consists of adult authentication module, near-field communication control module, policy server module, and database server module. A prototype of the proposed system was designed and implemented, and it was verified to have correct operation.

Vulnerability and Security Management System from the Perspective of the Cloud Service Users (클라우드 서비스 사용자 관점에서의 취약점과 보안관리체계)

  • Choi, Young-Jin;Ra, Jong-Hei;Ky, Hong Pil;Lee, Sang-Hak
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.4
    • /
    • pp.401-411
    • /
    • 2012
  • There has been increased interest for cloud computing services that can promote cost savings while increasing investment in information resources. Cloud computing, however, has a disadvantage physically located in the external information resources to take advantage of the economic benefits, the advantages and increase the vulnerability of information protection and control of information assets. In this study, due to the unique properties of the new services, including vulnerability, the vulnerability of cloud computing derive the vulnerability of cloud computing and control items were derived through the mapping between vulnerability and control items, that are not being managed to identify vulnerabilities Cloud computing risk factors are presented.

Study of PDA based Personal Asthma Management System Development (PDA 기반 천식관리 시스템 개발에 관한 연구)

  • Park, Jong-Cheon;Hwang, Dong-Guk;Lee, Woo-Ram;Jun, Byoung-Min;Kim, Kyung-Ah;Cha, Eun-Jong
    • Proceedings of the KAIS Fall Conference
    • /
    • 2006.11a
    • /
    • pp.216-219
    • /
    • 2006
  • Self management of chronic asthma is of great importance, since the disease could lead the patient into an emergent situation. In the present study, we describe design and implementation of a personal digital assistant(PDA) based asthma management system for personal application including symptom and medication to prevent from the potential exac-erbation of the disease. The software program was written by the Visual C++ tool in the mobile computing environment and Object Store was applied for data management. User friendly GUI environment was provided for the patient to input his/her daily condition and self treatment such as medication for suc-cessful management. The input screen design substituted for keyboard input to a mouse in order to easy to select an item and minimize the keyboard input. The implementation results of this system., Real-time data collection and process were possible and be able to have been carried effectively out a continuous symptom, a medication of asthma patients, risk management.

  • PDF

An Improved HORS for Stream Authentication (스트림 인증에 적합한 개선된 HORS기법)

  • 박용수;조유근
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.7_8
    • /
    • pp.417-425
    • /
    • 2003
  • We propose an efficient one-time signature scheme for stream authentication by improving HORS. When one-time signatures are used for authenticating live streams, one of the most serious drawbacks is that its large signature size yields high communication overhead. Compared with the previous one-time signature schemes, proposed scheme has the smallest signature size. Moreover, verification overhead is very low. Compared with the previous schemes for stream authentication, signing overhead of our scheme is larger than that of HORS but much lower than those of BiBa or Powerball. Moreover, signing operation can be trivially parallelized without any additional risk because it does not require sharing of the secret key between distributed servers.