• Title/Summary/Keyword: security analysis

Search Result 6,610, Processing Time 0.033 seconds

A Study of the Family Caregiver's Burden for the Elderly with Chronic disease in a Rural Area (일부 농촌 지역 노인 만성질환자 가족의 부담감에 관한 연구)

  • Jang, In-Sun
    • Journal of Home Health Care Nursing
    • /
    • v.2
    • /
    • pp.19-34
    • /
    • 1995
  • The purpose of this study was to analysis level on family caregiver's burden for the elderly with chronic disease in a rural area and to choose priority care group, thereby facilitating the development of interventions to reduce the caregiver's burden. For this purpose, data were collected by questionaire from June 10 to October 8, 1994. The instruments for data collection were Caregiver Burden Inventory by Novak(1989) and Zarit et al(1982), severity of dementia by Hughes Scales(1982), ADL by Lawton(1971), patients' family caregiving activity by pre-survey and reference review(Lee, 1993 ; Jang, 1990 ; Yoo, 1982). The subjects were 213 family caregiver of elderly with chronic disease in a rural area. The data was analysed by the use of t-test, ANOVA, correlation and multiple regression. The results were as follows ; 1. Total burden was evaluated below average, the mean of family burden was 46.98. By the diagnostic classification, Hypertension was 27.37, DM 32.46, CVA 62.96, Dementia 61.24. 2. Significant variables which were correlated to the family caregiver's burden were the patient's disease diagnosis (F=33.82, p<0.001), severity of dementia(F=30.52, p<0.001), the status of disease management(F=11.53, p<0.001), ADL(F=10.54, p<0.001), PADL(F=7.50, p<0.001), income(F=7.17, p<0.001), caregiver's health status(F=24.53, p<0.001), a view of patient's prognosis (F=22.17, p<0.001), relationship with the patient(F=33.82, p<0.001), the number of hours per day spent on caregiving(F=77.52, p<0.001), level of intimacy of caregiver and patients(F=8.75, p<0.001), level of helping(F=4.90, p<0.01), the frequency of caregiving activity(F=3.80, p<0.01), the number of admission(F=5.54, p<0.01), the length of caregiving(F=4.43, p<0.01), other chronic patient in family(t=2.81, p<0.01), caregiver's job(F=3.11, p<0.01), the duration of illness(F=2.98, p<0.05), caregiver's religion(F=2.93, p<0.05), medical security(F=3.89, p<0.05), caregiving's helper(t=2.42, p<0.05). 3. PADL was the most important predictor to family caregiver burden(R2=0.6611). In addition to this, IADL, caregiver's health status, the length of caregiving. level of intimacy of caregiver and patients, patient's age, the patient's disease diagnosis and patient's job accounted for 76% of family caregiver burden. 4. The criteria of priority care group were as follows ; the mean of family caregiver burden was above 58, above of moderate ADL, the number of hours per day spent on caregiving above of 8 hours, above of moderate dementia. By the diagnostic classification, number of priority care group, Hypertension was 4 (8.0%), DM 4(8.0%), CVA 34(64.1%), Dementia 45(75.0%).

  • PDF

A System Dynamics Model for Negotiation strategy Analysis with North Korea (남북관계와 대북협상전략)

  • 곽상만
    • Korean System Dynamics Review
    • /
    • v.1 no.2
    • /
    • pp.5-31
    • /
    • 2000
  • The summit meeting of the South North Korean leaders was a turning point in the relationships between the two countries. It was followed by the Red-Cross Meeting, Minister-Level Meeting, economic agreements, which have increased the relationship more colorful in both quantities and qualities. However, the half-century period for separation was too long to overcome all the problems by only one event. The two countries have quite different social systems; one politically strong person is governing the North, while many interest groups are involved in political decision making processes in the South. In short, it would take a long time to settle down all the problems residing between the two countries. A system dynamics model is developed to describe the long term dynamics of the relations between the South and North Koreas. As a first attempt, the model focuses only on the diplomatic meeting issues between the South and North. The model aggregates diplomatic issues into 5 categories; economic issues, security issues, infrastructure, cultural issues, and past problems. It assumes that there would not be any dramatic changes between the two countries. It is a conceptual model composed of around 200 variables, and should not be used as a forecast tool. However, it captures most of the logics discussed in the papers and conferences concerning the South and North Korea relations. Many sensitivity studies and Monte Carlo simulations have shown that the simulation results matches with mental models of experts; that is the model can be used as a learning tool or as a secondary opinion until the data required by the model is collected. In order to analyze the current situation, five scenarios are simulated and analyzed; the functional approach, the conditional approach, the balanced approach, the circumstantial approach, and the strategic approach. The functional approach represents that the South makes efforts in the area where the possibility of agreement is high for the next 10 years. The conditional approach is a scenario where the South impose all difficult issues as conditions for resolving other diplomatic issues. The balanced approach is resolving the five issues with the same priorities, while the circumstantial approach is resolving issues which seem to be resolved easily. Finally, another optimum approach has been seek using the system dynamics model developed. The optimum strategy (it is named as the strategic approach) was strikingly different from other four approaches. The optimum strategy is so complicated that no one could find it with mental model(or by just insights). Considering that the system dynamic model used to find the optimum is a simplifind (maybe over simplified) version of the reality, it is concluded that a well designed system dynamics model would be of great help to resolving the complicated diplomatic problems in any kind.

  • PDF

Sensitivity Analysis of Quasi-Governmental Agencies' Decisions for Cloud Computing Service (준 정부기관 클라우드 컴퓨팅 서비스 결정에 대한 민감도 분석)

  • Song, In Kuk
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.91-100
    • /
    • 2015
  • Recently many companies began to feel the pressures of cost savings due to the global recession, so they have been interested in the Cloud Computing. Cloud Computing is one of using method of IT resources through the network. Users can borrow softwares or hardwares instead of buying them. Many people expect remarkable growth in Cloud Computing industry because of it's effectiveness. But Cloud Computing industry is still at an early stage. Especially, people who in the public sector hesitate to adopt Cloud Computing Services due to security issues and their conservative views. Also, they just have limited understanding, so we need to investigate what they really know and understand. Researches about the Cloud Computing generally focus on technical issues, so we can hardly find researches reference for decision making in considering the services. The study aims to investigate diverse factors for agencies' adoption decisions, such as benefits, costs, and risk in developing the most ideal type of cloud computing service for them, and performs priority analyses by applying ANP (Analytic Network Process). The results identify that features pertaining to the risk properties were considered the most significant factors. According to this research, the usage of private cloud computing services may prove to be appropriate for public environment in Korea. The study will hopefully provide the guideline to many governmental agencies and service providers, and assist the related authorities with cloud computing policy in coming up with the relevant regulations.

The secured mobile wallet system using by integrated ID (통합 아이디를 이용한 안전한 모바일 월렛 시스템)

  • Nam, Choon-Sung;Jeon, Min-Kyung;Shin, Dong-Ryeol
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.9-20
    • /
    • 2015
  • Nowadays, Smart Wallet technology trend that is able to save users' consuming costs and also retain users' redundant behaviors such as Single-tapping, One-way communication, Integrated ID, has been issued in recent Mobile Industrial Fields. As one of Smart Wallet functions, Integrated ID is proposed for users' convenience, handiness, and immediate responses. It is designed for the effective management of users' IDs which are easy to be forgot because of its unusual structures. To be detail, instead of user, Integrated ID system can certificate users identification from various online sites (where user resisted) authorization requests via one-clicking, not putting identification data in each sites. So, this technology would be helpful much to a certain user who has lots ID and its Password in multiple Online shopping companies by establishing integrated ID. However, although Integrated ID has lots advantages to be used, most Mobile Service Companies has hesitated to apply Integrated ID service in their shopping systems because this technology requires them sharing their users' data. They have worried that this service would be not helpful to gain their profits. Furthermore, Users who join in multiple shopping companies and use Integrated ID services also are difficult to decide which company they have to save their points in before payment because this system could not show any financial benefit analysis data to their users. As following facts, via this paper majorly we propose the advanced Integrated ID system which concern shopping point management. Basically, this system has a strong security payment service and secure network services like other mobile Shopping systems. Additionally, this system is able to service (or to support) shopping -point -saving guide for customers' financial benefits and conveniences.

Social Media Analysis Based on Keyword Related to Educational Policy Using Topic Modeling (토픽모델링을 이용한 교육정책 키워드 기반 소셜미디어 분석)

  • Chung, Jin-myeong;Park, Young-ho;Kim, Woo-ju
    • Journal of Internet Computing and Services
    • /
    • v.19 no.4
    • /
    • pp.53-63
    • /
    • 2018
  • The traditional mass media function of conveying information and forming public opinion has rapidly changed into an environment in which information and opinions are shared through social media with the development of ICT technology, and such social media further strengthens its influence. In other words, it has been confirmed that the influence of the public opinion through the production and sharing of public opinion on political, social and economic changes is increasing, and this change is already in use on the political campaign. In addition, efforts to grasp and reflect the opinions of the public by utilizing social media are being actively carried out not only in the political area but also in the public area. The purpose of this study is to explore the possibility of using social media based public opinion in educational policy. We collected media data, analyzed the main topic and probability of occurrence of each topic, and topic trends. As a result, we were able to catch the main interest of the public(the 'Domestic Computer Education Time' accounted for 43.99%, and 'Prime Project Selection' topics was 36.81% and 'Artificial Intelligence Program' topics was 7.94%). In addition, we could get a suggestion that flexible policies should be established according to the timing of the curriculum and the subject of the policy even if the category of the policy is same.

Activation Plans of Vocational Home Economics High School Education (가사$\cdot$실업계 고등학교 교육의 활설화 방안)

  • Yoon In Kyung;Kim Sun Tae;Jang Myung Hee
    • Journal of Korean Home Economics Education Association
    • /
    • v.16 no.4 s.34
    • /
    • pp.107-126
    • /
    • 2004
  • The purpose of this study is to suggest some activation plans of vocational home economics high school education by analyzing the actual conditions of vocational home economics high school education and surveying teachers and students' recognition and their needs toward the present vocational home economics high school education. The data were collected through reference analysis. questionnaire and interview method. They were analyzed using SPSS. The outline of this study was as follows: First. some data for examining the development trends of vocational home economics were collected especially in terms of the social and economical change related to vocational home economics education. the development of vocational home economics education based on the current curriculum. and some trends of vocational home economics education in foreign countries. Second. the real conditions of vocational home economics high school education were analyzed according to the real conditions of curriculum management in vocational home economics high schools. Based on this result. a questionnaire was designed to survey teachers and students' recognition and their needs. The items consisted mainly of the curriculum management and satisfaction of school life. Third. some activation plans of vocational home economics high school education were proposed in terms of management system(3 items). curriculum management(5 items). security of teachers and their expertise(4 items). and administration and finance(3 items).

  • PDF

Hybrid Detection Algorithm of Copy-Paste Image Forgery (Copy-Paste 영상 위조의 하이브리드 검출 알고리즘)

  • Choi, YongSoo;Atnafu, Ayalneh Dessalegn;Lee, DalHo
    • Journal of Digital Contents Society
    • /
    • v.16 no.3
    • /
    • pp.389-395
    • /
    • 2015
  • Digital image provides many conveniences at the internet environment recently. A great number of applications, like Digital Library, Stock Image, Personal Image and Important Information, require the use of digital image. However it has fatal defect which is easy to be modified because digital image is only electronic file. Numerous digital image forgeries have become a serious problem due to the sophistication and accessibility of image editing software. Copy-Move forgery is the simplest type of forgery that involves copying portion of an image and paste it on different location within the image. There are many approaches to detect Copy-Move forgery, but all of them have their own limitations. In this paper, visual and invisible feature based forgery detection techniques are tested and analyzed. The analysis shows that pros and cons of these two techniques compensate each other. Therefore, a hybrid of visual based and invisible feature based forgery detection that combine the merits of both techniques is proposed. The experimental results show that the proposed algorithm has enhanced performance compared to individual techniques. Moreover, it provides more information about the forgery, like identifying copy and duplicate regions.

Automatic Detection Approach of Ship using RADARSAT-1 Synthetic Aperture Radar

  • Yang, Chan-Su
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.14 no.2
    • /
    • pp.163-168
    • /
    • 2008
  • Ship detection from satellite remote sensing is a crucial application for global monitoring for the purpose of protecting the marine environment and ensuring marine security. It permits to monitor sea traffic including fisheries, and to associate ships with oil discharge. An automatic ship detection approach for RADARSAT Fine Synthetic Aperture Radar (SAR) image is described and assessed using in situ ship validation information collected during field experiments conducted on August 6, 2004. Ship detection algorithms developed here consist of five stages: calibration, land masking, prescreening, point positioning, and discrimination. The fine image was acquired of Ulsan Port, located in southeast Korea, and during the acquisition, wind speeds between 0 m/s and 0.4 m/s were reported. The detection approach is applied to anchoring ships in the anchorage area of the port and its results are compared with validation data based on Vessel Traffic Service (VTS) radar. Our analysis for anchoring ships, above 68 m in length (LOA), indicates a 100% ship detection rate for the RADARSAT single beam mode. It is shown that the ship detection performance of SAR for smaller ships like barge could be higher than the land-based radar. The proposed method is also applied to estimate the ship's dimensions of length and breadth from SAR radar cross section(RCS), but those values were comparatively higher than the actual sizes because of layover and shadow effects of SAR.

  • PDF

Risk based policy at big data era: Case study of privacy invasion (빅 데이터 시대 위험기반의 정책 - 개인정보침해 사례를 중심으로 -)

  • Moon, Hyejung;Cho, Hyun Suk
    • Informatization Policy
    • /
    • v.19 no.4
    • /
    • pp.63-82
    • /
    • 2012
  • The world's best level of ICT(Information, Communication and Technology) infrastructure has experienced the world's worst level of ICT accident in Korea. The number of major accidents of privacy invasion has been three times larger than the total number of Internet user of Korea. The cause of the severe accident was due to big data environment. As a result, big data environment has become an important policy agenda. This paper has conducted analyzing the accident case of data spill to study policy issues for ICT security from a social science perspective focusing on risk. The results from case analysis are as follows. First, ICT risk can be categorized 'severe, strong, intensive and individual'from the level of both probability and impact. Second, strategy of risk management can be designated 'avoid, transfer, mitigate, accept' by understanding their own culture type of relative group such as 'hierarchy, egalitarianism, fatalism and individualism'. Third, personal data has contained characteristics of big data such like 'volume, velocity, variety' for each risk situation. Therefore, government needs to establish a standing organization responsible for ICT risk policy and management in a new big data era. And the policy for ICT risk management needs to balance in considering 'technology, norms, laws, and market'in big data era.

  • PDF

Validation of a New Design of Tellurium Dioxide-Irradiated Target

  • Fllaoui, Aziz;Ghamad, Younes;Zoubir, Brahim;Ayaz, Zinel Abidine;Morabiti, Aissam El;Amayoud, Hafid;Chakir, El Mahjoub
    • Nuclear Engineering and Technology
    • /
    • v.48 no.5
    • /
    • pp.1273-1279
    • /
    • 2016
  • Production of iodine-131 by neutron activation of tellurium in tellurium dioxide ($TeO_2$) material requires a target that meets the safety requirements. In a radiopharmaceutical production unit, a new lid for a can was designed, which permits tight sealing of the target by using tungsten inert gaswelding. The leakage rate of all prepared targets was assessed using a helium mass spectrometer. The accepted leakage rate is ${\leq}10^{-4}mbr.L/s$, according to the approved safety report related to iodine-131 production in the TRIGA Mark II research reactor (TRIGA: Training, Research, Isotopes, General Atomics). To confirm the resistance of the new design to the irradiation conditions in the TRIGA Mark II research reactor's central thimble, a study of heat effect on the sealed targets for 7 hours in an oven was conducted and the leakage rates were evaluated. The results show that the tightness of the targets is ensured up to $600^{\circ}C$ with the appearance of deformations on lids beyond $450^{\circ}C$. The study of heat transfer through the target was conducted by adopting a one-dimensional approximation, under consideration of the three transfer modes-convection, conduction, and radiation. The quantities of heat generated by gamma and neutron heating were calculated by a validated computational model for the neutronic simulation of the TRIGA Mark II research reactor using the Monte Carlo N-Particle transport code. Using the heat transfer equations according to the three modes of heat transfer, the thermal study of I-131 production by irradiation of the target in the central thimble showed that the temperatures of materials do not exceed the corresponding melting points. To validate this new design, several targets have been irradiated in the central thimble according to a preplanned irradiation program, going from4 hours of irradiation at a power level of 0.5MWup to 35 hours (7 h/d for 5 days a week) at 1.5MW. The results showthat the irradiated targets are tight because no iodine-131 was released in the atmosphere of the reactor building and in the reactor cooling water of the primary circuit.