• Title/Summary/Keyword: security system

Search Result 9,716, Processing Time 0.043 seconds

Analysis of the Effect of Objective Functions on Hydrologic Model Calibration and Simulation (목적함수에 따른 매개변수 추정 및 수문모형 정확도 비교·분석)

  • Lee, Gi Ha;Yeon, Min Ho;Kim, Young Hun;Jung, Sung Ho
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.1
    • /
    • pp.1-12
    • /
    • 2022
  • An automatic optimization technique is used to estimate the optimal parameters of the hydrologic model, and different hydrologic response results can be provided depending on objective functions. In this study, the parameters of the event-based rainfall-runoff model were estimated using various objective functions, the reproducibility of the hydrograph according to the objective functions was evaluated, and appropriate objective functions were proposed. As the rainfall-runoff model, the storage function model(SFM), which is a lumped hydrologic model used for runoff simulation in the current Korean flood forecasting system, was selected. In order to evaluate the reproducibility of the hydrograph for each objective function, 9 rainfall events were selected for the Cheoncheon basin, which is the upstream basin of Yongdam Dam, and widely-used 7 objective functions were selected for parameter estimation of the SFM for each rainfall event. Then, the reproducibility of the simulated hydrograph using the optimal parameter sets based on the different objective functions was analyzed. As a result, RMSE, NSE, and RSR, which include the error square term in the objective function, showed the highest accuracy for all rainfall events except for Event 7. In addition, in the case of PBIAS and VE, which include an error term compared to the observed flow, it also showed relatively stable reproducibility of the hydrograph. However, in the case of MIA, which adjusts parameters sensitive to high flow and low flow simultaneously, the hydrograph reproducibility performance was found to be very low.

A Consideration of Perception on Enforcement of Serious Accident Punishment Act(SAPA) among the Workers in the Nuclear Medicine Department (중대재해처벌법 시행에 따른 핵의학 종사자의 인식 고찰)

  • Lee, Joo-Young
    • Journal of the Korean Society of Radiology
    • /
    • v.16 no.4
    • /
    • pp.477-490
    • /
    • 2022
  • Serious Accident Punishment Act(SAPA) went into effect as of Jan. 27, 2022. The subject of study was the worker of the nuclear medicine department and the investigation was aimed at identifying the present situation of their understanding on the issue in the here and now, which can be utilized as basic research for further study. The survey was conducted on 51 people of the worker in the nuclear medicine department. The general factors were classified by their gender, the scale of the hospitals, the period of career, and the detailed occupational categories. The conclusion was drawn, including 1 missing data in gender and 2 in the type of occupation. The targeted hospitals were tertiary hospital, university hospital, and general hospital which have nuclear medicine department in. The period of subjects' career was categorized by less than 3 years, 3 to 5 years, 5 to 10 years, and more than 10 years. The specific occupation was classified by in-vivo radiological technologist, radiation safety manager and others. The amount of pressure that the job entails was highest in the category of general hospital, the period of 3 to 5 years of job experience, and radiation safety manager each. The system of the code was well constructed in the category of general hospital, the period of less than 3-year career, and radiation safety manager, as they responded. The blood transmissible disease had the largest number of outbreak of accidents related to the serious industrial accident. In addition, the radiopharmaceutical dosing error had the highest number of outbreak of accidents related to the serious civil accident. Therefore, we need to improve SAPA, facility inspection, security of budget, security of professional manpower. It will help the stable use of radiation and ensure patient safety.

Recidivism Follow-Up Study on Sex offenders under Electronic Monitoring (성범죄 전자감독대상자들에 대한 재범추적 연구)

  • Lee, SeungWon;Lee, SueJung;Seo, HyeRan
    • Korean Journal of Forensic Psychology
    • /
    • v.12 no.1
    • /
    • pp.15-33
    • /
    • 2021
  • In this study, we analyzed the difference in survival rates of those subject to electronic supervision of sex crimes based on the tracking of the period of recidivism and whether they were recidivism, and wanted to confirm the ability of the criminal record to predict recidivism. The criteria for recidivism were defined as cases where a conviction was confirmed due to a criminal case that occurred during the execution of electronic monitoring, and the date of recidivism was the date of occurrence of a case that was confirmed guilty. A total of 122 re-offenders were used in the analysis, and all of them were charged with electronic supervision for committing sex crimes. Studies have confirmed that the subjects commit the most recidivism within three years. In addition, in this study, the difference in survival rate between groups was analyzed after classifying mixed and sex recidivism cases. The number of members was 88 for the mixed recidivism group and 34 for the sex recidivism group. The analysis confirmed that both groups had the most recidivism within three years. There was a slight difference between the survival rate of the mixed recidivism group and the survival rate of the sex recidivism group. So the Log Rank Test and the Generalized Wilcoxon Test were conducted, but no statistically significant differences were identified(Wilcoxon statistic = 2.326, df = 1, p = .13, Log Rank = 1.345, df = 1, p = .25). Next, a Cox Regression analysis was performed to confirm the ability of the criminal record to predict recidivism. As a result, the number of criminal records(sex offense, violent crime) have been confirmed to be a good predictor of recidivism(X2=27.33, df=1, p< .001). As a result, the recidivism rate is gradually decreasing due to the implementation of the electronic monitoring. However, the duration of recidivism required by sex offenders in high-risk groups was found to be rather short. Currently, security measures against felons are being strengthened, so it is necessary to select high-risk groups. Therefore, based on the related studies, the characteristics of high-risk groups and the results of recidivism studies will be used as a basis for disposal within the criminal justice system, which will play a major role in granting objectivity.

  • PDF

Design and Implementation of IoT based Low cost, Effective Learning Mechanism for Empowering STEM Education in India

  • Simmi Chawla;Parul Tomar;Sapna Gambhir
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.163-169
    • /
    • 2024
  • India is a developing nation and has come with comprehensive way in modernizing its reducing poverty, economy and rising living standards for an outsized fragment of its residents. The STEM (Science, Technology, Engineering, and Mathematics) education plays an important role in it. STEM is an educational curriculum that emphasis on the subjects of "science, technology, engineering, and mathematics". In traditional education scenario, these subjects are taught independently, but according to the educational philosophy of STEM that teaches these subjects together in project-based lessons. STEM helps the students in his holistic development. Youth unemployment is the biggest concern due to lack of adequate skills. There is a huge skill gap behind jobless engineers and the question arises how we can prepare engineers for a better tomorrow? Now a day's Industry 4.0 is a new fourth industrial revolution which is an intelligent networking of machines and processes for industry through ICT. It is based upon the usage of cyber-physical systems and Internet of Things (IoT). Industrial revolution does not influence only production but also educational system as well. IoT in academics is a new revolution to the Internet technology, which introduced "Smartness" in the entire IT infrastructure. To improve socio-economic status of the India students must equipped with 21st century digital skills and Universities, colleges must provide individual learning kits to their students which can help them in enhancing their productivity and learning outcomes. The major goal of this paper is to present a low cost, effective learning mechanism for STEM implementation using Raspberry Pi 3+ model (Single board computer) and Node Red open source visual programming tool which is developed by IBM for wiring hardware devices together. These tools are broadly used to provide hands on experience on IoT fundamentals during teaching and learning. This paper elaborates the appropriateness and the practicality of these concepts via an example by implementing a user interface (UI) and Dashboard in Node-RED where dashboard palette is used for demonstration with switch, slider, gauge and Raspberry pi palette is used to connect with GPIO pins present on Raspberry pi board. An LED light is connected with a GPIO pin as an output pin. In this experiment, it is shown that the Node-Red dashboard is accessing on Raspberry pi and via Smartphone as well. In the final step results are shown in an elaborate manner. Conversely, inadequate Programming skills in students are the biggest challenge because without good programming skills there would be no pioneers in engineering, robotics and other areas. Coding plays an important role to increase the level of knowledge on a wide scale and to encourage the interest of students in coding. Today Python language which is Open source and most demanding languages in the industry in order to know data science and algorithms, understanding computer science would not be possible without science, technology, engineering and math. In this paper a small experiment is also done with an LED light via writing source code in python. These tiny experiments are really helpful to encourage the students and give play way to learn these advance technologies. The cost estimation is presented in tabular form for per learning kit provided to the students for Hands on experiments. Some Popular In addition, some Open source tools for experimenting with IoT Technology are described. Students can enrich their knowledge by doing lots of experiments with these freely available software's and this low cost hardware in labs or learning kits provided to them.

A Study on the Operation Plan of the Gangwon-do Disaster Management Resources Integrated Management Center (강원도 재난관리자원 통합관리센터 운영방안에 관한 연구)

  • Hang-Il Jo;Sang-Beom Park;Kye-Won Jun
    • Journal of Korean Society of Disaster and Security
    • /
    • v.17 no.1
    • /
    • pp.9-16
    • /
    • 2024
  • In Korea, as disasters become larger and more complex, there is a trend of shifting from a focus on response and recovery to a focus on prevention and preparedness. In order to prevent and prepare for disasters, each local government manages disaster management resources by stockpiling them. However, although disaster management resources are stored in individual warehouses, they are managed by department rather than by warehouse, resulting in insufficient management of disaster management resources due to the heavy workload of those in charge. In order to intensively manage these disaster management resources, an integrated disaster management resource management center is established and managed at the metropolitan/provincial level. In the case of Gangwon-do, the subject of this study, a warehouse is rented and operated as an integrated disaster management resource management center. When leasing an integrated management center, there is the inconvenience of having to move the location every 1 to 2 years, so it is deemed necessary to build a dedicated facility in an available site. To select a location candidate, network analysis was used to measure access to and use of facilities along interconnected routes of networks such as roads and railways. During network analysis, the Location-Allocation method, which was widely used in the past to determine the location of multiple facilities, was applied. As a result, Hoengseong-gun in Gangwon-do was identified as a suitable candidate site. In addition, if the integrated management center uses our country's logistics system to stockpile disaster management resources, local governments can mobilize disaster management resources in 3 days, and it is said that it takes 3 days to return to normal life after a disaster occurs. Each city's disaster management resource stockpile is 3 days' worth per week, and the integrated management center stores 3 times the maximum of the city's 4-day stockpile.

A Study on the Change of Cyber Attacks in North Korea (북한의 사이버 공격 변화 양상에 대한 연구)

  • Chanyoung Park;Hyeonsik Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.175-181
    • /
    • 2024
  • The U.N. Security Council's North Korea Sanctions Committee estimated that the amount of North Korea's cyberattacks on virtual asset-related companies from 2017 to 2023 was about 4 trillion won. North Korea's cyberattacks have secured funds through cryptocurrency hacking as it has been restricted from securing foreign currency due to economic sanctions by the international community, and it also shows the form of technology theft against defense companies, and illegal assets are being used to maintain the Kim Jong-un regime and develop nuclear and missile development. When North Korea conducted its sixth nuclear test on September 3, 2017, and declared the completion of its national nuclear armament following the launch of an intercontinental ballistic missile on November 29 of the same year, the U.N. imposed sanctions on North Korea, which are considered the strongest economic sanctions in history. In these difficult economic situations, North Korea tried to overcome the crisis through cyberattacks, but as a result of analyzing the changes through the North's cyber attack cases, the strategic goal from the first period from 2009 to 2016 was to verify and show off North Korea's cyber capabilities through the neutralization of the national network and the takeover of information, and was seen as an intention to create social chaos in South Korea. When foreign currency earnings were limited due to sanctions against North Korea in 2016, the second stage seized virtual currency and secured funds to maintain the Kim Jong-un regime and advance nuclear and missile development. The third stage is a technology hacking of domestic and foreign defense companies, focusing on taking over key technologies to achieve the five strategic weapons tasks proposed by Chairman Kim Jong-un at the 8th Party Congress in 2021. At the national level, security measures for private companies as well as state agencies should be established against North Korea's cyberattacks, and measures for legal systems, technical problems, and budgets related to science are urgently needed. It is also necessary to establish a system and manpower to respond to the ever-developing cyberattacks by focusing on cultivating and securing professional manpower such as white hackers.

A Study on Users' Recognition of Selection Attributes for Connection between Recreational Forest and Rural Tourism Village (자연휴양림과 체험마을 연계를 위한 이용객의 선택속성 인식 연구)

  • Lee, Yong-hak;Cho, Yeong-Eun;Kang, Eun-jee;Kim, Yong-Geun
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.44 no.1
    • /
    • pp.16-28
    • /
    • 2016
  • The study was conducted to compare and analyze the importance and performance of leisure destination selection attributes of persons who use recreational forests and rural tourism villages. This researcher investigated the use patterns of users to identify the ground for connection between recreational forest and rural tourism village, analyzed their recognition differences in physical selection attribute, program selection attribute, and service selection attribute in order for leisure destination selection, and conducted importance-performance analysis(IPA analysis) to draw a plan for connection. The main results and suggestions are presented as follows. First, recreational forests were visited by family users in order for rest and emotional cultivation and provided experience programs using simple public interest function of forest, whereas rural tourism villages were visited by family users, friends and co-workers, groups and club members to experience a variety of annual programs and understand regional cultures. It was found that it was necessary to connect natural forest with rural tourism village in order to meet the leisure needs of the people changed in diversified ways. Secondly, it was found that the connection between rural tourism village and recreational forest visited mainly for simple rest led to positive visit intention of users. It was expected that there will be various kinds of uses, including experience program participation, child education, and safe accommodations security. In other words, the connection between recreational forest and rural tourism village is an alternative to trigger actual demands and recreational forest activities with high quality. Thirdly, in the case of users of recreational forests, their performance of all selection attributes was lower than their importance of them. Therefore, overall improvements were needed. In particular, needed were the diversity, benefit, and promotion of programs, improvements in locality(themes), supply of lodges and convenient facilities, booking system, the purchase system of local special products, and professional skills of operators and managers. On contrary, the performance of program selection attribute of rural tourism village was high. Therefore, it was found that program attribute of rural tourism village was the main connection factor to activate recreational forest use. Fourthly, according to IPA analysis, the proper connections between loges, convenient facilities, and nearby touristattractions, which give high expectations and satisfaction to users, needed to remain. And it was required to make common efforts to accomplish the goal (income creation) of rural tourism village and improve booking system for visitors and performance of local special products sales opportunity. In addition, the essential factors to induce users' leisure destination selection were found to be maintenance of the use fee system of recreational forest, diversity of rural tourism village program, and retention of locality.

Variation of Hospital Costs and Product Heterogeneity

  • Shin, Young-Soo
    • Journal of Preventive Medicine and Public Health
    • /
    • v.11 no.1
    • /
    • pp.123-127
    • /
    • 1978
  • The major objective of this research is to identify those hospital characteristics that best explain cost variation among hospitals and to formulate linear models that can predict hospital costs. Specific emphasis is placed on hospital output, that is, the identification of diagnosis related patient groups (DRGs) which are medically meaningful and demonstrate similar patterns of hospital resource consumption. A casemix index is developed based on the DRGs identified. Considering the common problems encountered in previous hospital cost research, the following study requirements are estab-lished for fulfilling the objectives of this research: 1. Selection of hospitals that exercise similar medical and fiscal practices. 2. Identification of an appropriate data collection mechanism in which demographic and medical characteristics of individual patients as well as accurate and comparable cost information can be derived. 3. Development of a patient classification system in which all the patients treated in hospitals are able to be split into mutually exclusive categories with consistent and stable patterns of resource consumption. 4. Development of a cost finding mechanism through which patient groups' costs can be made comparable across hospitals. A data set of Medicare patients prepared by the Social Security Administration was selected for the study analysis. The data set contained 27,229 record abstracts of Medicare patients discharged from all but one short-term general hospital in Connecticut during the period from January 1, 1971, to December 31, 1972. Each record abstract contained demographic and diagnostic information, as well as charges for specific medical services received. The 'AUT-OGRP System' was used to generate 198 DRGs in which the entire range of Medicare patients were split into mutually exclusive categories, each of which shows a consistent and stable pattern of resource consumption. The 'Departmental Method' was used to generate cost information for the groups of Medicare patients that would be comparable across hospitals. To fulfill the study objectives, an extensive analysis was conducted in the following areas: 1. Analysis of DRGs: in which the level of resource use of each DRG was determined, the length of stay or death rate of each DRG in relation to resource use was characterized, and underlying patterns of the relationships among DRG costs were explained. 2. Exploration of resource use profiles of hospitals; in which the magnitude of differences in the resource uses or death rates incurred in the treatment of Medicare patients among the study hospitals was explored. 3. Casemix analysis; in which four types of casemix-related indices were generated, and the significance of these indices in the explanation of hospital costs was examined. 4. Formulation of linear models to predict hospital costs of Medicare patients; in which nine independent variables (i. e., casemix index, hospital size, complexity of service, teaching activity, location, casemix-adjusted death. rate index, occupancy rate, and casemix-adjusted length of stay index) were used for determining factors in hospital costs. Results from the study analysis indicated that: 1. The system of 198 DRGs for Medicare patient classification was demonstrated not only as a strong tool for determining the pattern of hospital resource utilization of Medicare patients, but also for categorizing patients by their severity of illness. 2. The wei틴fed mean total case cost (TOTC) of the study hospitals for Medicare patients during the study years was $11,27.02 with a standard deviation of $117.20. The hospital with the highest average TOTC ($1538.15) was 2.08 times more expensive than the hospital with the lowest average TOTC ($743.45). The weighted mean per diem total cost (DTOC) of the study hospitals for Medicare patients during the sutdy years was $107.98 with a standard deviation of $15.18. The hospital with the highest average DTOC ($147.23) was 1.87 times more expensive than the hospital with the lowest average DTOC ($78.49). 3. The linear models for each of the six types of hospital costs were formulated using the casemix index and the eight other hospital variables as the determinants. These models explained variance to the extent of 68.7 percent of total case cost (TOTC), 63.5 percent of room and board cost (RMC), 66.2 percent of total ancillary service cost (TANC), 66.3 percent of per diem total cost (DTOC), 56.9 percent of per diem room and board cost (DRMC), and 65.5 percent of per diem ancillary service cost (DTANC). The casemix index alone explained approximately one half of interhospital cost variation: 59.1 percent for TOTC and 44.3 percent for DTOC. Thsee results demonstrate that the casemix index is the most importand determinant of interhospital cost variation Future research and policy implications in regard to the results of this study is envisioned in the following three areas: 1. Utilization of casemix related indices in the Medicare data systems. 2. Refinement of data for hospital cost evaluation. 3. Development of a system for reimbursement and cost control in hospitals.

  • PDF

Suggestion for Comprehensive Quality Assurance of Medical Linear Accelerator in Korea (국내 선형가속기의 포괄적인 품질관리체계에 대한 제언)

  • Choi, Sang Hyoun;Park, Dong-wook;Kim, Kum Bae;Kim, Dong Wook;Lee, Jaiki;Shin, Dong Oh
    • Progress in Medical Physics
    • /
    • v.26 no.4
    • /
    • pp.294-303
    • /
    • 2015
  • American Association of Physicists in Medicine (AAPM) Published Task Group 40 report which includes recommendations for comprehensive quality assurance (QA) for medical linear accelerator in 1994 and TG-142 report for recommendation for QA which includes procedures such as intensity-modulated radiotherapy (IMRT), stereotactic radiosurgery (SRS) and stereotactic body radiation therapy (SBRT) in 2010. Recently, Nuclear Safety and Security Commission (NSSC) published NSSC notification no. 2015-005 which is "Technological standards for radiation safety of medical field". This notification regulate to establish guidelines for quality assurance which includes organization and job, devices, methods/frequency/tolerances and action levels for QA, and to implement quality assurance in each medical institution. For this reason, all of these facilities using medical machine for patient treatment should establish items, frequencies and tolerances for proper QA for medical treatment machine that use the techniques such as non-IMRT, IMRT and SRS/SBRT, and perform quality assurance. For domestic, however, there are lack of guidelines and reports of Korean Society of Medical Physicists (KSMP) for reference to establish systematic QA report in medical institutes. This report, therefore, suggested comprehensive quality assurance system such as the scheme of quality assurance system, which is considered for domestic conditions, based the notification of NSSC and AAPM TG-142 reports. We think that the quality assurance system suggested for medical linear accelerator also help establishing QA system for another high-precision radiation treatment machines.

A Study on the Performance of Cloud-based VDI Adoption: Comparing between IS administrators and business users (클라우드 기반 VDI 도입 성과에 관한 연구 - 시스템 관리자와 일반 사용자의 비교를 중심으로 -)

  • Kim, Il-Han;Kwon, Sun-Dong
    • Management & Information Systems Review
    • /
    • v.37 no.2
    • /
    • pp.149-167
    • /
    • 2018
  • The purpose of this study is to analyze the performance of Virtual Desktop Infrastructure(VDI) adoption. VDI performance was measured by IS manager (system quality, security, and managerial operation) and business user (usability, access, and user satisfaction). The survey questionnaires were developed for measuring VDI performance. 84 data samples were collected from the companies that had adopted cloud-based VDI. This research model was verified by Smart-PLS and SPSS. The research findings were as follows: First, the companies using VDI experienced actual performance, but they did not attain their expectation. Second, as results of comparing between IS managers and business users, IS administrators had considerably higher performance than business users, which indicates that there were big differences in performance perception among users. Compared with prior research such as technical trend, system construction, and performance improvement, this study has the following implications. First, by comparing the expected performance with the actual performance of the companies that have implemented and operating VDI, it was suggested how a company that wants to adopt VDI can manage the expectation level of VDI and achieve higher actual performance. Second, because the perception of VDI performance differs between business users and system managers, it is meaningful that a fair evaluation of VDI performance requires a balanced consideration of business users and system managers.