• Title/Summary/Keyword: shared control

Search Result 526, Processing Time 0.03 seconds

A Study on the Management and Dispensing Standards of Herbal Medicine in Herbal Dispensaries (탕전실의 조제 관리 및 운영 기준에 대한 연구)

  • Kang, Sung Chul;Kim, So Yeon;Yun, Yu Kyung;Kim, Ji-Hoon;Kim, Yun-Kyung
    • Herbal Formula Science
    • /
    • v.27 no.1
    • /
    • pp.31-44
    • /
    • 2019
  • Objective : Herbal dispensaries, where medications are prepared for patients, require specific preparation and operations management for safe herbal medicines. This study aims to propose improvements in the herbal medicine preparation and operation of the herbal dispensaries as series study of the "A Survey on the Management Status of Extramural Herbal Dispensaries" Methods : We first checked current management regulations. In addition, we compared and analyzed related laws which are "State management norm of Traditional Chinese Medicine dispensaries", "Enforcement Rule of Medicinal Product Safety" and " Hazard Analysis and Critical Control Point(HACCP)", to introduce the assessment items of herbal dispenses evaluation and certification system. Results : In this study, we found that the current regulations, "Guideline on Installation and Utilization of Extremal Herbal Pharmaceutical Facility and Shared-use of Herbal Dispensary", are insufficient to ensure the quality and safety of herbal medicines. We suggested articles for the proper management of herbal dispensaries and these were introduced to the Herbal dispensary evaluation and certification system. Conclusion : We recommend evaluation articles in Herbal dispensary evaluation and certification systems need to be popular among herbal dispensaries, then Korean herbal medicine could restore credibility from the people.

The Improvement of Disaster Safety Network using ICT Devices (ICT 기기를 활용한 재난안전통신망 강화 방안)

  • Hong, Sung-Hwa
    • Journal of Advanced Navigation Technology
    • /
    • v.23 no.2
    • /
    • pp.194-199
    • /
    • 2019
  • Natural disasters destroy decades of human effort and investments, thereby placing new demands on society for reconstruction and rehabilitation. In most case, the natural phenomena triggering the disasters are beyond human control. In order to solve the problems that the information resources can not be shared among disaster management sectors and their work is hard to be coordinated in city, an idea of application of ubiquitous sense network and ICT technology to model the architecture of the disaster prevention system based on the analysis of characteristics of disasters. The proposed algorithm simulated that it is possible to locate the terminal by linking the direction angle and the estimated position that can be confirmed at the time of stopping, even if the movement direction of the terminal does not move in a certain direction with only a smaller number of mobile base stations. We also confirmed that the proposed algorithms analyzed through simulation are more efficient than existing algorithms.

Fraud Detection in E-Commerce

  • Alqethami, Sara;Almutanni, Badriah;AlGhamdi, Manal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.312-318
    • /
    • 2021
  • Lack of knowledge and digital skills is a threat to the information security of the state and society, so the formation and development of organizational culture of information security is extremely important to manage this threat. The purpose of the article is to assess the state of information security of the state and society. The research methodology is based on a quantitative statistical analysis of the information security culture according to the EU-27 2019. The theoretical basis of the study is the theory of defense motivation (PMT), which involves predicting the individual negative consequences of certain events and the desire to minimize them, which determines the motive for protection. The results show the passive behavior of EU citizens in ensuring information security, which is confirmed by the low level of participation in trainings for the development of digital skills and mastery of basic or above basic overall digital skills 56% of the EU population with a deviation of 16%. High risks to information security in the context of damage to information assets, including software and databases, have been identified. Passive behavior of the population also involves the use of standard identification procedures when using the Internet (login, password, SMS). At the same time, 69% of EU citizens are aware of methods of tracking Internet activity and access control capabilities (denial of permission to use personal data, access to geographical location, profile or content on social networking sites or shared online storage, site security checks). Phishing and illegal acquisition of personal data are the biggest threats to EU citizens. It have been identified problems related to information security: restrictions on the purchase of products, Internet banking, provision of personal information, communication, etc. The practical value of this research is the possibility of applying the results in the development of programs of education, training and public awareness of security issues.

Secure Searchable Encryption with User-Revocability in Multi-User Settings (다자간 환경에서 사용자 탈퇴가 가능한 프라이버시 보호 키워드 검색 기법)

  • Kim, Dong-Min;Chun, Ji-Young;Noh, Geon-Tae;Jeong, Ik-Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.3-14
    • /
    • 2011
  • In recent days, people used to store and share the data with other users through the web storage services. It is more convenient for using the data, but it raise problems such as access control of stored data and privacy exposure to untrusted server. Searchable encryption is used to share the data securely in multi-user setting. Especially in the multi-user setting, the revoked users should not be able to search the data and access the stored data. That is, it should be considered the security from revoked users. However in the existing schemes, the revoked users can decrypt the shared data by passive attack. Proposed scheme is the secure searchable encryption that resolves the problem and guarantees the security for revoked users.

Genetic Diversity of Hard Ticks (Acari: Ixodidae) in the South and East Regions of Kazakhstan and Northwestern China

  • Yang, Yicheng;Tong, Jin;Ruan, Hongyin;Yang, Meihua;Sang, Chunli;Liu, Gang;Hazihan, Wurelihazi;Xu, Bin;Hornok, Sandor;Rizabek, Kadyken;Gulzhan, Kulmanova;Liu, Zhiqiang;Wang, Yuanzhi
    • Parasites, Hosts and Diseases
    • /
    • v.59 no.1
    • /
    • pp.103-108
    • /
    • 2021
  • To date, there is no report on the genetic diversity of ticks in these regions. A total of 370 representative ticks from the south and east regions of Kazakhstan (SERK) and Xinjiang Uygur Autonomous Region (XUAR) were selected for molecular comparison. A fragment of the mitochondrial cytochrome c oxidase subunit I (cox1) gene, ranging from 631 bp to 889 bp, was used to analyze genetic diversity among these ticks. Phylogenetic analyses indicated 7 tick species including Hyalomma asiaticum, Hyalomma detritum, Hyalomma anatolicum, Dermacentor marginatus, Rhipicephalus sanguineus, Rhipicephalus turanicus and Haemaphysalis erinacei from the SERK clustered together with conspecific ticks from the XUAR. The network diagram of haplotypes showed that i) Hy. asiaticum from Almaty and Kyzylorda Oblasts together with that from Yuli County of XUAR constituted haplogroup H-2, and the lineage from Chimkent City of South Kazakhstan was newly evolved; and ii) the R. turanicus ticks sampled in Israel, Almaty, South Kazakhstan, Usu City, Ulugqat and Baicheng Counties of XUAR were derivated from an old lineage in Alataw City of XUAR. These findings indicate that: i) Hy. asiaticum, R. turanicus and Ha. erinacei shared genetic similarities between the SERK and XUAR; and ii) Hy. marginatum and D. reticulatus show differences in their evolution.

Design of a Height Adjustable Bunker Bed Using a Gas Spring (가스 스프링을 이용한 높이조절 벙커침대 설계)

  • Jung, Gyuhong
    • Journal of Drive and Control
    • /
    • v.18 no.4
    • /
    • pp.19-27
    • /
    • 2021
  • A bunker bed is a type of furniture that efficiently utilizes a narrow indoor space by having a high bed and using the empty space below as a living and storage space. The demand for multi-purpose furniture is increasing due to the recent increase in single-person households and wide-spread shared accommodation. According to the consumer research, one of the major drawbacks of a bunker bed was to get on and off the bed through a ladder or stairs. In order to overcome these problems, it was confirmed that the height adjustment function that can easily adjust the minimum and maximum heights of the bed was necessary. In this study, a height adjustable bunker bed was designed by using a gas spring that generates a repulsive force by the compressed gas inside. The design process consisted of the following three steps: Firstly, the hysteresis characteristics due to a friction and spring constant of a commercial gas spring were confirmed by measuring the repulsive force vs. compressed displacement. Secondly, requirements of the vertical lifting force exerted on the bed against gravity force were derived. Finally, the height-adjustable bed using the four-bar link mechanism was designed with 4 parameters so that the bed weight of 60-70 kgf could be adjusted to 800 mm in height by an affordable initial operation force. The performance was verified through prototype production and the results of vertical displacement and force to move were nearly the same as designed. In addition, an electrically operated height-adjustable bed was also designed with linear actuators and the performance was proved with the prototype.

Development of DC/DC Converters and Actual Vehicle Simulation Experiment for 150 kW Class Fuel-cell Electric Vehicle (150kW급 수소연료전지 차량용 DC/DC 컨버터 개발 및 실차모사 실험)

  • Kim, Sun-Ju;Jeong, Hyeonju;Choi, Sewan;Cho, Jun-Ho;Jeon, Yujong;Park, Jun-Sung;Yoon, Hye-Sung
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.27 no.1
    • /
    • pp.26-32
    • /
    • 2022
  • This paper proposes a power system that includes a 120k W fuel cell DC-DC converter (FDC) and 30 kW bidirectional DC-DC converter (BHDC) for a 150 kW fuel-cell vehicle. With a high DC link voltage of 800 V, the efficiency and power density of the power electronic components are improved. Through the modular design of FDC and BHDC, electric components are shared, resulting in reduced mass production costs. The switching frequency of 30 kHz of full SiC devices and optimal design of coupled inductor reduce the volume, achieving a power density of 8.3 kW/L. Furthermore, a synergetic operation strategy using variable limiter control of FDC and BHDC was proposed to efficiently operate the fuel cell vehicle considering the fuel cell stack efficiency according to the load. Finally, the performance of the prototype was verified by Highway Fuel Economy Driving Schedule testing, EMI test, and the linked operation between FDC and BHDC. The full load efficiencies of the FDC and BHDC prototypes are 98.47% and 98.74%, respectively.

Analyzing the flood control capacity with flood disaster prevention system in agricultural reservoirs under climate change (농업용 저수지 홍수 방재체계 적용에 따른 기후변화 대응 홍수조절능력 변화 분석)

  • Jihye Kwak;Hyunji Lee;Jihye Kim;Seokhyeon Kim;Sinae Kim;Moon Seong Kang
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.296-296
    • /
    • 2023
  • 최근 기후변화로 인해 극한 강우의 발생빈도가 증가하고 있다. 극한 강우의 증가는 수리구조물의 설계홍수량을 초과하는 유입량을 발생시킴으로써 수리구조물의 구조적 안정성을 저해할 수 있다. 농업용 저수지가 기후변화로 인한 이상 강우의 증가에도 불구하고 안정적으로 운영되기 위해서는 적절한 홍수 방재체계의 수립이 필요하다. 저수지의 홍수 방재체계는 구조적 홍수 방재체계와 비구조적 홍수 방재체계로 구분되며, 구조적 홍수 방재체계는 비구조적 홍수 방재체계에 비해 많은 자본이 투입되어야 한다는 특징이 있다. 농업용 저수지의 홍수 방재체계 수립 시 구조적 방법과 비구조적 방법을 종합적으로 고려하여야 하며, 농업용 저수지에 관한 홍수 방재체계 마련 방안이 정립되어야 한다. 본 연구에서는 구조적 방법과 비구조적 방법을 모두 고려한 농업용 저수지의 홍수 방재체계를 마련하고, 이를 적용함으로써 기후변화에 대응하여 농업용 저수지의 홍수조절 능력이 적절히 마련되었는지를 확인하고자 한다. 본 연구에서는 수계, 저수량, 치수 사업 진행 여부 등의 요소를 고려하여 17개의 농업용 저수지를 연구대상지로 선정하였다. 저수지 운영 모의를 위하여 각 연구대상지의 기상자료, 지형자료, 저수지 제원 자료를 수집 및 분석하였다. 저수지 운영방법으로는 저수위가 목표수위 이상일 경우 유입량 전량을 방류하는 Auto-ROM 방식을 채택하였다. 기후변화가 농업용 저수지의 홍수조절능력에 미치는 영향을 파악하기 위해 SSP (Shared Socio-economic Pathways) 기후변화 시나리오를 활용하였다.

  • PDF

Genetic diversity of Plasmodium falciparum erythrocyte membrane protein 1 in field isolates from central Myanmar

  • Sylvatrie-Danne Dinzouna-Boutamba;Sanghyun Lee;Zin Moon;Dong-Il Chung;Yeonchul Hong;Moe Kyaw Myint;Haung Naw;Byoung-Kuk Na;Youn-Kyoung Goo
    • Parasites, Hosts and Diseases
    • /
    • v.61 no.1
    • /
    • pp.24-32
    • /
    • 2023
  • Plasmodium falciparum erythrocyte membrane protein 1 (PfEMP1), encoded by the polymorphic var multigene family, is a highly polymorphic antigen that plays a crucial role in the pathology of malaria. The contribution of the genetic diversity of var toward the immune escape of P. falciparum has not yet been fully elucidated. This study aimed to characterize the diversity of var repertoires by screening P. falciparum Duffy-binding-like α domain (PfDBLα) among field isolates from central Myanmar. Genetic analysis revealed that the D-H segments of var in Myanmar populations have an extensive polymorphic repertoire, with high numbers of unique sequence types in each individual. However, var genes from the global population, including Myanmar, shared close genetic lineages regardless of their geographic origins, indicating that they have not undergone rapid evolutionary changes.

Securing Sensitive Data in Cloud Storage (클라우드 스토리지에서의 중요데이터 보호)

  • Lee, Shir-Ly;Lee, Hoon-Jae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.871-874
    • /
    • 2011
  • The fast emerging of network technology and the high demand of computing resources have prompted many organizations to outsource their storage and computing needs. Cloud based storage services such as Microsoft's Azure and Amazon's S3 allow customers to store and retrieve any amount of data, at anytime from anywhere via internet. The scalable and dynamic of the cloud storage services help their customer to reduce IT administration and maintenance costs. No doubt, cloud based storage services brought a lot of benefits to its customer by significantly reducing cost through optimization increased operating and economic efficiencies. However without appropriate security and privacy solution in place, it could become major issues to the organization. As data get produced, transferred and stored at off premise and multi tenant cloud based storage, it becomes vulnerable to unauthorized disclosure and unauthorized modification. An attacker able to change or modify data while data inflight or when data is stored on disk, so it is very important to secure data during its entire life-cycle. The traditional cryptography primitives for the purpose of data security protection cannot be directly adopted due to user's lose control of data under off premises cloud server. Secondly cloud based storage is not just a third party data warehouse, the data stored in cloud are frequently update by the users and lastly cloud computing is running in a simultaneous, cooperated and distributed manner. In our proposed mechanism we protect the integrity, authentication and confidentiality of cloud based data with the encrypt- then-upload concept. We modified and applied proxy re-encryption protocol in our proposed scheme. The whole process does not reveal the clear data to any third party including the cloud provider at any stage, this helps to make sure only the authorized user who own corresponding token able to access the data as well as preventing data from being shared without any permission from data owner. Besides, preventing the cloud storage providers from unauthorized access and making illegal authorization to access the data, our scheme also protect the data integrity by using hash function.