• Title/Summary/Keyword: 개인적 위험도

Search Result 985, Processing Time 0.025 seconds

A Study on the Effectiveness of the Hazardous Chemical Transport Vehicle Management System (유해화학물질 운반차량 관리제도 실효성 연구)

  • Kim, Sungbum;Lee, HyunSeung;Jeong, Seongkyeong
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.4
    • /
    • pp.794-801
    • /
    • 2021
  • Purpose: The effectiveness of the transport vehicle management system of the Chemical Substances Control Act will be studies and used as basic data for future system improvement plans. Method: After the enforcement of the Chemical Substances Control Act, the effectiveness for the transport vehicle management system was studies by comparing the transport plan, guidance and inspection status, safety training completion management, ect., and the reduction rate of chemical accidents. Results: The average number of chemical accidents in transport vehicles nationwide is 20 each year. And It is decreasing with the stabilization of the Chemical Substances Control Act('15.1.1). The first reason for the decrease in chemical accidents is the increase in submission of transport plans. Second, as the guidance and inspection rate increased every year, the shipper company's management of transport companies was naturally strengthened. Finally, it is judged that chemical accident caused by transport vehicles decrease through safety education. Conclusion: The current tranport vehicle management system of the Chemical Substances Control Act is effective. However, further research is needed to improve the practical and efficient transport vehicle management system.

Fatigue Classification Model Using Speech Signals Based On Deep Neural Networks (심층 신경망 기반 음성신호를 이용한 피로도 분류 모델)

  • Chul Hong Kwon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.11 no.1
    • /
    • pp.683-689
    • /
    • 2025
  • This study aims to develop a classifier that objectively assesses workers' fatigue using Deep Neural Networks(DNN) models. As the demands of modern work environments increase, workers are experiencing significant physical and mental stress, leading to a higher risk of fatigue-related accidents. While existing methods can assess fatigue both subjectively and objectively, they require expert intervention and are time-consuming, making them impractical for everyday use. To overcome these limitations, this study proposes a DNN model based on speech signals that can evaluate fatigue in real-time. The study involved collecting speech data from participants and classifying fatigue levels into five categories. Using features extracted from the speech signals, the DNN model is trained, and cross-validation is employed to select the optimal model and hyperparameters. The experimental results showed that the selected DNN model could predict the 5-level fatigue states with a high accuracy of 85.39%. This model can be used as a real-time assessment tool applicable to various high-risk occupations. This system not only enhances workplace safety and prevents accidents but also plays an important role in reducing social costs by ensuring individual safety.

Factors related to COVID-19 Incidence and Mortality rate in Gyeongsangbuk-do, Korea (경상북도 지역의 코로나19 발생률 및 사망률 관련요인)

  • Kim, Dong-Hwi;Park, Sung-Jun;Kang, Hyun-Jun;Yeom, Eun-Jung;Yoo, Na-Eun;Lee, Jeong-Min;Nam, Eun-Ha;Park, Ji-Hyuk;Lee, Kwan
    • Journal of agricultural medicine and community health
    • /
    • v.45 no.4
    • /
    • pp.235-244
    • /
    • 2020
  • Objectives: Gyeongsangbuk-do has entered a super-aged society with 20.7% of the population aged 65 and older. As of April 30, 2020, the death rate of COVID-19(3.8 people) in Gyeongsangbuk-do is higher than the national mortality rate (2.3 people), and the fatality rate of COVID-19 by age accounts for more than half of the total of 58.6%, so it is time to propose to prevent infectious diseases in the event of additional infectious disease disasters COVID-19. Methods: We collected daily data on the number of confirmed cases and deaths due to COVID-19 from 19 February to 30 April 2020. The data collected was evaluated using the SPSS 21.0 statistical package. Results: As a result of comparing the incidence and death-related factors of confirmed patients in Gyeongsangbuk-do, there were significant differences in age group (p<0.001), underlying disease (p<0.001), and residence type (p<0.033). Conclusion: Factors affecting the mortality rate of confirmed patients in Gyeongsangbuk-do have been combined with individual level factors(age, gender, underlying disease), which means individual characteristics that have existed since before the disease, and regional level factors(Type of Residence), which are external factors that enable the use of medical resources. Therefore, each local government is required to establish preventive measures considering individual and regional level factors.

A Study on Practice of Protective Actions for Medical Information - A comparison between hospital administrators and occupational therapists - (의료정보 보호행동 실천에 관한 연구 - 병원행정관리자와 작업치료사를 비교 -)

  • Kweon, Eun-Ha
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.12
    • /
    • pp.1959-1970
    • /
    • 2013
  • Attempts were made in this paper to compare the practice of protective actions for information of patients' medical treatment between hospital administrators who do not make direct contact with patients and occupational therapists who usually do. The comparison between jobs in charge showed that occupational therapists did not practice much protective actions for information of patients' medical treatment ($3.52{\pm}.809$) compared to hospital administrators ($3.92{\pm}.724$), even though the former had received regular education about protection, management and supervision of patients' medical information more often ($3.17{\pm}1.129$) than the latter ($3.16{\pm}1.037$). In spite of the fact that occupational therapists were exposed frequently to the danger of revealing medical information in the process of their job performance through talks and communications with patients, they displayed relatively little concern for and awareness of keeping information of medical treatment from being leaked by them. It is thus suggested to promote awareness of medical staff to protect medical information by means of flexible educational system for each occupational group, periodical monitoring, continuing public relation, training and quality control for protection of medical information, as well as routine self-examination of such practice.

Study of effectiveness for the network separation policy of financial companies (금융회사 망분리 정책의 효과성 연구)

  • Cho, Byeong-Joo;Yun, Jang-Ho;Lee, Kyeong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.181-195
    • /
    • 2015
  • Financial industries have operated internal and external network with an unified system for continual business process of customers and other organizations in the past. The financial supervising authority requires more technical and managerial protecting policy to financial industries related to the exposure as danger of external attacks or information leakage. Financial industries performed network separation into internal business and external internet networks for protecting IT assets from malware infection accessing internet or hacking attacks and prohibiting leakage of customers' personal and financial information following financial supervising authority and redefine security policy to fit on network separated-condition. In this study, effectiveness for network separation policy was examined on malware inflow and verified that malware inflow in all routes can be blocked by the policy with analyzing operration data of a financial company, estimating network separation. Result of this study proves that malware infection route by portable storages was not completely blocked even on adapting network-separated condition. As a solution for this, efficient security policy would be suggested in this paper as controlling portable storages for maximizing effectiveness of network separation.

A Scheme for Identifying Malicious Applications Based on API Characteristics (API 특성 정보기반 악성 애플리케이션 식별 기법)

  • Cho, Taejoo;Kim, Hyunki;Lee, Junghwan;Jung, Moongyu;Yi, Jeong Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.187-196
    • /
    • 2016
  • Android applications are inherently vulnerable to a repackaging attack such that malicious codes are easily inserted into an application and then resigned by the attacker. These days, it occurs often that such private or individual information is leaked. In principle, all Android applications are composed of user defined methods and APIs. As well as accessing to resources on platform, APIs play a role as a practical functional feature, and user defined methods play a role as a feature by using APIs. In this paper we propose a scheme to analyze sensitive APIs mostly used in malicious applications in terms of how malicious applications operate and which API they use. Based on the characteristics of target APIs, we accumulate the knowledge on such APIs using a machine learning scheme based on Naive Bayes algorithm. Resulting from the learned results, we are able to provide fine-grained numeric score on the degree of vulnerabilities of mobile applications. In doing so, we expect the proposed scheme will help mobile application developers identify the security level of applications in advance.

Laboratory Biosafety Status of Researchers in Korea (국내 연구원들의 생물안전 개념에 대한 현황)

  • Kim, Dae Sik;Kim, Mi Kyung
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.50 no.1
    • /
    • pp.71-76
    • /
    • 2018
  • This study examined the status of the laboratory biosafety of researchers in Korea during 03 Jan 2017~25 Mar 2017. Questionnaires were given out to 500 researchers working with pathogens in the laboratory of universities and institutes. According to the results, the respondents showed a high level of awareness but not compliance on the overall biosafety rules and regulations. Regarding the Biosafety facility level, 279 (55.8%) of respondents answered "know" and 221 (44.2%) of respondents answered "no". Despite the insufficient safety equipment and biosafety plans, researchers believed that appropriate safety measures could protect the workers and that their laboratories are safe. In a study involving biosafety education, 80% of the researchers had been trained in laboratory safety and 20% had never received safety education. The need for biosafety education was 66% and the satisfaction rate of education was 46%. These results suggest that the researchers already had experience in biosafety training, but they believed that continuing education is necessary. In addition, there were opinions that the most important thing to improve the biosafety status is to strengthen the training program and education system. In conclusion, it is necessary to develop a better training system for laboratory biosafety regarding the exposure risks.

Third Party's Legal Interest Protection from Commercialization of Drones -A focus on Decision of the German District Court- (카메라 장착 드론에 대한 지상 제3자의 법익 보호 - 독일의 하급심 판결을 중심으로 -)

  • Kim, Sung-Mi
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.35 no.1
    • /
    • pp.3-32
    • /
    • 2020
  • With controlling Drones, although it was discussed in the previous study which showed a possibility. Which is personality and property rights of third parties could be violated while operating the drone with a video camera. But It's hard to find out precedents related to drones in Korea. In case of that someone try to control the drone which is equipped with a camera in a yard of neighborhood, the German District Court (Potsdam) considered an operator of drone has little bit of careless to do his duty and admit nonfeasance claim in the owner of the one's property for prevention to repetition of similar situation according to a nonfeasance claim for prevention to Section 1004 (1) sentence 2 of the German Civil Code(BGB). The drone which is equipped with a camera have possibilities to disrupt property and personal rights of the owner. Because a danger in repetition is getting larger regarding the violation of law. Moreover, there is a case that someone shot down the drone which is equipped with a camer. Because it has a risk to interrupt private life and cause some dangerous in our life. The German district court(Riesa) recently have considered that controlling the drone with a camera in private spaces is illegal as a violation of personal life. In addtion to, the action of property owner shot down drone is a legal according to § 228 of the German Civil Code(BGB) which is caleed "Necessity". Although it is difficult to apply to foreign cases directly to Korea, similar cases are likely to be occurred in Korea. The decision of the German District Court showed implications to Korea. As demand for the camera-equipped drone increases in Korea, it is time to discuss specific measures for drone violations.

Internet Users' Willingness to Expression and Perception of Public Opinion: The Comparison between Real Space and Cyber Space (인터넷 이용자의 여론 지각과 의견 표현: 현실공간과 사이버공간의 비교)

  • Han, Hye-Kyoung
    • Korean journal of communication and information
    • /
    • v.23
    • /
    • pp.189-221
    • /
    • 2003
  • This study compares the influence of perceived public opinion on Internet users' willingness to expression in real space with in cyber space. In real space, people who perceive their opinions as minority opinion are reluctant to express theirs publicly because of fear of isolation. But cyber space is the anonymous world. So we can expect that people express their opinions freely without the fear of isolation in this space. This study's results provide the support for our expectation. In cyber space, the minority perception group has as the high willingness to expression of their opinion about the abrogation of the Korean Family Rights Raw as the majority perception group. Both of in cyber space and in real space, it is the perception failure group that makes discrepancy in the willingness to expression. This group has the lowest willingness to expression in both space. However, the other predictors of willingness to expression in cyber space are similar to those in real space. Issue salience, Communication apprehension, and Age are the very significant predictors of willingness to expression in both spaces. Sex and ideology are significant predictors in real space, while the frequency of online conversation is the significant predictor in cyber space.

  • PDF

Factors Influencing Buyers' Choice of Online vs. Offline Channel at Information Search and Purchase Stages (정보탐색과 구매 단계에서 온라인과 오프라인 채널선택의 영향요인)

  • Kim, Sang-Hoon;Park, Gye-Young;Park, Hyun-Jung
    • Journal of Distribution Research
    • /
    • v.12 no.3
    • /
    • pp.69-90
    • /
    • 2007
  • This study is set out to investigate the factors that influence customers' behavior of choice and switching between online and offline channels, separating the purchase decision into two stages, i.e., information search and purchase. Factors influencing channel choice are found to differ from stage to stage. The main results of this study are as follows. At the information search stage, customers' channel knowledge had impacts on the choice of the channel. Customers are more likely to visit offline bookstores when they have hedonic shopping orientation and higher involvement level with books. On the contrary, customers are more apt to search online when they have a lot of online shopping experiences. At the purchase stage, the results varied according to the search channel. When customers search for information online, the following variables lead to online purchases: online shopping experiences with books, price-focused shopping orientation, and time availability for shopping. Perceived risk made customers purchase offline even though they searched online. In case of offline searching, customers with more convenience-focused, hedonic-focused shopping orientation and less tim availability purchased offline.

  • PDF