• Title/Summary/Keyword: 개인추적

Search Result 387, Processing Time 0.024 seconds

A Follow-up Study on the Personal Noise Exposed Dose and Hearing Loss (개인 소음폭로량과 청력손실에 관한 추적조사)

  • Kim, Won-Sool;Hong, Young-Seoub;Kim, Yang-Seak;Lee, Sang-Ju;Park, Kyung-Il;Jung, Kap-Yull;Kim, Joon-Youn
    • Journal of Preventive Medicine and Public Health
    • /
    • v.27 no.2 s.46
    • /
    • pp.286-298
    • /
    • 1994
  • For the purpose of presenting the basic data for the establishment of control measures on the long-term noise exposed workers, this study was carried out on the relationship between personal noise exposed dose and hearing loss on the 67 male workers whose hearing threshold had exceeded 40 dB in 4,000 Hz, from 1990 to 1992. Conclusively, the level of hearing loss was significantly related to personal noise exposed dose in follow-up period. We considered that personal noise exposed dose which was measured by the personal noise dosemeter was more efficient rather than the noise level of workplace for the evaluating the long-term change of hearing acuity. And although in the case of not-diagnosed as noise induced hearing loss. it was suspected that the active control programs such as improvement of noisy environment or early transfer to proper workplace were needed on the workers who exposed with over 90 dB in personal noise exposed dose.

  • PDF

Experimental Computer-Based Management System of Patients in Radiation Oncology (방사선치료 환자관리를 위한 컴퓨터 프로그램의 실험적 제작)

  • Choi, Ihl-Bohng;Kim, Choon-Yul;Bahk, Yong-Whee
    • Radiation Oncology Journal
    • /
    • v.5 no.2
    • /
    • pp.169-172
    • /
    • 1987
  • Currently, many computer systems are used in many areas of medicine including radiation oncology. For the most part, the computer system has proved to be useful in radiotherapeutic planning and dose calculation. There has been attempts to develop computer system including information management of patients, patient tracing, and office automation in radiation oncology department. But some of these available commercial systems have shortcomings. We developed a management system of patients in our radiation oncology department that integrated most of items for the evaluation of patents. In particular, the data were stored in a natural language (noncoded) and made themselves easily understandable by all clinical groups. In addition , the data could be isolated in files from which the computer could generate graphs and static data by the use of some simple commands. The system provided us with not only the functions of case review but functions of preparation of conferences, lectures and resident teaching.

  • PDF

A Psychological Phenomena Analysis of People who have experienced Healing in the Forest (숲에서 치유를 경험한 사람들의 심리현상 분석)

  • Oh, Kyung-Hee;Kim, Dong-Jun;Yeoun, Pyung-Sik
    • Korean Journal of Environment and Ecology
    • /
    • v.30 no.2
    • /
    • pp.277-286
    • /
    • 2016
  • This study was performed to investigate main psychological phenomena and healing process through qualitative analysis on the 115 handwriting healing experience in the forest. Main psychological phenomena experienced in the forest were important in order happiness, comfort, and understanding. The process of healing in the forest was first characterized by emotional changes, and was led to cognitive changes and behavioral changes. Healing stage of the forest has followed with six steps of stimulus, accommodating, purification, insight, filling, and change. This process was associated with nature sympathetic, rapport with oneself, and with the world. Previous studies, which were focused on the measurement of transient state after the comparative study between control and experimental groups, could not verify the continuity and process of psychological healing. this study suggests a new approach to understand the subjective psychological phenomena and healing processes in the forest, and will be a basis for developing and performing of forest healing program.

Analysis of Faceted-Reflector Antenna (각면 반사판 안테나의 해석)

  • Kwak, Chang-Soo;Uhm, Man-Seok;Yom, In-Bok
    • Journal of Satellite, Information and Communications
    • /
    • v.5 no.2
    • /
    • pp.34-39
    • /
    • 2010
  • Due to big demand for satellite and communication service using personal handheld terminals, demand for satellites with huge antennas is increasing correspondingly. While such large antennas are realized by various types of deployable antennas, the reflecting surface is made by many facets irrespective of deploying mechanisms. In order to analyze the faceted-reflector more accurately, an existing ray-tracing method is improved. The algorithm allows the rays to cross each other, which is the main characteristic of the faceted-reflector, and takes unevenness of amplitude and phase over the aperture plane into consideration. For the study of the effect of facet configuration, facet generating algorithm is devised. From the analysis algorithm and the facet-generating algorithm, it has been found that the number of facets in a radial direction affects both directivity and sidelobe level. On the other hand, the number of facets in a circumferential direction affects sidelobe level only.

Precise DGPS Positioning Using Two GPS Receivers (두대의 GPS 수신기를 이용한 DGPS 정밀측위)

  • Kang, Yong-Q.;Lee, Moon-Jin
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.3 no.2 s.6
    • /
    • pp.15-28
    • /
    • 1995
  • The GPS positioning involves not only 'natural' errors associated with the satellites position errors, refraction of EM wave in the ionosphere, etc., but also 'artificial' errors associated with the operation of S/A (Selective Availability). In this paper, we present the principles, accuracies and applicabilities of our personal DGPS method, which employs the position-correction method on the GPS positionings data collected at the reference and the remote sites. The essential requirement of our DGPS method is that two GPS receivers should utilize the identical Navstar satellites at the same time. The positioning error (1 drms) of the stand-alone GPS is of an order of a few tens meters, while that of horizontal position by our DGPS method is about 1m and that of vertical position is about 2m We applied out DGPS technique in positioning moving objects, and obtained satisfactory results in tracking the trajectories of a car on the road and the those of drifters in the sea.

  • PDF

"COVID-19 : Our Memory" : A Digital Archive for Social Changes caused by SARS-CoV-2 ("코로나-19 : 우리의 기억" : 코로나바이러스 감염증과 사회변화에 대한 디지털 아카이브)

  • Kim, Haklae
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.20 no.4
    • /
    • pp.229-236
    • /
    • 2020
  • In light of SARS-CoV-2's significant impact, human society has experienced rapid changes in lifestyle that it has not yet experienced before. One way this virus has influenced people's lives is the emergence of the zero-contact society, an initiative for preventing the spread of infectious diseases. As can be seen, the social impact of COVID-19 is widespread. Various issues, such as those about government policy, personal information protection, and health care, are affecting society as a whole. At the same time, factual information is difficult to track and record because of the rapid and transient nature of related events and issues. As such, a method of effectively describing COVID-19 and real-time information is necessary. The "COVID-19: Our Memory" project is an attempt to record the sociocultural impact of the coronavirus infection. This project collects major events and issues classified into several subjects, records those events from a neutral point of view, and develops a digital archive so that all records are accessible. All the data collected and built through the project, the application, including the source code and visualization, are all published to bring about new opportunities for collaboration.

A Design of MILENAGE Algorithm-based Mutual Authentication Protocol for The Protection of Initial Identifier in LTE (LTE 환경에서 초기 식별자를 보호하기 위한 MILENAGE 알고리즘 기반의 상호인증)

  • Yoo, Jae-hoe;Kim, Hyung-uk;Jung, Yong-hoon
    • Journal of Venture Innovation
    • /
    • v.2 no.1
    • /
    • pp.13-21
    • /
    • 2019
  • In LTE environment, which is 4th generation mobile communication systems, there is concern about private information exposure by transmitting initial identifier in plain text. This paper suggest mutual authentication protocol, which uses one-time password utilizing challenge-response and AES-based Milenage key generation algorithm, as solution for safe initial identification communication, preventing unique identification information leaking. Milenage key generation algorithm has been used in LTE Security protocol for generating Cipher key, Integrity key, Message Authentication Code. Performance analysis evaluates the suitability of LTE Security protocol and LTE network by comparing LTE Security protocol with proposed protocol about algorithm operation count and Latency.Thus, this paper figures out initial identification communication's weak points of currently used LTE security protocol and complements in accordance with traditional protocol. So, it can be applied for traditional LTE communication on account of providing additional confidentiality to initial identifier.

A Study on the Electronic Voting Scheme Suitable for Large Scale Election (대규모 선거에 적합한 전자 선거 기법에 관한 연구)

  • Yun, Seong-Hyeon;Kim, Tae-Yun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.2
    • /
    • pp.543-551
    • /
    • 1997
  • Many areas of human activities are computerized with the wide spread use of computers and communication networks.Electrinic voting is an important social activity in democtatic society.The realization of electronic democracy is based on the sectrity of edectronic voting scheme.Therefore, it is necessary to use the cryto-graphic technique for secure electronic voting scheme.Therefore, it is necessary to use the cryto-graghic technique for secure election.In this stusy, an dedctronic voting scheme sutiable for large election is proposed.In order to make practi-cal volting scheme, we assume that the voting authorization center is trustful and the chaum's anonymous com-munication channel[6] prepared before the election day.The center authorizes the ballot of eligible voter by using the ID based digital signature scheme in the registeation stage.During the voting stage, undeniable chal-lenge/ response prorocol is performed between the center and the boters to ensure that the intemediate voting results should not affect the entire.The proprsed scheme fully conforms to the requirments of large scale election such as privacy of the voters, fairness, unresuability, unforgeability and eligbility.

  • PDF

RFID Security Authentication Protocol for the Ubiquitous Environment (유비쿼터스 환경을 위한 RFID 보안 인증 프로토콜)

  • Bae, Woo-Sik;Choi, Shin-Hyeong;Han, Kun-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.4
    • /
    • pp.69-75
    • /
    • 2007
  • On the wireless communication between RFID Tag and Reader, there are some existing problems with weaknesses of security such as spoofing, replay, traffic analysis, position tracking, etc., in the established hash lock related algorithm. This paper has presented the comparison and analysis of the established hash lock related algorithm for privacy and in order to make up for this, also suggested a new security authentication algorithm based on hash which has an authentication protocol and creates hash function by using random numbers received from the reader on real time and every session. The algorithm suggested here can offer a several of usefulness for RFID authentication system and it has an advantage to reduce the amount of calculations compared to established algorithm. It also uses the tags needed among a lot of tags around which are expected later and it is expected to reduce a responsibility of the server by ending unnecessary tags' operation with time based.

  • PDF

Mobile Device User Trajectory Analysis and Route Recommendation Method based on Intersection Region Indexing (교차점 기반 구역 인덱싱을 이용한 모바일 장치 사용자 이동 궤적 분석 및 경로 추천 방법)

  • Kwak, Kwangjin;Kim, Jeongjoon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.1 no.1
    • /
    • pp.79-85
    • /
    • 2015
  • According to the growing use of the personal GPS in the mobile device recently, the LBS (Local bases service), which processes and refines the GPS information, such as a position-tracking service, a public safety service, a local based information service, has increased steadily. Due to the refraction or reflection of GPS, however, it is impossible to use GPS around or in buildings. Therefore, it is necessary to correct the errors of GPS. We propose the method which corrects the errors of GPS and creates the refined trajectory using intersection region indexing. After analyzing the trajectory, receiving trajectories from many people and identifying the similarity between of trajectories, we will recommend the favorite route and useful information such as restaurant, convenience store, bus station and emergency call service.