• Title/Summary/Keyword: 사전취약화

Search Result 81, Processing Time 0.029 seconds

Oral Health Promotion Program for Elderly in Dong-gu, Daejeon: A Case Report (대전 동구 노인 불소도포 스케일링 사업 사례 보고)

  • Song, Eun-Joo;Hwang, Soo-Jeong
    • Journal of dental hygiene science
    • /
    • v.16 no.3
    • /
    • pp.249-255
    • /
    • 2016
  • The Ministry of Health and Welfare in Korea has enforced the oral health promotion program for elderly in Korea. There are the denture delivery program and the fluoride application-scaling program for elderly. Donggu Public Health Center in Daejeon has delivered the fluoride application-scaling program for elderly since the demonstration project in 2009. The official dental hygienists had a prior consultation with Dong-gu branch of Korean Senior Citizens Association in Daejeon. We expanded the program through government office, welfare centers, and nursing homes. The participants were satisfied with the public relations (95.2%), scaling (99.7%), fluoride application (91.5%), toothbrushing education (98.6%), and denture cleaning education (96.6%). After a medial accident with persistent bleeding, the pre-inspection survey about systemic disease and medication was reinforced. The official dental hygienists have agonized over the low participation of the low-income group and the overlap benefit with health insurance benefit of scaling. We suggested it be needed the assessment of the public oral health program to overlap with health insurance benefit.

A Study on a Differentially Private Model for Financial Data (금융 데이터 상에서의 차분 프라이버시 모델 정립 연구)

  • Kim, Hyun-il;Park, Cheolhee;Hong, Dowon;Choi, Daeseon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1519-1534
    • /
    • 2017
  • Data de-identification is the one of the technique that preserves individual data privacy and provides useful information of data to the analyst. However, original de-identification techniques like k-anonymity have vulnerabilities to background knowledge attacks. On the contrary, differential privacy has a lot of researches and studies within several years because it has both strong privacy preserving and useful utility. In this paper, we analyze various models based on differential privacy and formalize a differentially private model on financial data. As a result, we can formalize a differentially private model on financial data and show that it has both security guarantees and good usefulness.

Lightweight Deep Learning Model for Real-Time 3D Object Detection in Point Clouds (실시간 3차원 객체 검출을 위한 포인트 클라우드 기반 딥러닝 모델 경량화)

  • Kim, Gyu-Min;Baek, Joong-Hwan;Kim, Hee Yeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.9
    • /
    • pp.1330-1339
    • /
    • 2022
  • 3D object detection generally aims to detect relatively large data such as automobiles, buses, persons, furniture, etc, so it is vulnerable to small object detection. In addition, in an environment with limited resources such as embedded devices, it is difficult to apply the model because of the huge amount of computation. In this paper, the accuracy of small object detection was improved by focusing on local features using only one layer, and the inference speed was improved through the proposed knowledge distillation method from large pre-trained network to small network and adaptive quantization method according to the parameter size. The proposed model was evaluated using SUN RGB-D Val and self-made apple tree data set. Finally, it achieved the accuracy performance of 62.04% at mAP@0.25 and 47.1% at mAP@0.5, and the inference speed was 120.5 scenes per sec, showing a fast real-time processing speed.

Investigation of Pohang Earthquake Liquefaction Using 1D Effective-Stress Site Response Analysis (1차원 유효응력개념의 지반응답해석을 통한 포항지진의 액상화 현상 규명)

  • Ahn, Jae-Kwang;Baek, Woo-Hyun;Choi, Jae-Soon;Kwak, Dong Youp
    • Journal of the Korean Geotechnical Society
    • /
    • v.34 no.8
    • /
    • pp.37-49
    • /
    • 2018
  • Since the observation of ground motions in South Korea, liquefaction manifestation was the first to be observed in Pohang earthquake in 2017 with $M_L$ 5.4. Because liquefaction causes ground settlement and lateral spread damaging in-ground or super structures, various researchers have been analyzing the Pohang liquefaction case history to better understand and predict liquefaction consequence and to prevent future disasters. In prior research at the 2018 EESK conference, a map of Liquefaction Potential Index (LPI), indicating the severity of liquefaction, in Pohang was created and compared with damage observations. The LPI correlated well with the observations, but the severity categorized by LPI range was significantly higher than the actual observations in most regions. The prior LPI map was created evaluating ground motions using the simplified approach. In this research, we perform the effective site response analyses with porewater pressure generation model for the detailed evaluation of liquefaction on the liquefied sites in Pohang. We found that the simplified approach for LPI evaluation can overestimate the severity.

A Study on the Special Needs of the Hearing-Impaired Person for Disaster Response (청각장애인 재난대응 욕구에 관한 연구)

  • Kim, Soungwan;Kim, Hey Sung;Roh, Sungmin
    • 재활복지
    • /
    • v.21 no.2
    • /
    • pp.63-88
    • /
    • 2017
  • This study evaluated the actual status of special needs of the hearing-impaired person for disaster response. The analysis revealed a significant level of unmet needs in disaster response for hearing-impaired person. The 5 special needs in disaster response include: 1) communication needs, which involve securing the means to make an emergency rescue request and communicating information during the rescue process; 2) transportation needs, which indicate the effective evacuation capacity and the level of training; 3) medical needs, which address the degree of preparedness for physical and mental emergency measures and the delivery of health information for rescue and first aid process; 4) maintaining functional independence needs, which refer to the level of self-preparedness to minimize damage in disaster situations, and; 5) supervision needs, which correspond to a personalized support system provided to disaster-vulnerable groups.

Non-self-intersecting Multiresolution Deformable Model (자체교차방지 다해상도 변형 모델)

  • Park, Ju-Yeong;Kim, Myeong-Hui
    • Journal of the Korea Computer Graphics Society
    • /
    • v.6 no.1
    • /
    • pp.19-27
    • /
    • 2000
  • This paper proposes a non-self-intersecting multiresolution deformable model to extract and reconstruct three-dimensional boundaries of objects from volumetric data. Deformable models offer an attractive method for extracting and reconstructing the boundary surfaces. However, convensional deformable models have three limitations- sensitivity to model initialization, difficulties in dealing with severe object concavities, and model self-intersections. We address the initialization problem by multiresolution model representation, which progressively refines the deformable model based on multiresolution volumetric data in order to extract the boundaries of the objects in a coarse-to-fine fashion. The concavity problem is addressed by mesh size regularization, which matches its size to the unit voxel of the volumetric data. We solve the model self-intersection problem by including a non-self-intersecting force among the customary internal and external forces in the physics-based formulation. This paper presents results of applying our new deformable model to extracting a sphere surface with concavities from a computer-generated volume data and a brain cortical surface from a MR volume data.

  • PDF

Strategy for Advancement of Current Pre-hospital Emergency Medical Service (현 병원 전 단계 응급의료서비스의 선진화 전략)

  • Shin, Seong-Yoon;Chai, Seung-Ki;Jang, Dai-Hyunl;Park, Sang-Joon;Choi, Byeong-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.12
    • /
    • pp.265-271
    • /
    • 2011
  • High-quality customized services demand was growing due to the increase of aging, extremely nuclear family, disaster vulnerable of society. Ambulance service is required of fast and professional rescue and emergency service because of preventable death rate such as acute diseases, cerebral and cardiovascular diseases, suicides, etc. was higher than in developed countries. First aid will be available using patients information when emergency occurs, before arriving at the hospital. And emergency department is equipped with that patient care can be prepared in advance, increase the efficiency of emergency care. We received a variety of complex emergency call using high social awareness of 119 number and propose an efficient emergency medical service advancement strategy building an integrated response system with relevant organization.

Consortium Blockchain based Forgery Android APK Discrimination DApp using Hyperledger Composer (Hyperledger Composer 기반 컨소시움 블록체인을 이용한 위조 모바일 APK 검출 DApp)

  • Lee, Hyung-Woo;Lee, Hanseong
    • Journal of Internet Computing and Services
    • /
    • v.20 no.5
    • /
    • pp.9-18
    • /
    • 2019
  • Android Application Package (APK) is vulnerable to repackaging attacks. Therefore, obfuscation technology was applied inside the Android APK file to cope with repackaging attack. However, as more advanced reverse engineering techniques continue to be developed, fake Android APK files to be released. A new approach is needed to solve this problem. A blockchain is a continuously growing list of records, called blocks, which are linked and secured using cryptography. Each block typically contains a cryptographic hash of theprevious block, a timestamp and transaction data. Once recorded, the data inany given block cannot be altered retroactively without the alteration of all subsequent blocks. Therefore, it is possible to check whether or not theAndroid Mobile APK is forged by applying the blockchain technology. In this paper, we construct a discrimination DApp (Decentralized Application) against forgery Android Mobile APK by recording and maintaining the legitimate APK in the consortium blockchain framework like Hyperledger Fabric by Composer. With proposed DApp, we can prevent the forgery and modification of the appfrom being installed on the user's Smartphone, and normal and legitimate apps will be widely used.

Password-Based Authentication Protocol for Remote Access using Public Key Cryptography (공개키 암호 기법을 이용한 패스워드 기반의 원거리 사용자 인증 프로토콜)

  • 최은정;김찬오;송주석
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.75-81
    • /
    • 2003
  • User authentication, including confidentiality, integrity over untrusted networks, is an important part of security for systems that allow remote access. Using human-memorable Password for remote user authentication is not easy due to the low entropy of the password, which constrained by the memory of the user. This paper presents a new password authentication and key agreement protocol suitable for authenticating users and exchanging keys over an insecure channel. The new protocol resists the dictionary attack and offers perfect forward secrecy, which means that revealing the password to an attacher does not help him obtain the session keys of past sessions against future compromises. Additionally user passwords are stored in a form that is not plaintext-equivalent to the password itself, so an attacker who captures the password database cannot use it directly to compromise security and gain immediate access to the server. It does not have to resort to a PKI or trusted third party such as a key server or arbitrator So no keys and certificates stored on the users computer. Further desirable properties are to minimize setup time by keeping the number of flows and the computation time. This is very useful in application which secure password authentication is required such as home banking through web, SSL, SET, IPSEC, telnet, ftp, and user mobile situation.

A Present Condition of R&D Supporting Industries: A Search for their Promotion (국내 연구개발 지원산업의 현황분석과 육성방안에 관한 연구)

  • 이장재;박종오
    • Journal of Korea Technology Innovation Society
    • /
    • v.2 no.2
    • /
    • pp.219-232
    • /
    • 1999
  • 연구개발 지원산업은 연구개발 활동을 직·간접적으로 지원하는 산업을 의미한다. 이러한 산업에 대한 개념화는 연구개발 활동의 전문화(professionalization), 분업화(division of labor)가 진행되고 있음을 의미하는 동시에 연구개발체제의 유연성 제고 및 고도화, 효율화가 이루어지고 있음을 나타내고 있다. 우리의 경우 (과학기술혁신을 위한 특별법) 제 15조 등을 통하여 연구개발 지원사업에 대한 특별지원제도의 시행을 명시하고 있으나 현재까지 연구개발 지원사업자를 지정·육성하기 위한 기본현황 파악이나 분석이 이루어지지 않은 실정이다. 본고는 이러한 수요를 반영하여 국내에서의 연구개발 지원산업에 대한 수요를 중심으로 실태를 파악 ·분석하는 동시에 산업지원 육성방안을 제시하고 있다. 국내 연구개발 지원산업의 규모를 추정해 보면 97년 현재 약 3,000억원에서 4,000억원의 규모로 나타나며, 이중 기술정보서비스업이 약 27.0%, 연구장비 및 시험 ·평가 ·검색 ·분석업이 약 38.4%, 연구개발 설계·자문업 등 기타사업이 34.6% 로 나타나고 있다. 연구개발지원 기능은 시험·검사 기능과 기술정보제공 기능이 대부분을 차지하고 있고, 전자의 경우는 내부처리의 비중이 높고 후자의 경우 외부의 전문기관을 이용하는 비중이 높게 나타나고 있다. 특히 기업이 연구개발활동 수행시에 필요한 지원기능을 외부에 위탁할 경우에 느끼는 애로사항은 첫째, 외부 전문위탁기관의 부족 및 정보 미흡이 가장 크고, 둘째, 전문기관의 해외정보력·경쟁력 부족이 다음이며, 공공기관의 지원기능이 미흡하다는 애로사항에 대한 비중이 상대적으로 낮게 나타나고 있다. 연구개발 지원산업을 특별지원·육성하기 위한 기본관점은 특별법의 시행령을 구체적으로 실행하기 위한 시행계획의 수립과 연구개발 지원산업의 육성 시책의 추진 절차의 결정, 사업자 선정, 지원 사항 등으로 제시될 수 있다. 먼저, 기업 연구개발활동의 고도화·효율화를 위해 연구개발 및 기술개량에 필요한 업무 중 기술정보서비스와 연구시험·평가·검사·분석 그리고 중소기업 기술집약화를 지원하는 사업 등을 연구개발 지원산업으로 범위를 정할 필요성이 있다. 다음으로 연구개발 지원사업자를 별도로 선정·인정하는 방식으로 지원해야 할 필요성이 있다. 기존의 산업 지원방식으로는 연구개발 지원기능이 주된 활동으로 인정받을 수 없으므로 국내 연구개발 지원기능의 발전에 한계가 있다. 따라서 취약한 여건을 감안하여 연구개발 지원산업을 육성하지 않게 되면, 각 분야별로 민간사업자의 참여가 거의 이루어지지 않거나, 참여해도 연구개발 지원 기능의 발전보다는 기존의 사업이 주가 될 가능성이 크다. 연구개발 지원 사업자의 지정 지원방식과는 별도로 이루어질 수 있는 지원활동에 대한 지원은 기업회계처리상의 문제와 일관성이 있는 시책추진 및 효과를 기대하기 어렵기 때문에 사전에 동산업의 참여 자격·능력을 갖춘 사업자에 대해서는 제한없이 참여할 수 있도록 Positive System으로 추진해야 할 것이다. 그리고 연구개발 지원사업자에 대한 지원내용을 조세·금융 등 직접적 지원과 타 제도와의 연계지원 그리고 정부구매 등 시장지원 등이 아울러 다양하게 추진될 필요가 있다.

  • PDF