• Title/Summary/Keyword: 산업안전

Search Result 11,405, Processing Time 0.042 seconds

Analysis of influential factors of cyanobacteria in the mainstream of Nakdong river using random forest (랜덤포레스트를 이용한 낙동강 본류의 남조류 발생 영향인자 분석)

  • Jung, Woo Suk;Kim, Sung Eun;Kim, Young Do
    • Journal of Wetlands Research
    • /
    • v.23 no.1
    • /
    • pp.27-34
    • /
    • 2021
  • In this study, the main influencing factors of the occurrence of cyanobacteria at each of the eight Multifunctional weirs were derived using a random forest, and a categorical prediction model based on a Algal bloom warning system was developed. As a result of examining the importance of variables in the random forest, it was found that the upstream points were directly affected by weir operation during the occurrence of cyanobacteria. This means that cyanobacteria can be managed through efficient security management. DO and E.C were indicated as major influencers in midstream. The midstream section is a section where large-scale industrial complexes such as Gumi and Gimcheon are concentrated as well as the emissions of basic environmental facilities have a great influence. During the period of heatwave and drought, E.C increases along with the discharge of environmental facilities discharged from the basin, which promotes the outbreak of cyanobacteria. Those monitoring sites located in the middle and lower streams are areas that are most affected by heat waves and droughts, and therefore require preemptive management in preparation for the outbreak of cyanobacteria caused by drought in summer. Through this study, the characteristics of cyanobacteria at each point were analyzed. It can provide basic data for policy decision-making for customized cyanobacteria management.

Investigations of Vulnerable Members and Collapse Risk for System Support Based on Damage Scenarios (손상시나리오 기반 시스템 동바리 취약부재 도출 및 붕괴 위험성 분석)

  • Park, Sae In;Park, Ju-Hyun;An, Hyojoon;Lee, Jong-Han
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.25 no.1
    • /
    • pp.33-40
    • /
    • 2021
  • In recent years, many construction projects become large and complicated, and construction accidents also steadily increase, which grows interest in the safety and maintenance during construction. Many of the construction accidents are related to temporary construction and structures, but the safety evaluation and management during construction are unclear and indefinite due to the short operating period and continuous change in the formation of the temporary structure. The system support, which is one of the temporary structures to support the pouring load of concrete, was proposed to easily install and dismantle members with connection parts pre-manufactured. The use of the system support is increasing to improve the safety of the temporary structure during construction. However, the system support, which consists of multiple members, still has uncertainties in connectivity between members and supports of vertical members. Therefore, this study analyzed the structure, load, and accident cases of the system support to define the damage scenarios for member connection, support condition, and lateral displacement. The decrease rate of the critical load was analyzed according to the damage scenarios based on the defined unit structure of the system support. In addition, this study provided vulnerable members for each damage scenario, which could induce instability of the temporary structures during design, construction, and operation of the structure.

IoT-Based Device Utilization Technology for Big Data Collection in Foundry (주물공장의 빅데이터 수집을 위한 IoT 기반 디바이스 활용 기술)

  • Kim, Moon-Jo;Kim, DongEung
    • Journal of Korea Foundry Society
    • /
    • v.41 no.6
    • /
    • pp.550-557
    • /
    • 2021
  • With the advent of the fourth industrial revolution, the interest in the internet of things (IoT) in manufacturing is growing, even at foundries. There are several types of process data that can be automatically collected at a foundry, but considerable amounts of process data are still managed based on handwriting for reasons such as the limited functions of outdated production facilities and process design based on operator know-how. In particular, despite recognizing the importance of converting process data into big data, many companies have difficulty adopting these steps willingly due to the burden of system construction costs. In this study, the field applicability of IoT-based devices was examined by manufacturing devices and applying them directly to the site of a centrifugal foundry. For the centrifugal casting process, the temperature and humidity of the working site, the molten metal temperature, and mold rotation speed were selected as process parameters to be collected. The sensors were selected in consideration of the detailed product specifications and cost required for each process parameter, and the circuit was configured using a NodeMCU board capable of wireless communication for IoT-based devices. After designing the circuit, PCB boards were prepared for each parameter, and each device was installed on site considering the working environment. After the on-site installation process, it was confirmed that the level of satisfaction with the safety of the workers and the efficiency of process management increased. Also, it is expected that it will be possible to link process data and quality data in the future, if process parameters are continuously collected. The IoT-based device designed in this study has adequate reliability at a low cast, meaning that the application of this technique can be considered as a cornerstone of data collecting at foundries.

Comparison of Overall Immunity Levels among Workers at Grape Orchard, Rose Greenhouse, and Open-Field Onion Farm

  • Maharjan, Anju;Gautam, Ravi;Jo, JiHun;Acharya, Manju;Lee, DaEun;Pramod, Bahadur KC;Gim, Jin;Sin, Sojung;Kim, Hyocher;Kim, ChangYul;Lee, SooYeon;Lee, SooJin;Heo, Yong;Kim, HyoungAh
    • Safety and Health at Work
    • /
    • v.13 no.2
    • /
    • pp.248-254
    • /
    • 2022
  • Background: Occupational hazards in crop farms vary diversely based on different field operations as soil management, harvesting processes, pesticide, or fertilizer application. We aimed at evaluating the immunological status of crop farmers, as limited systematic investigations on immune alteration involved with crop farming have been reported yet. Methods: Immunological parameters including plasma immunoglobulin level, major peripheral immune cells distribution, and level of cytokine production from activated T cell were conducted. Nineteen grape orchard, 48 onion open-field, and 21 rose greenhouse farmers were participated. Results: Significantly low proportion of natural killer (NK) cell, a core cell for innate immunity, was revealed in the grape farmers (19.8±3.3%) in comparison to the onion farmers (26.4±3.1%) and the rose farmers (26.9±2.5%), whereas cytotoxic T lymphocyte proportion was lower in the grape and the onion farmers than the rose farmers. The proportion of NKT cell, an immune cell implicated with allergic response, was significantly higher in the grape (2.3±0.3%) and the onion (1.6±0.8%) farmers compared with the rose farmers (1.0±0.4%). A significantly decreased interferon-gamma:interleukin-13 ratio was observed from ex vivo stimulated peripheral blood mononuclear cells of grape farmers compared with the other two groups. The grape farmers revealed the lowest levels of plasma IgG1 and IgG4, and their plasma IgE level was not significantly different from that of the onion or the rose farmers. Conclusion: Our finding suggests the high vulnerability of workplace-mediated allergic immunity in grape orchard farmers followed by open-field onion farmers and then the rose greenhouse farmers.

Setting Up of VTS Areas Around Jeju Using AIS Data (AIS 데이터를 활용한 제주지역 VTS 관제구역 설정)

  • Yoo, Sang-Lok;Kim, Kwang-Il
    • Journal of Navigation and Port Research
    • /
    • v.46 no.3
    • /
    • pp.209-215
    • /
    • 2022
  • On the Jeju coast, international cruise ships, passenger ships, and other ships pass frequently, as well as many fishing boats. Thus, there is a high risk of marine accidents and frequent ship collisions. Accordingly, it is urgent to establish a coastal VTS for systematic safety management of ships passing through the coastal waters of Jeju. The purpose of this study was to set the area of the VTS to be newly established. In this study, to calculate the workload of the VTS operators, a formula was proposed that reflects the monitoring workload considering the monitoring frequency and required time for target as well as non-target ships and the workload for ship collision situations. The proposed formula was applied to the newly established VTS area in Jeju. Three control sectors were set up in each VTS center. The average number of workstations per hour was approximately 1, so the division between sectors was appropriate. Thus, it was deduced that there would be no workload for the VTS operators. It is expected that the method proposed in this study can be used as primary data for calculating the appropriate number of workstations for the current VTS, and setting the VTS area for a new coastal VTS in the future.

Entomopathogenic Fungi-mediated Pest Management and R&D Strategy (곤충병원성 진균을 활용한 해충 관리와 개발 전략)

  • Lee, Se Jin;Shin, Tae Young;Kim, Jong-Cheol;Kim, Jae Su
    • Korean journal of applied entomology
    • /
    • v.61 no.1
    • /
    • pp.197-210
    • /
    • 2022
  • Entomopathogenic fungi can be used to control a variety of sucking and chewing insects, with little effect on beneficial insects and natural enemies. Approximately 170 entomopathogenic fungal insecticides have been registered and used worldwide, with the recent focus being on the mode of action and mechanism of insect-fungal interactions. During the initial period of research and development, the industrialization of entomopathogenic fungi focused on the selection of strains with high virulence. However, improvement in productivity, including securing resistance to environmental stressors, is a major issue that needs to be solved. Although conidia are the primary application propagules, efforts are being made to overcome the limitations of blastospores to improve the economic feasibility of the production procedure. Fungal transformation is also being conducted to enhance insecticidal activity, and molecular biology is being used to investigate functions of various genes. In the fungi-based pest management market, global companies are setting up cooperative platforms with specialized biological companies in the form of M&As or partnerships with the aim of implementing a tank-mix strategy by combining chemical pesticides and entomopathogenic fungi. In this regard, understanding insect ecology in the field helps in providing more effective fungal applications in pest management, which can be used complementary to chemicals. In the future, when fungal applications are combined with digital farming technology, above-ground applications to control leaf-dwelling pests will be more effective. Therefore, for practical industrialization, it is necessary to secure clear research data on intellectual property rights.

Risk Factors for COVID-19 Infection Among Healthcare Workers. A First Report From a Living Systematic Review and meta-Analysis

  • Dzinamarira, Tafadzwa;Nkambule, Sphamandla Josias;Hlongwa, Mbuzeleni;Mhango, Malizgani;Iradukunda, Patrick Gad;Chitungo, Itai;Dzobo, Mathias;Mapingure, Munyaradzi Paul;Chingombe, Innocent;Mashora, Moreblessing;Madziva, Roda;Herrera, Helena;Makanda, Pelagia;Atwine, James;Mbunge, Elliot;Musuka, Godfrey;Murewanhema, Grant;Ngara, Bernard
    • Safety and Health at Work
    • /
    • v.13 no.3
    • /
    • pp.263-268
    • /
    • 2022
  • Health care workers (HCWs) are more than ten times more likely to be infected with coronavirus infectious disease 2019 (COVID-19) than the general population, thus demonstrating the burden of COVID-19 among HCWs. Factors that expose HCWs to a differentially high-risk of COVID-19 acquisition are important to elucidate, enable appropriate public health interventions to mitigate against high risk and reduce adverse outcomes from the infection. We conducted a systematic review and meta-analysis to summarize and critically analyze the existing evidence on SARS-CoV-2 risk factors among HCWs. With no geographical limitation, we included studies, in any country, that reported (i) the PCR laboratory diagnosis of COVID-19 as an independent variable (ii) one or more COVID-19 risk factors among HCWs with risk estimates (relative risk, odds ratio, or hazard ratio) (iii) original, quantitative study design, and published in English or Mandarian. Our initial search resulted in 470 articles overall, however, only 10 studies met the inclusion criteria for this review. Out of the 10 studies included in the review, inadequate/lack of protective personal equipment, performing tracheal intubation, and gender were the most common risk factors of COVID-19. Based on the random effects adjusted pooled relative risk, HCWs who reported the use of protective personal equipment were 29% (95% CI: 16% to 41%) less likely to test positive for COVID-19. The study also revealed that HCWs who performed tracheal intubations were 34% (95% CI: 14% to 57%) more likely to test positive for COVID-19. Interestingly, this study showed that female HCWs are at 11% higher risk (RR 1.11 95% CI 1.01-1.21) of COVID-19 than their male counterparts. This article presents initial findings from a living systematic review and meta-analysis, therefore, did not yield many studies; however, it revealed a significant insight into better understanding COVID-19 risk factors among HCWs; insights important for devising preventive strategies that protect them from this infection.

A Study on Next-Generation Data Protection Based on Non File System for Spreading Smart Factory (스마트팩토리 확산을 위한 비파일시스템(None File System) 기반의 차세대 데이터보호에 관한 연구)

  • Kim, Seungyong;Hwang, Incheol;Kim, Dongsik
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.1
    • /
    • pp.176-183
    • /
    • 2021
  • Purpose: The introduction of smart factories that reflect the 4th industrial revolution technologies such as AI, IoT, and VR, has been actively promoted in Korea. However, in order to solve various problems arising from existing file-based operating systems, this research will focus on identifying and verifying non-file system-based data protection technology. Method: The research will measure security storage that cannot be identified or controlled by the operating system. How to activate secure storage based on the input of digital key values. Establish a control unit that provides input and output information based on BIOS activation. Observe non-file-type structure so that mapping behavior using second meta-data can be performed according to the activation of the secure storage. Result: First, the creation of non-file system-based secure storage's data input/output were found to match the hash function value of the sample data with the hash function value of the normal storage and data. Second, the data protection performance experiments in secure storage were compared to the hash function value of the original file with the hash function value of the secure storage after ransomware activity to verify data protection performance against malicious ransomware. Conclusion: Smart factory technology is a nationally promoted technology that is being introduced to the public and this research implemented and experimented on a new concept of data protection technology to protect crucial data within the information system. In order to protect sensitive data, implementation of non-file-type secure storage technology that is non-dependent on file system is highly recommended. This research has proven the security and safety of such technology and verified its purpose.

A Study on Proving RMF A&A in Real World for Weapon System Development (무기체계 개발을 위한 RMF A&A의 실증에 관한 연구)

  • Cho, Kwangsoo;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.817-839
    • /
    • 2021
  • To manage software safely, the military acquires and manages products in accordance with the RMF A&A. RMF A&A is standard for acquiring IT products used in the military. And it covers the requirements, acquisition through evaluation and maintenance of products. According to the RMF A&A, product development activities should reflect the risks of the military. In other words, developers have mitigated the risks through security by design and supply chain security. And they submit evidence proving that they have properly comply with RMF A&A's security requirements, and the military will evaluate the evidence to determine whether to acquire IT product. Previously, case study of RMF A&A have been already conducted. But it is difficult to apply in real-world, because it only address part of RMF A&A and detailed information is confidential. In this paper, we propose the evidence fulfilling method that can satisfy the requirements of the RMF A&A. Furthermore, we apply the proposed method to real-world drone system for verifying our method meets the RMF A&A.

A Study on Analysis and Utilization of Public Sharing Bike Data - By applying the data of Ouling, Public Sharing Bike System in Sejong City (공유자전거 데이터 분석 및 활용방안 연구 세종특별자치시 공유자전거 어울링의 데이터를 적용하여)

  • An, Se-Yun;Ju, Hannah;Kim, So-Yeon;Jo, Min-Jun;Kim, Sungwhan
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.7
    • /
    • pp.259-270
    • /
    • 2021
  • Recently, interests in the use of Sharing Bike is increasing in consideration of eco-friendly transportation and safety from viruses. As the technology for collecting and storing data is improved with the development of ICTs, research on mobility using the Sharing Bike Data is also actively progressing. Therefore, this paper analyzes the properties of Sharing Bike Data and cases of researches on it through literature review, and based on the results of the review, data of Eoulling, the Sharing Bike System of Sejong City is analyzed as a way to utilize Sharing Bike Data. Most of the selected literature used structured data, and analyzed it through statistical methods or data mining. Through data analysis, it identified the current status, found out problems of the Sharing Bike System, proposed a solution to solve them, developed plans to activate the use of Sharing Bike. This provides basic data for efficient management and operation plans for Sharing Bike System. Ultimately, it will be possible to explore ways to improve mobility in urban spaces by utilizing Sharing Bike Data.