• Title/Summary/Keyword: 위험 식별

Search Result 381, Processing Time 0.035 seconds

A Clinical Study of Hospitalized Infants 28 to 90 Days of Age with Fever without Source (원인 없는 열로 입원한 생후 28일에서 90일 사이 영아들에 대한 임상적 고찰)

  • Rye, Min Hyuk;Noh, Yn Il;Lee, Seong Hun;Lee, Sun Young;Hur, Nam Jin;Lee, Dong Jin
    • Pediatric Infection and Vaccine
    • /
    • v.8 no.2
    • /
    • pp.191-198
    • /
    • 2001
  • Purpose : The purpose of this study was to investigate clinical features of hospitalized infants 28~90 days of age with fever without source and to analyze those of young febrile infants using risk criteria for serious bacterial infection. Methods : The clinical features of 131 infants 28~90 days of age admitted to the Ulsan Dong-Kang General Hospital Pediatric Department because of fever(temperature ${\geq}38^{\circ}C$ rectally) without source, from January 2000 to December 2000, were investigated by retrospective chart review. The clinical features of 131 febrile infants were analyzed using Rochester criteria. Results : Among 131 cases, there were 60 cases(45.8%) of urinary tract infection, 33 cases (25.2%) of aseptic meningitis, 2 cases(1.5%) of bacteremia and 36 cases(27.5%) of no specific diagnosis. Among 131 cases, there were 57 cases(43.5%) in low risk group and 74 cases(56.5%) in not low risk one by Rochester criteria. A significant difference in the incidence of urinary tract infection, aseptic meningitis and no specific diagnosis was not found between both groups. Male to female ratio was 1.8 : 1. Sex ratio between both groups was not significantly different. Most febrile infant were noted in spring(35.1%) and the summer(36.7%). The peak incidence of aseptic meningitis was noted in May and June. The fever subsided mostly within 48~72 hours after administering antimicrobial agents(61.8~83.2%). A significant difference in duration of fever after administering antimicrobial agents was not found between both groups. Conclusion : A selected group of low risk infants 28~90 days of age with fever without source can be managed as outpatients provided that a thorough initial evaluation is performed, that parents can reliably monitor their infant closely at home and that careful follow up can be assured. Because bag collected specimens were more likely to yield indeterminate urine culture result, a suprapubic or catheter obtained urine specimen for culture is a necessary part of the evaluation of all febrile infants 28~90 days of age. The further prospective study on evaluation and management of young febrile infant should be performed in our hospital.

  • PDF

An Empirical Study on the Determinants of Ownership Structure of Listed Companies in Korea : Evidence from Panel Data (우리나라 상장기업의 소유구조 결정요인에 관한 실증적 연구 : 패널자료로부터의 근거)

  • Lee, Hae-Young;Lee, Jae-Choon
    • The Korean Journal of Financial Management
    • /
    • v.20 no.2
    • /
    • pp.41-72
    • /
    • 2003
  • The purposes of this paper are to build theoretical and empirically testable model to identify determining factors of ownership structure, and to analyze this model empirically using th Korea Stock Exchange panel data, and to test the impact of opening the stock market on the determinants of ownership structure. The determining factors of ownership structure identified in this paper include debt ratio, dividend, asset characteristics, profitability, growth business risk, size, institutional investors and chaebol-non chaebol dummy variable. Empirical panel estimation test reveals that this model can explain about $9\sim11%$ of the cross sectional variance in the equity ratio of large shareholders. The reasons that this model has too explanatory power are that some variables were measured with errors, and that there were some omitted variables in tested model. The regression results on the model variables ar generally in line with predictions. But the coefficient estimates on size is never significant. And it appears that the exogenous variable which explains opening the stock market has positive effect on the determinants of ownership structure.

  • PDF

Strengthening security structure of open Blockchain platform to enhance privacy protection of DApp users (DApp 사용자의 프라이버시 보호 강화를 위한 공개형 블록체인 플랫폼 보안구조 강화방안)

  • Hwang, Seonjin;Ko, DongHyun;Bahk, Taeu;Choi, Yoon-ho
    • Journal of Internet Computing and Services
    • /
    • v.21 no.3
    • /
    • pp.1-9
    • /
    • 2020
  • Along with the growth of Blockchain, DApp (Distributed Application) is getting attention. As interest in DApp grows, market size continues to grow and many developers participate in development. Many developers are using API(Application Programming Interface) services to mediate Blockchain nodes, such as Infura, for DApp development. However, when using such a service, there is a serious risk that the API service operator can violate the user's privacy by 1 to 1 matching the account address of the Transaction executed by the DApp user with the IP address of the DApp user. It can have an adverse effect on the reliability of public Blockchains that need to provide users with a secure DApp service environment. The proposed Blockchain platform is expected to provide user privacy protection from API services and provide a reliable DApp use environment that existing Blockchain platforms did not provide. It is also expected to help to activate DApp and increase the number of DApp users, which has not been activated due to the risk of an existing privacy breach.

Correlation of Marine Exploration-Survey Vessel Operation Factors and Grid-Type Operation Method through ES Model Analysis (환경스트레스 모델을 통한 해양탐사·조사선의 격자형 운항방식과 운항요인 상관관계에 관한 연구)

  • Park, Hyungoo;Park, Young-soo;Kim, Dae-won
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.26 no.6
    • /
    • pp.634-643
    • /
    • 2020
  • Because of the continuous increase in the demand for and importance of marine space, marine exploration and survey activities are being actively conducted in Korea actively. Because the marine survey vessels used for these activities have special operational patterns depending on the purpose and probe vessels, research on maritime traffic risk is required. In this study, an attempt was made to determine the correlation of each factor with the effect of marine exploration and survey vessel operation on maritime traffic. The status of ocean exploration and survey vessels in operation in Korea was identified, as well as the special operational conditions of some of the ocean physical probes. Generally, the number of exploration and survey vessels involved per hour, total vessel length(including exploration equipment), operation, interval distance of exploration as per plan, and marine traffic conditions(traffic volume and speed) can be classified as operating factors. To compare the results of the environmental stress, a maritime traffic flow simulation based on the "ES" Model was performed with each of the identified operating factors as independent variables. The results of the analysis confirmed that the environmental stress significantly changed in the order of traffic volume, ship length and speed. In addition, it was confirmed that the environmental stress is reduced when the operation course is set at an angle with the nearby maritime traffic flow. Accordingly, it can help reduce the operator's burden if the survey vessel operator understands nearby maritime traffic conditions and reflects them in the operation method when setting the operation plan.

A Development of Active Monitoring and Approach Alarm System for Marine Buoy Protection and Ship Accident Prevention based on Trail Cameras and AIS (해상 부이 보호 및 선박 사고 예방을 위한 트레일 카메라-AIS 연계형 능동감시 및 접근경보 시스템 개발)

  • Hwang, Hun-Gyu;Kim, Bae-Sung;Kim, Hyen-Woo;Gang, Yong-Soo;Kim, Dae-Han
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.7
    • /
    • pp.1021-1029
    • /
    • 2018
  • The marine buoys are operated in various domains, which are navigation route and danger maker, weather and environment monitoring, military strategical element, etc. If the marine buoy is damaged, there consumes many cost and time for recovery or replacement, because of severe environmental condition, and causes a risk possibility of secondary accident. In this paper, we developed an active monitoring and approach alarm providing system using trail cameras and AIS for protection for the marine buoys. To do this, we analyzed existing researches and similar systems, extracted requirements for enhancement, and designed the system architecture that applied the enhanced elements. The main considerations of system enhancement are: integration of AIS and trail cameras, adopting of phased alarm technique by approaching ships, applying of selective communication module, conducting the image processing of ships for providing alarm, and applying thermal cameras. After that, we developed the system using designed architecture and verified effectiveness of the system based on laboratory or field-level tests.

International Case Study and Strategy Proposal for IUCN Red List of Ecosystem(RLE) Assessment in South Korea (국내 IUCN Red List of Ecosystem(생태계 적색목록) 평가를 위한 국제 사례 연구와 전략 제시)

  • Sang-Hak Han;Sung-Ryong Kang
    • Journal of Wetlands Research
    • /
    • v.25 no.4
    • /
    • pp.408-416
    • /
    • 2023
  • The IUCN Red List of Ecosystems serves as a global standard for assessing and identifying ecosystems at high risk of biodiversity loss, providing scientific evidence necessary for effective ecosystem management and conservation policy formulation. The IUCN Red List of Ecosystems has been designated as a key indicator (A.1) for Goal A of the Kunming-Montreal Global Biodiversity Framework. The assessment of the Red List of Ecosystems discerns signs of ecosystem collapse through specific criteria: reduction in distribution (Criterion A), restricted distribution (Criterion B), environmental degradation (Criterion C), changes in biological interaction (Criterion D), and quantitative estimation of the risk of ecosystem collapse (Criterion E). Since 2014, the IUCN Red List of Ecosystems has been evaluated in over 110 countries, with more than 80% of the assessments conducted in terrestrial and inland water ecosystems, among which tropical and subtropical forests are distributed ecosystems under threat. The assessment criteria are concentrated on spatial signs (Criteria A and B), accounting for 68.8%. There are three main considerations for applying the Red List of Ecosystems assessment domestically: First, it is necessary to compile applicable terrestrial ecosystem types within the country. Second, it must be determined whether the spatial sign assessment among the Red List of Ecosystems categories can be applied to the various small-scale ecosystems found domestically. Lastly, the collection of usable time series data (50 years) for assessment must be considered. Based on these considerations, applying the IUCN Red List of Ecosystems assessment domestically would enable an accurate understanding of the current state of the country's unique ecosystem types, contributing to global efforts in ecosystem conservation and restoration.

User Authentication Method using Vibration Cue on Smartphone (진동 큐를 이용한 스마트폰 사용자 인증 방식)

  • Lee, Jong-Hyeok;Choi, Ok-Kyung;Kim, Kang-Seok;Yeh, Hong-Jin
    • The KIPS Transactions:PartC
    • /
    • v.19C no.3
    • /
    • pp.167-172
    • /
    • 2012
  • Mobile phone devices and memory card can be robbed and lost due to the carelessness that might be caused to leak personal information, and also company's confidential information can be disclosed. Therefore, the importance of user authentication to protect personal information is increasing exponentially. However, there are the limitations that criminals could easily obtain and abuse information about individuals, because the input method of personal identification number or the input method of password might not be safe for Shoulder Surfing Attack(SSA). Although various biometric identification methods were suggested to obstruct the SSA, it is the fact that they also have some faults due to the inconvenience to use in mobile environments. In this study, more complemented service for the user authentication was proposed by applying Keystroke method in the mobile environments to make up for the faults of existing biometric identification method. Lastly, the effectiveness and validity of this study were confirmed through experimental evaluations.

Improving Personal Data Protection in IoT Environments (사물인터넷(IoT) 환경에서 개인정보보호 강화를 위한 제도 개선 방안)

  • Lee, Ae Ri;Son, Soomin;Kim, Hyun Jin;Kim, Beomsoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.995-1012
    • /
    • 2016
  • In Internet of Things (IoT) environments, devices or sensors everywhere can automatically collect data without the individual awareness, further combine and share data using ubiquitous network, and thus the development of IoT raises new challenges in respect of personal data protection and privacy. This study aims to identify main issues related to data protection in the IoT and propose adequate measures. We analyzed the types of personal data controllers and processors in IoT and figured out the issues regarding the processing of personal data and the rights to privacy of data subject. Accordingly, we suggested the institutional ways (e.g., establishment of user-friendly notice and flexible consent system, re-identification risk monitoring system, data protection in cross-border transfer, and user education) to improve the situation of personal data protection in IoT and finally proposed the improvement tasks to carry out first based on the degree of urgency and importance.

A Study of the Marine Traffic Safety using the LED Flashing Number Plate for Light Buoys (등부표 식별용 LED 발광 번호판을 활용한 해상교통 안전에 관한 연구)

  • Shim, Moo-Jun;Lee, Tae-Hwan
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2010.04a
    • /
    • pp.448-452
    • /
    • 2010
  • The traditional Aids to Navigations(AtoN) have been ensuring the safety of ships by indicating the passage and dangers by depending on the flashing lights. But the more the industrial complex behind port which is all over the country involving the Ulsan port developed, the more the lights behind port is stronger, and then the distinguishment of the signal of AtoN from the lights behind port is more difficult. And It is urgently needed to prepare the counterplan about the ensurement of safety because the authorities levels up the limit tonnage of the ships which are sail in and out during night to improve the operation of port through reducing of the traffic jam So, the method of direct lighting like LED non-neon is applied to unmanned lighthouses or light beacon, and the LED flashing number plate is applied to light buoys whose light power is weaker than to improve distinguishment and to be easy positioning of ships. As a result, the users of Ulsan port comment favorably on this item and the development of AtoN must be continuos to overcome the lights behind port.

  • PDF

Design of an RFID Authentication Protocol Using Nonlinear Tent-Map (비선형 Tent-Map을 이용한 RFID 인증 프로토콜 설계)

  • Han, Kyu-Kwang;Yim, Geo-Su
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.10
    • /
    • pp.1145-1152
    • /
    • 2014
  • The RFID (Radio-Frequency Identification) system is a technology to discern things by radio and an epoch-making new method to improve product management such as distribution, transport, mobilization, inventory control. However, RFID, which uses radio, is at risk for information leakage and falsification due to the vulnerability of security of the communication section. We designed the new authentication protocol by applying the tent map, which is the representative complex systems, to the RFID communication system. A more solid and simple authentication system was designed by applying the initial value sensitivity and irregularity, which are the representative characteristics of the complex system, to the reader and tag of RFID. The purpose of this paper is to verify the usability of the RFID authentication protocol design that uses the nonlinear system shown in this thesis by the new system differentiated from the authentication system that depends on the existing hash function or random numbers.