• Title/Summary/Keyword: Action Priority

Search Result 124, Processing Time 0.026 seconds

Public Health Nutrition Policies and the Role of the Government: International Examples and the Need for Action in the Republic of Korea

  • Engellhardt, Katrin;Joung, Hyojee
    • Nutritional Sciences
    • /
    • v.8 no.1
    • /
    • pp.42-49
    • /
    • 2005
  • Many of the non-communicable diseases, which are now the major causes of death and disability worldwide, can be linked to our lifestyles, and thus to what eat The life-style related risk factors are - to a great extent - preventable. Public health nutrition (PHN) policies are means through which govemments can have an enornous impact on the reduction of nutrition-related non-communicable diseases, such as diabetes, hypertension, obesity, cancer and cardiovascular disease, by creating and supporting environments which enable healthier food choices and which are conducive to healthy nutrition behavior. More and more countries are developing nutrition policies. Nutrition policies are tools through which governments can intervene and control nutrition-related concerns throughout all levels of society. The need for more concerted action in the Republic of Korea is demonstrated, by showing the lack of priority for nutrition issues. Four recommendations for action are made; the first recommendation places emphasis on the need to implement a structure at the political level, through which nutrition concerns can be addressed, such as a nutrition unit within the Ministry of Health and Welfare. The second recommendation stresses the need for a strong nutrition advocacy strategy, to raise the awareness of the gains that can be achieved by promoting healthy nutrition. The third recommendation calls for more vigorous regulations and stricter enforcement of food and nutrition advertisement, and the fourth recommendation emphasizes the need for a settings-bsed approach to nutrition interventions. Acknowledging the developments that have already occurred in Korea, public health nutrition has yet to become a priority on the agenda of policy makers in Korea.

A Study on the Beauty Action of the High-School Girl with the Beauty, Beauty Products, and Multi-function Beauty Product Interest (여고생의 뷰티관심도, 뷰티제품 및 멀티기능 뷰티제품 관심도에 따른 뷰티행동 연구)

  • Barng, Keejung
    • Journal of Fashion Business
    • /
    • v.17 no.4
    • /
    • pp.124-139
    • /
    • 2013
  • Teenage girls under the influence of the physical changes due to the rapid physical development and appearance are interested. 200 parts were used for the statistical analysis of this research against the common excitation high school student positioned in Seoul. First, there was lots of the girl student managing the appearance due to the psychological satisfaction. And the girl student without the friend of the opposite sex managed the appearance at the psychological satisfaction. Because to be more important, thing including the studying, and etc. was the priority the girl student who doesn't the appearance management did not do the appearance management. Second, the factor found out over one month allowance 50,000 circle to be the very important factor through the beauty action high of the high beauty product concern degree and girl student action of the beauty product concern degree and girl student where there is the friend of the opposite sex. Third, the more the concern degree about the beauty product was high as the concern degree about the beauty was high, the girl student in high school could know that beauty action was high as the concern degree about the multi function beauty product was high.

A Study on the Priority of Complementary Measures about Deficiencies on the PIMS Certification (PIMS 인증결함의 보완조치 우선순위에 관한 연구)

  • Kang, Da-Yeon;Jeon, Jin-Hwan;Hwang, Jong-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.4
    • /
    • pp.10-17
    • /
    • 2018
  • Most of the privacy officers of organizations are hard to think of the corrective action about deficiencies of the PIMS(Personal Information Management Systems) certification. Because, it is difficult to define the priority of the complementary measures due to the unique characteristics and procedures of personal information protection for each organization. The purpose of this study is to evaluate the priority of the complementary measures using the Analytic Hierarchy Process(AHP). According to the results, it is important to comply with the legal requirements in the first tier. The second tier, PIMS experts answered that dedicated organization, password management, and agreement of the subject are important. Above all, agreement of the subject was found the highest priority for complementary measures about PIMS's deficiencies.

Design and Load Map of the Next Generation Convergence Security Framework for Advanced Persistent Threat Attacks

  • Lee, Moongoo
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.3 no.2
    • /
    • pp.65-73
    • /
    • 2014
  • An overall responding security-centered framework is necessary required for infringement accidents, failures, and cyber threats. On the other hand, the correspondence structures of existing administrative, technical, physical security have weakness in a system responding to complex attacks because each step is performed independently. This study will recognize all internal and external users as a potentially threatening element. To perform connectivity analysis regarding an action, an intelligent convergence security framework and road map is suggested. A suggested convergence security framework was constructed to be independent of an automatic framework, such as the conventional single solution for the priority defense system of APT of the latest attack type, which makes continuous reputational attacks to achieve its goals. This study suggested the next generation convergence security framework to have preemptive responses, possibly against an APT attack, consisting of the following five hierarchical layers: domain security, domain connection, action visibility, action control, and convergence correspondence. In the domain, the connection layer suggests a security instruction and direction in the domains of administrative, physical and technical security. The domain security layer has consistency of status information among the security domain. A visibility layer of an intelligent attack action consists of data gathering, comparison and decision cycle. The action control layer is a layer that controls the visibility action. Finally, the convergence corresponding layer suggests a corresponding system of before and after an APT attack. The administrative security domain had a security design based on organization, rule, process, and paper information. The physical security domain is designed to separate into a control layer and facility according to the threats of the control impossible and control possible. Each domain action executes visible and control steps, and is designed to have flexibility regarding security environmental changes. In this study, the framework to address an APT attack and load map will be used as an infrastructure corresponding to the next generation security.

A Study on Priority Factor Analysis of Standard Method for Risk Measurement (위험성 측정을 위한 표준안전작업 중점사항 분석에 관한 연구)

  • Yang, Kwang-Mo;Kim, Min-Jun;Cho, Jung-Hyun;Park, Jae-Hyun
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2007.04a
    • /
    • pp.27-33
    • /
    • 2007
  • There are many reason for unsafety action without safety operation. The reason is no standard safety operation in company or the workers never get a enough education. Standard safety operation is prepared by paper for accurate directions and orders and operators must read the paper to prevent an error of action. Also an essential particular is safety of equipment and machine must be assumed to establish standard safety operation then safety of operations will be possible.

  • PDF

The Future of Chemical Pest Control

  • Pickett, John-A.;Woodcock, Christine-M.
    • Korean journal of applied entomology
    • /
    • v.31 no.3
    • /
    • pp.304-313
    • /
    • 1992
  • The agricultural industry is beset by continuing demands to decrease the use of pest control agents which employ toxic modes of action. Although there are real problems of pesticide resistance, and sometimes overuse or redistribution in the environment, much criticism results from a lack of appreciation of how small is the risk involved. Whatever the background reasons, research and development for pesticide alternatives, particularly within Integrated Pest Management systems, is clearly of high priority. Currently available approaches, including use of natural products and molecular biology, are often regarded with naive optimism and require critical appraisal. For the future, methods of pest control based on chemicals with non-toxic modes of action (e.g. pheromones) continue to offer promise but, for widespread use, will require their integration with biological agents and development by means of plant molecular biology.

  • PDF

Skeleton Model-Based Unsafe Behaviors Detection at a Construction Site Scaffold

  • Nguyen, Truong Linh;Tran, Si Van-Tien;Bao, Quy Lan;Lee, Doyeob;Oh, Myoungho;Park, Chansik
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.361-369
    • /
    • 2022
  • Unsafe actions and behaviors of workers cause most accidents at construction sites. Nowadays, occupational safety is a top priority at construction sites. However, this problem often requires money and effort from investors or construction owners. Therefore, decreasing the accidents rates of workers and saving monitoring costs for contractors is necessary at construction sites. This study proposes an unsafe behavior detection method based on a skeleton model to classify three common unsafe behaviors on the scaffold: climbing, jumping, and running. First, the OpenPose method is used to obtain the workers' key points. Second, all skeleton datasets are aggregated from the temporary size. Third, the key point dataset becomes the input of the action classification model. The method is effective, with an accuracy rate of 89.6% precision and 90.5% recall of unsafe actions correctly detected in the experiment.

  • PDF

Root cause analys is and improving strategy of suicidal sentinel events (의료기관 내 자살사건의 근본원인분석과 개선전략)

  • Lim, Hun-Sun;Kim, Hong-Soon;Yum, Ho-Kee
    • Quality Improvement in Health Care
    • /
    • v.19 no.2
    • /
    • pp.50-64
    • /
    • 2013
  • Objectives : Suicide is a serious sentinel event in healthcare organization. Suicide and suicidal attempt are fatal and long lasting mental and physical damage to themselves, family, and medical staffs. To develope the system to prevent suicidal accident in hospital, we reviewed and analysed one case of suicidal sentinel event. Methods: The risks of suicidal sentinel event were evaluated and analysed through the root cause analysis and failure mode effects analysis. Result: We found several root causes such as initial assessment of oldest patient and security issues. Couple of action plans to fix the problems were done immediately. According to failure mode, we evaluate the risk priority number to modify the action plans. Conclusion: To reduce the risk of sentinel events, we reviewed the suicidal event and established the new system and action plan to prevent sentinel events.

A Simulation Method For Virtual Situations Through Seamless Integration Of Independent Events Via Autonomous And Independent Agents

  • Park, Jong Hee;Choi, Jun Seong
    • International Journal of Contents
    • /
    • v.14 no.3
    • /
    • pp.7-16
    • /
    • 2018
  • The extent and depth of the event plan determines the scope of pedagogical experience in situations and consequently the quality of immersive learning based on our simulated world. In contrast to planning in conventional narrative-based systems mainly pursuing dramatic interests, planning in virtual world-based pedagogical systems strive to provide realistic experiences in immersed situations. Instead of story plot comprising predetermined situations, our inter-event planning method aims at simulating diverse situations that each involve multiple events coupled via their associated agents' conditions and meaningful associations between events occurring in a background world. The specific techniques to realize our planning method include, two-phase planning based on inter-event search and intra-event decomposition (down to the animated action level); autonomous and independent agents to behave proactively with their own belief and planning capability; full-blown background world to be used as the comprehensive stage for all events to occur in; coupling events via realistic association types including deontic associations as well as conventional causality; separation of agents from event roles; temporal scheduling; and parallel and concurrent event progression mechanism. Combining all these techniques, diverse exogenous events can be derived and seamlessly (i.e., semantically meaningfully) integrated with the original event to form a wide scope of situations providing chances of abundant pedagogical experiences. For effective implementation of plan execution, we devise an execution scheme based on multiple priority queues, particularly to realize concurrent progression of many simultaneous events to simulate its corresponding reality. Specific execution mechanisms include modeling an action in terms of its component motions, adjustability of priority for agent across different events, and concurrent and parallel execution method for multiple actions and its expansion for multiple events.