• Title/Summary/Keyword: Fall risk

Search Result 419, Processing Time 0.033 seconds

Private Income Transfers and Old-Age Income Security (사적소득이전과 노후소득보장)

  • Kim, Hisam
    • KDI Journal of Economic Policy
    • /
    • v.30 no.1
    • /
    • pp.71-130
    • /
    • 2008
  • Using data from the Korean Labor & Income Panel Study (KLIPS), this study investigates private income transfers in Korea, where adult children have undertaken the most responsibility of supporting their elderly parents without well-established social safety net for the elderly. According to the KLIPS data, three out of five households provided some type of support for their aged parents and two out of five households of the elderly received financial support from their adult children on a regular base. However, the private income transfers in Korea are not enough to alleviate the impact of the fall in the earned income of those who retired and are approaching an age of needing financial assistance from external source. The monthly income of those at least the age of 75, even with the earning of their spouses, is below the staggering amount of 450,000 won, which indicates that the elderly in Korea are at high risk of poverty. In order to analyze microeconomic factors affecting the private income transfers to the elderly parents, the following three samples extracted from the KLIPS data are used: a sample of respondents of age 50 or older with detailed information on their financial status; a five-year household panel sample in which their unobserved family-specific and time-invariant characteristics can be controlled by the fixed-effects model; and a sample of the younger split-off household in which characteristics of both the elderly household and their adult children household can be controlled simultaneously. The results of estimating private income transfer models using these samples can be summarized as follows. First, the dominant motive lies on the children-to-parent altruistic relationship. Additionally, another is based on exchange motive, which is paid to the elderly parents who take care of their grandchildren. Second, the amount of private income transfers has negative correlation with the income of the elderly parents, while being positively correlated with the income of the adult children. However, its income elasticity is not that high. Third, the amount of private income transfers shows a pattern of reaching the highest level when the elderly parents are in the age of 75 years old, following a decreasing pattern thereafter. Fourth, public assistance, such as the National Basic Livelihood Security benefit, appears to crowd out private transfers. Private transfers have fared better than public transfers in alleviating elderly poverty, but the role of public transfers has been increasing rapidly since the welfare expansion after the financial crisis in the late 1990s, so that one of four elderly people depends on public transfers as their main income source in 2003. As of the same year, however, there existed and occupied 12% of the elderly households those who seemed eligible for the National Basic Livelihood benefit but did not receive any public assistance. To remove elderly poverty, government may need to improve welfare delivery system as well as to increase welfare budget for the poor. In the face of persistent elderly poverty and increasing demand for public support for the elderly, which will lead to increasing government debt, welfare policy needs targeting toward the neediest rather than expanding universal benefits that have less effect of income redistribution and heavier cost. Identifying every disadvantaged elderly in dire need for economic support and providing them with the basic livelihood security would be the most important and imminent responsibility that we all should assume to prepare for the growing aged population, and this also should accompany measures to utilize the elderly workforce with enough capability and strong will to work.

The Effects of Psychological Contract Violation on OS User's Betrayal Behaviors: Window XP Technical Support Ending Case (심리적 계약 위반이 OS이용자의 배신 행동에 미치는 영향: 윈도우 XP 기술적 지원서비스 중단 사례)

  • Lee, Un-Kon
    • Asia pacific journal of information systems
    • /
    • v.24 no.3
    • /
    • pp.325-344
    • /
    • 2014
  • Technical support of Window XP ended in March, 8, 2014, and it makes OS(Operating System) users fall in a state of confusion. Sudden decision making of OS upgrade and replacement is not a simple problem. Firms need to change the long term capacity plan in enterprise IS management, but they are pressed for time and cost to complete it. Individuals can not help selecting the second best plan, because the following OSs of Window XP are below expectations in performances, new PC sales as the opportunities of OS upgrade decrease, and the potential risk of OS technical support ending had not announced to OS users at the point of purchase. Microsoft as the OS vendors had not presented precaution or remedy for this confusion. Rather, Microsoft announced that the technical support of the other following OSs of Wndow XP such as Window 7 would ended in two years. This conflict between OS vendor and OS users could not happen in one time, but could recur in recent future. Although studies on the ways of OS user protection policy would be needed to escape from this conflict, few prior studies had conducted this issue. This study had challenge to cautiously investigate in such OS user's reactions as the confirmation with OS user's expectation in the point of purchase, three types of justice perception on the treatment of OS vendor, psychological contract violation, satisfaction and the other betrayal behavioral intention in the case of Window XP technical support ending. By adopting the justice perception on this research, and by empirically validating the impact on OS user's reactions, I could suggest the direction of establishing OS user protection policy of OS vendor. Based on the expectation-confirmation theory, the theory of justice, literatures about psychological contract violation, and studies about consumer betrayal behaviors in the perspective of Herzberg(1968)'s dual factor theory, I developed the research model and hypothesis. Expectation-confirmation theory explain that consumers had expectation on the performance of product in the point of sale, and they could satisfied with their purchase behaviors, when the expectation could have confirmed in the point of consumption. The theory of justice in social exchange argues that treatee could be willing to accept the treatment by treater when the three types of justice as distributive, procedural, and interactional justice could be established in treatment. Literatures about psychological contract violation in human behaviors explains that contracter in a side could have the implied contract (also called 'psychological contract') which the contracter in the other side would sincerely execute the contract, and that they are willing to do vengeance behaviors when their contract had unfairly been broken. When the psychological contract of consumers had been broken, consumers feel distrust with the vendors and are willing to decrease such beneficial attitude and behavior as satisfaction, loyalty and repurchase intention. At the same time, consumers feel betrayal and are willing to increase such retributive attitude and behavior as negative word-of-mouth, complain to the vendors, complain to the third parties for consumer protection. We conducted a scenario survey in order to validate our research model at March, 2013, when is the point of news released firstly and when is the point of one year before the acture Window XP technical support ending. We collected the valid data from 238 voluntary participants who are the OS users but had not yet exposed the news of Window OSs technical support ending schedule. The subject had been allocated into two groups and one of two groups had been exposed this news. The data had been analyzed by the MANOVA and PLS. MANOVA results indicate that the OSs technical support ending could significantly decrease all three types of justice perception. PLS results indicated that it could significantly increase psychological contract violation and that this increased psychological contract violation could significantly reduce the trust and increase the perceived betrayal. Then, it could significantly reduce satisfaction, loyalty, and repurchase intention, and it also could significantly increase negative word-of-month intention, complain to the vendor intention, and complain to the third party intention. All hypothesis had been significantly approved. Consequently, OS users feel that the OSs technical support ending is not natural value added service ending, but the violation of the core OS purchase contract, that it could be the posteriori prohibition of OS user's OS usage right, and that it could induce the psychological contract violation of OS users. This study would contributions to introduce the psychological contract violation of the OS users from the OSs technical support ending in IS field, to introduce three types of justice as the antecedents of psychological contract violation, and to empirically validate the impact of psychological contract violation both on the beneficial and retributive behavioral intentions of OS users. For practice, the results of this study could contribute to make more comprehensive OS user protection policy and consumer relationship management practices of OS vendor.

Comparisons between the Two Dose Profiles Extracted from Leksell GammaPlan and Calculated by Variable Ellipsoid Modeling Technique (렉셀 감마플랜(LGP)에서 추출된 선량 분포와 가변 타원체 모형화기술(VEMT)에 의해 계산된 선량 분포 사이의 비교)

  • Hur, Beong Ik
    • Journal of the Korean Society of Radiology
    • /
    • v.11 no.1
    • /
    • pp.9-17
    • /
    • 2017
  • A high degree of precision and accuracy in Gamma Knife Radiosurgery(GKRS) is a fundamental requirement for therapeutical success. Elaborate radiation delivery and dose gradients with the steep fall-off of radiation are clinically applied thus necessitating a dedicated Quality Assurance(QA) program in order to guarantee dosimetric and geometric accuracy and reduce all the risk factors that can occur in GKRS. In this study, as a part of QA we verified the accuracy of single-shot dose profiles used in the algorithm of Gamma Knife Perfexion(PFX) treatment planning system employing Variable Ellipsoid Modeling Technique(VEMT). We evaluated the dose distributions of single-shots in a spherical ABC phantom with diameter 160 mm on Gamma Knife PFX. The single-shots were directed to the center of ABC phantom. Collimating configurations of 4, 8, and 16 mm sizes along x, y, and z axes were studied. Gamma Knife PFX treatment planning system being used in GKRS is called Leksell GammaPlan(LGP) ver 10.1.1. From the verification like this, the accuracy of GKRS will be doubled. Then the clinical application must be finally performed based on precision and accuracy of GKRS. Specifically the width at the 50% isodose level, that is, Full-Width-of-Half-Maximum(FWHM) was verified under such conditions that a patient's head is simulated as a sphere with diameter 160mm. All the data about dose profiles along x, y, and z axes predicted through VEMT were excellently consistent with dose profiles from LGP within specifications(${\leq}1mm$ at 50% isodose level) except for a little difference of FWHM and PENUMBRA(isodose level: 20%~80%) along z axis for 4 mm and 8mm collimating configurations. The maximum discrepancy of FWHM was less than 2.3% at all collimating configurations. The maximum discrepancy of PENUMBRA was given for the 8 mm collimator along z axis. The difference of FWHM and PENUMBRA in the dose distributions obtained with VEMT and LGP is too small to give the clinical significance in GKRS. The results of this study are considered as a reference for medical physicists involved in GKRS in the whole world. Therefore we can work to confirm the validity of dose distributions for all collimating configurations determined through the regular preventative maintenance program using the independent verification method VEMT for the results of LGP and clinically assure the perfect treatment for patients of GKRS. Thus the use of VEMT is expected that it will be a part of QA that can verify and operate the system safely.

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

Changes in Growing Period and Productivity under Double Cropping of Spring Potato and Summer Cereals in Paddy Fields of Southern Korea (남부지역 논에서 봄감자와 하작물 이모작에 따른 생육기간 및 생산성 변화)

  • Seo, Jong-Ho;Hwang, Chung-Dong;Choi, Weon-Young;Bae, Hyeon-Kyung;Kim, Sang-Yeol;Oh, Seong-Hwan
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.64 no.4
    • /
    • pp.459-468
    • /
    • 2019
  • Changes in growing periods and productivities of crops under double cropping of potato-rice, potato-soybean and potato-maize, were investigated at the Paddy Experimental Fields in Miryang City from 2015 to 2018. Spring potatoes planted in early March showed a yield of 2.1-2.3 ton/10a and a period of 90 days. In double cropping, growing period of rice, soybean, and maize was about 130, 125 and 115 days, respectively. The potato yield obtained was as much as 616, 330 and 815 kg/10a under double cropping with rice, soybean and maize, respectively. It is beneficial to sow the spring potatoes as early as possible to increase the yield and to secure the growing period of sequential crops. The introduction of summer medium-late variety grain crops into double cropping of spring potato and rice as well as into double cropping of spring potato and soybean/maize, was possible because of no sowing in the fall and plants were able to reach the heading growth stage before the safe heading limit of rice in particular. In the case of maize, the growth period was different according to the change in temperature over the year. The introduction of upland crops such as soybeans and maize instead of rice improved soil physicochemical properties in a short period of time, contributing to the increase of spring potato yields, but there was also a risk of damage by successive cropping for more than three years. Spring potato-maize showed higher yield in terms of starch production, and spring potato-soybean was found to be advantageous for net income.

The legal responsibility of the unmanned aircraft operators and insurance (무인항공기 운영자의 법적책임과 보험)

  • Kim, Jong-Bok
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.33 no.2
    • /
    • pp.367-418
    • /
    • 2018
  • Just as safety is the most important thing in aviation, safety is the most important in the operation of unmanned aircraft (RPA), and safety operation is the most important in the legal responsibility of the operator of the unmanned aircraft. In this thesis, the legal responsibility of the operator of the unmanned aircraft, focusing on the responsibility of the operator of the unmanned aircraft, was discussed in depth with the issue of insurance, which compensates for damages in the event of an accident First of all, the legal responsibility of the operator of the unmanned aircraft was reviewed for the most basic : definition, scope and qualification of the operator of the unmanned aircraft, and the liability of the operator of the Convention On International Civil Aviation, the ICAO Annex, the RPAS Manual, the Rome Convention, other major international treaties and Domestic law such as the Aviation Safety Act. The ICAO requires that unmanned aircraft be operated in such a manner as to minimize hazards to persons, property or other aircraft as a major principle of the operation of unmanned aircraft, which is ultimately equivalent to manned aircraft Considering that most accidents involving unmanned aircrafts fall to the ground, causing damage to third parties' lives or property, this thesis focused on the responsibility of operators under the international treaty, and the responsibility of third parties for air transport by Domestic Commercial Act, as well as the liability for compensation. In relation to the Rome Convention, the Rome Convention 1952 detailed the responsibilities of the operator. Although it has yet to come into effect regarding liability, some EU countries are following the limit of responsibility under the Rome Convention 2009. Korea has yet to sign any Rome Convention, but Commercial Act Part VI Carriage by Air is modeled on the Rome Convention 1978 in terms of compensation. This thesis also looked at security-related responsibilities and the responsibility for privacy infringement. which are most problematic due to the legal responsibilities of operating unmanned aircraft. Concerning insurance, this thesis looked at the trends of mandatory aviation insurance coverage around the world and the corresponding regulatory status of major countries to see the applicability of unmanned aircraft. It also looked at the current clauses of the Domestic Aviation Business Act that make insurance mandatory, and the ultra-light flight equipment insurance policy and problems. In sum, the operator of an unmanned aircraft will be legally responsible for operating the unmanned aircraft safely so that it does not pose a risk to people, property or other aircraft, and there will be adequate compensation in the event of an accident, and legal systems such as insurance systems should be prepared to do so.

Non-invasive Brain Stimulation and its Legal Regulation - Devices using Techniques of TMS and tDCS - (비침습적 뇌자극기술과 법적 규제 - TMS와 tDCS기술을 이용한 기기를 중심으로 -)

  • Choi, Min-Young
    • The Korean Society of Law and Medicine
    • /
    • v.21 no.2
    • /
    • pp.209-244
    • /
    • 2020
  • TMS and tDCS are non-invasive devices that treat the diseases of patients or individual users, and manage or improve their health by applying stimulation to a brain through magnetism and electricity. The effect and safety of these devices have proved to be valid in several diseases, but research in this area is still much going on. Despite increasing cases of their application, legislations directly regulating TMS and tDCS are hard to find. Legal regulation regarding TMS and tDCS in the United States, Germany and Japan reveals that while TMS has been approved as a medical device with a moderate risk, tDCS has not yet earned approval as a medical device. However, the recent FDA guidance, European MDR changes, recalls in the US, and relevant legal provisions of Germany and Japan, as well as recommendations from expert groups all show signs of tDCS growing closer to getting approved as a medical device. Of course, safety and efficacy of tDCS can still be regulated as a general product instead of as a medical device. Considering multiple potential impacts on a human brain, however, the need for independent regulation is urgent. South Korea also lacks legal provisions explicitly regulating TMS and tDCS, but they fall into the category of the grade 3 medical devices according to the notifications of the Korean Ministry of Food and Drug Safety. And safety and efficacy of TMS are to be evaluated in compliance with the US FDA guidance. But no specific guidelines exist for tDCS yet. Given that tDCS devices are used in some hospitals in reality, and also at home by individual buyers, such a regulatory gap must quickly be addressed. In a longer term, legal system needs to be in place capable of independently regulating non-invasive brain stimulating devices.

Case study on flood water level prediction accuracy of LSTM model according to condition of reference hydrological station combination (참조 수문관측소 구성 조건에 따른 LSTM 모형 홍수위예측 정확도 검토 사례 연구)

  • Lee, Seungho;Kim, Sooyoung;Jung, Jaewon;Yoon, Kwang Seok
    • Journal of Korea Water Resources Association
    • /
    • v.56 no.12
    • /
    • pp.981-992
    • /
    • 2023
  • Due to recent global climate change, the scale of flood damage is increasing as rainfall is concentrated and its intensity increases. Rain on a scale that has not been observed in the past may fall, and long-term rainy seasons that have not been recorded may occur. These damages are also concentrated in ASEAN countries, and many people in ASEAN countries are affected, along with frequent occurrences of flooding due to typhoons and torrential rains. In particular, the Bandung region which is located in the Upper Chitarum River basin in Indonesia has topographical characteristics in the form of a basin, making it very vulnerable to flooding. Accordingly, through the Official Development Assistance (ODA), a flood forecasting and warning system was established for the Upper Citarium River basin in 2017 and is currently in operation. Nevertheless, the Upper Citarium River basin is still exposed to the risk of human and property damage in the event of a flood, so efforts to reduce damage through fast and accurate flood forecasting are continuously needed. Therefore, in this study an artificial intelligence-based river flood water level forecasting model for Dayeu Kolot as a target station was developed by using 10-minute hydrological data from 4 rainfall stations and 1 water level station. Using 10-minute hydrological observation data from 6 stations from January 2017 to January 2021, learning, verification, and testing were performed for lead time such as 0.5, 1, 2, 3, 4, 5 and 6 hour and LSTM was applied as an artificial intelligence algorithm. As a result of the study, good results were shown in model fit and error for all lead times, and as a result of reviewing the prediction accuracy according to the learning dataset conditions, it is expected to be used to build an efficient artificial intelligence-based model as it secures prediction accuracy similar to that of using all observation stations even when there are few reference stations.

Protective Effects of Chemical Drugs on the Course of Uranium-induced Acute Renal Failure (우라늄오염에 의한 신부전증에 미치는 제염제의 방호효과)

  • Kim, Tae-Hwan;Chung, In-Yong;Kim, Sung-Ho;Kim, Kyeng-Jung;Bang, Hyo-Chang;Yoo, Seong-Yul;Chin, Soo-Yil
    • Journal of Radiation Protection and Research
    • /
    • v.15 no.2
    • /
    • pp.27-39
    • /
    • 1990
  • Appreciable radiation exposures certainly were occurred in the reactor burn-up, the nuelear fall-out and the surroundings of nuclear installations with radioactive effluents. Therefore, radioactive nuclides is not only potentially hazardous to workers of nuclear power plants and related industrials, but also the wokers who handle radioactive nuclides in biochemical research and nuclear medicine diagnostics. And in the case of occurring the nuclear accidents, the early medical treatment of radiation injury should be necessary but little is established medical procedures to decontaminate the victims of internal contamination of radioactive nuclides in korea. Accordingly, to achieve the basic data for protective roles and medical treatment of radiation injury, the present studies were carrid out to evaluate the decontamination of uranium by the chemical drugs. The results observed were summarized as follows: 1. The combined treatmet group of sodium bicarbonate and saline with uranyl nitrate injection simultaneously and the dithiothreitol group that was administered 30 minutes after uranyl nitrate injection were increased significantly in the change of body weight than uranyl nitrate-only group (P<0.005). 2. All the experimental groups were increased the fluid intake and urine volume on the uranyl nitrate-induced acute renal failure. but the combined treatment group of sodium bicarbonate and saline with uranyl nitrate injection simultaneously and the dithiothreitol group that was administered 30 minutes after uranyl nitrate injection have the higher increment of fluid intake and urine volume (P<0.05). 3. When sodium bicarbonate and saline was treated with uranyl nitrate injection simultaneously. and dithiothreitol was administered 30 minutes after uranyl nitrate injection. there was significantly reduced in BUN concentration (P<0.01). 4. When dithiothreitol was administered 30 minutes after uranyl nitrate injection. there was reduced more significantly on the increment of serum creatinine concentration than that observed in uranyl nitrate-only group(P<0.01). but when the combined treatment of sodium bicarbonate and saline with uranyl nitrate simultaneously, there was still. albeit much less marked. decrease in serum creatinine concentration. 5. The sodium bicarbonate and saline was treated with uranyl nitrate simultaneously and dithiothreitol was administered at 30 minutes after uranyl nitrate were excreted markedly higher urine creatinine concentration than the uranyl nitrate-only group. 6. Uranyl nitrate has been used in experimental animals to produce hydropic degeneration and swelling of proximal tubules, disappearance of microvilli and brush border or necrosis in the kidney and centrilobular necrosis, congestion, and telangiectasia of the liver. When the sodium bicarbonate and saline was treated with uranyl nitrate simultaneously, and dithiothreitol was administered. 30 minutes after uranyl nitrate, there was more marked the protective effect than uranyl nitrate-only group. Finally, if the sodium bicarbonate and saline may administered as quickly as possible each time that some risk for internal contamination, with uranium, and dithiothreitol is administered 30 minutes after uranium contamination, there ameliorates the course of uranyl nitrate-induced acute renal failure.and this effect is assocciated with prevention of uranium (heavy metal)-induced alterations in BUN, serum creatinine, urine creatinine, fluid intake, urine volume and body weight.

  • PDF