• Title/Summary/Keyword: Medical Security

Search Result 808, Processing Time 0.024 seconds

The status of care satisfactions of the disabled persons with community-based rehabilitation plan (장애인의 치료만족도에 따른 지역사회중심재활에 관한 연구)

  • Lee In-Hak;Park Rae-Joon;Kim Mi-Ran
    • The Journal of Korean Physical Therapy
    • /
    • v.10 no.2
    • /
    • pp.13-32
    • /
    • 1998
  • A questionaire was conducted to obtain ran satisfactions in information of the 325 disabled persons among the total 9,314 handicapped people in Taejon area, and was surveyed during the period of June 1 to August 31, 1997. The results are as follows: 1. Among the studied disabled persons, $54.5\%$ of male, and $45.5\%$ of female. 2. Before disabled in occupation, $32.0\%$ of out of work group were high, $6.5\%$ of farm, student group were low. Before disabled in occupation by gender, male group is $29.9\%$ of out of work group were high, $0.6\%$ of housework group were low. female group is$34.5\%$ of out of work group were high, $4.7\%$ of student group were low(P<0.001). 3. After disabled in occupation, $75.1\%$ of out of work group wert high, $10.8\%$ of in working group were low. After disabled in occupation by gender, male group is $87.6\%$ of out of work group were high, $1.7\%$ of housework group were low. female group is $60.1\%$ of out of work group were hgh, $10.8\%$ of in working group were low(P<0.001). 4. Medical security status, $64.9\%$ of medical aid group wore high, $35.1\%$ of medical insurance group were low. Medical security status by gender, male group is $71.2\%$ of medical aid group were high, $28.8\%$ of medical insurance group were Iew. female group is $57.4\%$ of medical aid group wan high, $42.6\%$ of medical insurance were low(P<0.01). 5. Disabled record status, $68.6\%$ of record group were high, $31.4\%$ of non group were low. Disabled record status by gender, male group is $78.5\%$ of record group were high, $21.5\%$ of non record group were low. female group is $56.6\%$ of record group were high, $43.4%$ of non record group were low(P<0.001). 6. Disabled duration status, $42.2\%$ of loss than 9 year group were high, $10.2\%\;of\;20-29,\;30-39$ year group were low. Disabled duration status by gender,'male group is $44.6\%$ of less than 9 year group were high, $6.2\%$ of 20-29 year group wert low. female group is $39.2\%$ of less than 9 year were high, $39.2\%$ of 30-39 year group were low (P<0.05). 7. Cause of disabled status, $26.5\%$ of other group, $23.7\%$ of congenital group were high. $9.2\%$ of unknown group, $6.8\%$ of industry accident, $2.5\%$ of drug poisoning group were low. Cause of disabled status by gender, male group is $27.7\%$ of other group, $23.7\%$ of congenital group were high, $2.3\%$ drug poisoning group were low. female group is $25.0\%$ of other group, $20.9\%$ of congenital group were high, $2.5\%$ of drug poisoning group were low (P<0.001). 8. Disabled type status, $19.4\%$ of double disabled group were high, $2.2\%$ of muscle paralysis group were low. Disabled type status by gender, male group is $22.0\%$ of double disabled group were high, $2.3\%$ of muscle paralysis group were low. female group is $23.3\%$ of rheumatism group were high, $0.7\%$ of amputation group were low(P<0.001). 9. Smoking status, $73.2\%$ of non smoking group were high, $26.8\%$ of smoking group were low. Smoking status by gender, male group is $59.9\%$ of double non smoking group were high, $40.1\%$ of Smoking group were low, female group is $89.2\%$ of non smoking group were high, $10.8\%$ of smoking group were low(P<0.001). 10. Drinking status, $80.0\%$ of non drinking group were high, $20.0\%$ of drinking group were low. Drinking status by gender, male group is $72.3\%$ of non drinking group were high, $27.7\%$ of drinking group were low. female group is $89.2\%$ of non drinking group were high, $10.8\%$ of drinking group were low(P<0.001). 11. Stress level status, $52.9\%$ of high stress group were high, $1.8\%$ of very severe stress group were low. Stress level status by gender, male group is $50.8\%$ of high stress group were high, $2.3\%$ of very severe stress group were low. female group is $55.4\%$of high stress group were high, $1.4\%$ of very severe stress group were low. 12. Heed status, $28.0\%$ of economic support were high, $4.6\%$ of speech therapy, brace group were low. Need status by Sender, male group is $2i2\%$ of economic support group were high, $4.5\%$ of bracegroup were low. female group is$27.7\%$ of economic support group were high, $3.4\%$ of speech therapy group were low. 13. Care satisfaction comparision, 3.09, 0.55 point of IBR, 4.01, 0.45 point of CHR(P<0.001). 14. The variables which had positive correlation with IBR were gender(r=0.1406, P<0.01), age(r=0.1872, p<0.001), economic level(r=0.1246, P<0.05), disabled record(r=0.1137, P<0.05), education level(r=-0.1122. p<0.05). 15. The variables which had positive : correlation with CBR were gender(r=0.1613, P<0.01), age(r=0.2255, P<0.001). list of family(r=0.12i3, P<0.01), disabled record(r=0.1273, P<0.05). education level(r=-0.1294, P<0.01).

  • PDF

The Design and Implementation of Automotive Smart-key System Using general-purpose RFID (교통카드와 같은 범용 RFID를 활용한 자동차용 스마트키 시스템 설계 및 구현)

  • Lee, Yun-Sub;Kim, Kyeong-Seob;Yun, Jeong-Hee;Choi, Sang-Bang
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.4
    • /
    • pp.42-50
    • /
    • 2009
  • Ubiquitous computing technology is widely used in not only our everyday lives but also in education, medical care, military, environment and administration. RFID system, the basis of ubiquitous, is in the spotlight which can be an alternative solution of a bar code recognition system and magnetic system as they basically have practicality and security issues. An electronic authentication named smart-key system is recently concerned by an alternative solution of the security unit for an automobile. RFID system which has a general purpose is also in the limelight by an application technology. In this paper we designed vehicle smart key system with general-propose RFID system that is already in use. First, we designed control unit and RFID card reader for vehicle smart key system. Then we propose an algorithm and prove that the vehicle key system is controllable by showing the result of implementing and testing, after installing. Also security level is enlarged by proposing a authentication protocol between RFID reader and control unit.

XOR-based High Quality Information Hiding Technique Utilizing Self-Referencing Virtual Parity Bit (자기참조 가상 패리티 비트를 이용한 XOR기반의 고화질 정보은닉 기술)

  • Choi, YongSoo;Kim, HyoungJoong;Lee, DalHo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.12
    • /
    • pp.156-163
    • /
    • 2012
  • Recently, Information Hiding Technology are becoming increasingly demanding in the field of international security, military and medical image This paper proposes data hiding technique utilizing parity checker for gray level image. many researches have been adopted LSB substitution and XOR operation in the field of steganography for the low complexity, high embedding capacity and high image quality. But, LSB substitution methods are not secure through it's naive mechanism even though it achieves high embedding capacity. Proposed method replaces LSB of each pixel with XOR(between the parity check bit of other 7 MSBs and 1 Secret bit) within one pixel. As a result, stego-image(that is, steganogram) doesn't result in high image degradation. Eavesdropper couldn't easily detect the message embedding. This approach is applying the concept of symmetric-key encryption protocol onto steganography. Furthermore, 1bit of symmetric-key is generated by the self-reference of each pixel. Proposed method provide more 25% embedding rate against existing XOR operation-based methods and show the effect of the reversal rate of LSB about 2% improvement.

A Study on the Introduction Direction of Private Investigation Law (민간조사업법의 도입방향에 관한 연구)

  • Lee, Seung-Chal
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.255-276
    • /
    • 2008
  • The important items, which should be considered in Private Investigation Law, can include subjects, licenses, the scope of business, qualifying examinations, and supervisory and penal provisions. The subjects of Private Investigation Law should be permitted to be both natural persons and juridical persons in terms of providing various services, but should be permitted to be juridical persons and should be administered on a license system, even in order to ensure public interests. Concretely, the introduction scope of Private Investigation Law can be regulated to include the followings: that is, investigating the whereabouts identification of runaways and missing children, investigating the personal identification, habit, way of action, motivation, whereabouts identification, real child confirmation, association, transaction, reputation, and personality of specific persons or specific groups, investigating the whereabouts identification of missing persons, owners of government-vested properties or renounced properties, investigating the whereabouts of lost properties or stolen properties, investigating the causes of fire, character defamation, slander, damage, accident, physical disability, infringement on real estate or movable property, and investigating all sorts of accidents including traffic accidents, insurance accidents, and medical malpractices. In the qualifying examination, examinees' age should be restricted to be over age 25. The person, who is exempted from its primary examination, should be restricted to be the person, who has the career of over 20 years in related fields, in consideration of its equity with other certificates of qualification. In the supervisory institution, as the policy institution is the supervisory institution in many countries including France (the police) and Japan (public security committee), so the National Policy Agency should be the supervisory institution in consideration of management aspects. In the penal regulations, especially, we should clarify the management of personal information (personal information protection, personal information management), and so should prevent the infringement of people's basic rights, and then should ensure the public interest.

  • PDF

A Study on the Causes of Elderly Crime and Its Countermeasures in the Transition of Elderly Society (초고령사회 전환기에 노인범죄 발생원인과 그 대책에 관한 연구)

  • Yang, Jae Yeol;Kim, Sang Su;Lee, Ju Yeon
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.307-332
    • /
    • 2019
  • Recently, our society has been changing its population structure due to low birth rate along with the extension of life span due to the development of medical environment and improvement of living environment. It was not long before the population became older, and the problem of the elderly was amplified by generational conflict. The current generation of senior citizens could not afford to prepare for their own retirement income due to their children's education, marriage and housing problems, and is a generation alienated from the benefits of public income security. In addition, not only are they in poverty with rapid industrialization, informatization and economic instability, but they are also threatened with livelihood. The increase in elderly crimes arising from the elderly, who are less adaptable to our society dominated by materialism, is being highlighted as a new social issue. In this study, we are going to analyze the causes of violent and violent senior citizens' crimes in quality along with quantitative growth, and present criminal situations and preventive measures using 10 years of data, judging that this is a time when a national response is needed through a social discussion on crimes committed by senior citizens in our society, where the pace of aging is unprecedentedly fast in the world In order to achieve this research objective, various opinions and statistical data of our society where the standards of senior citizens are changing were reviewed, and analysis of crimes was conducted on literature utilizing data of the Supreme Public Prosecutor's Office, the National Police Agency, and the National Statistical Office, recent press releases, and existing research materials. In this study, we will diagnose crimes committed by senior citizens in various aspects, including the characteristics of the elderly and the view of the elderly in the present society, and explore the direction of development for the prevention of future crimes as well.

Reversible data hiding technique applying triple encryption method (삼중 암호화 기법을 적용한 가역 데이터 은닉기법)

  • Jung, Soo-Mok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.1
    • /
    • pp.36-44
    • /
    • 2022
  • Reversible data hiding techniques have been developed to hide confidential data in the image by shifting the histogram of the image. These techniques have a weakness in which the security of hidden confidential data is weak. In this paper, to solve this drawback, we propose a technique of triple encrypting confidential data using pixel value information and hiding it in the cover image. When confidential data is triple encrypted using the proposed technique and hidden in the cover image to generate a stego-image, since encryption based on pixel information is performed three times, the security of confidential data hidden by triple encryption is greatly improved. In the experiment to measure the performance of the proposed technique, even if the triple-encrypted confidential data was extracted from the stego-image, the original confidential data could not be extracted without the encryption keys. And since the image quality of the stego-image is 48.39dB or higher, it was not possible to recognize whether confidential data was hidden in the stego-image, and more than 30,487 bits of confidential data were hidden in the stego-image. The proposed technique can extract the original confidential data from the triple-encrypted confidential data hidden in the stego-image without loss, and can restore the original cover image from the stego-image without distortion. Therefore, the proposed technique can be effectively used in applications such as military, medical, digital library, where security is important and it is necessary to completely restore the original cover image.

Data Modeling for Cyber Security of IoT in Artificial Intelligence Technology (인공지능기술의 IoT 통합보안관제를 위한 데이터모델링)

  • Oh, Young-Taek;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.12
    • /
    • pp.57-65
    • /
    • 2021
  • A hyper-connected intelligence information society is emerging that creates new value by converging IoT, AI, and Bigdata, which are new technologies of the fourth industrial revolution, in all industrial fields. Everything is connected to the network and data is exploding, and artificial intelligence can learn on its own and even intellectual judgment functions are possible. In particular, the Internet of Things provides a new communication environment that can be connected to anything, anytime, anywhere, enabling super-connections where everything is connected. Artificial intelligence technology is implemented so that computers can execute human perceptions, learning, reasoning, and natural language processing. Artificial intelligence is developing advanced technologies such as machine learning, deep learning, natural language processing, voice recognition, and visual recognition, and includes software, machine learning, and cloud technologies specialized in various applications such as safety, medical, defense, finance, and welfare. Through this, it is utilized in various fields throughout the industry to provide human convenience and new values. However, on the contrary, it is time to respond as intelligent and sophisticated cyber threats are increasing and accompanied by potential adverse functions such as securing the technical safety of new technologies. In this paper, we propose a new data modeling method to enable IoT integrated security control by utilizing artificial intelligence technology as a way to solve these adverse functions.

Accuracy of the Registered Cause of Death in a County and its Related Factors (일개 군 사망신고자료에 기재된 사인의 정확성과 관련요인)

  • Shin, Hee-Young;Shin, Jun-Ho;Nam, Hae-Sung;Ryu, So-Yeon;Im, Jeong-Soo;Rhee, Jung-Ae;Chung, Eun-Kyung
    • Journal of Preventive Medicine and Public Health
    • /
    • v.35 no.2
    • /
    • pp.153-159
    • /
    • 2002
  • Objectives : To evaluate the accuracy of the registered cause of death in a county and its related factors. Methods : The data used in this study was based on 504 cases, in a county of Chonnam province, registered between January and December 1998. Study subjects consisted of 388 of the 504 cases, and their causes of death were established by an interview survey of the next of kin or neighbor and medical record surveys. We compared the registered cause of death with the confirmed cause of death, determined by surveys and medical records, and evaluated the factors associated with the accuracy of the registered cause of death. Results : 62.6% of the deaths were concordant with 19 Chapters classification of cause of death. external causes of mortality, endocrine, nutritional and metabolic diseases, neoplasms and diseases of the circulatory system showed the good agreement between the registered cause of death and the confirmed cause of death. The factors relating to the accuracy of the registered cause of death were the doctors' diagnosis for the cause of death (adjusted Odds Ratio: 2.67, 95% Confidence Interval: 1.21-5.89) and the grade of the public officials in charge of the death registry (adjusted Odds Ratio: 0.30, 95% CI=0.12-0.78). Conclusions : The accuracy of the registered cause of death was not high. It could be improved by using the doctors' diagnosis for death and improving the job specification for public officials who deal with death registration.

The Developmental Device for 119 fire fighting helicopter use activations (119 소방헬기 이용 활성화를 위한 발전방안)

  • Koh, Jae-Moon;Kim, Tae-Min;Kim, Hyo-Sik;Lee, Young-Ah
    • The Korean Journal of Emergency Medical Services
    • /
    • v.11 no.3
    • /
    • pp.93-109
    • /
    • 2007
  • The pre-hospital care in site transportation care and site care will be divided, it will follow in site or evacuation it will enforce it will can evacuate in condition of the emergency patient of like this at the initial stage and emergency care from inside fire fighting helicopter back transfer means and the manpower security of the specialty emergency necessary personnel(nursing and 1st EMT's) as the medical treatment agency and modernization of first aid equipment necessity inside American securing and fire fighting helicopter and specialty first aid packet won about lower the emergency care which is appropriate cannot become accomplished are the actual condition in total lack of emergency care equipment. Consequently craving augmentation, in order to be adapted with the handling kind transfer whose specialty and is appropriate and present time of rapid increase and the citizen of emergency demand by fire fighting helicopter simplicity transfer compared to it is a condition where the countermeasure preparation is earnest. Must expand emergency care equipment first even in fire fighting helicopter and 1st EMT's which it follows in him become arrangement and quickly the execution and specialty temporary disposal(ALS) must be enforced a temporary disposal and must buy the life which is. Also it gets by experience a helicopter induction outline, a radio communication method and the patient helicopter on-board hour attention point back various attention fact back with the body and when where it stands but accurately there must be it will be able to induce the helicopter. Also every manuals anger it does a helicopter transfer method and the emergency care method back and that all processes must do fixed form anger, it becomes feed. Also it related with a helicopter transfer even from the relationship agency many research to lead, difference of the advanced foreign nation and the maximum it is the actual condition where the medical emergency system construction which it reduces is earnestly demanded. Also with emergency structure(crane) it confronts to an aviation transfer even from the establishment college and education it leads intensively and 1st EMT's of the good quality which relates with an aviation structure expects is cultivate at all.

  • PDF

A Study on Home Accidents of Preschool Children (from 1 to 6) in Korea and Prevention Measures (영유소아기 가정사고의 원인과 예방에 관한 연구)

  • 변수자
    • Journal of Korean Academy of Nursing
    • /
    • v.4 no.1
    • /
    • pp.107-120
    • /
    • 1974
  • Necessity and purpose of this study: In a large number of countries it has been founded that children′s domestic accidents are at great risk year by year In the United States, they publish detailed accident statistics at regular intervals. In Korea. there have been just a few studies on Accidents-At-Home of preschool children. But it can not be said that there have been any systematic statistics about this area. and any study accounting for the relations of home accidents and preschool: children in detail, Therefore, the purpose of this thesis was focused on the inquire of these relations so as to make a little contribution to Korean preschool children′s health and security measures. So, the detail-purposes are to study following questions and to testify following hypothesis. Prob. 1. What the types of accidents of Preschool children, where the place accidents occurred\ulcorner Prob. 2. What the cause of accidents and, the main factors of the cause\ulcorner Prob. 3. How about the number of their children. the disparity of age among their children and mother′s age in each case of accidents\ulcorner hypothesis 1. There will be differences in the density of protection of parents according to the number of their children. hypothesis 2, There will be differences in accident-types and first-aid methods according to parents socio-economic background. Method; This study employed the interviewing survey method, in which 130 preschool children ware random.sampled, who visit hospital to have medical care. These children (from 1 to 6 years olds) were selected at the emergency room of five hospitals in Seoul (Hosp: Severance, Woosok, Medical Center, Hanyang Medical College Hospital and Seoul Medical Col1age Hospital during study-period (from Aug. to Oct, 1973). Four head nurses in above Hospitals were employed as accident members for this study. Concerning research analysis, the method of hypothesis verifying is used. Conclusion: As two American experts on this subject. Dr, Raymond Neuter and Mr. Ross Mc Garland have drawn attention to "minor epidemics of accidents" that could be avoided by fairly simple measures. preschool children′s accidents could be avoided by parents fair attentions. In other words, one of the most common causes of preschool children′s accidents derived from their parent′s inattention. Therefore, one important task on this subject is to instruct the parents fairly about the children′s accidents. Many accidents could be avoided by the exorcist of a little self-discipline. Also, as much the prevention of accidents is important, as the first-aid Is Important and necessary at the case of the accidents. So, the methods of proper first-aid treatment must be emphasized, and must be taught in school, especially in girls school. And there could be other means available for prevention of accidents. Firstly, the public authorities can take legal measures. More stringent safety standards can be made enforceable by law. Building materials and equipment for domestic us: ought to meat minimum safety criteria at all times. Next the public itself has to understand the seriousness of the problem, and here the dissemination of information is of great importance. All mass media should be brought into play to promote greater public awareness of the question. At last, it will be needed to obtain more detailed epidemiological data through additional surveys and statistics after this study.

  • PDF