• Title/Summary/Keyword: Particular Risk Analysis

Search Result 447, Processing Time 0.03 seconds

A Study of Sewer Layout to Control a Outflow in Sewer Pipes (우수관거 흐름 제어를 위한 관망 설계에 관한 연구)

  • Kim, Joong-Hoon;Joo, Jin-Gul;Jun, Hwan-Don;Lee, Jung-Ho
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.9 no.1
    • /
    • pp.1-7
    • /
    • 2009
  • Most developed models are designed to determine pipe diameter, slope and overall layout in order to minimize the cost for the design rainfall for the optimal sewer layout. However, these models are not capable of considering the superposition effect of runoff hydrographs in the sewer pipes. The flow characteristics in the sewer pipes, such as the sewer layout, pipe diameter and slope, vary according to the design of the sewer system. In particular, when the sewer network is modified, the shapes of the runoff hydrographs in the sewer pipes also change because of the superposition effect. In this study, the sewer layout is designed to control and distribute the flows in the sewer pipes, while considering the runoff superposition effect, in order to reduce the inundation risk at each junction. This is accomplished by separating the inflows that enter into each junction by changing the way in which pipes are connected between junctions. And this model combines SWMM (Storm Water Management Model) to perform the hydraulic analysis for the flows in the sewer network. The current sewer layout was modified to minimize the peak outflow at outlet in Garak basin, Seoul, South Korea. As the results, the peak outflows at the outlet were decreased by approximately 20% for the design rainfall during 30 minutes and the total overflows were also decreased for the excessive rainfalls.

A study on the Factors Affecting Job Separation by Middle and Old aged Self-Employed using KLoSA Panel (고령화연구조사(KLoSA) 패널을 활용한 중고령 자영업자의 일자리 이탈 요인에 관한 연구)

  • Choi, Whayoung
    • Journal of vocational education research
    • /
    • v.37 no.1
    • /
    • pp.119-138
    • /
    • 2018
  • The purpose of this study was to analyze the factors influencing of separation and the time of separation for middle and old aged self-employed workers. The cox proportional hazards model was used in the first survey of KLoSA, 684 persons who were over 40 years old in 2006, using data up to the 5th period of 2014. The main findings of this study are as follows. First, the average duration of job for middle and old aged self-employed workers in 2005 was 15.5years. Of the total 684 workers, 214(31.3%) person was found to have lost their job during survey period. Second, gender, age at start up, and education level have significant effects on job separation of them. When women, when they were older at start up, when they were graduate the university or higher, increased their risk of leaving their businesses. Third, in the characteristic of their work, the type of job and job satisfaction were found to affect to job desertion. When people are engaged in accommodation and food business rather than agriculture and forestry fishery, when the satisfaction of the work is lower, the risk was high. Based on these conlusions, the following implications are suggested. First, it is necessary to establish a support strategy for female middle-aged and old self-employed and older workers who start their own business after their 60s. Second, it is necessary to support them to enter into various fields by utilizing their own aptitude and experience rather than establishing them in industries with low entry barriers. Third, it is necessary to develop policies to help improve job satisfaction in the working environment. In particular, it is necessary to ensure that high educated self-employed workers are satisfied with various compensations by self-employed.

Development of a Software for Re-Entry Prediction of Space Objects for Space Situational Awareness (우주상황인식을 위한 인공우주물체 추락 예측 소프트웨어 개발)

  • Choi, Eun-Jung
    • Journal of Space Technology and Applications
    • /
    • v.1 no.1
    • /
    • pp.23-32
    • /
    • 2021
  • The high-level Space Situational Awareness (SSA) objective is to provide to the users dependable, accurate and timely information in order to support risk management on orbit and during re-entry and support safe and secure operation of space assets and related services. Therefore the risk assessment for the re-entry of space objects should be managed nationally. In this research, the Software for Re-Entry Prediction of space objects (SREP) was developed for national SSA system. In particular, the rate of change of the drag coefficient is estimated through a newly proposed Drag Scale Factor Estimation (DSFE), and is used for high-precision orbit propagator (HPOP) up to an altitude of 100 km to predict the re-entry time and position of the space object. The effectiveness of this re-entry prediction is shown through the re-entry time window and ground track of space objects falling in real events, Grace-1, Grace-2, Tiangong-1, and Chang Zheng-5B Rocket body. As a result, through analysis 12 hours before the final re-entry time, it is shown that the re-entry time window and crash time can be accurately predicted with an error of less than 20 minutes.

The Relationship between Frailty and Area Deprivation Index among Older Adults in South Korea (한국 노인의 노쇠와 지역박탈지수의 관련성 연구)

  • Gi Eun Choi;Eun Young Jo;Jin Young Nam
    • Health Policy and Management
    • /
    • v.34 no.2
    • /
    • pp.156-162
    • /
    • 2024
  • Background: This study aimed to explore the relationship between frailty and Area Deprivation Index (ADI) among older adults in Korea. Methods: We used data from the Korea National Health and Nutrition Examination Survey from 2014 to 2019, focusing on individuals aged 65 years and older. Frailty was assessed using Fried phenotype of frailty criteria. A multiple logistic regression analysis was conducted to assess the relationship between frailty and ADI adjusted for all covariates. Results: Among 9,825 older adults, those who lived in an area with a high ADI had a 1.2-fold higher risk of frailty compared to those who lived in an area with a low ADI (odds ratio [OR], 1.23; 95% confidence interval [CI], 1.09-1.37). Particularly, married individuals living in areas with a high ADI had an approximately 1.4-fold higher risk of frailty compared to those living in areas with a low ADI (OR, 1.35; 95% CI, 1.16-1.57). Conclusion: This study reveal a significant relationship between frailty and the ADI among older adults. In particular, married individuals who live in areas with a high ADI were found more vulnerable to frailty than those who live in areas with a low ADI. Therefore, policy intervention should be implemented to reduce health inequalities among older people, especially those living in the most deprived areas groups.

Clinical and Imaging Characteristics of SARS-CoV-2 Breakthrough Infection in Hospitalized Immunocompromised Patients

  • Jong Eun Lee;Jinwoo Kim;Minhee Hwang;Yun-Hyeon Kim;Myung Jin Chung;Won Gi Jeong;Yeon Joo Jeong
    • Korean Journal of Radiology
    • /
    • v.25 no.5
    • /
    • pp.481-492
    • /
    • 2024
  • Objective: To evaluate the clinical and imaging characteristics of SARS-CoV-2 breakthrough infection in hospitalized immunocompromised patients in comparison with immunocompetent patients. Materials and Methods: This retrospective study analyzed consecutive adult patients hospitalized for COVID-19 who received at least one dose of the SARS-CoV-2 vaccine at two academic medical centers between June 2021 and December 2022. Immunocompromised patients (with active solid organ cancer, active hematologic cancer, active immune-mediated inflammatory disease, status post solid organ transplantation, or acquired immune deficiency syndrome) were compared with immunocompetent patients. Multivariable logistic regression analysis was performed to evaluate the effect of immune status on severe clinical outcomes (in-hospital death, mechanical ventilation, or intensive care unit admission), severe radiologic pneumonia (≥ 25% of lung involvement), and typical CT pneumonia. Results: Of 2218 patients (mean age, 69.5 ± 16.1 years), 274 (12.4%), and 1944 (87.6%) were immunocompromised an immunocompetent, respectively. Patients with active solid organ cancer and patients status post solid organ transplantation had significantly higher risks for severe clinical outcomes (adjusted odds ratio = 1.58 [95% confidence interval {CI}, 1.01-2.47], P = 0.042; and 3.12 [95% CI, 1.47-6.60], P = 0.003, respectively). Patient status post solid organ transplantation and patients with active hematologic cancer were associated with increased risks for severe pneumonia based on chest radiographs (2.96 [95% CI, 1.54-5.67], P = 0.001; and 2.87 [95% CI, 1.50-5.49], P = 0.001, respectively) and for typical CT pneumonia (9.03 [95% CI, 2.49-32.66], P < 0.001; and 4.18 [95% CI, 1.70-10.25], P = 0.002, respectively). Conclusion: Immunocompromised patients with COVID-19 breakthrough infection showed an increased risk of severe clinical outcome, severe pneumonia based on chest radiographs, and typical CT pneumonia. In particular, patients status post solid organ transplantation was specifically found to be associated with a higher risk of all three outcomes than hospitalized immunocompetent patients.

Design of Comprehensive Security Vulnerability Analysis System through Efficient Inspection Method according to Necessity of Upgrading System Vulnerability (시스템 취약점 개선의 필요성에 따른 효율적인 점검 방법을 통한 종합 보안 취약성 분석 시스템 설계)

  • Min, So-Yeon;Jung, Chan-Suk;Lee, Kwang-Hyong;Cho, Eun-Sook;Yoon, Tae-Bok;You, Seung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.7
    • /
    • pp.1-8
    • /
    • 2017
  • As the IT environment becomes more sophisticated, various threats and their associated serious risks are increasing. Threats such as DDoS attacks, malware, worms, and APT attacks can be a very serious risk to enterprises and must be efficiently managed in a timely manner. Therefore, the government has designated the important system as the main information communication infrastructure in consideration of the impact on the national security and the economic society according to the 'Information and Communication Infrastructure Protection Act', which, in particular, protects the main information communication infrastructure from cyber infringement. In addition, it conducts management supervision such as analysis and evaluation of vulnerability, establishment of protection measures, implementation of protection measures, and distribution of technology guides. Even now, security consulting is proceeding on the basis of 'Guidance for Evaluation of Technical Vulnerability Analysis of Major IT Infrastructure Facilities'. There are neglected inspection items in the applied items, and the vulnerability of APT attack, malicious code, and risk are present issues that are neglected. In order to eliminate the actual security risk, the security manager has arranged the inspection and ordered the special company. In other words, it is difficult to check against current hacking or vulnerability through current system vulnerability checking method. In this paper, we propose an efficient method for extracting diagnostic data regarding the necessity of upgrading system vulnerability check, a check item that does not reflect recent trends, a technical check case for latest intrusion technique, a related study on security threats and requirements. Based on this, we investigate the security vulnerability management system and vulnerability list of domestic and foreign countries, propose effective security vulnerability management system, and propose further study to improve overseas vulnerability diagnosis items so that they can be related to domestic vulnerability items.

Design of Splunk Platform based Big Data Analysis System for Objectionable Information Detection (Splunk 플랫폼을 활용한 유해 정보 탐지를 위한 빅데이터 분석 시스템 설계)

  • Lee, Hyeop-Geon;Kim, Young-Woon;Kim, Ki-Young;Choi, Jong-Seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.1
    • /
    • pp.76-81
    • /
    • 2018
  • The Internet of Things (IoT), which is emerging as a future economic growth engine, has been actively introduced in areas close to our daily lives. However, there are still IoT security threats that need to be resolved. In particular, with the spread of smart homes and smart cities, an explosive amount of closed-circuit televisions (CCTVs) have been installed. The Internet protocol (IP) information and even port numbers assigned to CCTVs are open to the public via search engines of web portals or on social media platforms, such as Facebook and Twitter; even with simple tools these pieces of information can be easily hacked. For this reason, a big-data analytics system is needed, capable of supporting quick responses against data, that can potentially contain risk factors to security or illegal websites that may cause social problems, by assisting in analyzing data collected by search engines and social media platforms, frequently utilized by Internet users, as well as data on illegal websites.

Airway Microbiota in Stroke Patients with Tracheostomy: A Pilot Study (기관절개술을 시행한 뇌졸중 환자들에서의 기도미생물 탐색 연구)

  • Seong, Eunhak;Choi, Yura;Lim, Sookyoung;Lee, Myeongjong;Nam, Youngdo;Song, Eunji;Kim, Hojun
    • Journal of Korean Medicine for Obesity Research
    • /
    • v.19 no.2
    • /
    • pp.97-105
    • /
    • 2019
  • Objectives: We investigated differences between the tracheostomized and the non-tracheostomized stroke patients through microbiological analysis for the purpose of preliminary explorations of full-scale clinical research in the future. Methods: We collected tracheal aspirates samples from 5 stroke patients with tracheostomy and expectorated sputum samples from 5 stroke patients without tracheostomy. Genomic DNA from sputum samples was isolated using QIAamp DNA mini kit. The sequences were processed using Quantitative Insights into Microbial Ecology 1.9.0. Alpha-diversity was calculated using the Chao1 estimator. Beta-diversity was analyzed by UniFrac-based principal coordinates analysis (PCoA). To confirm taxa with different abundance among the groups, linear discriminant analysis effect size analysis was performed. Results: Although alpha-diversity value of the tracheostomized group was higher than that of the non-tracheostomized group, there was no statistically significant difference. In PCoA, clear separation was seen between clusters of the tracheostomized group and that of the non-tracheostomized group. In both groups, Bacteroidetes, Proteobacteria, Fusobacteria, Firmicutes, Actinobacteria were identified as dominant in phylum level. In particular, relative richness of Proteobacteria was found to be 31% more in the tracheotomized group (36.6%) than the non-tracheostomized group (5.6%)(P<0.05). In genus level, Neisseria (24%), Prevotella (17%), Streptococcus (13%), Fusobacteria (11%), Porphyromonas (7%) were identified as dominant in the tracheostomized group. In the non-tracheostomized group, Prevotella (38%), Veillonella (20%), Neisseria (9%) were genera that found to be dominant. Conclusions: It is meaningful in that the tracheostomized group has been identified a higher rate of microbiotas known as pathogenic in respiratory diseases compared to the non-tracheostomized group, confirming the possibility that the risk of opportunity infection may be higher.

Understanding the Mismatch between ERP and Organizational Information Needs and Its Responses: A Study based on Organizational Memory Theory (조직의 정보 니즈와 ERP 기능과의 불일치 및 그 대응책에 대한 이해: 조직 메모리 이론을 바탕으로)

  • Jeong, Seung-Ryul;Bae, Uk-Ho
    • Asia pacific journal of information systems
    • /
    • v.22 no.2
    • /
    • pp.21-38
    • /
    • 2012
  • Until recently, successful implementation of ERP systems has been a popular topic among ERP researchers, who have attempted to identify its various contributing factors. None of these efforts, however, explicitly recognize the need to identify disparities that can exist between organizational information requirements and ERP systems. Since ERP systems are in fact "packages" -that is, software programs developed by independent software vendors for sale to organizations that use them-they are designed to meet the general needs of numerous organizations, rather than the unique needs of a particular organization, as is the case with custom-developed software. By adopting standard packages, organizations can substantially reduce many of the potential implementation risks commonly associated with custom-developed software. However, it is also true that the nature of the package itself could be a risk factor as the features and functions of the ERP systems may not completely comply with a particular organization's informational requirements. In this study, based on the organizational memory mismatch perspective that was derived from organizational memory theory and cognitive dissonance theory, we define the nature of disparities, which we call "mismatches," and propose that the mismatch between organizational information requirements and ERP systems is one of the primary determinants in the successful implementation of ERP systems. Furthermore, we suggest that customization efforts as a coping strategy for mismatches can play a significant role in increasing the possibilities of success. In order to examine the contention we propose in this study, we employed a survey-based field study of ERP project team members, resulting in a total of 77 responses. The results of this study show that, as anticipated from the organizational memory mismatch perspective, the mismatch between organizational information requirements and ERP systems makes a significantly negative impact on the implementation success of ERP systems. This finding confirms our hypothesis that the more mismatch there is, the more difficult successful ERP implementation is, and thus requires more attention to be drawn to mismatch as a major failure source in ERP implementation. This study also found that as a coping strategy on mismatch, the effects of customization are significant. In other words, utilizing the appropriate customization method could lead to the implementation success of ERP systems. This is somewhat interesting because it runs counter to the argument of some literature and ERP vendors that minimized customization (or even the lack thereof) is required for successful ERP implementation. In many ERP projects, there is a tendency among ERP developers to adopt default ERP functions without any customization, adhering to the slogan of "the introduction of best practices." However, this study asserts that we cannot expect successful implementation if we don't attempt to customize ERP systems when mismatches exist. For a more detailed analysis, we identified three types of mismatches-Non-ERP, Non-Procedure, and Hybrid. Among these, only Non-ERP mismatches (a situation in which ERP systems cannot support the existing information needs that are currently fulfilled) were found to have a direct influence on the implementation of ERP systems. Neither Non-Procedure nor Hybrid mismatches were found to have significant impact in the ERP context. These findings provide meaningful insights since they could serve as the basis for discussing how the ERP implementation process should be defined and what activities should be included in the implementation process. They show that ERP developers may not want to include organizational (or business processes) changes in the implementation process, suggesting that doing so could lead to failed implementation. And in fact, this suggestion eventually turned out to be true when we found that the application of process customization led to higher possibilities of failure. From these discussions, we are convinced that Non-ERP is the only type of mismatch we need to focus on during the implementation process, implying that organizational changes must be made before, rather than during, the implementation process. Finally, this study found that among the various customization approaches, bolt-on development methods in particular seemed to have significantly positive effects. Interestingly again, this finding is not in the same line of thought as that of the vendors in the ERP industry. The vendors' recommendations are to apply as many best practices as possible, thereby resulting in the minimization of customization and utilization of bolt-on development methods. They particularly advise against changing the source code and rather recommend employing, when necessary, the method of programming additional software code using the computer language of the vendor. As previously stated, however, our study found active customization, especially bolt-on development methods, to have positive effects on ERP, and found source code changes in particular to have the most significant effects. Moreover, our study found programming additional software to be ineffective, suggesting there is much difference between ERP developers and vendors in viewpoints and strategies toward ERP customization. In summary, mismatches are inherent in the ERP implementation context and play an important role in determining its success. Considering the significance of mismatches, this study proposes a new model for successful ERP implementation, developed from the organizational memory mismatch perspective, and provides many insights by empirically confirming the model's usefulness.

  • PDF

A Prediction of N-value Using Artificial Neural Network (인공신경망을 이용한 N치 예측)

  • Kim, Kwang Myung;Park, Hyoung June;Goo, Tae Hun;Kim, Hyung Chan
    • The Journal of Engineering Geology
    • /
    • v.30 no.4
    • /
    • pp.457-468
    • /
    • 2020
  • Problems arising during pile design works for plant construction, civil and architecture work are mostly come from uncertainty of geotechnical characteristics. In particular, obtaining the N-value measured through the Standard Penetration Test (SPT) is the most important data. However, it is difficult to obtain N-value by drilling investigation throughout the all target area. There are many constraints such as licensing, time, cost, equipment access and residential complaints etc. it is impossible to obtain geotechnical characteristics through drilling investigation within a short bidding period in overseas. The geotechnical characteristics at non-drilling investigation points are usually determined by the engineer's empirical judgment, which can leads to errors in pile design and quantity calculation causing construction delay and cost increase. It would be possible to overcome this problem if N-value could be predicted at the non-drilling investigation points using limited minimum drilling investigation data. This study was conducted to predicted the N-value using an Artificial Neural Network (ANN) which one of the Artificial intelligence (AI) method. An Artificial Neural Network treats a limited amount of geotechnical characteristics as a biological logic process, providing more reliable results for input variables. The purpose of this study is to predict N-value at the non-drilling investigation points through patterns which is studied by multi-layer perceptron and error back-propagation algorithms using the minimum geotechnical data. It has been reviewed the reliability of the values that predicted by AI method compared to the measured values, and we were able to confirm the high reliability as a result. To solving geotechnical uncertainty, we will perform sensitivity analysis of input variables to increase learning effect in next steps and it may need some technical update of program. We hope that our study will be helpful to design works in the future.