• Title/Summary/Keyword: Post-fire

Search Result 208, Processing Time 0.024 seconds

A Research on Paramedic Student Type of Perception for 119 Rescue Workers

  • Lee, Jae-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.8
    • /
    • pp.127-137
    • /
    • 2021
  • This research studies the perception types of 119 rescue workers among emergency rescue department students, and was carried out to identify the types of perception of 119 rescue workers among firefighters and to prepare basic data to find out the characteristics of each type. As a result of analysis on the Q sample consisting of 27 statements by executing the Q UANL program on a total of 54 students from the Emergency rescue department, it is confirmed that there were 3 types, which accounted for 45% of the total variable. When looking at the explanatory power per type, it turned out: 32% for Type I; 6.7% for Type II; and 5.8% for Type III. Each type was named as follows: our Superman for Type I ; suffering hero for Type II ; and rescue expert for Type III. Overall, there were 119 rescue workers as follows : rescue workers in lexical meaning; and 119 rescue workers who were in difficult situations suffering from post-traumatic stress disorder and needed to be covered and protected by citizens. In addition, there was a perception of 119 rescue workers who were recognized as a specialist and carry out his/her lifesaving duties without a single mistake. Therefore, in order for 119 rescue workers to be recognized as a specialized field of rescue, a program in which 119 rescue workers can share various training and experiences must be provided and researched.

Monitoring of residue PBDEs level in human milk and fish & shellfish samples collected from Korea (한국인 모유 및 어패류 중 PBDEs 잔류 레벨 모니터링)

  • Jang, Myungsu;Cha, Sujin;Kang, Younseok;Park, Jongsei
    • Analytical Science and Technology
    • /
    • v.19 no.3
    • /
    • pp.244-254
    • /
    • 2006
  • Flame retardants are added to prevent catching fire and to slow down the burning process. PBDEs are known to affect thyroid hormones and hormone disruption. The aim of this study was to propose a manual for determination of PBDEs, and investigate the accumulation of PBDEs(BDE-28, 47, 99, 100, 153, 154 and 183) in fish&shellfish and human milk samples. Pre-treatment for PBDEs determination, alkali digestion and L-L(Liquid-Liquid) extraction method could be applied to fish and shellfish. When Multi-layer column was used for cleaning up the sample, 50 mL of hexane and 100 mL of hexane:dichloromethane(9:1) solutions were used for pre- and post-elution, respectively. Activated-carbon column was optimized by a 100 mL of hexane:dichloromethane(3:1). The result of fish, highest concentration was detected in flatfish, 890 pg/g(wet weight). The other side, lowest concentration was detected in pollack, 40 pg/g(wet weight). The result of breast milk, PBDEs was detected 2,580 and 3,600 pg/g(lipid weight) from breast milk of Seoul and Juju, respectively. BDE-153 and 183 were not detected in all samples. There was no difference in PBDEs level was not difference between first and second delivery. In this study, we could find that PBDEs level in Korea is lower than other countries.

The Short-term Safety Factor Considering Passive Resistance Effect of Bar Anchor Based on Smart Construction (스마트 건설기반의 강봉앵커 수동저항 효과를 고려한 단기 안전율)

  • Donghyuk Lee;Duhyun Baek
    • Journal of the Korean GEO-environmental Society
    • /
    • v.25 no.4
    • /
    • pp.29-35
    • /
    • 2024
  • This is an analytical study to confirm the passive resistance effect before post-tensioning of steel bar anchors. When using a steel bar as a permanent anchor, if displacement occurs within the slope even before the head load is applied, the displacement is suppressed by the passive resistance caused by the interaction between the steel bar, grout, and surrounding soil. Accordingly, the shape of the failure surface and changes in the safety factor were examined using limit equilibrium analysis and finite element analysis targeting sites where steel bar anchors were actually applied. It was found that the safety factor of the slope reinforced with steel bar anchors is 2.02 using finite element analysis, which is about 5.9% smaller than 2.14 using limit equilibrium analysis. Also, the location of the failure surface was found to be deeper compared to the unreinforced slope. Likewise, the factor of safety has a 153% and 163% increase using finite element method and limit equilibrium analysis, respectively. In addition, the maximum displacement occurs in the lower unreinforced section within the slope, and the displacement is found to be reduced by 42 to 83% at the location where the steel bar anchors are installed.

With Corona Era, exploring policy measures to prevent non-face-to-face lonely deaths - Focusing on Daegu Metropolitan City's AI and IOT cases of lonely death prevention (With 코로나 시대 비대면 고독사 예방정책 방안 모색 - 대구광역시 AI, IOT 고독사 예방 사례를 중심으로)

  • Ha-Yoon Kim;Tai-Hyun Ha
    • Journal of Digital Convergence
    • /
    • v.21 no.3
    • /
    • pp.49-62
    • /
    • 2023
  • Due to social and cultural changes and the growth of aging people living as a single because of aging, lonely deaths are steadily increasing, and each local government has begun to define them as a social problem. The legal basis began to be established. In order to explore policy measures to prevent lonely deaths, this study examined cases of lonely death prevention policies using smart digital information technology (AI, IOT), which is being promoted by Daegu Metropolitan City to promote non-face-to-face policies to prevent lonely deaths. Policies related to lonely deaths are divided into two axes: lonely death prevention projects and post-excavation support projects. In order to operate these businesses efficiently, the provision of non-face-to-face services through artificial intelligence and the Internet of Things is recognized as a new service delivery system, so the importance and necessity of non-face-to-face services is increasing. It is time that multifaceted changes and preparations are needed, such as establishing a system to expand the non-face-to-face industry at the national level. In order to respond to another national disaster situation in the future, the non-face-to-face smart care system is being expanded in various welfare policies such as preventing lonely deaths. It will have to be activated.

Analysis of Vegetation Recovery Trends by Restoration Method in Wildfire-Damaged Areas Using NDVI Mean-Variance plot (NDVI 평균-분산 도표를 활용한 산불피해지 복원 방법별 식생 회복 경향 분석)

  • Kim, In-hwa;Kim, Yoon-Ji;Chung, Hye-In;Shin Yu-jin;Lee, Sang-Wook;Jeong, Da-yong;Jeon, Seong-Woo
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.27 no.5
    • /
    • pp.13-25
    • /
    • 2024
  • With the increasing wildfire damage driven by climate change, it is crucial to assess the effectiveness of restoration efforts on a large scale. The majority of forests in Korea are situated in rugged mountainous regions, making it challenging to monitor large-scale wildfires. Consequently, establishing methodologies that use satellite imagery to evaluate restoration effectiveness is essential. This study aims to assess the recovery trends of ecosystems in wildfire-affected areas using NDVI mean-variance plots, which monitor changes in NDVI mean and variance over time through satellite imagery and visually represent the restoration process. The analysis of NDVI mean-variance plots for different restoration methods revealed that landscape restoration had the slowest recovery. This slower recovery is likely due to reduced growth from the complete removal of damaged trees. In contrast to High Severity (HS) areas, Moderate High Severity (MHS) areas showed that commercial afforestation, revegetation, ecological forest treatment led to a more stable recovery state post-disturbance, suggesting that areas with lower wildfire severity may recover more quickly. Furthermore, the recovery trends between artificial and natural restoration showed no significant difference, indicating that natural restoration can have similar restoration effects to artificial restoration in appropriate areas. Therefore, the study emphasizes the need to expand natural restoration areas, considering ecological and economic benefits such as increased biodiversity and genetic resource conservation. This research provides critical baseline data for the formulation and implementation of restoration policies in large-scale wildfire-affected regions and is expected to contribute significantly to the development of effective management strategies and monitoring techniques.

Multi-dimensional Security Threats and Holistic Security - Understanding of fusion-phenomenon of national security and criminal justice in post-modern society - (다차원 안보위협과 융합 안보)

  • Yun, Min-Woo;Kim, Eun-Young
    • Korean Security Journal
    • /
    • no.31
    • /
    • pp.157-185
    • /
    • 2012
  • Today, the emergence of cyberspace and advancement of globalization caused not only the transformation of our productive and conventional life but also the revolutionary transition of use of destructive violence such as crime and warfare. This transition of environmental condition connects various security threats which separatedly existed in individual, local, national, and global levels in the past, and transformed the mechanical sum of all levels of security threats into the organic sum of multi-dimensional security threats. This article proposes that the sum of multi-dimensional security threats is caused by the interconnectivity of various different levels of security threats and the integrated interdisciplinary perspective is essential to properly understand the fundamental existence of today's security problem and the reality of fear that we face today. The holistic security, the concept proposed here, is to suggest the mode of networked response to multi-dimensional security threats. The holistic security is suggested to overcome the conventional divisional approach based on the principle of "division of labor" and bureaucratic principles, which means more concretely that national security and criminal justice are divided and intelligence, military, police, prosecution, fire-fighting, private security, and etc. are strictly separated into its own expertise and turf. Also, this article introduces integrated security approaches tried by international organization and major countries overseas with the respect of the holistic security. The author have spent some substantial experience of participant observation, meetings, seminar, conference, and expert interviews regarding the issues discussed in the article in various countries including the United States, Russia, Austria, Germany, Canada, Mexico, Israel, and Uzbekistan for the last ten years. Intelligence and information on various levels of security threats and security approaches introduced in this paper is obtained from such opportunities.

  • PDF

A study of the destructive styles from Contemporary Paintings - Focused on distinguishing enmity-destruction and self-destruction - (현대회화에서 드러난 해체의 형식론에 관한 연구 -타의적 해체와 자의적 해체의 성격규정을 중심으로-)

  • Park Ki-Woong
    • Journal of Science of Art and Design
    • /
    • v.7
    • /
    • pp.5-63
    • /
    • 2005
  • Generally, the meanings of destruction are related in the meaning of demolition, breakdown, into fragments ... and so on, and the similar meanings are twist, crush, demolish, split, cut, into pieces , break up ... etc. Further, it has related in the cruelty and destructive heart which are linked with orgy, Sadism, Necrophilia and so on. The meanings are also expressed by the initial , which are deprivation, deface, defame, deform, degrade, delegitimize, denounce , deride, destroy, devalue, as well as debase, debunk, declaim, declassify, decry, delete, denigrate, deprecate, despise or detract ...and so on. Dario Gamboni has discussed the meaning in his book as two categories Iconoclasm and Vandalism. And the similar meanings could be found in the words which has the initial of , like abase, abate, abhor, abjure, abolish, abridge, abuse ...and so on. Even though the distinct meanings of Iconoclasm and Vandalism, it is not easy to distinguish clearly between the differences when the results are accomplished in contemporary paintings because of the similarity of the results. In korean vocabulary there are no similar words to distinguish between the meanings of destruction and deconstruction, and the deconstruction is not recorded in the general dictionaries. However the meaning of is diminishing, separation, contrast and so on. So the unification of the word as do-construction is not construct, minus construction, reverse construction. And Vincent Ditch explained that there are the meaning of destroy the text. From Jacques Derrida, the deconstruction strategy is to criticise the world of traditional metaphysics and logocentrism, and not to reconstruire the philosophical meaning of texts but $d\'{e}construire$ them. And Saussure emphasized that the signifers could have more meaning that there can be more signified in traditional texts in the art. as a result, deconstruction is explained that there are many signified meanings in a signifer. In this thesis , from using the meanings of destruction and deconstruction, to distinguish the expressive skills in contemporary art works are arising. Therefore, special methods which are linked in the destruction styles are selected. As a result, the two different purposes of destruction is arising, one is enmity destruction and the other is self destruction another word, auto destruction or destruction to create The enmity destruction can be distinguished by the two category Iconoclasm and Vandalism. They come from the moment of different historical aspect is arising and want to attack the Icon or masterpiece this concept is from the study of John Philips and especially iconoclasm is linked with religious and artistic heart, but Vandalism is come from the political attack. Sometime, this distinguish is not clearly arising, because the two aspects are co-related in the attack. As a result, firstly, the Iconoclastic controversy had arisen in the methods of Dadaism which has developed by Man Ray, Francis Picabia and Marcel Duchamp. They want to attack the pre-established master-pieces and painting spaces, and they had 'non-artistic attitude' not to be art. Since 1980, the German artist Anselm Kiefer adapted the methods and made them his special skills so he had tried to paint tough brush strokes and draw with hugh pallette image line and fire and water images , they can be the image attack as the Iconoclasm. secondly, the model of vandalism is to be done by hammer, drill, canon and so on. the method is to attack the content of painting. Further, the object of destruction is bound by cords and iron lings to demolish or to declare the authority of pre-statues; it symbolize the pre-authority is gone already. Self-destruction based paintings are clearly different in the purpose of approaching the art work. First of all, they can be auto-destruction, creative destruction and metamorphosis destruction, which is linked with the skill the material aspect and basic stature, and sign destruction or signifier destruction, which is link with the inner meaning destruction that is considered as the Semiotical destruction in post-modern paintings. Since 1960, the auto destruction is based on the method of firing, melting, grinding and similar skills, which is linked with Neo-Dada and reverse-assemblage. Metamorphosis destruction is strongly linked with the basic inner heart price and quality, so it can be resulted in the changedness of expectation and recognition. Tony Cragg has developed the skills to metamorphose the wood as stone or iron as cloth and stone as sponge and rubber and so on. The researcher has developed the same style in the series of since 2003. The other self-destructive methods are found in the skill of sign destruction. In the methods the meaning of the art is not fixed as one or two, but is developed multi-meaning and differ from original starting situation, so Jacques Derrida called the difference meaning in deconstruction. It is the destruction of textes. These methods are accomplished by David Salle, Francesco Clemente, and recently Tracy Emin, who has developed the attacking heart in the spectators' emotion. Sometime in the method of self-destruction, it is based on horror and shock, the method is explored by Demian Hirst and Jakes and Dinos Chapman. Their destructive styles stimulate ambivalent heart and destroy original sign of girl and animals.

  • PDF

Wearable Computers

  • Cho, Gil-Soo;Barfield, Woodrow;Baird, Kevin
    • Fiber Technology and Industry
    • /
    • v.2 no.4
    • /
    • pp.490-508
    • /
    • 1998
  • One of the latest fields of research in the area of output devices is tactual display devices [13,31]. These tactual or haptic devices allow the user to receive haptic feedback output from a variety of sources. This allows the user to actually feel virtual objects and manipulate them by touch. This is an emerging technology and will be instrumental in enhancing the realism of wearable augmented environments for certain applications. Tactual displays have previously been used for scientific visualization in virtual environments by chemists and engineers to improve perception and understanding of force fields and of world models populated with the impenetrable. In addition to tactual displays, the use of wearable audio displays that allow sound to be spatialized are being developed. With wearable computers, designers will soon be able to pair spatialized sound to virtual representations of objects when appropriate to make the wearable computer experience even more realistic to the user. Furthermore, as the number and complexity of wearable computing applications continues to grow, there will be increasing needs for systems that are faster, lighter, and have higher resolution displays. Better networking technology will also need to be developed to allow all users of wearable computers to have high bandwidth connections for real time information gathering and collaboration. In addition to the technology advances that make users need to wear computers in everyday life, there is also the desire to have users want to wear their computers. In order to do this, wearable computing needs to be unobtrusive and socially acceptable. By making wearables smaller and lighter, or actually embedding them in clothing, users can conceal them easily and wear them comfortably. The military is currently working on the development of the Personal Information Carrier (PIC) or digital dog tag. The PIC is a small electronic storage device containing medical information about the wearer. While old military dog tags contained only 5 lines of information, the digital tags may contain volumes of multi-media information including medical history, X-rays, and cardiograms. Using hand held devices in the field, medics would be able to call this information up in real time for better treatment. A fully functional transmittable device is still years off, but this technology once developed in the military, could be adapted tp civilian users and provide ant information, medical or otherwise, in a portable, not obstructive, and fashionable way. Another future device that could increase safety and well being of its users is the nose on-a-chip developed by the Oak Ridge National Lab in Tennessee. This tiny digital silicon chip about the size of a dime, is capable of 'smelling' natural gas leaks in stoves, heaters, and other appliances. It can also detect dangerous levels of carbon monoxide. This device can also be configured to notify the fire department when a leak is detected. This nose chip should be commercially available within 2 years, and is inexpensive, requires low power, and is very sensitive. Along with gas detection capabilities, this device may someday also be configured to detect smoke and other harmful gases. By embedding this chip into workers uniforms, name tags, etc., this could be a lifesaving computational accessory. In addition to the future safety technology soon to be available as accessories are devices that are for entertainment and security. The LCI computer group is developing a Smartpen, that electronically verifies a user's signature. With the increase in credit card use and the rise in forgeries, is the need for commercial industries to constantly verify signatures. This Smartpen writes like a normal pen but uses sensors to detect the motion of the pen as the user signs their name to authenticate the signature. This computational accessory should be available in 1999, and would bring increased peace of mind to consumers and vendors alike. In the entertainment domain, Panasonic is creating the first portable hand-held DVD player. This device weight less than 3 pounds and has a screen about 6' across. The color LCD has the same 16:9 aspect ratio of a cinema screen and supports a high resolution of 280,000 pixels and stereo sound. The player can play standard DVD movies and has a hour battery life for mobile use. To summarize, in this paper we presented concepts related to the design and use of wearable computers with extensions to smart spaces. For some time, researchers in telerobotics have used computer graphics to enhance remote scenes. Recent advances in augmented reality displays make it possible to enhance the user's local environment with 'information'. As shown in this paper, there are many application areas for this technology such as medicine, manufacturing, training, and recreation. Wearable computers allow a much closer association of information with the user. By embedding sensors in the wearable to allow it to see what the user sees, hear what the user hears, sense the user's physical state, and analyze what the user is typing, an intelligent agent may be able to analyze what the user is doing and try to predict the resources he will need next or in the near future. Using this information, the agent may download files, reserve communications bandwidth, post reminders, or automatically send updates to colleagues to help facilitate the user's daily interactions. This intelligent wearable computer would be able to act as a personal assistant, who is always around, knows the user's personal preferences and tastes, and tries to streamline interactions with the rest of the world.

  • PDF