• Title/Summary/Keyword: Security Devices

Search Result 1,594, Processing Time 0.034 seconds

Design of detection method for malicious URL based on Deep Neural Network (뉴럴네트워크 기반에 악성 URL 탐지방법 설계)

  • Kwon, Hyun;Park, Sangjun;Kim, Yongchul
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.5
    • /
    • pp.30-37
    • /
    • 2021
  • Various devices are connected to the Internet, and attacks using the Internet are occurring. Among such attacks, there are attacks that use malicious URLs to make users access to wrong phishing sites or distribute malicious viruses. Therefore, how to detect such malicious URL attacks is one of the important security issues. Among recent deep learning technologies, neural networks are showing good performance in image recognition, speech recognition, and pattern recognition. This neural network can be applied to research that analyzes and detects patterns of malicious URL characteristics. In this paper, performance analysis according to various parameters was performed on a method of detecting malicious URLs using neural networks. In this paper, malicious URL detection performance was analyzed while changing the activation function, learning rate, and neural network structure. The experimental data was crawled by Alexa top 1 million and Whois to build the data, and the machine learning library used TensorFlow. As a result of the experiment, when the number of layers is 4, the learning rate is 0.005, and the number of nodes in each layer is 100, the accuracy of 97.8% and the f1 score of 92.94% are obtained.

A Study on the Introductioin of Data Trusts System to Expand the Rights of Privacy Self-Determination (개인정보 자기결정권 확대를 위한 데이터 신탁제도 도입 방안 연구)

  • Jang, Keunjae;Lee, Seungyong
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.1
    • /
    • pp.29-43
    • /
    • 2022
  • With the advent of the Internet and the development of mobile digital devices such as smartphones and tablet PCs, the communication service paradigm began to shift from existing voice services to data services. Recently, as social network services (SNS) are activated and 4th industrial revolution technologies centered on ICT (Information and Communication Technologies) such as Big Data, Blockchain, Cloud, and 5G/6G are rapidly developed, the amount of shared data type and the amount of data are increasing rapidly. As the transition to a digital society begins actively, the importance of using data information, as well as the economic and social values of personal information are becoming increasingly important. As a result, they are actively discussing policies to revitalize the data information industry around the world and ways to efficiently obtain, analyze, and utilize increasingly diverse and vast data, as well as to protect/guarantee the rights of information subjects (providers) in various fields such as society, culture, economy, and politics.. In this paper, in order to improve the self-determination right of personal information on data produced by information subjects, and further expand the use of safe data and the data economy, a differentiated data trusts system was considered and suggested. In addition, the components and data trusts procedures necessary to efficiently operate the data trusts system in Korea were considered, and the non-profit data trusts system and the for-profit data trusts system were considered as a way to flexibly operate the data trusts system. Furthermore, the legal items necessary for the implementation of the data trusts system were investigated and considered. In this paper, in order to propose a domestic data trusts system, cases related to existing data trusts systems such as the United States, Japan, and Korea were reviewed and analyzed. In addition, in order to prepare legislation necessary for the data trusts system, data-related laws in major countries and domestic legal and policy trends were reviewed to study the rights that conflict or overlap with existing laws, and differences were investigated and considered. The Data trusts system proposed in this paper is a reasonable system that is expected to recognize the asset value of data in the capitalist market economy system, to provide legitimate compensation for data produced by data subjects, and further to contribute greatly to the use of safe data and creation of a new service market.

A Study on Fast Iris Detection for Iris Recognition in Mobile Phone (휴대폰에서의 홍채인식을 위한 고속 홍채검출에 관한 연구)

  • Park Hyun-Ae;Park Kang-Ryoung
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.43 no.2 s.308
    • /
    • pp.19-29
    • /
    • 2006
  • As the security of personal information is becoming more important in mobile phones, we are starting to apply iris recognition technology to these devices. In conventional iris recognition, magnified iris images are required. For that, it has been necessary to use large magnified zoom & focus lens camera to capture images, but due to the requirement about low size and cost of mobile phones, the zoom & focus lens are difficult to be used. However, with rapid developments and multimedia convergence trends in mobile phones, more and more companies have built mega-pixel cameras into their mobile phones. These devices make it possible to capture a magnified iris image without zoom & focus lens. Although facial images are captured far away from the user using a mega-pixel camera, the captured iris region possesses sufficient pixel information for iris recognition. However, in this case, the eye region should be detected for accurate iris recognition in facial images. So, we propose a new fast iris detection method, which is appropriate for mobile phones based on corneal specular reflection. To detect specular reflection robustly, we propose the theoretical background of estimating the size and brightness of specular reflection based on eye, camera and illuminator models. In addition, we use the successive On/Off scheme of the illuminator to detect the optical/motion blurring and sunlight effect on input image. Experimental results show that total processing time(detecting iris region) is on average 65ms on a Samsung SCH-S2300 (with 150MHz ARM 9 CPU) mobile phone. The rate of correct iris detection is 99% (about indoor images) and 98.5% (about outdoor images).

New demand forecast for vocational high school graduates in regional strategic industries: Focusing on comparison between Daejeon and Jeonnam (지역전략산업에 따른 특성화고 졸업자 신규수요 예측: 대전과 전남 지역 비교를 중심으로)

  • Kim, Jin-Mo;Choi, Su-Jung;Jeon, Yeong-Uk;Oh, Jin-Ju;Ryu, Ji-Eun;Kim, Seon-Geun
    • Journal of vocational education research
    • /
    • v.36 no.1
    • /
    • pp.47-75
    • /
    • 2017
  • The purpose of this study was to provide basic data for policy making for secondary vocational education in each region and transformation in vocational high schools. To achieve this, the regional strategic industries in Daejeon and Jeonnam were selected, new demand for vocational high school graduates was forecasted in each industry and occupation. The results of the study are as follows. First, locational quotient analysis and regional shift-share analysis revealed that Daejon and Jeonnam have different strategic industries. Daejon, unlike Jeonnam strategically develops 'manufacturing food, beverage and tobacco', 'manufacturing timber and paper, printing and copying', 'public service and administration of national defense and social security' and 'manufacturing electrical devices, electronics and precision devices'. Jeonnam has specialized industries distinguished from Daejon's, which are 'manufacturing of machinery transportation equipments and etc', 'manufacturing of non-metallic minerals and metal products', 'electric, gas, steam and water supply systems/industries', 'manufacturing coal and chemical products, refining petroleum', 'mining' and 'agriculture, forestry and fishery'. Second, new demand for vocational high school graduates by occupations and industries showed regional differences(in Daejon and Jeonnam). According the forecast, Daejon will have many workforce demands based on manufacturing industries, on the other hand Jeonnam's focused on service industries. Analysis by occupations was also different, Daejon showed high demands on professional and related workers, while Jeonnam requested many new office and service workers. Third, new workforce demand by occupations in regional strategic industries is big part of overall new workforce demand both in Daejon and Jeonnam. Forth, according to the results of analyzing the new demand for vocational high school graduates in Daejeon and Jeonnam in terms of industry location quotient and change effect, there was high demand in industries with positive total change effects. In terms of location quotient, Daejeon and Jeonnam showed different results.

The Design and Application of Vibrator Type(AM) Combination Apparatus for Improving Police Equipment for Fugitive Prevention (도주방지용 경찰장구의 기능개선을 위한 진동자 방식(AM) 결속장치 설계 및 응용)

  • Choi, Ki-Nam;Lee, Seon-Jeh
    • Convergence Security Journal
    • /
    • v.11 no.2
    • /
    • pp.13-24
    • /
    • 2011
  • Policemen judge the situations rationally and use their equipment such as handcuffs and rope within the purview, finding them needed to arrest criminals in the act who commit crimes which conforms to death penalty, life imprisonment or long imprisonment for over 3 years in accordance with Clause 10-2, Article 1 of the Police Mandate Law and prevent fleeing from them, defend their and others' lives and bodies, or if there are probable causes to be recognized that using equipment is necessary to restrain the interference with government officials in the execution of their duties. However, as the cases which the criminals run away in handcuffs or with both hands tied occur, it results in the waste of police force, distrust and enormous trouble in the pursuit of their duties. Therefore, if the way to perceive fleeing of criminals who have already worn the police equipment by some simple assistive devices without developing other new equipment, it will be very effective for police duties. This study is about the combination apparatus for fugitive prevention attached to the existing handcuffs and rope whose alert sounds let the staffs working inside the office perceive the fleeing of wanted criminals and examined suspects who wear the handcuffs or are tied up with rope, providing that they go through the exit where a transmitter and a receiver were set. The combination apparatus for fugitive prevention which the study introduces contains the connecting parts which connect a flexible tube(cognition tags inside of the tube) of connector equipped with the police equipment with the ends of the tube and the part where these two meet and which connect them inside of the tube. The connecting parts are easy to be attached to the police equipment such as handcuffs and rope, but hard to be dismantled by the people tied up with the equipment. It enables watchers to perceive the fleeing of wanted criminals and examined suspects who wear the handcuffs or are tied up with rope, providing that they go through the exit where a transmitter and a receiver were set. Plus, if it is combined together with the portable receiver, it can be installed on the patrol cars and easily adopted to supervise illegally accessing of evidences. It is also avaliable to be adjunctively utilized for the handcuffs provided and the cost is so reasonable. Owing to its snap-on way to the cuffs, it can clear up any invasion of privacy and it can not be used as a self-injury tool because of the soft tube. Using AM Tag minimizes the lack of malfunction.

A Comparative Study on Attitude of the Collegiate an4 Non-Collegiate Nursing Students toward Their Clinical Affiliation in a Mental Hospital (정신과 간호 실습에 대한 간호 대학생과 간호학교 학생들의 태도 비교 연구)

  • 김소야자
    • Journal of Korean Academy of Nursing
    • /
    • v.4 no.2
    • /
    • pp.17-31
    • /
    • 1974
  • Today, over seventy five percent of nursing in Korea provide a psychiatric experience in the basic curriculum. The psychiatric affiliation presents numerous major problems of adjustment to the student. The Importance of positive attitude toward the nursing care of psychiatric patients is recognized by the nursing profession. I have fined out the unfavorable attitude of non collegiate nursing students toward psychiatric nursing affiliation by previous research. This study was undertaken in response to a felt need to explore the use of several devices which might yield information about attitudes toward psychiatric nursing as a basis for future planning of the program offered at a selected hospital. This study is designed to meet the following objectives; (1) In order to find out the expressed attitudes of fifty·three collegiate nursing students toward their psychiatric affiliation. (2) To compare responses given by selected group of collegiate and non collegiate nursing students to same questionnaire (3) To determine the relationship between the attitudes of nursing students toward psychiatric nursing and the type of instructions where experience was obtained. A questionnaire, a Korean translation of the "Psychiatric Nursing Attitude Questionnaire" by Moldered Elizabeth fletcher, was administered to fifty-three collegiate nursing students who had completed a four-week psychiatric affiliation in a S hospital psychiatric ward during May 7, 1973 to Dec. 16, 1973. - The questionnaire of 100 statements was administered in the following way; (1) Part Ⅰ, Preconceptions, was, given in individual conferences with each subject, during the first few days of their affiliation, and again during the final week of affiliation. The responses to Part I were oral. (2) Part Ⅱ, Expectations, Part Ⅲ, Personal Relations, Part Ⅳ, Personal Feelings, and Part V, Attitudes and Activities of Patients were given to all of the subjects in a group meeting during the second week of the affiliation, and again, during the fourth week at the termination of the affiliation. Responses to Parts Ⅱ, Ⅲ, Ⅳ·, and V, were written. Each of the 100 statements of the questionnaire was considered to be either Positive or Negative. A favorable response was assigned the positive value of 1 and an unfavorable response was assigned the Negative value of O. The coefficient of correlation was computed between the two sets of scores for the fifty-three nursing students, The mean score, the standard deviation, and the differences in the means on each of the five parts of the questionnaire were computed and the relationships calculated by at-test. The results of the study were as follows; 1. There was no significant correlation between the two sets of the scores for the fifty-three nursing students during the four-week psychiatric affiliation. (r= 0.36) 2. There was no significant difference in the mean scores between the first and final tests for any of the questionnaire. 3. The Part Ⅰ, Preconceptions, data indicated collegiate nursing students have positive attitudes in preconceptions than non collegiate nursing students and preconceptions toward the psychiatric affiliation which affect their psychiatric nursing experience. 4. The Part Ⅱ, Expectations, data indicated more appropriate expectations of collegiate nursing students related to pre psychiatric affiliation orientation and sufficient theory learning than non-collegiate nursing students. 5. The Part Ⅲ, Personal relations, data indicated some students have negative attitudes in personal relations with normal people in respect to psychological security and social responsibilities. 6. The Part Ⅳ, Personal feelings, data indicated nursing students have psychological insecurity & inappropriateness. 7. The Part V, Attitudes and activities of patients, data indicated collegiate nursing students have more positive attitudes to the psychotic behavior of certain situations due to sufficient theory learning. 8. The data indicated collegiate·nursing students have more positive attitude than non-collegiate nursing students. 5. The Part Ⅲ, Personal relations, data indicated some students have negative attitudes in personal relations with normal people in respect to psychological security and social responsibilities. 6. The Part Ⅳ, Personal feelings, data indicated nursing students have psychological insecurity & inappropriateness. 7. The Part V, Attitudes and activities of patients, data indicated collegiate nursing students have more positive attitudes to the psychotic behavior of certain situations due to sufficient theory learning. 8. The data indicated collegiate·nursing students have more positive attitude than non-collegiate nursing students through psychiatric affiliation.

  • PDF

A Study on the Decision Factors for AI-based SaMD Adoption Using Delphi Surveys and AHP Analysis (델파이 조사와 AHP 분석을 활용한 인공지능 기반 SaMD 도입 의사결정 요인에 관한 연구)

  • Byung-Oh Woo;Jay In Oh
    • The Journal of Bigdata
    • /
    • v.8 no.1
    • /
    • pp.111-129
    • /
    • 2023
  • With the diffusion of digital innovation, the adoption of innovative medical technologies based on artificial intelligence is increasing in the medical field. This is driving the launch and adoption of AI-based SaMD(Software as a Medical Device), but there is a lack of research on the factors that influence the adoption of SaMD by medical institutions. The purpose of this study is to identify key factors that influence medical institutions' decisions to adopt AI-based SaMDs, and to analyze the weights and priorities of these factors. For this purpose, we conducted Delphi surveys based on the results of literature studies on technology acceptance models in healthcare industry, medical AI and SaMD, and developed a research model by combining HOTE(Human, Organization, Technology and Environment) framework and HABIO(Holistic Approach {Business, Information, Organizational}) framework. Based on the research model with 5 main criteria and 22 sub-criteria, we conducted an AHP(Analytical Hierarchy Process) analysis among the experts from domestic medical institutions and SaMD providers to empirically analyze SaMD adoption factors. The results of this study showed that the priority of the main criteria for determining the adoption of AI-based SaMD was in the order of technical factors, economic factors, human factors, organizational factors, and environmental factors. The priority of sub-criteria was in the order of reliability, cost reduction, medical staff's acceptance, safety, top management's support, security, and licensing & regulatory levels. Specifically, technical factors such as reliability, safety, and security were found to be the most important factors for SaMD adoption. In addition, the comparisons and analyses of the weights and priorities of each group showed that the weights and priorities of SaMD adoption factors varied by type of institution, type of medical institution, and type of job in the medical institution.

Design and Implementation of IoT based Low cost, Effective Learning Mechanism for Empowering STEM Education in India

  • Simmi Chawla;Parul Tomar;Sapna Gambhir
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.163-169
    • /
    • 2024
  • India is a developing nation and has come with comprehensive way in modernizing its reducing poverty, economy and rising living standards for an outsized fragment of its residents. The STEM (Science, Technology, Engineering, and Mathematics) education plays an important role in it. STEM is an educational curriculum that emphasis on the subjects of "science, technology, engineering, and mathematics". In traditional education scenario, these subjects are taught independently, but according to the educational philosophy of STEM that teaches these subjects together in project-based lessons. STEM helps the students in his holistic development. Youth unemployment is the biggest concern due to lack of adequate skills. There is a huge skill gap behind jobless engineers and the question arises how we can prepare engineers for a better tomorrow? Now a day's Industry 4.0 is a new fourth industrial revolution which is an intelligent networking of machines and processes for industry through ICT. It is based upon the usage of cyber-physical systems and Internet of Things (IoT). Industrial revolution does not influence only production but also educational system as well. IoT in academics is a new revolution to the Internet technology, which introduced "Smartness" in the entire IT infrastructure. To improve socio-economic status of the India students must equipped with 21st century digital skills and Universities, colleges must provide individual learning kits to their students which can help them in enhancing their productivity and learning outcomes. The major goal of this paper is to present a low cost, effective learning mechanism for STEM implementation using Raspberry Pi 3+ model (Single board computer) and Node Red open source visual programming tool which is developed by IBM for wiring hardware devices together. These tools are broadly used to provide hands on experience on IoT fundamentals during teaching and learning. This paper elaborates the appropriateness and the practicality of these concepts via an example by implementing a user interface (UI) and Dashboard in Node-RED where dashboard palette is used for demonstration with switch, slider, gauge and Raspberry pi palette is used to connect with GPIO pins present on Raspberry pi board. An LED light is connected with a GPIO pin as an output pin. In this experiment, it is shown that the Node-Red dashboard is accessing on Raspberry pi and via Smartphone as well. In the final step results are shown in an elaborate manner. Conversely, inadequate Programming skills in students are the biggest challenge because without good programming skills there would be no pioneers in engineering, robotics and other areas. Coding plays an important role to increase the level of knowledge on a wide scale and to encourage the interest of students in coding. Today Python language which is Open source and most demanding languages in the industry in order to know data science and algorithms, understanding computer science would not be possible without science, technology, engineering and math. In this paper a small experiment is also done with an LED light via writing source code in python. These tiny experiments are really helpful to encourage the students and give play way to learn these advance technologies. The cost estimation is presented in tabular form for per learning kit provided to the students for Hands on experiments. Some Popular In addition, some Open source tools for experimenting with IoT Technology are described. Students can enrich their knowledge by doing lots of experiments with these freely available software's and this low cost hardware in labs or learning kits provided to them.

A Study on People Counting in Public Metro Service using Hybrid CNN-LSTM Algorithm (Hybrid CNN-LSTM 알고리즘을 활용한 도시철도 내 피플 카운팅 연구)

  • Choi, Ji-Hye;Kim, Min-Seung;Lee, Chan-Ho;Choi, Jung-Hwan;Lee, Jeong-Hee;Sung, Tae-Eung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.2
    • /
    • pp.131-145
    • /
    • 2020
  • In line with the trend of industrial innovation, IoT technology utilized in a variety of fields is emerging as a key element in creation of new business models and the provision of user-friendly services through the combination of big data. The accumulated data from devices with the Internet-of-Things (IoT) is being used in many ways to build a convenience-based smart system as it can provide customized intelligent systems through user environment and pattern analysis. Recently, it has been applied to innovation in the public domain and has been using it for smart city and smart transportation, such as solving traffic and crime problems using CCTV. In particular, it is necessary to comprehensively consider the easiness of securing real-time service data and the stability of security when planning underground services or establishing movement amount control information system to enhance citizens' or commuters' convenience in circumstances with the congestion of public transportation such as subways, urban railways, etc. However, previous studies that utilize image data have limitations in reducing the performance of object detection under private issue and abnormal conditions. The IoT device-based sensor data used in this study is free from private issue because it does not require identification for individuals, and can be effectively utilized to build intelligent public services for unspecified people. Especially, sensor data stored by the IoT device need not be identified to an individual, and can be effectively utilized for constructing intelligent public services for many and unspecified people as data free form private issue. We utilize the IoT-based infrared sensor devices for an intelligent pedestrian tracking system in metro service which many people use on a daily basis and temperature data measured by sensors are therein transmitted in real time. The experimental environment for collecting data detected in real time from sensors was established for the equally-spaced midpoints of 4×4 upper parts in the ceiling of subway entrances where the actual movement amount of passengers is high, and it measured the temperature change for objects entering and leaving the detection spots. The measured data have gone through a preprocessing in which the reference values for 16 different areas are set and the difference values between the temperatures in 16 distinct areas and their reference values per unit of time are calculated. This corresponds to the methodology that maximizes movement within the detection area. In addition, the size of the data was increased by 10 times in order to more sensitively reflect the difference in temperature by area. For example, if the temperature data collected from the sensor at a given time were 28.5℃, the data analysis was conducted by changing the value to 285. As above, the data collected from sensors have the characteristics of time series data and image data with 4×4 resolution. Reflecting the characteristics of the measured, preprocessed data, we finally propose a hybrid algorithm that combines CNN in superior performance for image classification and LSTM, especially suitable for analyzing time series data, as referred to CNN-LSTM (Convolutional Neural Network-Long Short Term Memory). In the study, the CNN-LSTM algorithm is used to predict the number of passing persons in one of 4×4 detection areas. We verified the validation of the proposed model by taking performance comparison with other artificial intelligence algorithms such as Multi-Layer Perceptron (MLP), Long Short Term Memory (LSTM) and RNN-LSTM (Recurrent Neural Network-Long Short Term Memory). As a result of the experiment, proposed CNN-LSTM hybrid model compared to MLP, LSTM and RNN-LSTM has the best predictive performance. By utilizing the proposed devices and models, it is expected various metro services will be provided with no illegal issue about the personal information such as real-time monitoring of public transport facilities and emergency situation response services on the basis of congestion. However, the data have been collected by selecting one side of the entrances as the subject of analysis, and the data collected for a short period of time have been applied to the prediction. There exists the limitation that the verification of application in other environments needs to be carried out. In the future, it is expected that more reliability will be provided for the proposed model if experimental data is sufficiently collected in various environments or if learning data is further configured by measuring data in other sensors.

Resolution Method of Hazard Factor for Life Safety in Rental Housing Complex (임대주택단지의 생활안전 위해요인 해소방안)

  • Sohn, Jeong-Rak;Cho, Gun-Hee;Kim, Jin-Won;Song, Sang-Hoon
    • Land and Housing Review
    • /
    • v.8 no.1
    • /
    • pp.1-11
    • /
    • 2017
  • The government has been constructing and supplying public rental housing to ordinary people in order to stabilize housing since 1989. However, the public rental houses initially supplied to ordinary people are at high risk for safety accidents due to the deterioration of the facilities. Therefore, this study is aimed to propose a solution to solve the life safety hazards of the old rental housing complex as a follow-up study of Analysis of Accident Patterns and Hazard Factor for Life Safety in Rental Housing Complex. Types of life safety accidents that occur in public rental housing complexes are sliding, falling, crash, falling objects, breakage, fire accidents, traffic accidents and criminal accidents. The types of safety accidents that occur in rental housing complexes analyzed in this study are sliding, crashes, falling objects, and fire accidents. Although the incidence of safety accidents such as falling, breakage, traffic accidents and crime accidents in public rental housing complexes is low, these types are likely to cause safety accidents. The method of this study utilized interviews and seminar results, and it suggested ways to solve the life safety hazards in rental housing complexes. Interviews were conducted with residents and managers of rental housing complexes. Seminars were conducted twice with experts in construction, maintenance, asset management, housing welfare and safety. Through interviews and seminars, this study categorizes the life safety hazards that occur in rental housing complexes by types of accidents and suggests ways to resolve them as follows. (1) sliding ; use of flooring materials with high friction coefficient, installation of safety devices such as safety handles, implementation of maintenance, safety inspections and safety education, etc. (2) falling ; supplementation of safety facilities, Improvement of the design method of the falling parts, Safety education, etc. (3) crash ; increase the effective width of the elevator door, increase the effective width of the lamp, improve the lamp type (U type ${\rightarrow}$ I type), etc. (4) falling objects and breakage ; design of furniture considering the usability of residents, replacement of old facilities, enhancement of safety consciousness of residents, safety education, etc. (5) fire accidents ; installation of fire safety equipment, improvement by emergency evacuation, safety inspection and safety education, etc. (6) traffic accidents ; securing parking spaces, installing safety facilities, conducting safety education, etc. (7) criminal accidents; improvement of CCTV pixels, installation of street lights, removal of blind spots in the complex, securing of security, etc. The roles of suppliers, administrators and users of public rental housing proposed in this study are summarized as follows. Suppliers of rental housing should take into consideration the risk factors that may arise not only in the design and construction but also in the maintenance phase and should consider the possibility of easily repairing old facilities considering the life cycle of rental housing. Next, Administrators of rental housing should consider the safety of the users of the rental housing, conduct safety checks from time to time, and immediately remove any hazardous elements within the apartment complex. Finally, the users of the rental housing needs to form a sense of ownership of all the facilities in the rental housing complex, and efforts should be made not to cause safety accidents caused by the user's carelessness. The results of this study can provide the necessary information to enable residents of rental housing complexes to live a safe and comfortable residential life. It is also expected that this information will be used to reduce the incidence of safety accidents in rental housing complexes.