• Title/Summary/Keyword: Security Screening

Search Result 91, Processing Time 0.033 seconds

A Multi-level Analysis of Factors Affecting Participation in Health Screenings in Korea: A Focus on Household and Regional Factors

  • Park, So Yoon;Shin, Young-jeon
    • Journal of Preventive Medicine and Public Health
    • /
    • v.55 no.2
    • /
    • pp.153-163
    • /
    • 2022
  • Objectives: This study divided the factors that affect participation in health screenings into individual, household, and regional levels and conducted a multi-level analysis to identify the factors related to participation in health screenings. Methods: Participants from the 2017 Community Health Survey were classified into 2 groups (under 40 and 40 or older). A multi-level logistic regression analysis was conducted to identify the factors that affected participation in health screenings. Results: The screening rate of the participants was 69.7%, and it was higher among participants aged 40 and older (80.3%) than it was among participants younger than 40 (49.8%). At the individual level, the factors that influenced participation in health screenings included age, economic activity, smoking status, physician-diagnosed hypertension, and a moderate or high physical activity level. At the household level, the odds ratio of participation in health screenings was high for participants who lived in single-person households, lived with a spouse, earned a high monthly household income, and were not beneficiaries of national basic livelihood security. At the regional level, the odds ratio at the 95% confidence interval level of participation in health screenings was high for participants who had trust in the local community and lived in an area with a proportionally high social welfare budget. Conclusions: This study analyzed nationalwide data and confirmed that individual, household, and regional characteristics affected participation in health screenings. Therefore, policies that prioritize the improvement of regional level factors and especially household level factors are likely to be the most effective for improving the screening rate.

A study on the implementation of Digital Cinema platform and its security system (디지털 시네마 플랫폼 구축과 보안에 관한 연구)

  • Kim Jong-An;Kim Jin-Han;Kim Jong-Heum
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2006.08a
    • /
    • pp.82-86
    • /
    • 2006
  • Film has been used widely since Auguste and Louis Lumiere hold the first private screening in 1895. Star Wars Episode II: Attack of the Clones directed by George Lucas released on May 16, was the first motion picture both to be shot completely on a high definition digital 24-frame system and to be projected by digital projectors. Its success showed us that the digital cinema era is imminent. Digital Cinema will enable the studios and movie distributors to low the expenses of making and delivering film prints and dissemination of it can put the entire digital cinema ecosystem in great jeopardy. Therefore DRM and other security policies are used for digital cinema content protection. In this paper it will be discussed how the digital cinema platform can package (encooe & encrypt), transport, and project the digital cinema contents safely.

  • PDF

Development of on-line Transient Security Assessment Algorithm (온라인 과도안전도 평가 알고리즘 개발)

  • Kim Y. H.;Cha S. T.;Kim T. K.;Kim H. K.;Jeon M. R.;Choo J. B;Nam H. K.
    • Proceedings of the KIEE Conference
    • /
    • summer
    • /
    • pp.91-93
    • /
    • 2004
  • This paper is to develope the fast screening algorithm for on line transient security assessment. All generators are represented in a classical model and stability index is defined as a ratio between acceleration power and deceleration power Critical machines and remaining machines are identified based on stability index and aggregated into two equivalent machines. And finally equivalent machines are reduced into OMIB system then CCT is computed. The Proposed algorithm is applied to the KEPCO system and obtained the reasonable results compared with TSA Tool.

  • PDF

Multi-Class Classification Framework for Brain Tumor MR Image Classification by Using Deep CNN with Grid-Search Hyper Parameter Optimization Algorithm

  • Mukkapati, Naveen;Anbarasi, MS
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.101-110
    • /
    • 2022
  • Histopathological analysis of biopsy specimens is still used for diagnosis and classifying the brain tumors today. The available procedures are intrusive, time consuming, and inclined to human error. To overcome these disadvantages, need of implementing a fully automated deep learning-based model to classify brain tumor into multiple classes. The proposed CNN model with an accuracy of 92.98 % for categorizing tumors into five classes such as normal tumor, glioma tumor, meningioma tumor, pituitary tumor, and metastatic tumor. Using the grid search optimization approach, all of the critical hyper parameters of suggested CNN framework were instantly assigned. Alex Net, Inception v3, Res Net -50, VGG -16, and Google - Net are all examples of cutting-edge CNN models that are compared to the suggested CNN model. Using huge, publicly available clinical datasets, satisfactory classification results were produced. Physicians and radiologists can use the suggested CNN model to confirm their first screening for brain tumor Multi-classification.

Success of a Cervical Cancer Screening Program: Trends in Incidence in Songkhla, Southern Thailand, 1989-2010, and Prediction of Future Incidences to 2030

  • Sriplung, Hutcha;Singkham, Phathai;Iamsirithaworn, Sopon;Jiraphongsa, Chuleeporn;Bilheem, Surichai
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.22
    • /
    • pp.10003-10008
    • /
    • 2014
  • Background: Cervical cancer has been a leading female cancer in Thailand for decades, and has been second to breast cancer after 2007. The Ministry of Public Health (MoPH) has provided opportunistic screening with Pap smears for more than 30 years. In 2002, the MoPH and the National Health Security Office provided countrywide systematic screening of cervical cancer to all Thai women aged 35-60 years under universal health care coverage insurance scheme at 5-year intervals. Objectives: This study characterized the cervical cancer incidence trends in Songkhla in southern Thailand using joinpoint and age period cohort (APC) analysis to observe the effect of cervical cancer screening activities in the past decades, and to project cervical cancer rates in the province, to 2030. Materials and Methods: Invasive and in situ cervical cancer cases were extracted from the Songkhla Cancer Registry from 1990 through 2010. Age standardized incidence rates were estimated. Trends in incidences were evaluated by joinpoint and APC regression models. The Norpred package was modified for R and was used to project the future trends to 2030 using the power of 5 function and cut trend method. Results: Cervical cancer incidence in Songkhla peaked around 1998-2000 and then dropped by -4.7% per year. APC analysis demonstrated that in situ tumors caused an increase in incidence in early ages, younger cohorts, and in later years of diagnosis. Conclusions: Both joinpoint and APC analysis give the same conclusion in continuation of a declining trend of cervical cancer to 2030 but with different rates and the predicted goal of ASR below 10 or even 5 per 100,000 women by 2030 would be achieved. Thus, maintenance and improvement of the screening program should be continued. Other population based cancer registries in Thailand should analyze their data to confirm the success of cervical cancer screening policy of Thailand.

A Study on The Security Measures of Insurance Crimes (보험범죄의 보안대책에 관한 연구)

  • Park, Hyung Sik
    • Convergence Security Journal
    • /
    • v.16 no.6_2
    • /
    • pp.53-60
    • /
    • 2016
  • Security measures for the current insurance crime has focused on the capture oriented and reactive response in the screening stage of insurance payments. However, since leaving the damages that can not be healed by post-punishment, it is necessary to take measures to prevent the insurance crimes in advance. In this paper, I would like to try to identify problems through analyzing the characteristics and cases of the insurance crimes, and to present alternatives to it. The problems with the current insurance system that causes the insurance crimes are, First, When signing the insurance contract, it is too inattentive to confirm about the credit status of the policyholder, duplicate join or not, whether voluntarily sign up etc. Second, a thorough investigation or criminal charges in case of insurance accident is not being done properly. Third, information exchange and management to malicious policyholders is not being done properly. Therefore, in order to guard people from insurance crimes, First, it should strengthen the audit of such credit conditions, accident experiences in the insurance contract at the policyholders. Second, we need to block insurance crimes in advance through the continuous upgrades of insurance fraud analysis systems and social network. Third, it is necessary to strengthen the surveillance systems for the insurance crimes by the information sharing.

The Security Constrained Economic Dispatch with Line Flow Constraints using the Multi PSO Algorithm Based on the PC Cluster System (PC 클러스터 기반의 Multi-HPSO를 이용한 안전도 제약의 경제급전)

  • Jang, Se-Hwan;Kim, Jin-Ho;Park, Jong-Bae;Park, June-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.58 no.9
    • /
    • pp.1658-1666
    • /
    • 2009
  • This paper proposes an approach of Mult_HPSO based on the PC cluster system to reduce or remove the stagnation on an early convergence effect of PSO, reduce an execution time and improve a search ability on an optimal solution. Hybrid PSO(HPSO) is combines the PSO(Particle Swarm Optimization) with the mutation of conventional GA(Genetic Algorithm). The conventional PSO has operated a search process in a single swarm. However, Multi_PSO operates a search process through multiple swarms, which increments diversity of expected solutions and reduces the execution time. Multiple Swarms are composed of unsynchronized PC clusters. We apply to SCED(security constrained economic dispatch) problem, a nonlinear optimization problem, which considers line flow constraints and N-1 line contingency constraints. To consider N-1 line contingency in power system, we have chosen critical line contingency through a process of Screening and Selection based on PI(performace Index). We have applied to IEEE 118 bus system for verifying a usefulness of the proposed approaches.

Application Plan of U.S Aviation Profiling for Prevention of Air Terrorism in Korea (항공테러 예방을 위한 미국 항공프로파일링 기법의 국내 활용방안)

  • Yang, Seung-Don;Yang, Young-Mo
    • Korean Security Journal
    • /
    • no.38
    • /
    • pp.33-56
    • /
    • 2014
  • This study is aim to make use of prevention of air terrorism and strengthen of air security in Korea. To achieve it. searching main feature in U.S aviation profiling. Aviation profiling in U.S used to Secure Flight, Screening Passengers by Observation Technique, Registered Travel Program. Through U.S Aviation Profiling, Prevention of air terrorism in Korea are as in the following. First, Through U.S Aviation Profiling, Information of terrorism constructed in advance and unification of constructed information. Second, Identifiying that institution exclusively for prevention of air terrorism. Third, Identifiying that human rights and privacy invasion to a minimun plan anout U.S aviation profiling. Finally, Identifiying that the spread of research development for prevention of air terrorism and strengthen of air security in Korea.

  • PDF

Screening Rice Cultivars for Resistance to Bacterial Leaf Blight

  • Fred, Agaba Kayihura;Kiswara, Gilang;Yi, Gihwan;Kim, Kyung-Min
    • Journal of Microbiology and Biotechnology
    • /
    • v.26 no.5
    • /
    • pp.938-945
    • /
    • 2016
  • Bacterial leaf blight (BLB) caused by Xanthomonas oryzae pv. oryzae (Xoo) is one of the most serious threats to rice production. In this study, screening of rice for resistance to BLB was carried out at two different times and locations; that is, in a greenhouse during winter and in an open field during summer. The pathogenicity of Xoo race K1 was tested on 32 Korean rice cultivars. Inoculation was conducted at the maximum tillering stage, and the lesion length was measured after 14 days of inoculation. Five cultivars, Hanareum, Namcheon, Samgdeok, Samgang, and Yangjo, were found to be resistant in both the greenhouse and open-field screenings. Expression of the plant defense-related genes JAmyb, OsNPR1, OsPR1a, OsWRKY45, and OsPR10b was observed in resistant and susceptible cultivars by qRT-PCR. Among the five genes tested, only OsPR10b showed coherent expression with the phenotypes. Screening of resistance to Xoo in rice was more accurate when conducted in open fields in the summer cultivation period than in greenhouses in winter. The expression of plant defense-related genes after bacterial inoculation could give another perspective in elucidating defense mechanisms by using both resistant and susceptible individuals.

Improved u-Healthcare Service Authentication Protocol based on RFID Technology (개선된 RFID 기술을 이용한 u-헬스케어 서비스 인증 프로토콜)

  • Ahn, Hae-Soon;Yoon, Eun-Jun;Bu, Ki-Dong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.10
    • /
    • pp.107-115
    • /
    • 2013
  • Recently, the RFID technology is combined with a u-healthcare services is an emerging trend in the field of medical services. u-healthcare service, as covering the field of personal health information beyond the level of simple health screening and treatment of life are closely related. Considering security, invasion of privacy, as well as life may be threatened even if your personal health information to be exposed or exploited illegally u-Healthcare services certification is essential. In 2012, Jeong proposed J-L patient authentication protocol that Initialization process, and patients using RFID technology separates the certification process. Jeong, such as the claim that the proposed protocol for reuse attacks, spoofing attacks, prevent information disclosure and traceability fire safety, but raises issues of security and operations efficiency. Therefore, in this paper, Jeong, such as the security of the proposed protocol and to prove the computational efficiency issues, and to enhance the safety and efficiency of RFID technology based on practical u-Healthcare services authentication protocol is proposed.