• Title/Summary/Keyword: User safety

Search Result 1,247, Processing Time 0.031 seconds

An Efficient Damage Information Extraction from Government Disaster Reports

  • Shin, Sungho;Hong, Seungkyun;Song, Sa-Kwang
    • Journal of Internet Computing and Services
    • /
    • v.18 no.6
    • /
    • pp.55-63
    • /
    • 2017
  • One of the purposes of Information Technology (IT) is to support human response to natural and social problems such as natural disasters and spread of disease, and to improve the quality of human life. Recent climate change has happened worldwide, natural disasters threaten the quality of life, and human safety is no longer guaranteed. IT must be able to support tasks related to disaster response, and more importantly, it should be used to predict and minimize future damage. In South Korea, the data related to the damage is checked out by each local government and then federal government aggregates it. This data is included in disaster reports that the federal government discloses by disaster case, but it is difficult to obtain raw data of the damage even for research purposes. In order to obtain data, information extraction may be applied to disaster reports. In the field of information extraction, most of the extraction targets are web documents, commercial reports, SNS text, and so on. There is little research on information extraction for government disaster reports. They are mostly text, but the structure of each sentence is very different from that of news articles and commercial reports. The features of the government disaster report should be carefully considered. In this paper, information extraction method for South Korea government reports in the word format is presented. This method is based on patterns and dictionaries and provides some additional ideas for tokenizing the damage representation of the text. The experiment result is F1 score of 80.2 on the test set. This is close to cutting-edge information extraction performance before applying the recent deep learning algorithms.

Work Environment Monitoring of Workers Using Wearable Sensor and Helmet (착용형 센서와 헬멧을 이용한 작업자의 작업환경 모니터링)

  • Gu, Ye-Jin;Kim, Jong-Jin;Chung, Wan-Young
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.20 no.2
    • /
    • pp.91-98
    • /
    • 2019
  • Accidents of worker that occur in isolated places are difficult to rescue, unlike general construction accidents. There is a problem of communication limitation when an accident occurs in an isolated place. Also, it is difficult to search the accident place due to the absence of CCTV. In order to solve these problems, this paper proposes a device that combines IoT technology with a safety helmet, which must be worn in the workplace. The proposed device additionally designs and implements a real-time PPG(Photoplethysmography) sensor, body temperature sensor, accelerometer sensor and a camera sensor on the helmet. The proposed helmet system allows the user and the control center to monitor the state of the worker. In addition, when an abnormal biological signal or fall occurs to the worker, the image is transmitted to the control center. By using the proposed system, it is possible to check the status of the worker in real time, so that it has an advantage that it can cope with the accident quickly.

Awareness and Wearing of Functional Fabrics Related with Health and Exercise Life of Silver Generation (노년층의 건강과 운동생활에 따른 기능성 소재의 인지 및 착용에 관한 연구)

  • Kim, Jung-Min;Sang, Jeong-Seon;Park, Myung-Ja
    • The Research Journal of the Costume Culture
    • /
    • v.18 no.1
    • /
    • pp.190-204
    • /
    • 2010
  • Understanding awareness and wearing behavior of functional textiles for silver generation is expected to contribute to clothing products development to improve and maintain their health and marketing strategy fit for user characteristics. For empirical research, a survey was developed and the aged 50 and above were 332 respondents. The results of the study are as follows. First, the level of awareness for both comfort-oriented and health/safetyoriented functional fabrics in high health-conscious group was much higher than that in low health-conscious group. In number of wearing times, health body and high-conscious group wear comfort-oriented fabrics more frequently, while weak body group wear health/safety-oriented fabrics more often. The health-consciousness significantly influenced the possession of active sportswear with various functions. Second, the awareness of functional fabrics in exercise activities groups was much higher than that in exercise-conscious groups. High exercise activities group know more about the wet sensation-related fabrics and clothing materials for outdoor activities. Low exercise-conscious group put on health/comfort-oriented fabrics for casuals more frequent than functional fabrics for sportswear. High exercise activities group preferred to wear sportswear suitable for outdoor activities. The aged people have a lot of health/comfort-oriented functional casual wear appropriate for indoor activities regardless of exercise-consciousness. However, the more they enjoy exercise activities the more they are interested in functional sportswear. Even though they were unconcerned with exercise, older people are interested in functional casual clothes. As a conclusion, the high interest in health and exuberant activities in silver generation arose the necessity of new multi-functional clothing products.

A COMPARISON STUDY OF SPACE RADIATION DOSE ANALYSIS PROGRAMS: SPENVIS SECTORING TOOL AND SIGMA II

  • Chae Jongwon
    • Bulletin of the Korean Space Science Society
    • /
    • 2004.10b
    • /
    • pp.347-350
    • /
    • 2004
  • A space radiation analysis has been used to evaluate an ability of electronic equipment boxes or spacecrafts to endure various radiation effects, so it helps design thicknesses of structure and allocate components to meet the radiation requirements. A comparison study of space radiation dose analysis programs SPENVIS Sectoring Tool (SST) and SIGMA II is conducted through some structure cases, simple sphere shell, box and representative satellite configurations. The results and a discussion of comparison will be given. A general comparison will be shown for understanding those programs. The both programs use the same strategy, solid angle sectoring with ray-tracing method to produce an approximate dose at points in representative simple and complex models of spacecraft structures. Also the particle environment data corresponding to mission specification and radiation transport data are used as input data. But there are distinctions between them. The specification of geometry model and its input scheme, the assignment of dose point and the numbers, the prerequisite programs and ways of representing results will be discussed. SST is a web-based interactive program for sectoring analysis of complex geometries. It may be useful for a preliminary dose assessment with user-friendly interfaces and a package approach. SIGMA II is able to obtain from RSICC (Radiation Safety Information Computational Center) as a FOR-TRAN 77 source code. It may be suitable for either parametric preliminary design or detailed final design, e.g. a manned flight or radiation-sensitive component configuration design. It needs some debugs, recompiling and a tedious work to make geometrical quadric surfaces for actual spacecraft configuration, and has poor documentation. It is recommend to vist RSICC homepage and GEANT4/SSAT homepage.

  • PDF

A Design of Certificate Management Method for Secure Access Control in IoT-based Cloud Convergence Environment (IoT기반 클라우드 융합환경에서 안전한 접근제어를 위한 인증서 관리기법 설계)

  • Park, Jung-Oh
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.7
    • /
    • pp.7-13
    • /
    • 2020
  • IoT which is the core IT of the 4th industrial revolution, is providing various services from users in the conversion with other industries. The IoT convergence technology is leading the communication paradigm of communication environment in accordance with the increase of convenience for users. However, it is urgently needed to establish the security measures for the rapidly-developing IoT convergence technology. As IoT is closely related to digital ethics and personal information protection, other industries should establish the measures for coping with threatening elements in accordance with the introduction of IoT. In case when security incidents occur, there could be diverse problems such as information leakage, damage to image, monetary loss, and casualty. Thus, this paper suggests a certificate management technique for safe control over access in IoT-based Cloud convergence environment. This thesis designed the device/user registration, message communication protocol, and device renewal/management technique. On top of performing the analysis on safety in accordance with attack technique and vulnerability, in the results of conducting the evaluation of efficiency compared to the existing PKI-based certificate management technique, it showed about 32% decreased value.

Secure Configuration Scheme of Pre-shared Key for Lightweight Devices in Internet of Things (사물인터넷의 경량화 장치를 위한 안전한 Pre-shared Key 설정 기술)

  • Kim, Jeongin;Kang, Namhi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.1-6
    • /
    • 2015
  • The IoT(Internet of things) technology enable objects around user to be connected with each other for sharing information. To support security is the mandatory requirement in IoT because it is related to the disclosure of private information but also directly related to the human safety. However, it is difficult to apply traditional security mechanism into lightweight devices. This is owing to the fact that many IoT devices are generally resource constrained and powered by battery. PSK(Pre-Shared Key) based approach, which share secret key in advance between communication entities thereafter operate security functions, is suitable for light-weight device. That is because PSK is costly efficient than a session key establishment approach based on public key algorithm. However, how to safely set a PSK of the lightweight device in advance is a difficult issue because input/output interfaces such as keyboard or display are constrained in general lightweight devices. To solve the problem, we propose and develop a secure PSK configuration scheme for resource constrained devices in IoT.

Driver Assistance System By the Image Based Behavior Pattern Recognition (영상기반 행동패턴 인식에 의한 운전자 보조시스템)

  • Kim, Sangwon;Kim, Jungkyu
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.12
    • /
    • pp.123-129
    • /
    • 2014
  • In accordance with the development of various convergence devices, cameras are being used in many types of the systems such as security system, driver assistance device and so on, and a lot of people are exposed to these system. Therefore the system should be able to recognize the human behavior and support some useful functions with the information that is obtained from detected human behavior. In this paper we use a machine learning approach based on 2D image and propose the human behavior pattern recognition methods. The proposed methods can provide valuable information to support some useful function to user based on the recognized human behavior. First proposed one is "phone call behavior" recognition. If a camera of the black box, which is focused on driver in a car, recognize phone call pose, it can give a warning to driver for safe driving. The second one is "looking ahead" recognition for driving safety where we propose the decision rule and method to decide whether the driver is looking ahead or not. This paper also shows usefulness of proposed recognition methods with some experiment results in real time.

Bone graft materials and its intended use (임상가를 위한 특집 1 - 뼈이식재 족보 바로 알고 사용하기)

  • Lee, Jeong-Keun
    • The Journal of the Korean dental association
    • /
    • v.48 no.4
    • /
    • pp.256-262
    • /
    • 2010
  • bone grafting is indicated in the case of bony defects and is classified into autograft, allograft, and xenograft. Synthetic bone graft is contrasted with these three categories in that it has a different donor source. Autograft is most prominent as it is known as a gold standard of all grafting procedures. Its principles and practices are well established via accumulated informations and clinical experiences, which imposes no regulations or restrictions in its clinical use. On the other hand, other bone graft procedures are under tight control for the safety and effectiveness of each product. Food and Drug Administration of the United States has a system in which the information on the approvals and clearances of bone graft materials on their internet homepage. All the bone graft materials that are under the regulations of the United States are classified into the category of medical devices, which includes allogenic bone, xenogenic bone, and synthetic bone graft materials. Each bone graft material has its own indication and the FDA approvals and clearances of medical devices contain the item of "intended use" to specify the indications of each bone graft materials. US dentists, as users of the specific bone graft materials, are provided with adequate information on the approved materials they are to utilize. As an user of these materials, Korean dentists are less provided with the information on the bone graft materials they want to use. Medical providers of the bone graft materials have to be able to provide their users with the essential information such as the intended use of the regulatory approval. Dentists must also be active in gathering informations on the material of their interest, and the system must be built in which both of the medical providers and users of bone graft materials can be satisfied in providing and getting the information, respectively.

Selective encryption technique according to class classification in LoRa environment (LoRa 환경에서의 Class 분류에 따른 선택적 암호화 기술)

  • Lee, Nam-gon;Kim, Keecheon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.285-287
    • /
    • 2017
  • Currently, the world of data communication is not simply communication between server and user in a wired way, but using wireless environment, various devices communicate with each other in a wider and diverse environment to generate a large amount of data. In this environment, IoT is now located deep in our lives, and IoT technologies are used in many tasks, but the data used in IoT is exposed without sufficient protection from malicious behavior. Most of these devices do not have enough computing power to cope with malicious attacks. In this paper, we aim to make all devices that have sufficient computing power and safety from simple sensors to be able to have security according to the situation. The proposed technology is based on the importance of the device and computing power, and it is possible to select the encryption technology selectively and to improve security.

  • PDF

The Researches in the Present State of Applying Smart Device in Vehicle and Implementing Bi-Directional Mirroring Services (Smart Device 차량 도입 현황 및 양방향 Mirroring 구현에 관한 연구)

  • Park, Hwa-Beom;Lee, Jean;Kim, Young-kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.127-130
    • /
    • 2017
  • The information and communication technology that is being developed recently has been greatly influencing the automobile market. In recent years, devices equipped with IT technology have been installed for the safety and convenience of the driver. It is necessary to develop a system that can link the Smartphone with the vehicle in accordance with these changes. In this paper, first of all we analyze the car connectivity services that served by the other competitors. In addition, we proposed and implemented the improved system that can support and control most of smart device application in vehicle by user's NEEDS. We also implemented the application that can restrict the applications which unsatisfied the drive regulations and designed and proposed the scenario that can apply our company's car connectivity system in future.

  • PDF