• Title/Summary/Keyword: combined protection

Search Result 382, Processing Time 0.023 seconds

The Interplay Between Supervisor Safety Support and Occupational Health and Safety Vulnerability on Work Injury

  • Yanar, Basak;Lay, Morgan;Smith, Peter M.
    • Safety and Health at Work
    • /
    • v.10 no.2
    • /
    • pp.172-179
    • /
    • 2019
  • Background: Workers exposed to hazards without adequate protections are at greater risk of injury and illness. Supervisor activities have also been associated with injury risk. We examined the interplay between supervisor safety support and occupational health and safety (OHS) vulnerability on workplace injury and illness. Methods: A survey was administered to 2,390 workers employed for more than 15 hrs/week in workplaces with at least five employees who had a direct supervisor. We examined the combined effects of hazard exposure with inadequate protection (OHS vulnerability) and supervisor support on workplace injury and illness, using additive interactions in log-binomial regression models. Results: OHS vulnerability and lack of supervisor support independently increased the likelihood of physical injuries at work. Crude and adjusted models showed that the risk of physical injury was at least 3.5 times higher among those experiencing both OHS vulnerability and a lack of supervisor support than individuals without OHS vulnerability and with a supportive direct supervisor. Workers who experienced vulnerability were at less risk if they had a supervisor who was supportive. Conclusion: In workplaces where workers experience one or more types of OHS vulnerability, having a supportive supervisor may play an important role in reducing the risk of injury and protecting workers.

A Study on the Video Privacy Protective Mechanism (영상 프라이버시 보호 메커니즘에 관한 연구)

  • Kim, Minsu;Kim, Jongmin;Kim, Sang-Choon
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.49-55
    • /
    • 2017
  • In case of security of IoT-based areas in ICBM industry, the anxiety about safety goes to extremes in public and national safety area, so that the demand for security service related to disaster/safety management is increasing. Like this, as a security service for safety, CCTVs are installed/operated for the purpose of maintenance of public order and crime prevention. Especially, as the recorded images are presented as crucial evidences of crimes, they are rapidly increasing. However, as adverse effects of CCTVs, it is highly possible to unintentionally leak personal information in the process of performing the original purpose, or to violate someone's privacy in case when such technologies are abused. Therefore, it would be necessary to have researches on the multilaterally-combined mechanism for the protection of image privacy.

Semantic Analysis of Information Assurance Concept : A Literature Review (문헌 연구를 통한 정보보증 개념의 구문 분석)

  • Kang, Ji-Won;Choi, Heon-jun;Lee, Hanhee
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.31-40
    • /
    • 2019
  • Today, information security (INFOSEC) as a discipline is gaining more and more importance according to the emergence and extension of the cyberspace. Originated from Joint Doctrine for Information Operation (Joint Pub 3-13) by the U.S. Department of Defense, 'information assurance (IA)' is the concept widely used in the relevant field. Grown from the practice of information security, it encompasses broader and more proactive protection that includes countermeasures and repair, security management throughout an information system (IS)'s life-cycle, and trustworthiness of an IS in the process of risk analysis. In Korea, many industry professionals tend to misunderstand IA, remaining unaware of the conceptual differences between IA and INFOSEC. On this account, the current study attempted to provide a combined definition of IA by reviewing relevant literature. This study showed the validity of the wordings used in the proposed definition phrase by phrase.

Twenty-one-year follow-up of variable onset MELAS syndrome with heteroplasmic nt3243A>G mtDNA mutation: A case report

  • Song, Wung Joo;Lee, Yoon Jin;Kang, Joon Won;Chang, Mea Young;Song, Kyu Sang;Kang, Dae Young;Kim, Sook Za
    • Journal of Genetic Medicine
    • /
    • v.16 no.1
    • /
    • pp.31-38
    • /
    • 2019
  • Mitochondrial encephalomyopathy, lactic acidosis, and stroke-like episodes (MELAS) syndrome is a maternally inherited mitochondrial disorder of which m.3243A>G is the most commonly associated mutation, resulting in an inability to meet the energy requirements of various organs. MELAS poses a diagnostic challenge owing to its multiple organ involvement and great clinical variability due to its heteroplasmic nature. We report three cases from a family who were initially misdiagnosed with myasthenia gravis or undiagnosed. Although there is no optimal consensus treatment approach for patients with MELAS because of the disease's heterogeneity, our 21-year-long therapy regimen of ${\text\tiny{L}}-arginine$, ${\text\tiny{L}}-carnitine$, and coenzyme Q10 supplementation combined with dietary management appeared to provide noticeable protection from the symptoms and complications. Prompt early diagnosis is important, as optimal multidisciplinary management and early intervention may improve outcomes.

A Study of the Factors Affecting the Intention to Use of Real Estate Crowdfunding (부동산 크라우드펀딩의 이용의도에 영향을 미치는 요인에 관한 연구)

  • Kim, Hye Sook;Kim, Yonghee;Chong, Kyung-Won;Choi, Jeongil
    • Journal of Information Technology Services
    • /
    • v.18 no.1
    • /
    • pp.13-26
    • /
    • 2019
  • This study analyzes the characteristics of lending-based crowdfunding of various crowdfunding models, identifies the factors affecting the use of the general public, and provides suggestions for the policies set by real estate crowdfunding businesses and related authorities. To analyze the service's adoption from a cognitive perspective, this study developed a new model that combined the Value-based Adoption Model (VAM), motivation theory, and a set of variables that take into account the characteristics of the real estate industry. For empirical analysis, survey was conducted from the general investors of real estate and valid 252 data were utilized by R 3.2.2. The results of this study showed that both government regulation and the perceived risk are hindering the perceived values and intention to use crowdfunding for real estate. In contrast, this research found that among the intrinsic motivation, enjoyment had a significant impact on the perceived value. In addition, it turned out that among the extrinsic motivation, market attractiveness, brand credibility, expected return, and safety and protection had significant impacts on the perceived value. Finally, it showed the perceived value of real estate crowdfunding had a positive impact on the intention to use.

Micronutrients as Supportive Care for Gastrointestinal Cancer Patients; Benefits and Concerns

  • Yoo-Sun Kim;Yuri Kim
    • Journal of Digestive Cancer Research
    • /
    • v.1 no.2
    • /
    • pp.82-88
    • /
    • 2013
  • Cancer is the first leading cause of death in Korea and the second leading cause of death in the USA. There is extensive research into prevention of cancer and the support of oncology patients with diet or dietary supplements. In vitro and in vivo animal studies have indicated that antioxidants, including beta-carotene, alpha-tocopherol, and ascorbic acid, can yield anti-cancer effects in addition to providing protection against oxidative damage. Although many observational studies have shown that consuming fruits and vegetables can reduce the risk of some cancers, the results of several large-scale human intervention trials testing the benefits of a single or combined higher-dose of individual micronutrients have been inconsistent. Cancer can cause profound metabolic and physiological changes which may affect patients' nutrient requirements. Although the optimal route of nutrient delivery is through diet, cancer patients often suffer symptoms that disrupt their food intake, including anorexia, premature satiety, altered taste and smell, and changes in bowel mobility. In particular, micronutrient deficits can slow postoperative healing, contribute to depression symptoms, and decrease immune competence. Cancer patients are generally motivated to take dietary supplements to improve responses to treatment and quality of life. The Physician's Health Study II (PHS II) randomized controlled trial reported recently that daily multivitamin supplementation significantly, albeit modestly, reduced the risk of total cancer. Although evidence of multivitamin use benefits is limited in cancer patients, taking dietary supplements with constituents in the range of the recommended daily allowance according to the Dietary Reference Intake (DRI) recommendation is generally considered to be safe.

  • PDF

Machine Learning Based Hybrid Approach to Detect Intrusion in Cyber Communication

  • Neha Pathak;Bobby Sharma
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.190-194
    • /
    • 2023
  • By looking the importance of communication, data delivery and access in various sectors including governmental, business and individual for any kind of data, it becomes mandatory to identify faults and flaws during cyber communication. To protect personal, governmental and business data from being misused from numerous advanced attacks, there is the need of cyber security. The information security provides massive protection to both the host machine as well as network. The learning methods are used for analyzing as well as preventing various attacks. Machine learning is one of the branch of Artificial Intelligence that plays a potential learning techniques to detect the cyber-attacks. In the proposed methodology, the Decision Tree (DT) which is also a kind of supervised learning model, is combined with the different cross-validation method to determine the accuracy and the execution time to identify the cyber-attacks from a very recent dataset of different network attack activities of network traffic in the UNSW-NB15 dataset. It is a hybrid method in which different types of attributes including Gini Index and Entropy of DT model has been implemented separately to identify the most accurate procedure to detect intrusion with respect to the execution time. The different DT methodologies including DT using Gini Index, DT using train-split method and DT using information entropy along with their respective subdivision such as using K-Fold validation, using Stratified K-Fold validation are implemented.

Create a hybrid algorithm by combining Hill and Advanced Encryption Standard Algorithms to Enhance Efficiency of RGB Image Encryption

  • Rania A. Tabeidi;Hanaa F. Morse;Samia M. Masaad;Reem H. Al-shammari;Dalia M. Alsaffar
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.129-134
    • /
    • 2023
  • The greatest challenge of this century is the protection of stored and transmitted data over the network. This paper provides a new hybrid algorithm designed based on combination algorithms, in the proposed algorithm combined with Hill and the Advanced Encryption Standard Algorithms, to increase the efficiency of color image encryption and increase the sensitivity of the key to protect the RGB image from Keyes attackers. The proposed algorithm has proven its efficiency in encryption of color images with high security and countering attacks. The strength and efficiency of combination the Hill Chipper and Advanced Encryption Standard Algorithms tested by statical analysis for RGB images histogram and correlation of RGB images before and after encryption using hill cipher and proposed algorithm and also analysis of the secret key and key space to protect the RGB image from Brute force attack. The result of combining Hill and Advanced Encryption Standard Algorithm achieved the ability to cope statistically

An indoor localization system for estimating human trajectories using a foot-mounted IMU sensor and step classification based on LSTM

  • Ts.Tengis;B.Dorj;T.Amartuvshin;Ch.Batchuluun;G.Bat-Erdene;Kh.Temuulen
    • International journal of advanced smart convergence
    • /
    • v.13 no.1
    • /
    • pp.37-47
    • /
    • 2024
  • This study presents the results of designing a system that determines the location of a person in an indoor environment based on a single IMU sensor attached to the tip of a person's shoe in an area where GPS signals are inaccessible. By adjusting for human footfall, it is possible to accurately determine human location and trajectory by correcting errors originating from the Inertial Measurement Unit (IMU) combined with advanced machine learning algorithms. Although there are various techniques to identify stepping, our study successfully recognized stepping with 98.7% accuracy using an artificial intelligence model known as Long Short-Term Memory (LSTM). Drawing upon the enhancements in our methodology, this article demonstrates a novel technique for generating a 200-meter trajectory, achieving a level of precision marked by a 2.1% error margin. Indoor pedestrian navigation systems, relying on inertial measurement units attached to the feet, have shown encouraging outcomes.

Study on Qiang embroidery patterns creative design based on Shape Grammars

  • Ruiyu Li;Xiajie Zhao
    • International Journal of Advanced Culture Technology
    • /
    • v.12 no.1
    • /
    • pp.51-59
    • /
    • 2024
  • Qiang ethnic group is one of the fifty-six ethnic minorities in China, and Qiang embroidery, as an important achievement of Qiang's intangible cultural heritage, is the precipitation and testimony of the history and culture of the Qiang ethnic group. However, with the development of the times, traditional and ancient Qiang embroidery is facing a dilemma due to the problem of a single form of communication. Therefore, it is necessary to add new communication media for Qiang embroidery to help it spread and develop better. In this paper, we extract the core representative patterns of Qiang embroidery, use the "shape grammars" as the rules of morphological changes, and generate new decorative pattern patterns with the characteristics of Qiang embroidery by adding, deleting, mirroring, rotating, and other relevant rules of changes, and combine the new patterns with the rules of formal beauty to combine the layout, which is then applied in the design of different cultural creations and products. The new patterns are combined with the rules of formal beauty and applied in the design of different cultural and creative products. To provide a quantitative method for the digital protection of Qiang embroidery in the new era of Chinese traditional art, and also provide new ideas for the industrialization application.