• Title/Summary/Keyword: security technology

Search Result 6,557, Processing Time 0.034 seconds

Performance Ability after CPR Education of the ground workers in an airport (공항 지상 근무자의 심폐소생술 수행능력)

  • Shin, Ji-Hoon
    • The Korean Journal of Emergency Medical Services
    • /
    • v.13 no.3
    • /
    • pp.29-40
    • /
    • 2009
  • Objective : This study is an experimental study which is designed to examine the differences between knowledge and self-confidence before and after theory education(CPR PPT material) based on guidelines of CPR and emergency cardiac treatment of American Heart Association(AHA, 2005) and video self-instruction program for the general public by Korean Association of Cardiopulmonary Resuscitation(KACPR), trace CPR performance ability after CPR and AED education and investigate the accuracy of artificial respiration and chest compression, and know the difference in CPR performance abilities including AED. Methods : Subjects of this study include ground crews and staffs at M airport in G province equipped with emergency equipments for CPR according to Art. 47, Sec. 2 of Emergency Medical Law, airport police, rent-a-cops, security guard, quarantine officer, custom officer, and communication, electricity, civil engineering, facility management staff, airport fire fighting staff, air mechanic, traffic controller, and airport management team among airport facility management staffs. They were given explanation of necessity of research and 147 of 220 subjects who gave consent to this research but 73 who were absent from survey were excluded were used as subjects of this study. of 147 subjects, there were 102 men and 45 women. Results : 1) Knowledge score of CPR was $6.18{\pm}0.87$ before instruction and it was increased to $15.12{\pm}1.78$ after instruction, and there was statistically significant difference. 2) Self-confidence score in CPR was $3.16{\pm}0.96$ before instruction and it was increased to $7.05{\pm}0.75$ after instruction, and there was statistically significant difference. 3) Total average score in CPR performance ability after instruction was 7.46 out of 9, performance ability was highest in confirmation of response as 144(97.95%), follwed by request of help as 140(95.25%) and confirmation of respiration as 135(91.83%), and lowest in performing artificial respiration twice(gross elevation of chest) as 97(65.98%). Accuracy of artificial respiration(%) was $28.60{\pm}16.88$ and that of chest compression(%) was $73.10{\pm}22.16$. 4) Performance ability of AED after instruction showed proper performance in power on by 141(95.91%) and attaching pad by 135(91.83%), hand-off for analyzing rhythm showed 'accuracy' in 115(78.23%) and 'non-performance' in 32(21.77%), delivery of shock and hand-off confirmation showed 'accuracy' in 109(74.14%) and 'inaccuracy' in 38(25.86%), and beginning chest compression immediately after AED was done by 105(71.42%).

  • PDF

A Resilient Key Renewal Scheme in Wireless Sensor Networks (센서 네트워크에서 복원력을 지닌 키갱신 방안)

  • Wang, Gi-Cheol;Cho, Gi-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.2
    • /
    • pp.103-112
    • /
    • 2010
  • In sensor networks, because sensors are deployed in an unprotected environment, they are prone to be targets of compromise attack, If the number of compromised nodes increases considerably, the key management in the network is paralyzed. In particular, compromise of Cluster Heads (CHs) in clustered sensor networks is much more threatening than that of normalsensors. Recently, rekeying schemes which update the exposed keys using the keys unknown to the compromised nodes are emerging. However, they cause some security and efficiency problems such as single group key employment in a cluster, passive eviction of compromised nodes, and excessive communication and computation overhead. In this paper, we present a proactive rekeying scheme using renewals of duster organization for clustered sensor networks. In the proposed scheme, each sensor establishes individual keys with neighbors at network boot-up time, and these keys are employed for later transmissions between sensors and their CH. By the periodic cluster reorganization, the compromised nodes are expelled from network and the individual keys employed in a cluster are changed continuously. Besides, newly elected CHs securely agree a key with sink by informing their members to sink, without exchangingany keying materials. The simulation results shows that the proposed scheme remarkably improves the confidentiality and integrity of data in spite of the increase of compromised nodes. Also, they show that the proposed scheme exploits the precious energy resource more efficiently than SHELL.

A Review of Change Detection Techniques using Multi-temporal Synthetic Aperture Radar Images (다중시기 위성 레이더 영상을 활용한 변화탐지 기술 리뷰)

  • Baek, Won-Kyung;Jung, Hyung-Sup
    • Korean Journal of Remote Sensing
    • /
    • v.35 no.5_1
    • /
    • pp.737-750
    • /
    • 2019
  • Information of target changes in inaccessible areas is very important in terms of national security. Fast and accurate change detection of targets is very important to respond quickly. Spaceborne synthetic aperture radar can acquire images with high accuracy regardless of weather conditions and solar altitude. With the recent increase in the number of SAR satellites, it is possible to acquire images with less than one day temporal resolution for the same area. This advantage greatly increases the availability of change detection for inaccessible areas. Commonly available information in satellite SAR is amplitude and phase information, and change detection techniques have been developed based on each technology. Those are amplitude Change Detection (ACD), Coherence Change Detection (CCD). Each algorithm differs in the preprocessing process for accurate automatic classification technique according to the difference of information characteristics and the final detection result of each algorithm. Therefore, by analyzing the academic research trends for ACD and CCD, each technologies can be complemented. The goal of this paper is identifying current issues of SAR change detection techniques by collecting research papers. This study would help to find the prerequisites for SAR change detection and use it to conduct periodic detection research on inaccessible areas.

The Details and Outlook of Three Data Acts Amendment in South Korea: With a Focus on the Changes of Domestic Financial and Data Industry (데이터 3법 개정안의 내용과 전망: 국내 금융 및 데이터 산업계의 변화를 중심으로)

  • Kim, Eun-Chan;Kim, Eun-Young;Lee, Hyo-Chan;Yoo, Byung-Joon
    • Informatization Policy
    • /
    • v.28 no.3
    • /
    • pp.49-72
    • /
    • 2021
  • This study analyzes the major content, significances, and future outlook of Three Data Acts amendment enacted in August 2020 in South Korea, with the focus on their impact on the financial and data industries. It seems that the revision of the Credit Information Act will enable the specification of a business which had previously only been regulated as the business of credit inquiry, and also enable the domestic data industry to activate the MyData industry, data trading and platforms, and specify data pseudonymization and trading procedures. For the rational and efficient implementation of the amendments to the Three Data Acts, the Personal Information Protection Committee must be as transparent and lawful in its activities as possible, and fairness must be guaranteed. Even in the utilization of personal information, the development or complementation of the related data processing technologies is essential, and clear data processing methods and areas must be regulated. Furthermore, the amendments must be supported with guarantees and the systematization of a fair competitive system in the data market, stricter regulations on penalties for illegal acts related to data, establishment and strengthening of the related security systems, and reinforcement of the system of cooperation for data transfer.

Influencing Factors to Enrollment in Private Health Insurance and Medical Use by Life Cycle : Analysis of 2016-2019 Korea Welfare Panel (생애주기별 민간의료보험 가입 영향 요인 및 의료이용 행태 : 2016~2019년 한국복지패널자료를 사용하여)

  • Kim, Ji-On
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.10
    • /
    • pp.194-204
    • /
    • 2021
  • This study was conducted to find out the status and factors of private health insurance subscriptions by life cycle and to identify differences in medical usage behavior by life cycle. Using the SPSS 26 program as the 12th-15th (2016-2019) data of the Korea Welfare Panel, the difference subscriptions was identified as Chi-square by demo social and health characteristics of 58,223 people, and the factors affecting subscription were analyzed by polynomial logistic analysis and average analysis was performed for medical use behavior. As a result of the analysis, the biggest factor in purchasing private health insurance was household income, private health insurance coverage is the highest in growth period, and multiple subscriptions were made depending on household income. In youth, household income, spouse, and no disability, and middle age, household income, economic activities, spouses, and health levels were largely influential factors. The rate of private health insurance coverage in old age was the lowest, and low-income households, poor health levels, and people with disabilities were lower. The increase in medical use by private health insurance subscribers also occurred during growth and youth. It is necessary to strengthen the national health insurance coverage, and the role of private health insurance to supplement it should be established in time for the life cycle to complement each other, eliminating blind spots of medical security and maximizing people's health and well-being.

Analysis of Health Care Service Trends for The Older Adults Based on ICT (국내외 ICT기반 노인 건강관리 서비스 동향분석)

  • Lee, Sung-Hyun;Hong, Sung Jung;Kim, Kyung Mi
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.5
    • /
    • pp.373-383
    • /
    • 2021
  • Our society is aging rapidly. In this super-aged society, the increase in healthcare costs are considered a national problem that undermines the sustainability of social security. Various services for healthcare for the elderly have been promoted to address this. However, most of them have focused on healthcare after the outbreak of chronic diseases and lack preventive healthcare. Most of the preventive healthcare projects are only pilots. In this paper, the current status of health care services for senior citizens at home and abroad was analyzed and based on this, the limitations and improvements were analyzed to propose the establishment of IoT-based Total Silver Care Center. IoT-based Total Silver Care Center may be conveniently monitored the health status of the elderly through various sensors, medical devices, and smart bands. And based on this, it can improve the quality of nursing services through time-saving and work efficiency of nursing providers. In addition, health care interventions may be provided in a timely manner if there is a change in the health status of users. And real-time imaging systems can help overcome mental difficulties.

A study of the selection criteria for Localization of Military Weapon (무기체계 국산화 대상 선정기준 연구)

  • RYU, SEOKBEOM
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.4
    • /
    • pp.338-344
    • /
    • 2021
  • Elements that threaten domestic security, such as diplomatic changes in the four major powers surrounding the Korean Peninsula and restrictions on supply and demand of parts due to COVID-19, are constantly increasing. The importance of localizing weapon systems has grown to respond proactively to the threat. As localization is not conducted evenly by the field, it is necessary to change the criteria for selecting localization targets. Establishing standards for selecting targets is difficult due to a lack of research to identify targets. This paper emphasized that the smooth supply of parts from overseas should be examined to identify targets for localization. If suppliers are not distributed evenly in the market, there is a risk of potential supply problems. CRk and HHI, representing the market structure, were proposed as indicators for evaluating the degree of smoothness quantitatively. Among them, CRk is used in Korea to check the market concentration, but there is a limit in the subjectivity of the evaluator, so it cannot be applied without a separate study on the market structure. Therefore, HHI should be applied.

A Study on the Ransomware Detection System Based on User Requirements Analysis for Data Restoration (데이터 복원이 가능한 사용자 요구사항 분석기반 랜섬웨어 탐지 시스템에 관한 연구)

  • Ko, Yong-Sun;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.4
    • /
    • pp.50-55
    • /
    • 2019
  • Recently Ransomware attacks are continuously increasing, and new Ransomware, which is difficult to detect just with a basic vaccine, continuously has its upward trend. Various solutions for Ransomware have been developed and applied. However, due to the disadvantages and limitations of existing solutions, damage caused by Ransomware has not been reduced. Ransomware is attacking various platforms no matter what platform it is, such as Windows, Linux, servers, IoT devices, and block chains. However, most existing solutions for Ransomware are difficult to apply to various platforms, and there is a limit that they are dependent on only some specific platforms while operating. This study analyzes the problems of existing Ransomware detection solutions and proposes the onboard module based Ransomware detection system; after the system defines the function of necessary elements through analyzing requirements that can actually reduce the damage caused by the Ransomware from the viewpoint of users, it supports various OS without pre-installation and is able to restore data even after being infected. We checked the feasibility of each function of the proposed system through the analysis of the existing technology and verified the suitability of the proposed techniques to meet the user's requirements through the questionnaire survey of a total of 264 users of personal and corporate PC users. As a result of statistical analysis of the questionnaire results, it was found that the score of intent to introduce the system was at 6.3 or more which appeared to be good, and the score of intent to change from existing solution to the proposed system was at 6.0 which appeared to be very high.

Fire Detection using Deep Convolutional Neural Networks for Assisting People with Visual Impairments in an Emergency Situation (시각 장애인을 위한 영상 기반 심층 합성곱 신경망을 이용한 화재 감지기)

  • Kong, Borasy;Won, Insu;Kwon, Jangwoo
    • 재활복지
    • /
    • v.21 no.3
    • /
    • pp.129-146
    • /
    • 2017
  • In an event of an emergency, such as fire in a building, visually impaired and blind people are prone to exposed to a level of danger that is greater than that of normal people, for they cannot be aware of it quickly. Current fire detection methods such as smoke detector is very slow and unreliable because it usually uses chemical sensor based technology to detect fire particles. But by using vision sensor instead, fire can be proven to be detected much faster as we show in our experiments. Previous studies have applied various image processing and machine learning techniques to detect fire, but they usually don't work very well because these techniques require hand-crafted features that do not generalize well to various scenarios. But with the help of recent advancement in the field of deep learning, this research can be conducted to help solve this problem by using deep learning-based object detector that can detect fire using images from security camera. Deep learning based approach can learn features automatically so they can usually generalize well to various scenes. In order to ensure maximum capacity, we applied the latest technologies in the field of computer vision such as YOLO detector in order to solve this task. Considering the trade-off between recall vs. complexity, we introduced two convolutional neural networks with slightly different model's complexity to detect fire at different recall rate. Both models can detect fire at 99% average precision, but one model has 76% recall at 30 FPS while another has 61% recall at 50 FPS. We also compare our model memory consumption with each other and show our models robustness by testing on various real-world scenarios.

Development of IoT Searching System Missing Children by utilizing Open Source Hardware (오픈소스 하드웨어를 이용한 IoT 미아찾기 시스템)

  • Heo, Seong-Mu;Kim, Cha-Jong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.277-280
    • /
    • 2016
  • Currently, systems for finding missing children are composed of using communication between a QR code and RFID chip, as the use of a smartphone. However, the current systems for finding missing children have limitations in that children can only be found if there are people in the surrounding area; there is an economic burden on parents required to purchase a smartphone for their children; along with difficulties in finding the missing children without the assistance of those in the surrounding area in critical situations such as a kidnapping, due to the limited duration of the battery life. In order to solve such problems, approaches need to be made from two perspectives: having someone in the surrounding area; and absence of anyone in the surrounding area. This thesis is centered on the development of a IoT (Internet of Things) system for finding missing children that combines two methods, namely, the method of finding missing children without a guardian in the surrounding area -within the limited space in which AP is installed by using a beacon and open source hardware being highlighted as the IoT technology - and the method of finding missing children with the smartphone application in which each individual becomes the Access Point (AP). The Main purpose is to provide accurate information of missing children's location for the 2situations and it is found that the accuracy of smartphones APP is 97.7% and security device AP is 91.1%.

  • PDF