• Title/Summary/Keyword: Risk Potential

Search Result 2,999, Processing Time 0.027 seconds

Depressive Symptoms on the Geriatric Depression Scale and Suicide Deaths in Older Middle-aged Men: A Prospective Cohort Study

  • Yi, Sang-Wook
    • Journal of Preventive Medicine and Public Health
    • /
    • v.49 no.3
    • /
    • pp.176-182
    • /
    • 2016
  • Objectives: Prospective evaluations of the associations between depressive symptoms and suicide deaths have been mainly performed in high-risk populations, such as individuals with psychiatric disorders or histories of self-harm. The purpose of this study was to prospectively examine whether more severe depressive symptoms assessed using the Geriatric Depression Scale (GDS) were associated with a greater risk of death from suicide in a general-risk population. Methods: A total of 113 478 men from the Korean Veterans Health Study (mean age, 58.9 years) who participated in a postal survey in 2004 were followed up for suicide mortality until 2010. Results: Over 6.4 years of follow-up, 400 men died by suicide (56.7 deaths per 100 000 person-years). More severe depressive symptoms were associated with greater risk of suicide death (p for trend <0.001). The unadjusted hazard ratios (HRs) in comparison to the absence of depression were 2.18 for mild depression, 2.13 for moderate depression, 3.33 for severe depression, and 3.67 for extreme depression. After adjusting for potential confounders, men with a potential depressive disorder had an approximate 90% higher mortality from suicide (adjusted HR, 1.92; 95% confidence interval [CI], 1.38 to 2.68; p<0.001) than men without depression. Each five-point increase in the GDS score was associated with a higher risk of death by suicide (adjusted HR, 1.22; p<0.001). The value of the area under the receiver operating characteristics curve of GDS scores for suicide deaths was 0.61 (95% CI, 0.58 to 0.64). Conclusions: Depressive symptoms assessed using the GDS were found to be a strong independent predictor of future suicide. However, the estimate of relative risk was weaker than would be expected based on retrospective psychological autopsy studies.

An Analysis on the Influence of Smartphone Addiction by University Students of Radiological Science on School Life (방사선학과 대학생의 스마트폰 과의존이 대학교 생활적응에 미치는 영향 분석)

  • Jung, Hong-Ryang;Huang, Yuxin;Choi, JI-Hoon
    • Journal of radiological science and technology
    • /
    • v.42 no.5
    • /
    • pp.387-392
    • /
    • 2019
  • This study analyzed the influence of smartphone addiction on adaptation to school life by using the questionnaire survey method of 431 students of radiological science in six regions. The results showed that 89.6% of students are the general user group, 6.3% the high risk group and 4.2% the potential risk group. Adaptability to school life was found to be social adaptability 3.71, righteous adaptability 3.17 and academic adaptability 2.95. Academic adaptability was 3.06 for male students and 2.79 for female students. And righteous adaptability was 3.26 for male students and 3.03 for female students. As a result, male students were more adaptable than female students in academic adaptability and righteous adaptability, which was statistically significant. And Social adaptability was 3.73 for female students and 3.68 for male students, but there was no significant difference(p<.001). Adaptability to school life by smartphone addiction level was found to be the general user group 3.19, the potential risk group 3.05 and the high risk group 2.81. The difference of righteous adaptability between the general user group and the high risk group was statistically significant. And social and academic adaptability of the general user group and the high risk group was no significant(p<.01).

Dynamic Path Planning for Mobile Robots Using Fuzzy Potential Field Method (퍼지 포텐셜 필드를 이용한 이동로봇의 동적 경로 계획)

  • Woo, Kyoung-Sik;Park, Jong-Hun;Huh, Uk-Youl
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.61 no.2
    • /
    • pp.291-297
    • /
    • 2012
  • In this paper, potential field algorithm was used for path planning in dynamic environment. This algorithm is used to plan a robot path because of its elegant mathematical analysis and simplicity. However, there are some problems. The problems are problem of collision risk, problem of avoidance path, problem of time consumption. In order to solve these problems, we fused potential field with fuzzy system. The input of the fuzzy system is set using relative velocity and location of robot and obstacle. The output of the fuzzy system is set using the weighting factor of repulsive potential function. The potential field algorithm is improved by using fuzzy potential field algorithm and, path planning in various environment has been done.

A Review on Youth Risk Behavior Surveillance System of U.S.A (미국의 청소년 건강위험행위 감시체계에 관한 고찰)

  • Park, Eun-Ok
    • Journal of the Korean Society of School Health
    • /
    • v.18 no.2
    • /
    • pp.85-92
    • /
    • 2005
  • Purpose: This study reviews the Youth Risk Behavior Surveillance System (YRBSS) in the United States. This review focuses on the purposes, questionnaires, survey methods, and use of survey results. The author also discussesthe establishment and use of Korean Youth Risk Behavior Surveillance System. Results:The YRBSS was developed in 1990 to monitor priority health risk behaviors that contribute to the leading causes of death, disability, and social problems among youth and adults in the United States. The purpose of YRBSS is to determine the prevalence of health risk behaviors, to assess the trend of health risk behavior prevalence, provide comparable data, monitor progress toward achieving the Healthy People 2010. The questionnaires inquire about health-related behaviors, including tobacco use, unhealthydietary behaviors, inadequate physical activity, alcohol and drug use, sexual activity, behaviors that contribute to unintentional injuries and violence. The results of YRBS have been used to estimate the prevalence of risk behaviors among youth, to set goals for school health programs, for training and development of health program personnel, for the development of health education curriculum, to support enactment of health-related regulations, and to support funding for futher research. Conclusions: The YRBSS represents a potentially valuable program that can be applied in Korea. Assessment of risk behaviors among Korean youths will provide invaluable insight for many potential purposes.

Comparative Study of Probabilistic Ecological Risk Assessment (PERA) used in Developed Countries and Proposed PERA approach for Korean Water Environment (확률생태위해성평가(PERA) 선진국 사례분석 및 국내수계에 적합한 PERA 기법 제안)

  • An, Youn-Joo;Nam, Sun-Hwa;Lee, Woo-Mi
    • Journal of Korean Society on Water Environment
    • /
    • v.25 no.4
    • /
    • pp.494-501
    • /
    • 2009
  • Probabilistic Ecological risk assessment (PERA) is extensive approach to qualify and quantify risk on the multi species based on species sensitivity distribution (SSD). As a while, deterministic ecological risk assessment (DERA) considers the comparison of predicted no-effect concentration (PNEC) and predicted exposure concentration (PEC). DERA is used to determine if there is potential risk or no risk, and it doesn't consider the nature variability and the species sensitivity. But PERA can be more realistic and reasonable approach to estimate likelihood or risk. In this study, we compared PERA used in developed countries, and proposed PERA applicable for the Korean water environment. Taxonomic groups were classified as "class" level including Actinopterygill, Branchiopoda, Chlorophyceae, Maxillapoda, Insects, Bivalvia, Gastropoda, Secernentea, Polychaeta, Monocotyldoneae, and Chanophyceae in this study. Statistical extrapolation method (SEM), statistical extrapolation method $_{acutechronicratio}$ ($SEM_{ACR}$) and assessment factor method (AFM) were used to calculate the ecological protective concentration based on qualitative and quantitative levels of taxonomic toxicity data. This study would be useful to establish the PERA for the protection of aquatic ecosystem in Korea.

Library Risk Management and Insurance (도서관 리스크관리와 보험)

  • Chung, Hye-Kyoung
    • Journal of Information Management
    • /
    • v.31 no.4
    • /
    • pp.1-12
    • /
    • 2000
  • The potential risks, involved with the management of a library, may cause a tremendous economic loss, so require a systematic management. The rist management process, consisting of risk identification, risk measurement selection of risk treatment methods, implementation, and monitoring and evaluation, suggests the use of insurance to deal with property risks, liability risks and personnel risks. For the systematic risk management of a library, risk manager should be appointed to be responsible for program development and insurance purchase. The limited coverage of library risks, provided by the school cooperative society, should be supplemented through development of insurance products. Further study is required to improve the library risk management and the application of insurance in a systematic and realistic way.

  • PDF

Application of Toxicogenomic Technology for the Improvement of Risk Assessment

  • Hwang, Myung-Sil;Yoon, Eun-Kyung;Kim, Ja-Young;Son, Bo-Kyung;Jang, Dong-Deuk;Yoo, Tae-Moo
    • Molecular & Cellular Toxicology
    • /
    • v.4 no.3
    • /
    • pp.260-266
    • /
    • 2008
  • Recently, there has been scientific discussion on the utility of -omics techniques such as genomics, proteomics, and metabolomics within toxicological research and mechanism-based risk assessment. Toxicogenomics is a novel approach integrating the expression analysis of genes (genomic) or proteins (proteomic) with traditional toxicological methods. Since 1999, the toxicogenomic approach has been extensively applied for regulatory purposes in order to understand the potential toxic mechanisms that result from chemical compound exposures. Therefore, this article's purpose was to consider the utility of toxicogenomic profiles for improved risk assessment, explore the current limitations in applying toxicogenomics to regulation, and finally, to rationalize possible avenues to resolve some of the major challenges. Based on many recent works, the significant impact toxicogenomic techniques would have on human health risk assessment is better identification of toxicity pathways or mode-of-actions (MOAs). In addition, the application of toxicogenomics in risk assessment and regulation has proven to be cost effective in terms of screening unknown toxicants prior to more extensive and costly experimental evaluation. However, to maximize the utility of these techniques in regulation, researchers and regulators must resolve many parallel challenges with regard to data collection, integration, and interpretation. Furthermore, standard guidance has to be prepared for researchers and assessors on the scientifically appropriate use of toxicogenomic profiles in risk assessment. The National Institute of Toxicological Research (NITR) looks forward to an ongoing role as leader in addressing the challenges associated with the scientifically sound use of toxicogenomics data in risk assessment.

Development of RBI Procedures and Implementation of a Software Based on API Code (III) - Quantitative Approach (API 기준에 근거한 RBI 절차 개발 및 소프트웨어의 구현 (III) - 정량적 접근법 -)

  • 송정수;심상훈;최송천;윤기봉
    • Journal of the Korean Society of Safety
    • /
    • v.18 no.1
    • /
    • pp.56-63
    • /
    • 2003
  • During the last decade, effort has been made f3r reducing maintenance cost for aged equipments and ensuring safety, efficiency and profitability of petrochemical and refinery plants. Hence, it was required to develop advanced methods which meet this need. RBI(Risk Based Inspection) methodology is one of the most promising technology satisfying the requirements in the field of integrity management. In this study, a quantitative assessment algorithm fir RBI based on the API 581 code was reconstructed for developing an RBI software. The user-friendly realRBI software is developed with a module for evaluating quantitative risk md financial risk using the potential consequence and the likelihood. Also, inspection planning module for inspection time and inspection method are included in it.

Effective Detection Technique of Near Miss using 4M Risk Assesment Methodology (4M 위험성평가 기법을 이용한 앗차사고의 효과적인 발굴기법)

  • Seo, Seong-Hwa;Weon, Jong-Il;Woo, Heung-Sik
    • Journal of the Korean Society of Safety
    • /
    • v.27 no.5
    • /
    • pp.164-170
    • /
    • 2012
  • In this study, a new technique for detecting near miss using 4M risk assessment method is suggested. Until now, the safety education with instances of near miss has just been progressed in most industrial settings, without any systematic guideline. By menas of appling 4M risk assessment method, the organized technique, which could effectively manage the fundamental prevention of industrial accident in advance, is developed. The organized technique of near miss-management suggested in this study will take an effective role in basically expanding the application of risk assessment method, as well as in contributing the activity of zero-accident as a safety guideline in hazardous workshops.

Trust and Risk based Access Control and Access Control Constraints

  • Helil, Nurmamat;Kim, Mu-Cheol;Han, Sang-Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.2254-2271
    • /
    • 2011
  • Access control in dynamic environments needs the ability to provide more access opportunities of information to users, while also ensuring protection information from malicious users. Trust and risk are essential factors and can be combined together in access control decision-making to meet the above requirement. In this paper, we propose the combination of the trust and risk in access control to balance information accessibility and protection. Access control decision is made on the basis of trustworthiness of users and risk value of permissions. We use potential relations between users and relations between permissions in access control. Our approach not only provides more access opportunities for trustworthy users in accessing permissions, but also enforces traditional access control constraints such as Chinese Wall policy and Separation of Duty (SoD) of Role-Based Access Control (RBAC) model in an effective way.