• 제목/요약/키워드: prevention focus

검색결과 717건 처리시간 0.024초

Real-time video Surveillance System Design Proposal Using Abnormal Behavior Recognition Technology

  • Lee, Jiyoo;Shin, Seung-Jung
    • International journal of advanced smart convergence
    • /
    • 제9권4호
    • /
    • pp.120-123
    • /
    • 2020
  • The surveillance system to prevent crime and accidents in advance has become a necessity, not an option in real life. Not only public institutions but also individuals are installing surveillance cameras to protect their property and privacy. However, since the installed surveillance camera cannot be monitored for 24 hours, the focus is on the technology that tracks the video after an accident occurs rather than prevention. In this paper, we propose a system model that monitors abnormal behaviors that may cause crimes through real-time video, and when a specific behavior occurs, the surveillance system automatically detects it and responds immediately through an alarm. We are a model that analyzes real-time images from surveillance cameras and uses I3D models from analysis servers to analyze abnormal behavior and deliver notifications to web servers and then to clients. If the system is implemented with the proposed model, immediate response can be expected when a crime occurs.

폐경 후 여성의 골다공증 유병 관련 요인 (Factors Related to Osteoporosis Prevalence in Postmenopausal Women)

  • 채현주
    • 근관절건강학회지
    • /
    • 제28권2호
    • /
    • pp.91-101
    • /
    • 2021
  • Purpose: This study was conducted to identify factors related to osteoporosis prevalence in postmenopausal women. Methods: This study was a secondary analysis research using data from the Eighth Korea National Health and Nutrition Examination Survey (KNHANES VIII-1), 2019, which were downloaded from the KNHANES website. The subjects of this study were 1,791 postmenopausal women who participated in the KNHANES VIII-1, 2019. Data analysis was performed using the IBM SPSS 21.0 program and complex sample design analysis was performed considering factors such as weight, cluster, and strata. Results: Osteoporosis prevalence of in postmenopausal women was 17.5%. Factors related to osteoporosis prevalence were age (65~74 years old, ≥75 years old), house income (low), household type (one-person household), postmenopausal period (10~19 years), drinking (non-drinking). Conclusion: Interventions for osteoporosis prevention and management in postmenopausal women need to focus on women less than 10 years after menopause and one-person household women. Furthermore, it is necessary to expand bone density testing for the early detection of osteoporosis in postmenopausal women.

Information and General Guidance for Healthcare Professionals in the Fourth Wave of COVID-19

  • Kim, Jeung-Im;Yu, Mi;Yu, Soyoung;Park, Jin-Hee
    • 대한간호학회지
    • /
    • 제51권4호
    • /
    • pp.395-407
    • /
    • 2021
  • The COVID-19 curve seesawed and reached the fourth pandemic in July 2021. Since the first three waves, the focus has been on achieving herd immunity through vaccination while a lot of manpower is used for quarantine. However, we have not been able to prevent the fourth wave. The causes are thought to be related to people who doubt the safety of the vaccine and refuse it or violate quarantine guidelines such as social distancing. This study examined guidelines for preventing and controlling COVID-19, the accuracy of vaccination-related information, and described quarantine measures including for those who completed vaccination. In conclusion, prevention and vaccination are the most effective countermeasures against COVID-19. We recommend people vaccination with self-quarantine. Also, it is necessary to make large investments to protect and support nurses in future pandemics.

DDoS attacks prevention in cloud computing through Transport Control protocol TCP using Round-Trip-Time RTT

  • Alibrahim, Thikra S;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • 제22권1호
    • /
    • pp.276-282
    • /
    • 2022
  • One of the most essential foundations upon which big institutions rely in delivering cloud computing and hosting services, as well as other kinds of multiple digital services, is the security of infrastructures for digital and information services throughout the world. Distributed denial-of-service (DDoS) assaults are one of the most common types of threats to networks and data centers. Denial of service attacks of all types operates on the premise of flooding the target with a massive volume of requests and data until it reaches a size bigger than the target's energy, at which point it collapses or goes out of service. where it takes advantage of a flaw in the Transport Control Protocol's transmitting and receiving (3-way Handshake) (TCP). The current study's major focus is on an architecture that stops DDoS attacks assaults by producing code for DDoS attacks using a cloud controller and calculating Round-Tripe Time (RTT).

A Hybrid PSO-BPSO Based Kernel Extreme Learning Machine Model for Intrusion Detection

  • Shen, Yanping;Zheng, Kangfeng;Wu, Chunhua
    • Journal of Information Processing Systems
    • /
    • 제18권1호
    • /
    • pp.146-158
    • /
    • 2022
  • With the success of the digital economy and the rapid development of its technology, network security has received increasing attention. Intrusion detection technology has always been a focus and hotspot of research. A hybrid model that combines particle swarm optimization (PSO) and kernel extreme learning machine (KELM) is presented in this work. Continuous-valued PSO and binary PSO (BPSO) are adopted together to determine the parameter combination and the feature subset. A fitness function based on the detection rate and the number of selected features is proposed. The results show that the method can simultaneously determine the parameter values and select features. Furthermore, competitive or better accuracy can be obtained using approximately one quarter of the raw input features. Experiments proved that our method is slightly better than the genetic algorithm-based KELM model.

대학생의 코로나19에 대한 인식 : 지식, 감염예방 가능성, 감염예방행동수칙 준수 중심으로 (COVID-19 Perception among college students: focus on knowledge, infection possibility, preventive possibility, and preventive behaviors)

  • 이영아
    • 한국응급구조학회지
    • /
    • 제26권2호
    • /
    • pp.47-59
    • /
    • 2022
  • Purpose: This study aimed to survey coronavirus disease (COVID-19) related knowledge, preventive possibility, and preventive behaviors levels among college students and identify the correlation between these variables. Methods: An online survey was conducted among college students from October 25 to November 5, 2021. The data were analyzed by an independent t-test and Pearson's correlations. Results: A total of 344 college students participated. The correct answer rate for COVID-19 knowledge level was high, infection and preventive possibility levels were moderate, and the anxiety level was high. Infection possibility had a positive correlation with anxiety and preventive behaviors had a positive correlation with preventive possibility. Conclusion: The findings regarding COVID-19 perception can be used to develop appropriate health policies for infectious disease prevention behaviors in educational fields.

Current scenario and future applicability of antivirals against herpes zoster

  • Sang Hun Kim
    • The Korean Journal of Pain
    • /
    • 제36권1호
    • /
    • pp.4-10
    • /
    • 2023
  • Herpes zoster (HZ) is a common disease in the aging population and immunocompromised individuals, with a lifetime risk of 20%-30% that increases with age. HZ is caused by reactivation of the varicella-zoster virus (VZV), which remains latent in the spinal dorsal root ganglia and cranial sensory ganglia after resolution of the primary VZV infection. The main focus of HZ management is rapid recovery from VZV infection as well as the reduction and prevention of zoster-associated pain (ZAP) and postherpetic neuralgia (PHN). The use of antivirals against VZV is essential in the treatment of HZ. However, limited antivirals are only licensed clinically for the treatment of HZ, including acyclovir, valacyclovir, famciclovir, brivudine, and amenamevir. Fortunately, some new antivirals against different types of Herpesviridae have been investigated and suggested as novel drugs against VZV. Therefore, this review focuses on discussing the difference in efficacy and safety in the currently licensed antivirals for the treatment of HZ, the applicability of future novel antivirals against VZV, and the preventive or therapeutic effects of these antivirals on ZAP or PHN.

수산물 품목분류 분쟁사례에 관한 연구-도시디쿠스(Dosidicus)속 기가스(Gigas)종 오징어 품목분류 사례를 중심으로 (Study on the Fishery Products Classification Dispute Cases - Focusing on the Classification of Dosidicus Gigas Squid Species )

  • 박민규
    • 수산경영론집
    • /
    • 제53권4호
    • /
    • pp.51-67
    • /
    • 2022
  • The Korean tariff rate for fishery products is a single tax rate of 10% for live fish and frozen seafood, and 20% for all others. Since FTAs have been concluded with several countries, the tariffs is not an appropriate means to protect domestic fishery producers. The differential tariff rate according to the scientific name (genus) of the fishery products, which was implemented 30 years ago to protect fishery products produced in the Korean coastal waters has lost its original purpose. It seems that future fishery trade policy should focus on IUU prevention, hygiene and safety of consumers rather than protecting fishery producers through customs tariffs. This paper suggest that a paradigm shift in the fishery producers protection policies such as direct financial support from the state, protection and development of fishery resources, and support for fostering the 6th industry rather than indirect protection through tariffs.

Burden of GI Cancer and Its Control Strategies in Korea

  • Kwang-Sig Lee;Eun-Cheol Park
    • Journal of Digestive Cancer Research
    • /
    • 제1권2호
    • /
    • pp.73-77
    • /
    • 2013
  • Gastrointestinal (GI) cancers are top priorities for cancer control in Korea. In terms of epidemiological, population-health and economic burden, GI cancers such as stomach, liver and colorectal cancers have been top four cancers in the nation during the past decade and this trend is likely to continue in the near future. In order to reduce the great burden of GI cancer in Korea, the nation might need the following strategies: (1) to put more focus on primary prevention on infection/diet and related research; (2) to improve screening rates for colorectal and stomach cancers, and conduct more cost-effectiveness analysis of these screening programs, e.g., Fecal Occult Blood Test vs. colonoscopy; (3) to establish a more consistent and integrative cost-effectiveness analysis system for new cancer treatments and anticancer drugs; and (4) to place more emphasis on hospice and other palliative care of GI cancer, as well as on the etiology, staging and treatment of pancreas cancer with its poor survival rate.

  • PDF

A Model to Investigate the Security Challenges and Vulnerabilities of Cloud Computing Services in Wireless Networks

  • Desta Dana Data
    • International Journal of Computer Science & Network Security
    • /
    • 제23권10호
    • /
    • pp.107-114
    • /
    • 2023
  • The study provides the identification of vulnerabilities in the security issues by Wireless Network. To achieve it the research focus on packet flow analysis, end to end data communication, and the security challenges (Cybercrime, insider threat, attackers, hactivist, malware and Ransomware). To solve this I have used the systematic literature review mechanisms and demonstrative tool namely Wireshark network analyzer. The practical demonstration identifies the packet flow, packet length time, data flow statistics, end- to- end packet flow, reached and lost packets in the network and input/output packet statics graphs. Then, I have developed the proposed model that used to secure the Wireless network solution and prevention vulnerabilities of the network security challenges. And applying the model that used to investigate the security challenges and vulnerabilities of cloud computing services is used to fulfill the network security goals in Wireless network. Finally the research provides the model that investigate the security challenges and vulnerabilities of cloud computing services in wireless networks