• Title/Summary/Keyword: safety target

Search Result 1,518, Processing Time 0.03 seconds

Analysis of Horticultural Activities in the Teacher's Guidebooks of Nuri Curriculum for 5-Year-Olds

  • Choi, Byung Jin;Jeong, Yeo Jin;Kim, Mi Jin;Yun, Suk Young
    • Journal of People, Plants, and Environment
    • /
    • v.23 no.2
    • /
    • pp.211-220
    • /
    • 2020
  • The purpose of this study was to analyze the frequency and contents of horticultural activities in 696 individual activities listed in 11 teacher's guidebooks of Nuri Curriculum for 5-year-olds, and to find out the perceptions of horticultural activities in the formal curriculum. The target horticultural activities that were selected were those using natural objects like potted plants, water, wind, soil, stones, etc. as the topic or subject of activities, and those with different topics but are mentioning plants or natural objects as an example at least twice. The 150 selected horticultural activities were classified by life-based theme, activity type, activity domain, and medium. As a result of examining horticultural activities by life-based theme, there were 150 horticultural activities (21.55%): 40 in Spring, Summer, Autumn and Winter (5.75%), 34 in Animals, Plants, and Nature (4.89%), 22 in Environment and Life (3.16%), 19 in Our Country (2.73%), and nine in Our Neighborhood (1.29%), nine in Various Countries of the World (1.29%), four in Health and Safety (0.57%), four in Living tools (0.57%), four in Transportation (0.57%), three in Kindergarten and Friends (0.43%), two in Me and My Family (0.29%; χ2=130.427, p < .001). As a result of examining horticultural activities by activity type, there were 61 free choice activities (40.67%), 80 large and small group activities (53.33%), and nine outdoor play activities (6.00%), indicating that outdoor play was the fewest activity type (χ2=54.040, p < .001). The results of analyzing horticultural activities by activity domain showed that there were 25 in conversation (16.67%), 19 in science (12.50%), 14 in art (9.33%), 14 in cooking (9.33%), 10 in fairy tales (6.00%), nine in music (6.00%), eight in language (5.33%), eight in number operation (5.33%), eight in others (5.33%), six in children's plays (4.0%), six in games (4.0%), four in body and movement (2.67%), three in stacking (2.00%), three in roles (2.00%), three in rhythm (2.00%), two in children's poems (1.33%), two in field experience (1.33%) and one in outside play (0.67%; χ2=87.600, p < .001). As a result of examining the mediums used in the horticultural activities, 46 activities (30.67%) directly used plants as the mediums, 11 activities (7.33%) used soil such as stones, gravel, and earth as the mediums instead of plants, four activities (2.67%) used dry plants such as branches and dry leaves as the mediums, and 89 activities (59.33%) used videos, photos of plants, and pictures of plants as the mediums (χ2=121.307, p < .001).

Implementation of Responsive Web-based Vessel Auxiliary Equipment and Pipe Condition Diagnosis Monitoring System (반응형 웹 기반 선박 보조기기 및 배관 상태 진단 모니터링 시스템 구현)

  • Sun-Ho, Park;Woo-Geun, Choi;Kyung-Yeol, Choi;Sang-Hyuk, Kwon
    • Journal of Navigation and Port Research
    • /
    • v.46 no.6
    • /
    • pp.562-569
    • /
    • 2022
  • The alarm monitoring technology applied to existing operating ships manages data items such as temperature and pressure with AMS (Alarm Monitoring System) and provides an alarm to the crew should these sensing data exceed the normal level range. In addition, the maintenance of existing ships follows the Planned Maintenance System (PMS). whereby the sensing data measured from the equipment is monitored and if it surpasses the set range, maintenance is performed through an alarm, or the corresponding part is replaced in advance after being used for a certain period of time regardless of whether the target device has a malfunction or not. To secure the reliability and operational safety of ship engine operation, it is necessary to enable advanced diagnosis and prediction based on real-time condition monitoring data. To do so, comprehensive measurement of actual ship data, creation of a database, and implementation of a condition diagnosis monitoring system for condition-based predictive maintenance of auxiliary equipment and piping must take place. Furthermore, the system should enable management of auxiliary equipment and piping status information based on a responsive web, and be optimized for screen and resolution so that it can be accessed and used by various mobile devices such as smartphones as well as for viewing on a PC on board. This update cost is low, and the management method is easy. In this paper, we propose CBM (Condition Based Management) technology, for autonomous ships. This core technology is used to identify abnormal phenomena through state diagnosis and monitoring of pumps and purifiers among ship auxiliary equipment, and seawater and steam pipes among pipes. It is intended to provide performance diagnosis and failure prediction of ship auxiliary equipment and piping for convergence analysis, and to support preventive maintenance decision-making.

Implementation of Specific Target Detection and Tracking Technique using Re-identification Technology based on public Multi-CCTV (공공 다중CCTV 기반에서 재식별 기술을 활용한 특정대상 탐지 및 추적기법 구현)

  • Hwang, Joo-Sung;Nguyen, Thanh Hai;Kang, Soo-Kyung;Kim, Young-Kyu;Kim, Joo-Yong;Chung, Myoung-Sug;Lee, Jooyeoun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.4
    • /
    • pp.49-57
    • /
    • 2022
  • The government is making great efforts to prevent crimes such as missing children by using public CCTVs. However, there is a shortage of operating manpower, weakening of concentration due to long-term concentration, and difficulty in tracking. In addition, applying real-time object search, re-identification, and tracking through a deep learning algorithm showed a phenomenon of increased parameters and insufficient memory for speed reduction due to complex network analysis. In this paper, we designed the network to improve speed and save memory through the application of Yolo v4, which can recognize real-time objects, and the application of Batch and TensorRT technology. In this thesis, based on the research on these advanced algorithms, OSNet re-ranking and K-reciprocal nearest neighbor for re-identification, Jaccard distance dissimilarity measurement algorithm for correlation, etc. are developed and used in the solution of CCTV national safety identification and tracking system. As a result, we propose a solution that can track objects by recognizing and re-identification objects in real-time within situation of a Korean public multi-CCTV environment through a set of algorithm combinations.

A Study on the Software Supply Chain Security Policy for the Strengthening of Cybersecurity: Based on SBOM Policy Cases (사이버안보 강화를 위한 소프트웨어 공급망 보안 정책 연구: SBOM 정책 추진 사례를 중심으로)

  • Son, Hyo-Hyun;Kim, Dong-Hee;Kim, So-Jeong
    • Journal of Digital Convergence
    • /
    • v.20 no.2
    • /
    • pp.9-20
    • /
    • 2022
  • Supply chain attacks target critical infrastructure, causing large amounts of damage and evolving into a threat to public safety and national security. Accordingly, when establishing cybersecurity strategies and policies, supply chain risk management is specified to enhance security, and the US Biden administration recently issued the Executive Order on Improving the Nation's Cybersecurity, SBOM was mentioned as part of the guidelines for strengthening software supply chain security. If the government mandates SBOM and uses it as a security verification tool for supply chains, it can be affected by the domestic procurement system in the future and can be referenced when establishing a security system for domestic supply chains according to the progress of policy implementation. Accordingly, in this paper, countries that are promoting the SBOM policy as a way to strengthen the security of the software supply chain were selected and analyzed with a focus on related cases. In addition, through comparison and analysis of foreign SBOM policy trends, methods for using domestic SBOM in terms of technology, policy, and law were considered. As the value of using SBOM as a supply chain integrity/transparency verification tool is expected in the future, it is necessary to continuously identify trends in the establishment of international standardization and policy development for SBOM and study the standard format.

Study of Decision Making Procedures for Follow-up Management of Water-friendly Riverfront (하천 내 친수지구의 사후관리 의사결정 절차 방법 연구)

  • Lee, Seung Yeon;Lee, Sang Eun;Kim, Na Hui;Lee, Seung Oh
    • Journal of Korean Society of Disaster and Security
    • /
    • v.14 no.4
    • /
    • pp.81-91
    • /
    • 2021
  • The reasonable decision making procedure for conducting follow-up management of water-friendly riverfront have been proposed in the national streams when the use of the level of usage for facility becomes degraded. It consists of two part usage: the selection of destination and the follow-up strategy with the alternatives. Considering the water-friendly riverfront grade derived from prior research, Grade IV and V were selected as candidates, and if the economic utility became low, it should be selected as candidates for the follow-up management. In addition, the basic plan for follow-up management was reviewed and alternatives suitable for the strategy could be derived considering the need for the operation of water-friendly riverfront in target site. The prior study on the follow-up decision making process of the water-friendly riverfront has not yet been confirmed, but since the life cycle of such facilities become almost expired, systematic procedures are needed to enable the use of administrative procedures for users' convenience and safety.

Development of Automated Statistical Analysis Tool using Measurement Data in Cable-Supported Bridges (특수교 계측 데이터 자동 통계 분석 툴 개발)

  • Kim, Jaehwan;Park, Sangki;Jung, Kyu-San;Seo, Dong-Woo
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.3
    • /
    • pp.79-88
    • /
    • 2022
  • Cable-supported bridges, as important large infrastructures, require a long-term and systematic maintenance strategy. In particular, various methods have been proposed to secure safety for the bridges, such as installing various types of sensor on members in the bridges, and setting management thresholds. It is evidently necessary to propose a strategic plan to efficiently manage increasing number of cable-supported bridges and data collected from a number of sensors. This study aims to develop an analysis tool that can automatically remove abnormal signals and calculate statistical results for the purpose of efficiently analyzing a wide range of data collected from a long span bridge measurement system. To develop the tool, basic information such as the types and quantity of sensors installed in long span bridges and signal characteristics of the collected data were analyzed. Thereafter, the Humpel filtering method was used to determine the presence or absence of an abnormality in the signal and then filtered. The statistical results with filtered data were shown. Finally, one cable-stayed bridge and one suspension bridge currently in use were chosen as the target bridges to verify the performance of the developed tool. Signal processing and statistical analysis with the tool were performed. The results are similar to the results reported in the existing work.

Post-Quantum Security Strength Evaluation through Implementation of Quantum Circuit for SIMECK (SIMEC 경량암호에 대한 양자회로 구현 및 Post-Quantum 보안 강도 평가)

  • Song Gyeong Ju;Jang Kyung Bae;Sim Min Joo;Seo Hwa Jeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.6
    • /
    • pp.181-188
    • /
    • 2023
  • Block cipher is not expected to be safe for quantum computer, as Grover's algorithm reduces the security strength by accelerating brute-force attacks on symmetric key ciphers. So it is necessary to check the post-quantum security strength by implementing quantum circuit for the target cipher. In this paper, we propose the optimal quantum circuit implementation result designed as a technique to minimize the use of quantum resources (qubits, quantum gates) for SIMECK lightweight cryptography, and explain the operation of each quantum circuit. The implemented SIMECK quantum circuit is used to check the estimation result of quantum resources and calculate the Grover attack cost. Finally, the post-quantum strength of SIMECK lightweight cryptography is evaluated. As a result of post-quantum security strength evaluation, all SIMECK family cipher failed to reach NIST security strength. Therefore, it is expected that the safety of SIMECK cipher is unclear when large-scale quantum computers appear. About this, it is judged that it would be appropriate to increase the block size, the number of rounds, and the key length to increase the security strength.

Assessing the Quality for Blood Transfusion Service since the 1st National Quality Assessment Program in South Korea (국내 1차 수혈 적정성 평가 시행에 따른 수혈서비스 질관리 현황)

  • Jin-Ah Kwon;Eun-Jeong Cho;A-Hyun Jung;Dong-Sook Kim
    • Quality Improvement in Health Care
    • /
    • v.28 no.2
    • /
    • pp.30-38
    • /
    • 2022
  • Purpose: The Health Insurance Review and Assessment Service (HIRA) in South Korea initiated a quality assessment (QA) program for blood transfusion healthcare services in 2020 to ensure patient safety and appropriate blood use. This study examines the quality of blood transfusion services since the first national QA program for blood transfusion services in Korea. Methods: We analyzed HIRA claims and QA investigation data based on inpatient medical records from all tertiary, general, and primary hospitals between October 2020 and March 2021. The target population was patients aged 18 years and older who received either total knee arthroplasty or red blood cell transfusion. The QA indicators for transfusion healthcare service consisted of four quality indicators and four monitoring indicators. Results: We analyzed the results of QA indicators for transfusion service from the medical records of 189,668 patients from 1,171hospitals and expressed indicators as proportions. The average results for evaluation indicators were as follows: transfusion checklist presence, 64.8%; irregular antibody tests, 61.8%; transfusions in which the hemoglobin levels before transfusion met the transfusion guidelines for patients undergoing total knee arthroplasty, 20.6%, and transfusions in patients undergoing total knee arthroplasty, 59.3%. The average results for monitoring indicators were as follows: transfusion management implementation in medical institutions, 56.9%; preoperative anemia management in anemia patients undergoing total knee arthroplasty, 43.9%; one-unit transfusions, 82.5%; and the transfusion index. Conclusion: The quality of blood transfusion healthcare varied and the assessment revealed that there is scope for improvement. Hospitals require more effective blood transfusion management and this can be facilitated by providing feedback on the QA results about blood transfusion healthcare services to medical institutions, and by disclosing the results to the public.

A Study on the Real-time Recognition Methodology for IoT-based Traffic Accidents (IoT 기반 교통사고 실시간 인지방법론 연구)

  • Oh, Sung Hoon;Jeon, Young Jun;Kwon, Young Woo;Jeong, Seok Chan
    • The Journal of Bigdata
    • /
    • v.7 no.1
    • /
    • pp.15-27
    • /
    • 2022
  • In the past five years, the fatality rate of single-vehicle accidents has been 4.7 times higher than that of all accidents, so it is necessary to establish a system that can detect and respond to single-vehicle accidents immediately. The IoT(Internet of Thing)-based real-time traffic accident recognition system proposed in this study is as following. By attaching an IoT sensor which detects the impact and vehicle ingress to the guardrail, when an impact occurs to the guardrail, the image of the accident site is analyzed through artificial intelligence technology and transmitted to a rescue organization to perform quick rescue operations to damage minimization. An IoT sensor module that recognizes vehicles entering the monitoring area and detects the impact of a guardrail and an AI-based object detection module based on vehicle image data learning were implemented. In addition, a monitoring and operation module that imanages sensor information and image data in integrate was also implemented. For the validation of the system, it was confirmed that the target values were all met by measuring the shock detection transmission speed, the object detection accuracy of vehicles and people, and the sensor failure detection accuracy. In the future, we plan to apply it to actual roads to verify the validity using real data and to commercialize it. This system will contribute to improving road safety.

A study on Korean welfare policy examined through Mokminsimseo (목민심서를 통해 한국적 복지정책에 대한 연구)

  • kim Bong wha
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.669-674
    • /
    • 2023
  • This study examined the specific contents of social welfare policies of the Joseon Dynasty through the analysis of Mokminsimseo, Aemin Sixjo and Jinhwang Yukjo, and identified the connection between them and today's social welfare policies. As a result, In the Care of the People, it contained the basic contents of the Elderly Welfare Act and welfare services for the elderly, and in the Freedom, it included welfare policy services related to infants and children, and the value system of welfare for the disabled through government affairs. The policy direction was confirmed, and it was found that disaster relief calls for social integration in response to social crises and disasters. This also confirmed that major areas of social welfare policy such as family safety, income security, health policy, and social integration have been emphasized through social welfare policy indicators. In addition, through the analysis of Qinhwangyukjo, it was found that it contains not only the basic ideology and values of the social security system and social insurance system in terms of visa, scale, and power, but also the details of specific policy implementation. Today's social welfare policies and social service policies, which are equipped with social welfare facilities and are implementing systematic social welfare services for each target, were able to confirm their foundation through the Qinhwangyukjo. This confirms that the emphasis on social integration and income security is prominent in the Qinhwangyukjo through the social welfare policy indicators of the current policy system.