• Title/Summary/Keyword: 정보기술관리자

Search Result 2,016, Processing Time 0.029 seconds

Improvement of Certification Criteria based on Analysis of On-site Investigation of Good Agricultural Practices(GAP) for Ginseng (인삼 GAP 인증기준의 현장실천평가결과 분석에 따른 인증기준 개선방안)

  • Yoon, Deok-Hoon;Nam, Ki-Woong;Oh, Soh-Young;Kim, Ga-Bin
    • Journal of Food Hygiene and Safety
    • /
    • v.34 no.1
    • /
    • pp.40-51
    • /
    • 2019
  • Ginseng has a unique production system that is different from those used for other crops. It is subject to the Ginseng Industry Act., requires a long-term cultivation period of 4-6 years, involves complicated cultivation characteristics whereby ginseng is not produced in a single location, and many ginseng farmers engage in mixed-farming. Therefore, to bring the production of Ginseng in line with GAP standards, it is necessary to better understand the on-site practices of Ginseng farmers according to established control points, and to provide a proper action plan for improving efficiency. Among ginseng farmers in Korea who applied for GAP certification, 77.6% obtained it, which is lower than the 94.1% of farmers who obtained certification for other products. 13.7% of the applicants were judged to be unsuitable during document review due to their use of unregistered pesticides and soil heavy metals. Another 8.7% of applicants failed to obtain certification due to inadequate management results. This is a considerably higher rate of failure than the 5.3% incompatibility of document inspection and 0.6% incompatibility of on-site inspection, which suggests that it is relatively more difficult to obtain GAP certification for ginseng farming than for other crops. Ginseng farmers were given an average of 2.65 points out of 10 essential control points and a total 72 control points, which was slightly lower than the 2.81 points obtained for other crops. In particular, ginseng farmers were given an average of 1.96 points in the evaluation of compliance with the safe use standards for pesticides, which was much lower than the average of 2.95 points for other crops. Therefore, it is necessary to train ginseng farmers to comply with the safe use of pesticides. In the other essential control points, the ginseng farmers were rated at an average of 2.33 points, lower than the 2.58 points given for other crops. Several other areas of compliance in which the ginseng farmers also rated low in comparison to other crops were found. These inclued record keeping over 1 year, record of pesticide use, pesticide storages, posts harvest storage management, hand washing before and after work, hygiene related to work clothing, training of workers safety and hygiene, and written plan of hazard management. Also, among the total 72 control points, there are 12 control points (10 required, 2 recommended) that do not apply to ginseng. Therefore, it is considered inappropriate to conduct an effective evaluation of the ginseng production process based on the existing certification standards. In conclusion, differentiated certification standards are needed to expand GAP certification for ginseng farmers, and it is also necessary to develop programs that can be implemented in a more systematic and field-oriented manner to provide the farmers with proper GAP management education.

A Study on Smart Accuracy Control System based on Augmented Reality and Portable Measurement Device for Shipbuilding (조선소 블록 정도관리를 위한 경량화 측정 장비 및 증강현실 기반의 스마트 정도관리 시스템 개발)

  • Nam, Byeong-Wook;Lee, Kyung-Ho;Lee, Won-Hyuk;Lee, Jae-Duck;Hwang, Ho-Jin
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.32 no.1
    • /
    • pp.65-73
    • /
    • 2019
  • In order to increase the production efficiency of the ship and shorten the production cycle, it is important to evaluate the accuracy of the ship components efficiently during the drying cycle. The accuracy control of the block is important for shortening the ship process, reducing the cost, and improving the accuracy of the ship. Some systems have been developed and used mainly in large shipyards, but in some cases, they are measured and managed using conventional measuring instruments such as tape measure and beam, optical instruments as optical equipment, In order to perform accuracy control, these tools and equipment as well as equipment for recording measurement data and paper drawings for measuring the measurement position are inevitably combined. The measured results are managed by the accuracy control system through manual input or recording device. In this case, the measurement result is influenced by the work environment and the skill level of the worker. Also, in the measurement result management side, there are a human error about the lack of the measurement result creation, the lack of the management sheet management, And costs are lost in terms of efficiency due to consumption. The purpose of this study is to improve the working environment in the existing accuracy management process by using the augmented reality technology to visualize the measurement information on the actual block and to obtain the measurement information And a smart management system based on augmented reality that can effectively manage the accuracy management data through interworking with measurement equipment. We confirmed the applicability of the proposed system to the accuracy control through the prototype implementation.

Management and Use of Oral History Archives on Forced Mobilization -Centering on oral history archives collected by the Truth Commission on Forced Mobilization under the Japanese Imperialism Republic of Korea- (강제동원 구술자료의 관리와 활용 -일제강점하강제동원피해진상규명위원회 소장 구술자료를 중심으로-)

  • Kwon, Mi-Hyun
    • The Korean Journal of Archival Studies
    • /
    • no.16
    • /
    • pp.303-339
    • /
    • 2007
  • "The damage incurred from forced mobilization under the Japanese Imperialism" means the life, physical, and property damage suffered by those who were forced to lead a life as soldiers, civilians attached to the military, laborers, and comfort women forcibly mobilized by the Japanese Imperialists during the period between the Manchurian Incident and the Pacific War. Up to the present time, every effort to restore the history on such a compulsory mobilization-borne damage has been made by the damaged parties, bereaved families, civil organizations, and academic circles concerned; as a result, on March 5, 2004, Disclosure act of Forced Mobilization under the Japanese Imperialism[part of it was partially revised on May 17, 2007]was officially established and proclaimed. On the basis of this law, the Truth Commission on Forced Mobilization under the Japanese Imperialism Republic of Korea[Compulsory Mobilization Commission hence after] was launched under the jurisdiction of the Prime Minister on November 10, 2004. Since February 1, 2005, this organ has begun its work with the aim of looking into the real aspects of damage incurred from compulsory mobilization under the Japanese Imperialism, by which making the historical truth open to the world. The major business of this organ is to receive the damage report and investigation of the reported damage[examination of the alleged victims and bereaved families, and decision-making], receipt of the application for the fact-finding & fact finding; fact finding and matters impossible to make judgment; correction of a family register subsequent to the damage judgement; collection & analysis of data concerning compulsory mobilization at home and from abroad and writing up of a report; exhumation of the remains, remains saving, their repatriation, and building project for historical records hall and museum & memorial place, etc. The Truth Commission on Compulsory Mobilization has dug out and collected a variety of records to meet the examination of the damage and fact finding business. As is often the case with other history of damage, the records which had already been made open to the public or have been newly dug out usually have their limits to ascertaining of the diverse historical context involved in compulsory mobilization in their quantity or quality. Of course, there may happen a case where the interested parties' story can fill the vacancy of records or has its foundational value more than its related record itself. The Truth Commission on Compulsory mobilization generated a variety of oral history records through oral interviews with the alleged damage-suffered survivors and puts those data to use for examination business, attempting to make use of those data for public use while managing those on a systematic method. The Truth Commission on compulsory mobilization-possessed oral history archives were generated based on a drastic planning from the beginning of their generation, and induced digital medium-based production of those data while bearing the conveniences of their management and usage in mind from the stage of production. In addition, in order to surpass the limits of the oral history archives produced in the process of the investigating process, this organ conducted several special training sessions for the interviewees and let the interviewees leave their real context in time of their oral testimony in an interview journal. The Truth Commission on compulsory mobilization isn't equipped with an extra records management system for the management of the collected archives. The digital archives are generated through the management system of the real aspects of damage and electronic approval system, and they plays a role in registering and searching the produced, collected, and contributed records. The oral history archives are registered at the digital archive and preserved together with real records. The collected oral history archives are technically classified at the same time of their registration and given a proper number for registration, classification, and keeping. The Truth Commission on compulsory mobilization has continued its publication of oral history archives collection for the positive use of them and is also planning on producing an image-based matters. The oral history archives collected by this organ are produced, managed and used in as positive a way as possible surpassing the limits produced in the process of investigation business and budgetary deficits as well as the absence of records management system, etc. as the form of time-limit structure. The accumulated oral history archives, if a historical records hall and museum should be built as regulated in Disclosure act of forced mobilization, would be more systematically managed and used for the public users.

The Effects of Yongin-Emotional Management Training Program on the Improvement of Life Care in Patients with Chronic Schizophrenia (만성 조현병 환자의 라이프케어 증진을 위해 용인 정서관리 훈련 프로그램이 미치는 영향)

  • Lee, Eun-Young;Jin, Myung-Ja;Kim, Young-Woon
    • Journal of Korea Entertainment Industry Association
    • /
    • v.13 no.4
    • /
    • pp.385-400
    • /
    • 2019
  • We reviewed existing studies and proposed future research on the sustainability of short-term effects, and of the Yongin Emotion Management Training program (Y-EMT). In this study, we conducted Y-EMT to verify its effectiveness in relation to affective disorders associated with chronic schizophrenia. Thirty-five patients were assigned to the experimental group, and 35 to the control group. First, results of repeated-measures analysis supported the effectiveness of Y-EMT. Comparisons of the results on the pre-test with those for the 5-month and 1-year post-training tests showed significant differences in mean scores between the experimental and control groups. Furthermore, these differences persisted at the 2-year follow-up. Second, in the experimental group, interactions between emotional behavior and expression, self-efficacy, and changes in interpersonal relationships showed significant effects at 5 months after the program ended, and these effects continued to increase up to 1 year post-training. Taken together, the findings indicate that, to maintain the effects of therapy in patients with chronic schizophrenia, patients should undergo Y-EMT along with cognitive rehabilitation training and social skills training. Human relations training such as Y-EMT is most helpful for rehabilitation when it is paired with high levels of medication.

An Oral History Study of Overseas Korean Astronomer: John D. R. Bahng's Case (한국천문연구원 원외 원로 구술사연구 - 방득룡 전임 노스웨스턴 대학교 천문학 교수 사례 -)

  • Choi, Youngsil;Seo, Yoon Kyung;Lee, Hyung Mok
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.46 no.2
    • /
    • pp.73.4-74
    • /
    • 2021
  • 한국천문연구원은 2017년 제1차 구술채록사업에 이어 2020년 제2차 사업을 진행하면서 최초로 원외 원로에 대한 구술채록을 시도하였다. 국가 대표 천문연구의 산실로서 연구원 존재 의의를 확립하기 위하여 원내 원로에 국한되었던 구술자 대상을 확장한 것이다. 그 첫 외부 구술 대상자로 방득룡 전임 노스웨스턴 천문학과 교수를 선정하여 2020년 7월부터 준비단계에 들어갔다. 방득룡 전(前)교수가 첫 번째 한국천문연구원 원외 인사 구술자로 선정된 이유는, 그가 우리나라 천문대1호 망원경 구매 선정에 개입한 서신(1972년)이 자료로 남아있었기 때문이다. 한국천문연구원에서 2017년에 수행한 제1차 구술채록사업에서 구술자로 참여한 오병렬 한국천문연구원 원로가 기증한 사료들은 대부분 연구원 태동기 국립천문대 구축과 망원경 구매 관련 자료였으며 이 가운데 1972년 당시 과학기술처 김선길 진흥국장에게 Boller and Chivesns(사(社))의 반사경을 추천한 방득룡 전(前)교수의 서신은 한국 천문학 발전사에서 중요한 사료였다. 연구진은 이 자료를 시작으로, 방득룡 전(前)교수의 생존 여부와 문서고의 공기록물들에서 그의 흔적을 찾아가기 시작했다. 놀랍게도 그는 실제 세계와 한국천문연구원 문서고 깊숙이 기록물들 모두에서 상존하고 있었다. 1927년생인 방득룡 전(前)교수, Dr. John D. R.은 미국 플로리다 한 실버타운에서 건강한 정신으로 생존하여 있었고 연구진의 인터뷰에 흔쾌히 응했다. 2020년 9월 16일에 한국천문연구원 본원 세종홀 2층 회의실에서 영상통신회의로 그와의 구술인터뷰가 진행되었다. 이 구술인터뷰는 원외 인사가 대상이란 점 외에도 방법적으로는 전형적인 대면 방식이 아닌 영상 인터뷰였다는 점에서 코로나 시대의 대안이 되는 실험적 시도였다. 현대 한국천문학 발전사의 재조명 측면에서도 의미가 있었다. 1960년대 초반부터 1992년 정년퇴임까지 30년을 미국 유수 대학교 천문학과 교수로 재직하며 활발한 활동을 해 온 한국계 천문학자가 우리나라 최초 반사망원경 구매 선정에 적극 개입하였던 역사는, 공문서 자료들과 서신 사료들에 이어 그의 육성으로 나머지 의구심의 간극이 채워졌다. 또 구술자 개인이 주관적으로 중요하다고 여기는 '기억'이 중요한 아카이빙 콘텐츠 확장의 단초가 될 수 있다는 것을 보여줌으로써 구술사 연구에 있어서도 중요한 관점을 주었다. 애초 연구진이 방득룡 전(前)교수의 공식 기록에서 아카이빙의 큰 줄기로 잡았던 것은 1948년 도미, 1957년 위스콘신 대학교 천문학 박사학위 취득, 1962년부터 노스웨스턴 대학(일리노이주 에반스턴)의 천문학 교수진, 1992년 은퇴로 이어진 생애였다. 그러나 그와의 구술 준비 서신 왕래와 구술을 통하여 알게 된 그가 인생에서 중요시 여겼던 지점은, 1948년 도미 무렵 한국의 전쟁 전 상황과 당시 비슷한 시기에 유학한 한국 천문학자들의 동태, 그리고 1957년부터 1962년까지 프린스턴 대학교에서 M. Schwarzschild 교수와 L. Spitzer 교수를 보조하며 Stratoscope Project를 연구하였던 경험이었다. 기록학적 의미에서도, 전자를 통해서 그와 함께 동시대 한국 천문학을 이끌었던 인재들의 맥락정보를 얻을 수 있었으며, 후자를 통해서는 세계 천문학사에 큰 영향을 미친 석학에 대한 아카이브 정보와의 연계 지점과 방득룡 전(前)교수의 연구 근원을 찾을 수 있었다. 이들은 추후 방득룡 콘텐츠 서비스 시에 AIP, NASM, Lyman Spitzer 콘텐츠, 평양천문대, 화천조경천문대, 서울대와 연세대, 그리고 한국천문연구원까지 연계되어 전 세계 폭넓은 이용자들의 유입을 유도할 수 있는 검색 도구가 될 수 있다. 이번 방득룡 구술사 연구에서 구술자 개인의 주관적인 소회가 공식 기록이 다가갈 수 없는 역사적 실체에 일정 부분 가까울 수 있다는 것, 그리고 이를 통하여 개인의 역사는 공동체의 역사로 확장될 수 있다는 사실을 발견할 수 있었다. 또 연구진은 방득룡 전(前)교수의 회상을 통하여 구술자 개인의 시각으로 한국과 미국 천문학계의 공동체 역사를 재조명할 수 있었고, 이것을 아카이브 콘텐츠 확장 서비스에 반영할 수 있다는 기대를 가지게 되었다. 무엇보다 이 연구를 통하여 다양한 주제의 아카이브로 연동될 수 있는 주제어와 검색도구를 구술자 개인의 회상으로부터 유효하게 도출할 수 있다는 것을 확인하였다. 그리고 향후 한국천문 구술아카이브의 확장을 통하여 보다 다양한 활용과 연구 재활용의 선순환이 가능하다는 것도 알 수 있었다. 이는 최근 기록학계에서 대두되고 있는 LOD(Linked Open Data)의 방향성과도 흡사하여 한국천문학 구술사연구의 차세대 통합형 기록관리의 미래모형을 기대케 하는 대목이다.

  • PDF

A Study on Difficulty Factors of Youth Startups for Activating Local Startups (지역창업 활성화를 위한 청년창업 애로 요인에 관한 연구)

  • Ahn, Tae-Uk;Kang, Tae-Won
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.15 no.2
    • /
    • pp.67-80
    • /
    • 2020
  • This study has been conducted at a time when Korean government continues to extend support for youth startups as part of its policy to create jobs and the focus moves from career and employment to youth startups with a growing interest in the field of youth startups. Against this background, this study aims to identify difficulty factors of youth startups in areas besides the Seoul Metropolitan Area, seek ways to overcome difficulty factors, and propose policy implications. To this end, this study set five criteria and 25 sub-criteria to evaluate the difficulties of youth startups by reviewing previous studies and conducting literature review, and performing brainstorming method. The empirical analysis of the evaluation criteria was performed, using the analytic hierarchy process (AHP) method, on youths aged 19 to 39 in Gunsan area. The analysis results showed that the largest difficulty factors facing local youths include business model establishment, business administration and management, and startup funding in the criteria. As for sub-criteria, the largest difficulty factors are market information acquisition, technology commercialization, project feasibility, technology development, and new market pioneering in descending order. Local youths have much difficulty about the process of turning a business item into a product and commercializing it. According to a comparative analysis by gender, men were a relatively high difficulty in commercializing business models than women. men were a relatively high difficulty in commercializing business models than women. On the other hand, women were higher than men in all factors (management management, entrepreneurship, improvement of entrepreneurship system, and improvement of entrepreneurship awareness) except for factors affecting business model. In addition, the factors of entrepreneurship were found to be relatively different among young people (college students, prospective entrepreneurs, entrepreneurs). In conclusion, it was suggested that in order to revitalize youth entrepreneurship in the region, it is necessary to actively resolve the difficulties of business model commercialization rather than entrepreneurship funds. In addition, it is necessary to strategically support customized entrepreneurship support and situational administrative services because gender and hierarchical difficulties are different than general solutions. This study presented practical priorities and derivation methods for the entrepreneurship difficulties faced by local youth, and suggested measures and improvements for vitalizing local youth entrepreneurship in the future.

A Study on the RFID's Application Environment and Application Measure for Security (RFID의 보안업무 적용환경과 적용방안에 관한 연구)

  • Chung, Tae-Hwang
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.155-175
    • /
    • 2009
  • RFID that provide automatic identification by reading a tag attached to material through radio frequency without direct touch has some specification, such as rapid identification, long distance identification and penetration, so it is being used for distribution, transportation and safety by using the frequency of 125KHz, 134KHz, 13.56MHz, 433.92MHz, 900MHz, and 2.45GHz. Also it is one of main part of Ubiquitous that means connecting to net-work any time and any place they want. RFID is expected to be new growth industry worldwide, so Korean government think it as prospective field and promote research project and exhibition business program to linked with industry effectively. RFID could be used for access control of person and vehicle according to section and for personal certify with password. RFID can provide more confident security than magnetic card, so it could be used to prevent forgery of register card, passport and the others. Active RFID could be used for protecting operation service using it's long distance date transmission by application with positioning system. And RFID's identification and tracking function can provide effective visitor management through visitor's register, personal identification, position check and can control visitor's movement in the secure area without their approval. Also RFID can make possible of the efficient management and prevention of loss of carrying equipments and others. RFID could be applied to copying machine to manager and control it's user, copying quantity and It could provide some function such as observation of copy content, access control of user. RFID tag adhered to small storage device prevent carrying out of item using the position tracking function and control carrying-in and carrying-out of material efficiently. magnetic card and smart card have been doing good job in identification and control of person, but RFID can do above functions. RFID is very useful device but we should consider the prevention of privacy during its application.

  • PDF

Design and Implementation of a Protection and Distribution System for Digital Broadcasting Contents (디지털 방송 콘텐츠 보호 유통 시스템 설계 및 구현)

  • Lee Hyejoo;Choi BumSeok;Hong Jinwoo;Seo Jongwon
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.731-738
    • /
    • 2004
  • With the increase of digital content usages, the protection for digital content and intellectual property becomes more important. The DRM(digital rights management) technologies are applicable to protect not only any kind of digital contents but also intellectual property. Besides such techniques are required for recorded digital broadcasting contents due to introduction of digital broadcasting techniques and storage devices such as personal video recorder. The conventional protection scheme for broadcasting content is the CAS(conditional access system) by which the access of viewer is controlled on the specific channels or programs. The CAS prohibits the viewer from delivering the digital broadcasting content to other person, so it results in restriction of superdistribution on the digital broadcasting content. In this paper, for broadcast targeting unspecfic many people, we will design the service model of the protection and distribution of digital broadcasting content using encryption and license by employing the concept of DRM. The results of implementation are also shown to verify some functions of each component. An implemented system of this paper has some advantages that the recording of broadcast content is allowed on set-top-box and superdistribution is available by consumer. Hence it provides content providers and consumers with trustworthy environment for content protection and distribution.

Security-Enhanced Local Process Execution Scheme in Cloud Computing Environments (클라우드 컴퓨팅 환경에서 보안성 향상을 위한 로컬 프로세스 실행 기술)

  • Kim, Tae-Hyoung;Kim, In-Hyuk;Kim, Jung-Han;Min, Chang-Woo;Kim, Jee-Hong;Eom, Young-Ik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.5
    • /
    • pp.69-79
    • /
    • 2010
  • In the current cloud environments, the applications are executed on the remote cloud server, and they also utilize computing resources of the remote cloud server such as physical memory and CPU. Therefore, if remote server is exposed to security threat, every applications in remote server can be victim by several security-attacks. Especially, despite many advantages, both individuals and businesses often have trouble to start the cloud services according to the malicious administrator of the cloud server. We propose a security-enhanced local process executing scheme resolving vulnerability of current cloud computing environments. Since secret data is stored in the local, we can protect secret data from security threats of the cloud server. By utilizing computing resource of local computer instead of remote server, high-secure processes can be set free from vulnerability of remote server.

Provider Provisioned based Mobile VPN using Dynamic VPN Site Configuration (동적 VPN 사이트 구성을 이용한 Provider Provisioned 기반 모바일 VPN)

  • Byun, Hae-Sun;Lee, Mee-Jeong
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.1
    • /
    • pp.1-15
    • /
    • 2007
  • Increase in the wireless mobile network users brings the issue of mobility management into the Virtual Private Network (VPN) services. We propose a provider edge (PE)-based provider provisioned mobile VPN mechanism, which enables efficient communication between a mobile VPN user and one or more correspondents located in different VPN sites. The proposed mechanism not only reduces the IPSec tunnel overhead at the mobile user node to the minimum, but also enables the traffic to be delivered through optimized paths among the (mobile) VPN users without incurring significant extra IPSec tunnel overhead regardless of the user's locations. The proposed architecture and protocols are based on the BGP/MPLS VPN technology that is defined in RFC24547. A service provider platform entity named PPVPN Network Server (PNS) is defined in order to extend the BGP/MPLS VPN service to the mobile users. Compared to the user- and CE-based mobile VPN mechanisms, the proposed mechanism requires less overhead with respect to the IPSec tunnel management. The simulation results also show that it outperforms the existing mobile VPN mechanisms with respect to the handoff latency and/or the end-to-end packet delay.