• Title/Summary/Keyword: 정보학대학

Search Result 27, Processing Time 0.033 seconds

An Analysis of Library and Information Science Curriculum in North America: Focusing on Subject Modules (북미대학의 문헌정보학 교과과정 운영 사례 분석 I - 교과 영역별 개설현황을 중심으로 -)

  • Choi, Sang-Ki;Ahn, In-Ja;Noh, Young-Hee;Kim, Ju-Sup
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.22 no.4
    • /
    • pp.145-167
    • /
    • 2011
  • This paper analyses the trends in library and information science curriculum in North America, in order to address the characteristics of the subject modules in LIS education institutions in advanced countries. The research is based on the related literature review and the analysis of universities' webpages. The analysis includes a comparison between GSLI and SIS, the curriculum and subject operations of Library and Information science courses, the number and kinds of core and optional modules and subjects.

The Characteristics of Recurrence on Intervention Cases of Child Protective Services: Application of Survival Analysis (아동보호서비스 개입사례의 재학대 특성 연구: 생존분석의 적용)

  • Jang, Hee Sun;Kim, Ki Hyun;Kim, Kyung Hee
    • Korean Journal of Family Social Work
    • /
    • no.54
    • /
    • pp.225-262
    • /
    • 2016
  • This article reports on the analysis of the patterns and frequency of recurrences of substantiated instances of maltreatment in the Child Protective System (CPS). The data was collected from 2012 to 2014 by the CPS. Five-thousand-five-hundred-forty-two cases were substantiated in 2012 and then 323 cases were exposed recurrence during that time. Most recurrence families experienced only one recurrence. Results from survival analyses instances indicated that risk of recurrence was greatest during the first one month following a report. The prior CPS report, multiple type of abuse, physical abuse, and services type was linked the pattern of recurrence of maltreatment. Also, victim's age and the number of problematic behavior, perpetrator's stress and social isolation, intra family member as perpetrator, prior CPS report, and the number of reports was linked recurrence.

Full mouth rehabilitation of a worn dentition using digital guided tooth preparation: a case report (과도한 구치부 마모를 보이는 환자에서 digital guided tooth preparation을 이용한 완전 구강 회복 증례)

  • Kim, Yong-Kyu;Yeo, In-Sung Luke;Yoon, Hyung-In;Lee, Jae-Hyun;Han, Jung-Suk
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.60 no.1
    • /
    • pp.80-90
    • /
    • 2022
  • With the development of digital dentistry, it is being applied in various ways of dental treatment. This case report presents the definitive prosthesis designed in advance with a re-established vertical dimension and the digital technology, which determined the amount of tooth preparation, in order to preserve as much tooth structure as possible in a patient with pathological wear of the posterior teeth and loss of vertical dimension. For accurate tooth preparation, the guides of the occlusal and axial surfaces were digitally and additively manufactured. Then, aesthetics and anterior guidance were established at the provisional stage. The information of the provisional restoration was delivered to the definitive stage by double scanning. The digital technology, including the virtual planning and the guided tooth removal, produced the definitive restorations satisfactory to both the patient and clinician.

An OpenPose-based Child Abuse Decision System using Surveillance Video (감시 영상을 활용한 OpenPose 기반 아동 학대 판단시스템)

  • Yoo, Hye-Rim;Lee, Bong-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.3
    • /
    • pp.282-290
    • /
    • 2019
  • Recently child abuse has occurred frequently in educational institutions such as daycare center and kindergarten. Therefore, government made it mandatory to install CCTVs, but it is not easy to inspect the CCTV images. In this paper, we propose a model for judging child abuse using CCTV images. First of all, child abuse is a physical abuse of children by adults, thus a model for classifying adults and children is needed. The existing Haar scheme uses the frontal image to classify adults and children. However, the OpenPose allows to classify adults and children regardless of frontal and side image. In this research, a child abuse judgment model was designed and implemented by applying characteristics of adult and child posture when a child was abused. Since the implemented system utilizes the currently installed CCTV image, it is possible to monitor the child abuse in real time without any additional installation, which enables us to cope with the abuse promptly.

Complete mouth rehabilitation with fixed implant-supported prosthesis using temporary denture and dental CAD-CAM (완전 무치악 환자에서 임시 의치와 치과용 CAD-CAM을 활용한 전악 고정성 임플란트 회복 증례)

  • Jeon, Sol;Yoon, Hyung-In;Lee, Jae-Hyun;Yeo, In-Sung Luke;Han, Jung-Suk
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.60 no.1
    • /
    • pp.100-109
    • /
    • 2022
  • Installation of dental implants at optimal angles and positions is critical in long-term stable implant-supported restorations. Surgery and prosthodontic procedures should be performed accurately as the treatment is planned. In this clinical case, Computer aided design and manufacturing technology was used not only to establish a precise surgical plan, but also to fabricate both provisional and definitive fixed prostheses. A surgical guide was designed to install the implants at proper positions for the definitive prostheses. The patient's esthetic information, which was necessary for the new provisional and definitive fixed prostheses, was obtained from the existing temporary dentures. Finally, the complete mouth fixed implant-supported rehabilitation using monolithic zirconia provided the patient with functionally and esthetically satisfactory prostheses.

Performance Comparison of Machine Learning Algorithms for Network Traffic Security in Medical Equipment (의료기기 네트워크 트래픽 보안 관련 머신러닝 알고리즘 성능 비교)

  • Seung Hyoung Ko;Joon Ho Park;Da Woon Wang;Eun Seok Kang;Hyun Wook Han
    • Journal of Information Technology Services
    • /
    • v.22 no.5
    • /
    • pp.99-108
    • /
    • 2023
  • As the computerization of hospitals becomes more advanced, security issues regarding data generated from various medical devices within hospitals are gradually increasing. For example, because hospital data contains a variety of personal information, attempts to attack it have been continuously made. In order to safely protect data from external attacks, each hospital has formed an internal team to continuously monitor whether the computer network is safely protected. However, there are limits to how humans can monitor attacks that occur on networks within hospitals in real time. Recently, artificial intelligence models have shown excellent performance in detecting outliers. In this paper, an experiment was conducted to verify how well an artificial intelligence model classifies normal and abnormal data in network traffic data generated from medical devices. There are several models used for outlier detection, but among them, Random Forest and Tabnet were used. Tabnet is a deep learning algorithm related to receive and classify structured data. Two algorithms were trained using open traffic network data, and the classification accuracy of the model was measured using test data. As a result, the random forest algorithm showed a classification accuracy of 93%, and Tapnet showed a classification accuracy of 99%. Therefore, it is expected that most outliers that may occur in a hospital network can be detected using an excellent algorithm such as Tabnet.

The Perception and Attitude of Pre-service Childcare Teachers on Child Abuse - Preparation with other Major Students - (예비보육교사의 아동학대 신고에 관한 인식과 태도: 타전공 대학생과의 비교)

  • Kim, Tae Yeon;Jung, Hyun Sim
    • Korean Journal of Child Education & Care
    • /
    • v.18 no.3
    • /
    • pp.65-75
    • /
    • 2018
  • Objective: The purpose of this study is to find out the perception on childe abuse of pre-service childcare teachers who will become the closest witnesses to child abuse, and also whether they have the proper knowledge and attitude to report abuse. Methods: Surveys were conducted at five universities in Seoul and Kyonggi-province. We investigated students from child development major, and additionally students from other majors as a comparative group. Results: The results of this study are as follows: First, pre-service childcare teachers' level of abuse severity was significantly higher than other major students. They were more aware of child abuse reporting system and reporting obligations than other major students. Second, pre-service teachers had higher intention of reporting then other major students. However, both groups barely know about child protection institution, and have negative perception on the effect of reporting. Conclusion/Implications: In conclusion, this study suggests that pre-service teachers are more aware of child abuse and willing to report than other major students, however it is necessary to increase the reliability of report effectiveness. Also, it provide implications for future policy-making related to child abuse by suggesting that information transmission and promotion through mass media is necessary and efforts should be made to reduce the risk of disclosure of the identity of the complainant in reporting abuse.

Research on Core Technology for Information Security Based on Artificial Intelligence (인공지능 기반 정보보호핵심원천기술 연구)

  • Sang-Jun Lee;MIN KYUNG IL;Nam Sang Do;LIM JOON SUNG;Keunhee Han;Hyun Wook Han
    • The Journal of Bigdata
    • /
    • v.6 no.2
    • /
    • pp.99-108
    • /
    • 2021
  • Recently, unexpected and more advanced cyber medical treat attacks are on the rise. However, in responding to various patterns of cyber medical threat attack, rule-based security methodologies such as physical blocking and replacement of medical devices have the limitations such as lack of the man-power and high cost. As a way to solve the problems, the medical community is also paying attention to artificial intelligence technology that enables security threat detection and prediction by self-learning the past abnormal behaviors. In this study, there has collecting and learning the medical information data from integrated Medical-Information-Systems of the medical center and introduce the research methodology which is to develop the AI-based Net-Working Behavior Adaptive Information data. By doing this study, we will introduce all technological matters of rule-based security programs and discuss strategies to activate artificial intelligence technology in the medical information business with the various restrictions.

Classifying Predominant Type and Examining Risk Factors for Recurrence of Child Maltreatment (아동학대사례의 잠재유형화와 유형별 재학대 위험요인)

  • Lee, Sang-Gyun;Lee, Bong Joo;Kim, Sewon;Kim, Hyun-Soo;Yoo, Joan P.;Jang, Hwa Jung;Chin, Meejung;Park, Ji-Myung
    • Korean Journal of Social Welfare Studies
    • /
    • v.48 no.3
    • /
    • pp.171-208
    • /
    • 2017
  • The purpose of this study is to classify the underlying and parsimonious types of child maltreatment and examine whether the effects of risk factors on child maltreatment recurrence differ by type of maltreatment. We utilized the multiyear national administrative data from the National Child Maltreatment Information System collected by Child Protection Agency in Korea. Of 26,921 child maltreatment victims reported and substantiated on or after January 1, 2012, 1,447 children who had recurrence of child maltreatment until December 31, 2015 were selected as maltreatment recurrence group and 4,580 children who had not experienced maltreatment since first substantiation were assigned as maltreatment non-recurrence group. Latent class analysis(LCA) and latent transition analysis(LTA) were used to group children with similar maltreatment subtypes into discrete classes of child maltreatment recurrence. Logistic regression is employed to examine the association between the child maltreatment predominant types and risk factors for recurrence. Results of LCA and LTA showed four latent classes representing predominant type of child maltreatment: 'physical abuse predominant type', 'emotional abuse predominant type', 'sexual abuse predominant type', and 'neglect type'. Significant differences in the effect of risk factors among latent classes were found in child's age and gender, perpetrator's gender, family poverty, biological parent as the perpetrator, domestic violence toward partner, perpetrator's alcoholic problem, insufficient parenting skills, and out-of-home care service, Based on these findings, results suggested how the typology can be used to guide decision about who to target in prevention and intervention programs, and which features of risk factors to target. Practice and policy implications as well as further research tasks were discussed in the lights of searching for useful and important strategies to prevent recurrence of child maltreatment.