• Title/Summary/Keyword: Active Management

Search Result 2,995, Processing Time 0.034 seconds

A Study of Men's Attitudes toward of their Image Chase (20대 남성이 이미지추구에 관한 연구)

  • Mun, Ji-Young;Kim, Jung-Won
    • Fashion & Textile Research Journal
    • /
    • v.6 no.6
    • /
    • pp.715-722
    • /
    • 2004
  • The social culture critics say that the current situation of the boom in pretty men happened because stereotyped notions of sex roles have changed. However, no scientific study has been done as yet to support this theory. Therefore, this study analyzed the present situation and examined it from many different points of view. I asked 600 men to fill out the questionnaire: 300 from Daegu and the other 300 from Seoul. I analyzed four 461 of them. The inner/outer image of Korean males in their 20s was analyzed into seven factors, a positive image, a progressive image, an affirmative image, a sensible image, an exemplary image, a conscious image, and an active image. The demographic result based on the inner/outer image factors showed a significant difference in ages for a sensible image, a conscious image, and an active image.

Stress and Coping of Manufacturing Male Workers (생산직 남성 근로자의 스트레스와 대처유형)

  • Choi, Hye Seon;Kim, Souk Young;Ahn, Hye Young;Kim, Duck Hee
    • Korean Journal of Occupational Health Nursing
    • /
    • v.16 no.2
    • /
    • pp.109-118
    • /
    • 2007
  • Purpose: The purpose of this study was to identify stress and coping patterns of manufacturing male workers. Method: Data were collected from 215 manufacturing male workers and analyzed by SPSS WIN 12.0 Results: The total job stress score was 41.41 and the mean of the daily hassles score was 1.60. Related to the coping type, direct-active coping was the highest among four types of coping. Indirect-active coping was the second, followed by direct-passive coping and indirect-passive coping. Job stress score and daily hassles score were highly correlated by passive coping types. Conclusion: Occupational health management program including coping strategy is required to relieve workers' stress.

  • PDF

A Reliability Optimization Problem of System with Mixed Redundancy Strategies (혼합 중복전략을 고려한 시스템 신뢰도 최적화 문제)

  • Kim, Heung-Seob;Jeon, Geon-Wook
    • IE interfaces
    • /
    • v.25 no.2
    • /
    • pp.153-162
    • /
    • 2012
  • The reliability is defined as a probability that a system will operate properly for a specified period of time under the design operating conditions without failure and it has been considered as one of the major design parameters in the field of industries. Reliability-Redundancy Optimization Problem(RROP) involves selec tion of components with multiple choices and redundancy levels for maximizing system reliability with constraints such as cost, weight, etc. However, in practice both active and cold standby redundancies may be used within a particular system design. Therefore, a redundancy strategy(active, cold standby) for each subsystem in order to maximize system reliability is considered in this study. Due to the nature of RROP, i.e. NP-hard problem, A Parallel Particle Swarm Optimization(PPSO) algorithm is proposed to solve the mathematical programming model and it gives consistently better quality solutions than existing studies for benchmark problems.

Children's Personality Traits, Parent Attachment, Parents' Marital Conflict, and Aggression/victimization Status (또래괴롭힘 집단에 따른 아동의 인성특성, 부모에 대한 애착 및 부모의 부부갈등)

  • 박보경;한세영;최미경;도현심
    • Journal of Families and Better Life
    • /
    • v.22 no.1
    • /
    • pp.45-54
    • /
    • 2004
  • To examine group differences among four groups divided by asgression/victimization status, 655 4th graders living in Seoul reported their perceptions of peer aggression, peer victimization, personality traits, parent attachment, and their parents' marital conflict. Peers of the subjects also reported their perceptions of peer aggression and peer victimization. Based on the scores of peer aggression and peer victimization, each child was classified into one of the four groups: nonvictimized aggressors, aggressive victims, passive victims, and normative contrasts. For boys, nonvictimized aggressors were more sociable/active than both aggressive and passive victims. Aggressive victims were more shy/emotional than nonvictimized aggressors and normative contrasts, and were exposed to the highest parental marital conflict. For girls, passive victims were the least sociable/active among the four groups, and showed lower attachment to fathers than normative contrasts. Both aggressive and passive victims were more shy/emotional than nonvictimized aggressors and normative contrasts, and normative contrasts were exposed to the lowest parental marital conflict.

액티브 보안 기술

  • 방효찬;나중찬;손승원;박치항
    • Information and Communications Magazine
    • /
    • v.19 no.8
    • /
    • pp.128-136
    • /
    • 2002
  • It is an active security that has the research field which has more powerful responding mechanism comparing to current network security technology, has an ability to introduce new security mechanism according to changing our environments, and can support effective security management. Our goal is to introduce a new category of internet security technologies on network survivability: active security technology. It is a new security technology that blocking network or computers. before malicious traffics are reached to them, including protecting hosts or small area network from hackers.

A Survey Study on the Development Model of Intelligent University Facilities (인텔리전트 대학시설 모형개발을 위한 실태조사 연구)

  • Bae, Jung-Ik;An, Byung-Wook;Park, Tong-So;Lee, Sang-Ho;Lee, Kyung-Hoi
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.5 no.1
    • /
    • pp.44-52
    • /
    • 1998
  • Nowadays, social environment is rapidly changed toward globalization and information age, and which demands the new paradigm for active utilization of information system in the field of education and many others. The effort to adapt tele-communication technique to educational facilities and the planning to make virtual university come true are needed immediately. Intelligent Building system should be applied to educational facilities to cope with the changing and progressing building system. As a result of the surveying eleven domestic universities, it was found that library management system, administration automation system and office automation system were already introduced, but campus infrastructure such as network system and tele-communication system between buildings in campus have been constructed now. As the conclusion of this study, impeding factors and improvement direction for active utilization of intelligent building systems in university facilities were presented.

  • PDF

A Review of the Potency of Plant Extracts and Compounds from Key Families as an Alternative to Synthetic Nematicides: History, Efficacy, and Current Developments

  • Mwamula, Abraham Okki;Kabir, Md. Faisal;Lee, DongWoon
    • The Plant Pathology Journal
    • /
    • v.38 no.2
    • /
    • pp.53-77
    • /
    • 2022
  • The global nematicides market is expected to continue growing. With an increasing demand for synthetic chemical-free organic foods, botanical nematicides are taking the lead as replacements. Consequently, in the recent years, there have been vigorous efforts towards identification of the active secondary metabolites from various plants. These include mostly glucosinolates and their hydrolysis products such as isothiocyanates; flavonoids, alkaloids, limonoids, quassinoids, saponins, and the more recently probed essential oils, among others. And despite their overwhelming potential, variabilities in quality, efficacy, potency and composition continue to persist, and commercialization of new botanical nematicides is still lagging. Herein, we have reviewed the history of botanical nematicides and regional progresses, the potency of the identified phytochemicals from the key important plant families, and deciphered some of the impediments involved in standardization of the active compounds in addition to the concerns over the safety of the purified compounds to non-target microbial communities.

Automated Representation of Active SLA's (능동형 서비스 수준 계약의 표현 자동화)

  • Kim, Sang-Rak;Bae, Jae-Hak J.
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.279-282
    • /
    • 2011
  • 최근 기업들이 SOA, 웹 서비스, 유틸리티 컴퓨팅, 클라우드 컴퓨팅 등과 같은 서비스 지향적인 컴퓨팅 환경에 관심을 가지면서 SLA(Service Level Agreement) 기반의 자동화된 계약관리의 수요가 증가하고 있다. 일반적으로 기업에서는 종이에 자연언어로 표현된 SLA를 사용하고 있다. 이를 SLM(Service Level Management) 시스템에서 이해하고 계약조항을 직접 실행시키는 한 방법으로서 본 논문에서는 ASLA(Active SLA) 도입을 제안하였다. ASLA에서는 계약조항이 내용이 Prolog로 표현 된다.사람이 계약조항을 분석하여 Prolog로 표현할 때는 사람에 따라 변환 결과가 달라질 수 있을 뿐만 아니라 작업시간이 많이 소요된다는 단점이 있다. 본 논문에서는 제한된 자연어로 작성된 SLA를 APE(Attempto Parsing Engine)를 사용하여 ASLA를 얻는 방법을 제안한다. 그 방법의 핵심은 SLA ${\rightarrow}$ [APE Parser] ${\rightarrow}$ DRS(Discource Representation Structure) ${\rightarrow}$[drs2prolog] ${\rightarrow}$ Prolog 프로그램 ${\rightarrow}$ [prolog2xml] ${\rightarrow}$ ASLA로 요약할 수 있다.

Revisited Security Evaluation on Midori-64 against Differential Cryptanalysis

  • Guoyong Han;Hongluan Zhao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.2
    • /
    • pp.478-493
    • /
    • 2024
  • In this paper, the Mixed Integer Linear Programming (MILP) model is improved for searching differential characteristics of block cipher Midori-64, and 4 search strategies of differential path are given. By using strategy IV, set 1 S-box on the top of the distinguisher to be active, and set 3 S-boxes at the bottom to be active and the difference to be the same, then we obtain a 5-round differential characteristics. Based on the distinguisher, we attack 12-round Midori-64 with data and time complexities of 263 and 2103.83, respectively. To our best knowledge, these results are superior to current ones.

A study on the auto encoder-based anomaly detection technique for pipeline inspection (관로 조사를 위한 오토 인코더 기반 이상 탐지기법에 관한 연구)

  • Gwantae Kim;Junewon Lee
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.38 no.2
    • /
    • pp.83-93
    • /
    • 2024
  • In this study, we present a sewer pipe inspection technique through a combination of active sonar technology and deep learning algorithms. It is difficult to inspect pipes containing water using conventional CCTV inspection methods, and there are various limitations, so a new approach is needed. In this paper, we introduce a inspection method using active sonar, and apply an auto encoder deep learning model to process sonar data to distinguish between normal and abnormal pipelines. This model underwent training on sonar data from a controlled environment under the assumption of normal pipeline conditions and utilized anomaly detection techniques to identify deviations from established standards. This approach presents a new perspective in pipeline inspection, promising to reduce the time and resources required for sewer system management and to enhance the reliability of pipeline inspections.