• Title/Summary/Keyword: Administrator

Search Result 573, Processing Time 0.022 seconds

An Analysis on the Influence of Work Management Type on Work Condition (작업관리방식이 작업여건에 미치는 영향 분석 - 주단위작업관리방식과 일단위작업관리방식을 중심으로 -)

  • Yoon, Byong-Sik;Yu, Jung-Ho;Kim, Chang-Duk
    • Korean Journal of Construction Engineering and Management
    • /
    • v.11 no.5
    • /
    • pp.75-83
    • /
    • 2010
  • Construction industries is a labor intensive industries. According to Korea Productivity Center, most OECD members indicate high labor productivity more than Korea labor productivity in construction industries. First of all, for increasing labor productivity work efficiency and work condition should be managed by administrator in work site. Especially, work condition could be controlled by the management behaviors of administrator in work site such as work management type. This indicates that work management type could influence strongly work condition. But although that work management type could influence work condition is the characteristic of construction work is recongized to many people, the quantitative analysis on the relationship between work condition and work management type is not enough. Therefore the purpose of this study is to analyze the Influence of Work Management Type on Work Condition.

A Study on the Relationships Between the chief Nurse′s Leadership style and the organizational climate of Hospitals (간호과장의 지도성 유형과 병원 조직풍토와의 관계)

  • 김영매;한상임
    • Journal of Korean Academy of Nursing
    • /
    • v.5 no.1
    • /
    • pp.79-86
    • /
    • 1975
  • It had been thought the role of Nursing administrator was still not started along the right line in Korea because of the Lacking of full understanding and recognition of the real meaning of administrator's role, and because there are several Rinds of problems and difficulties in actual role. The present study is an attempt to clarify some existing relationships between the chief Nurse's Leadership style and the organizational climate of Hospitals. The problems of the study are specifically started as follows ; 1) What influence does the individual behavior have on the formation of the organizational climate of Hospital? 2) From what do the difference of climate arise? 3) How are the individual be heavier and organizational climate of Hospital measured ? In order to see the relationships or the interactions between the two factors, the chief nurse's Leadership style and organizational climate of hospital , the researcher has classified. He former into; 1) effective Leadership style. 2) initiating structure leader ship style. 3) Consideration structure Leadership style, and 4) ineffective Leadership style, and the latter in to. 1) open climate and 2) closed climate The Chief Nurses Leadership style has been. Classified into consideration-human relations approaches and initiating structure approaches according to L. B. D. Q by Hapin. Organizational climate of hospital has been classified into open-closed continuum according to O. C. H Q. by Hairpin and Croft. The results obtained are as follows : 1) The chief nurse's Leadership style is closer to Initiating structure Leadership style than Consideration structure lure Leadership style. 2) The organizational climate of hospital is closer to open climate than closed climate. 3) The chief nurse's Leadership sty]e and the organizational climate of hospital to not show any significant relations.

  • PDF

Efficient Anomaly Detection Through Confidence Interval Estimation Based on Time Series Analysis (시계열 분석 기반 신뢰구간 추정을 통한 효율적인 이상감지)

  • Kim, Yeong-Ju;Heo, You-Kyung;Park, Jin-Gwan;Jeong, Min-A
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.8
    • /
    • pp.708-715
    • /
    • 2014
  • In this paper, we suggest a method of realtime confidence interval estimation to detect abnormal states of sensor data. For realtime confidence interval estimation, the mean square errors of the exponential smoothing method and moving average method, two of the time series analysis method, where compared, and the moving average method with less errors was applied. When the sensor data passes the bounds of the confidence interval estimation, the administrator is notified through alarming. As the suggested method is for realtime anomaly detection in a ship, an Android terminal was adopted for better communication between the wireless sensor network and users. For safe navigation, an administrator can make decisions promptly and accurately upon emergency situation in a ship by referring to the anomaly detection information through realtime confidence interval estimation.

Correlation Analysis of Event Logs for System Fault Detection (시스템 결함 분석을 위한 이벤트 로그 연관성에 관한 연구)

  • Park, Ju-Won;Kim, Eunhye;Yeom, Jaekeun;Kim, Sungho
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.39 no.2
    • /
    • pp.129-137
    • /
    • 2016
  • To identify the cause of the error and maintain the health of system, an administrator usually analyzes event log data since it contains useful information to infer the cause of the error. However, because today's systems are huge and complex, it is almost impossible for administrators to manually analyze event log files to identify the cause of an error. In particular, as OpenStack, which is being widely used as cloud management system, operates with various service modules being linked to multiple servers, it is hard to access each node and analyze event log messages for each service module in the case of an error. For this, in this paper, we propose a novel message-based log analysis method that enables the administrator to find the cause of an error quickly. Specifically, the proposed method 1) consolidates event log data generated from system level and application service level, 2) clusters the consolidated data based on messages, and 3) analyzes interrelations among message groups in order to promptly identify the cause of a system error. This study has great significance in the following three aspects. First, the root cause of the error can be identified by collecting event logs of both system level and application service level and analyzing interrelations among the logs. Second, administrators do not need to classify messages for training since unsupervised learning of event log messages is applied. Third, using Dynamic Time Warping, an algorithm for measuring similarity of dynamic patterns over time increases accuracy of analysis on patterns generated from distributed system in which time synchronization is not exactly consistent.

An Implementation on CIS Management for Underground Social Infrastructure based on Active RFID (능동형 RFID 기반의 지하 매설물 GIS 관리 구현)

  • Baek, Jang-Mi;Hong, In-Sik
    • Journal of Internet Computing and Services
    • /
    • v.8 no.3
    • /
    • pp.45-56
    • /
    • 2007
  • Recently, much research has been actively conducted for a new kind of network environment ubiquitous computing. This paper will define the smart-tag technology required by a ubiquitous environment. We will describe how to apply smart-tag-related Radio Frequency Identification(RFID) research for GIS in underground social infrastructure, a local-area wireless-communication technology. Application development is important that will be able to materialize a network environment. This research promotes various application developments, such reason currently it establishes the IT 839 from domestic. The geographic information system construction is a part of IT 839. The research which is various becomes accomplished for the ubiquitous of social base facility from domestic. Consequently, in this paper analyzes the geographic information system of existing, researches based RFID underground social infrastructure management system development. The Proposed method is complements the method of existing, and is efficient for underground social infrastructure. This system is new management system for underground social infrastructure, and provides safe administrator function using authentication of active RFID tag. It provides real processing and autonomy of administrator.

  • PDF

Teacher-Librarians' Perceptions of Their Roles (초등학교 사서교사의 역할 인식에 관한 연구)

  • Chung, Jin-Soo
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.43 no.4
    • /
    • pp.281-306
    • /
    • 2009
  • This exploratory study reports how teacher-librarians perceive their roles as practitioners in school library media programs. Conducted within the framework of qualitative research, the study employed a focus group interview (Morgan 1997) with five teacher-librarians at elementary school level in Seoul. The findings suggest: (1) the roles of teacher-librarians are influenced a great deal by many factors in educational systems; (2) there is no consensus on how to define and perform their role as teachers; (3) there seems to be increasing emphasis on their program administrator's role; (4) there is no consensus on prioritizing the five roles suggested by the AASL (2009), but all the participants agreed that the leader's role is most crucial for the success of pursuing the rest of the roles, and (5) there seems to be no clear boundaries as teacher-librarians perform their roles. Putting all the results together, the researcher was able to conclude that teacher-librarians are frequently asked to be flexible and negotiable and have great burden in the affective, cognitive, and physical realm for the roles imposed and expected of them.

The Service Log Analyser for Blocking Unused Account on Internet Services (인터넷 서비스 미 사용 계정 차단을 위한 서비스 로그 분석기)

  • Jung, Kyu-Cheol;Lee, Jin-Kwan;Lee, Dae-Hyung;Jang, Hae-Suk;Lee, Jong-Chan;Park, Ki-Hong
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.73-80
    • /
    • 2007
  • The fact that since Internet has been spreaded widely to people, Many security problems also have been grown too much. Due to sudden growth, administrator's responsibility for secure network and services has been growing more and more. This paper represents how to prevent account which didn't use for long period on multi domains environment using service log analysis. hence administrator can find security hole on systems and can dealing with it. The Service Log Analyzer is that loading log file which are written by each service and analyzing them. as a result it makes a list named Used User List contains a number of account names which uses specific services. When the time has come - means cron job schedule time, User Usage Shifter is the next runner. it's mission is finding the person who didn't used service for a specific period of time. Then modifying the expire day of the account information.

  • PDF

Design and Implementation of a Management Framework for Ubiquitous Sensor Networks Based on Clustering (클러스터링 기반 유비쿼터스 센서 네트워크 관리 프레임워크의 설계 및 구현)

  • Lee, Jong-Eon;Cha, Si-Ho;Cho, Kuk-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.4B
    • /
    • pp.174-183
    • /
    • 2008
  • In this paper we design and implement a sensor network management framework(SNMF) for ubiquitous sensor networks(USNs). The SNMF employs the policy-based management approach for the autonomous and energy-efficient management of USNs. Moreover, a new light-weight policy distribution protocol called TinyCOPS-PR is designed and USN PIB for low-level policy is also defined. This allows the high-level policies defined by an administrator to translate into the specific low-level policies. The low-level policies are executed on sensor nodes so it can fulfill the proper management actions. The sensor nodes that receive some policies from an administrator perform local management actions according to those policies. SNMF can therefore realize small energy consumption and bring long network lifetime. It can also manage USNs automatically with a minimum of human interference.

Perceptions held by Investigators, IRB Members and IRB Administrators on the Bioethical Oversight System of National R&D Projects (국가연구개발과제 생명의학윤리 감독체계에 대한 인식조사 및 제언)

  • Kang, Young Hee;Lee, Sang Mi;Kwon, Kwang Il;Kim, Eun Young;Huh, Woo Sung
    • Korean Journal of Clinical Pharmacy
    • /
    • v.24 no.2
    • /
    • pp.135-143
    • /
    • 2014
  • Purpose: Aim of this study was to gather and evaluate perceptions of investigators, IRB members, and IRB administrators on the appropriateness of IRB review process and bioethical oversight system of national R&D (NR&D) projects. Method: Investigators, IRB members, and IRB administrators at 17 different institutions were surveyed using convenience sampling and survey questionnaires were partially group-specialized to consider any differences between the groups. Results: Participants included 29 investigators, 37 IRB members, and 17 administrators with response rate of 100% (83 of 83). According to the responses obtained, insufficient preparation time for constructing protocol and gaining IRB approval was one of the main problems in the IRB review process (investigator 79.3%, IRB administrator 88.2%). Also, discrepancy between NR&D and IRB's protocol formats was another major issue (IRB members 96.4%, IRB administrator 100%) and most investigators (89.7%) had to modify the original NR&D protocol to obtain IRB approval. Moreover, it was reported that 13.8% of investigators and 31.3% of IRB administrators did not submit midyear reports to IRB and for bioethical issues of NR&D projects, 17.2% of investigators did not include information on project status and safety issues in the annual reports. Conclusion: In conclusion, for successful and ethical completion of R&D projects, revision of both IRB review process and NR&D project protocol formats as well as implementation of appropriate bioethical oversights are necessary.

A Study on Nurses Role Conflict in a Hospital University (일 종합병원 간호원의 역할갈등에 관한 연구)

  • 이유순
    • Journal of Korean Academy of Nursing
    • /
    • v.11 no.1
    • /
    • pp.29-44
    • /
    • 1981
  • Nursing role tends to be more complex then before because of the increased number of health professionals and of the health needs of patient. Accordingly, nursing role expectations are various and sometimes conflict by its role set. There are various literatures on role conflict of nurses and discussed how to eliminate the conflict in order to improve nursing service particularly in the hospital organization. This study was designed to determine if role conflict exist among nurses who work in a hospital and if so what resolution were most frequently selected by the nurses to the role conflict. The study population was fifty six registered nurses of K university hospital. The fifty six was defined and selected by nonproportional stratified sampling method to obtain subjects who are from uniform role set. A questionnaire, a list of role connect, stimulated by the literature review, knowledge based on several years' experience in nursing was formulated by the author and administered to the study population. The questionnaire included twenty nine closed question items of role conflict and classified according to the intra sender conflict, intersender conflict, person conflict and interperson conflict. The response choices to the questions range on a scale continuum with degrees of conflict from one to five: never - 0, seldom - 1, occasionally - 2, frequently - 3, and mostly -4. Per cent, means, standard deviation, and x² -test were used to analyze data. The findings of the study could be summarized as follows. 1. General characterstics of the study population: Most of the population were between the age of 22-27 and are not married. 2. Analysis of Role conflict Existence of Role conflict of nurses was found by the total mean conflict score, 2.06. Inter Sender Role conflict revealed the most high mean conflict score and the lowest one was inter person role conflict. Among the five role senders of nurses: Physician, patient and hi9 family, peer and superior, nursing students and hospital administrator, nurses showed the highest conflict mean score for physicians and the lowest score for Nursing student. 3. Analysis of role conflict resolution. Compromise through discussion with the role sender was the most frequently selected method by the respondents. The result also showed that the respondents tend to resolve the conflicting situation created by patient or his family by persuation. On the o thor hand, Avoidance and ignorance was frequently chosen for the conflicting role expectations from the hospital administrator.

  • PDF