• Title/Summary/Keyword: Communication Model

Search Result 8,193, Processing Time 0.036 seconds

Major Factors Influencing the Usage Needs for the Adult Guardianship System in Parents of People with Developmental Disabilities (발달장애인 부모의 성년후견제도 이용욕구에 영향을 미치는 요인)

  • Lee, Yong-Pyo;Song, Seung-Yeon
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.6
    • /
    • pp.334-344
    • /
    • 2016
  • The purpose of this research is to investigate usage related predictors to activate Adult Guardianship System of People with Developmental Disabilities. To achieve the purpose of this research, we have analyzed the survey of parents of People with Developmental Disabilities usage needs for Adult Guardianship System which is based on the Andersen's behavioral model. The study utilized data from 2011 Welfare Needs Assessment of Seoul middle and senior-aged Family with Developmental Disabilities, and the analysis method, the study applied used SPSS 22.0, frequency analysis, descriptive statistics analysis, logistic regression analysis. According to the result, the usage needs for Adult Guardianship System increases meaningfully if the parents does not have occupation, and the subject of Adult Guardianship System is male. In income and the social security system wise, the usage needs for Adult Guardianship System show remarkably large rating if the average income is high and the desire to be cared by others is high. But in case of People with Developmental Disabilities, communication skills, the degree of disability, burden of caring does not have effect on the usage needs for Adult Guardianship System. The conclusion for this research is, first, to activate vigorous usage of Adult Guardianship System, the government intervention is required. Second, the following study is needed to explain to the concept of the needs caring by others and the cultural factors relating to the usage needs for Adult Guardianship System.

Analysis of Nursing College Students' Educational Needs about Program outcomes (간호대학생의 프로그램학습성과에 대한 교육요구 분석)

  • Nam, Soung-Mi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.7
    • /
    • pp.315-324
    • /
    • 2018
  • This study was conducted to identify and analyze the educational needs for program outcomes in nursing students. Participants included 256 nursing students at K college, and a survey was conducted from October 30 to December 22, 2017. Data was analyzed with SPSS WIN 20.0 using descriptive statistics, t-test, ANOVA, Borich's Needs Analysis, and the Locus for Focus Model. Results found that subjects recognized that the present level was high about 'Apply therapeutic communication skills,' 'Provide fundamental nursing skills' and 'Understanding nursing profession standards'. 'Provide fundamental nursing skills', 'Apply a nursing intervention', 'Understanding legal and ethical standards of nursing practice and implementation' were the most important sub-elements of program outcomes. In according with the Borich's needs value and the Locus for Focus Model, 'Apply a nursing intervention', 'Explain the importance of the role and cooperation within the healthcare team', 'Provide fundamental nursing skills', 'Execute the nursing process', 'Understanding the legal and ethical standards of nursing practice and implement' were identified as the top priorities of educational needs. Results of this study are expected to be used as basic data to develop outcome-based curriculum and nursing education programs.

Serialized Multitasking Code Generation from Dataflow Specification (데이타 플로우 명세로부터 직렬화된 멀티태스킹 코드 생성)

  • Kwon, Seong-Nam;Ha, Soon-Hoi
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.9_10
    • /
    • pp.429-440
    • /
    • 2008
  • As embedded system becomes more complex, software development becomes more important in the entire design process. Most embedded applications consist of multi -tasks, that are executed in parallel. So, dataflow model that expresses concurrency naturally is preferred than sequential programming language to develop multitask software. For the execution of multitasking codes, operating system is essential to schedule multi-tasks and to deal with the communication between tasks. But, it is needed to execute multitasking code without as when the target hardware platform cannot execute as or target platforms are candidates of design space exploration, because it is very costly to port as for all candidate platforms of DSE. For this reason, we propose the serialized multitasking code generation technique from dataflow specification. In the proposed technique, a task is specified with dataflow model, and generated as a C code. Code generation consists of two steps: First, a block in a task is generated as a separate function. Second, generated functions are scheduled by a multitasking scheduler that is also generated automatically. To make it easy to write customized scheduler manually, the data structure and information of each task are defined. With the preliminary experiment of DivX player, it is confirmed that the generated code from the proposed framework is efficiently and correctly executed on the target system.

Implementation of Massive FDTD Simulation Computing Model Based on MPI Cluster for Semi-conductor Process (반도체 검증을 위한 MPI 기반 클러스터에서의 대용량 FDTD 시뮬레이션 연산환경 구축)

  • Lee, Seung-Il;Kim, Yeon-Il;Lee, Sang-Gil;Lee, Cheol-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.9
    • /
    • pp.21-28
    • /
    • 2015
  • In the semi-conductor process, a simulation process is performed to detect defects by analyzing the behavior of the impurity through the physical quantity calculation of the inner element. In order to perform the simulation, Finite-Difference Time-Domain(FDTD) algorithm is used. The improvement of semiconductor which is composed of nanoscale elements, the size of simulation is getting bigger. Problems that a processor such as CPU or GPU cannot perform the simulation due to the massive size of matrix or a computer consist of multiple processors cannot handle a massive FDTD may come up. For those problems, studies are performed with parallel/distributed computing. However, in the past, only single type of processor was used. In GPU's case, it performs fast, but at the same time, it has limited memory. On the other hand, in CPU, it performs slower than that of GPU. To solve the problem, we implemented a computing model that can handle any FDTD simulation regardless of size on the cluster which consist of heterogeneous processors. We tested the simulation on processors using MPI libraries which is based on 'point to point' communication and verified that it operates correctly regardless of the number of node and type. Also, we analyzed the performance by measuring the total execution time and specific time for the simulation on each test.

A Study on the Economic Analysis Method of Energy Storage System (에너지 저장 시스템(ESS)의 경제성 분석 기법에 관한 연구)

  • Yoon, Young-Sang;Choi, Jae-Hyun;Choi, Yong-Lak;Shin, Yongtae;Kim, Jong-Bae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.3
    • /
    • pp.596-606
    • /
    • 2015
  • Recently, the government is promoting the new renewable energy spread and expansion policy. To this end, the investment and the research is ongoing on the core of the ESS (Energy Storage System) for the Smart Grid that is being spread around the industrialized countries. US and European countries have also conducted a variety of ESS related systems maintenance and improvement in order to induce the activation of the ESS industry. On the other hand, our country has no law and institutional foundation for the introduction of activation ESS, and there is no objective basis for the economic impact of the introduction of the ESS. Therefore, spread and activation of the ESS is not properly conducted. In this paper, the economics of the ESS based on the Korea electric pricing system for the spread and activation of the ESS effectively proposes a technique for analysis. To do this, define the ESS operating model, and propose the best economic analysis method economic analysis comparing each operating model.

A Study on the Lower Body Muscle Strengthening System Using Kinect Sensor (Kinect 센서를 활용하는 노인 하체 근력 강화 시스템 연구)

  • Lee, Won-hee;Kang, Bo-yun;Kim, Yoon-jung;Kim, Hyun-kyung;Park, Jung Kyu;Park, Su E
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.11
    • /
    • pp.2095-2102
    • /
    • 2017
  • In this paper, we implemented the elderly home training contents provide individual exercise prescription according to the user's athletic ability and provide personalized program to the elderly individual. Health promotion is essential for overcoming the low health longevity of senior citizens preparing for aging population. Therefore, the lower body strengthening exercise to prevent falls is crucial to prevent a fall in the number of deaths of senior citizens. In this game model, the elderly are aiming at home training contents that can be found to feel that the elderly are going out of walk and exercising in the natural environment. To achieve this, Kinect extracts a specific bone model provide by the Kinect Sensor to generate the feature vectors and recognizes the movements and motion of the user. The recognition test using the Kinect sensor showed a recognition rate of about 80 to 97%.

DDS-Based BLE Adaptor for Standard Profile Data Interoperation in Internet of Things (사물인터넷 환경에서 표준 Profile 데이터 상호운용을 위한 DDS 기반 BLE 어댑터)

  • Oh, Jung-Hoon;Back, Moon-Ki;Oh, Gil-Tak;Lee, Kyu-Chul
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.11
    • /
    • pp.403-410
    • /
    • 2016
  • IoT(Internet of Things) has purpose for providing new kind of service though interaction with everything. With development of IoT, computer model which is based on internet is changed to distributed connection model between heterogeneous things. There is a problem that it is impossible to connect between each other different protocols. To solve this problem, we should abstract each of things of data through using adaptor of middleware structure in order to make consistent data unit. In this paper, we propose BLE(Bluetooth Low Energy) adaptor, which is interaction with things, based on DDS(Data Distribution Service) that is real-time standard middleware. It is possible to data interaction between BLE Devices as well as two-way data interaction with different protocol devices. Also existing BLE Devices and study have a problem that Data exchange without using a standard data format of a profile defined by the Bluetooth SIG. Using the data formats defined independently by a problem that should not exchange data according to the type and manufacturer of the device BLE. The BLE adapter to solve this problem, the classification and analysis of the 12 stand profile was applied to create a profile based on the standard data format. It is possible to get wide interoperability of not affected on the BLE devices type and manufacturer of the device because it is applied a profile that standard data format.

Effect of Supply Chain Risk Management Factors on Risk Management Strategy and Corporate Performance (공급사슬관리 리스크 요인이 위험관리전략과 기업성과에 미치는 영향)

  • Lee, Choong-Bae;Kim, Hyun-Chung
    • Journal of Korea Port Economic Association
    • /
    • v.36 no.3
    • /
    • pp.55-74
    • /
    • 2020
  • With globalization and the development of information and communication technology, the supply chain is becoming more widespread and complex, which increases the occurrence and damage caused by supply chain risks. Supply chain risk management has a great impact on corporate performance through the analysis of risk factors and proactive and strategic approaches. This study aims to analyze the effects of supply chain risk factors on risk management strategies and corporate performance empirically. In the research model for empirical analysis, supply chain risk factors were classified into supply, demand, operation, network, and external environment, while the risk management strategies were divided into active and passive strategies, as well as financial and operational performance for corporate performance. The data obtained via the questionnaire were analyzed for the path of the structural equation model. As a result of the analysis, companies are actively pursuing risk management for internal risk factors, rather than external factors, in terms of internal and external risk factors, and it was found that these strategies have a significant effect on corporate performance. Therefore, in the future, companies should conduct risk management strategies more proactively and preemptively through a thorough analysis of various risk factors affecting business operations.

Model Verification of a Safe Security Authentication Protocol Applicable to RFID System (RFID 시스템에 적용시 안전한 보안인증 프로토콜의 모델검증)

  • Bae, WooSik;Jung, SukYong;Han, KunHee
    • Journal of Digital Convergence
    • /
    • v.11 no.4
    • /
    • pp.221-227
    • /
    • 2013
  • RFID is an automatic identification technology that can control a range of information via IC chips and radio communication. Also known as electronic tags, smart tags or electronic labels, RFID technology enables embedding the overall process from production to sales in an ultra-small IC chip and tracking down such information using radio frequencies. Currently, RFID-based application and development is in progress in such fields as health care, national defense, logistics and security. RFID structure consists of a reader that reads tag information, a tag that provides information and the database that manages data. Yet, the wireless section between the reader and the tag is vulnerable to security issues. To sort out the vulnerability, studies on security protocols have been conducted actively. However, due to difficulties in implementation, most suggestions are concerned with theorem proving, which is prone to vulnerability found by other investigators later on, ending up in many troubles with applicability in practice. To experimentally test the security of the protocol proposed here, the formal verification tool, CasperFDR was used. To sum up, the proposed protocol was found to be secure against diverse attacks. That is, the proposed protocol meets the safety standard against new types of attacks and ensures security when applied to real tags in the future.

Developing Competency Based Integrated Curriculum for Fostering Sports Marketer in Sports Industry (스포츠마케터 인재양성을 위한 역량기반 융합형 교육과정 개발)

  • Kim, Jin-Se;Ahn, Jai-Han;Kim, Mi-Suk
    • Journal of Digital Convergence
    • /
    • v.16 no.6
    • /
    • pp.449-462
    • /
    • 2018
  • The purpose of this study is to develop a competency-based convergence curriculum for the development of sports marketers, sports talent in the sports industry. For this purpose, we conducted literature analysis, in-depth interviews and job analysis to derive necessary capabilities to become sports marketers, draw up a capability profile, and then developed a capability model through expert verification. Sports marketers ' capacity models were divided into sport marketing / PR and sports events by type of experience, with six common basic competencies including sports mind and 12 professional competencies including sponsorships. Sports marketers education courses developed based on capacity models are composed of understanding of sports industry, sports marketing communication, sports law, understanding of sports facility, sports facilities management, sports sponsorship, sports media, sports licensing, sports agent, sports event planning, sports event management, make a proposal, sports event field practice. The developed training courses for sports marketers will be used in colleges and private education institutions related to the sports industry, contributing to fostering and expanding sports industry talent.