• Title/Summary/Keyword: Data line sharing

Search Result 71, Processing Time 0.042 seconds

Prevalence and Alternative Treatment of Head-Lice Infestation in Rural Thailand: A Community-Based Study

  • Singhasivanon, On-uma;Lawpoolsri, Saranath;Mungthin, Mathirut;Yimsamran, Surapon;Soonthornworasiri, Ngamphol;Krudsood, Srivicha
    • Parasites, Hosts and Diseases
    • /
    • v.57 no.5
    • /
    • pp.499-504
    • /
    • 2019
  • Head-lice infestation, pediculosis capitis, remains a public-health burden in many countries. The widely used first-line pediculicides and alternative treatments are often too costly for use in poor socio-economic settings. Ivermectin has been considered an alternate treatment for field practice. This study was composed of 2 parts, a cross-sectional survey and an intervention study. The main objectives were to determine the prevalence and potential factors associated with head-lice infestation, and to evaluate the effectiveness and safety of oral ivermectin administration. A community-based cross-sectional survey was conducted among 890 villagers in rural areas along Thai-Myanmar border. Females with infestations were eligible for the intervention study, and 181 participated in the intervention study. A post-treatment survey was conducted to assess acceptance of ivermectin as a treatment choice. Data analysis used descriptive statistics and a generalized-estimation-equation model adjusted for cluster effect. The study revealed the prevalence of head-lice infestation was 50% among females and only 3% among males. Age stratification showed a high prevalence among females aged <20 years, and among 50% of female school-children. The prevalence was persistent among those with a history of infestation. The major risk factors were residing in a setting with other infected cases, and sharing a hair comb. The study also confirmed that ivermectin was safe and effective for field-based practice. It was considered a preferable treatment option. In conclusion, behavior-change communication should be implemented to reduce the observed high prevalence of head-lice infestation. Ivermectin may be an alternative choice for head-lice treatment, especially in remote areas.

Information Security Management System on Cloud Computing Service (클라우드 컴퓨팅 서비스에 관한 정보보호관리체계)

  • Shin, Kyoung-A;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.155-167
    • /
    • 2012
  • Cloud computing service is a next generation IT service which has pay-per-use billing model and supports elastically provisioning IT infra according to user demand. However it has many potential threats originating from outsourcing/supporting service structure that customers 'outsource' their own data and provider 'supports' infra, platform, application services, the complexity of applied technology, resource sharing and compliance with a law, etc. In activation of Cloud service, we need objective assessment standard to ensure safety and reliability which is one of the biggest obstacles to adopt cloud service. So far information security management system has been used as a security standard for a security management and IT operation within an organization. As for Cloud computing service it needs new security management and assessment different from those of the existing in-house IT environment. In this paper, to make a Information Security Management System considering cloud characteristics key components from threat management system are drawn and all control domain of existing information security management system as a control components are included. Especially we designed service security management to support service usage in an on-line self service environment and service contract and business status.

Algorithm to Search for the Original Song from a Cover Song Using Inflection Points of the Melody Line (멜로디 라인의 변곡점을 활용한 커버곡의 원곡 검색 알고리즘)

  • Lee, Bo Hyun;Kim, Myung
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.5
    • /
    • pp.195-200
    • /
    • 2021
  • Due to the development of video sharing platforms, the amount of video uploads is exploding. Such videos often include various types of music, among which cover songs are included. In order to protect the copyright of music, an algorithm to find the original song of the cover song is essential. However, it is not easy to find the original song because the cover song is a modification of the composition, speed and overall structure of the original song. So far, there is no known effective algorithm for searching the original song of the cover song. In this paper, we propose an algorithm for searching the original song of the cover song using the inflection points of the melody line. Inflection points represent the characteristic points of change in the melody sequence. The proposed algorithm compares the original song and the cover song using the sequence of inflection points for the representative phrase of the original song. Since the characteristics of the representative phrase are used, even if the cover song is a song made by modifying the overall composition of the song, the algorithm's search performance is excellent. Also, since the proposed algorithm uses only the features of the inflection point sequence, the memory usage is very low. The efficiency of the algorithm was verified through performance evaluation.

A Store Recommendation Procedure in Ubiquitous Market for User Privacy (U-마켓에서의 사용자 정보보호를 위한 매장 추천방법)

  • Kim, Jae-Kyeong;Chae, Kyung-Hee;Gu, Ja-Chul
    • Asia pacific journal of information systems
    • /
    • v.18 no.3
    • /
    • pp.123-145
    • /
    • 2008
  • Recently, as the information communication technology develops, the discussion regarding the ubiquitous environment is occurring in diverse perspectives. Ubiquitous environment is an environment that could transfer data through networks regardless of the physical space, virtual space, time or location. In order to realize the ubiquitous environment, the Pervasive Sensing technology that enables the recognition of users' data without the border between physical and virtual space is required. In addition, the latest and diversified technologies such as Context-Awareness technology are necessary to construct the context around the user by sharing the data accessed through the Pervasive Sensing technology and linkage technology that is to prevent information loss through the wired, wireless networking and database. Especially, Pervasive Sensing technology is taken as an essential technology that enables user oriented services by recognizing the needs of the users even before the users inquire. There are lots of characteristics of ubiquitous environment through the technologies mentioned above such as ubiquity, abundance of data, mutuality, high information density, individualization and customization. Among them, information density directs the accessible amount and quality of the information and it is stored in bulk with ensured quality through Pervasive Sensing technology. Using this, in the companies, the personalized contents(or information) providing became possible for a target customer. Most of all, there are an increasing number of researches with respect to recommender systems that provide what customers need even when the customers do not explicitly ask something for their needs. Recommender systems are well renowned for its affirmative effect that enlarges the selling opportunities and reduces the searching cost of customers since it finds and provides information according to the customers' traits and preference in advance, in a commerce environment. Recommender systems have proved its usability through several methodologies and experiments conducted upon many different fields from the mid-1990s. Most of the researches related with the recommender systems until now take the products or information of internet or mobile context as its object, but there is not enough research concerned with recommending adequate store to customers in a ubiquitous environment. It is possible to track customers' behaviors in a ubiquitous environment, the same way it is implemented in an online market space even when customers are purchasing in an offline marketplace. Unlike existing internet space, in ubiquitous environment, the interest toward the stores is increasing that provides information according to the traffic line of the customers. In other words, the same product can be purchased in several different stores and the preferred store can be different from the customers by personal preference such as traffic line between stores, location, atmosphere, quality, and price. Krulwich(1997) has developed Lifestyle Finder which recommends a product and a store by using the demographical information and purchasing information generated in the internet commerce. Also, Fano(1998) has created a Shopper's Eye which is an information proving system. The information regarding the closest store from the customers' present location is shown when the customer has sent a to-buy list, Sadeh(2003) developed MyCampus that recommends appropriate information and a store in accordance with the schedule saved in a customers' mobile. Moreover, Keegan and O'Hare(2004) came up with EasiShop that provides the suitable tore information including price, after service, and accessibility after analyzing the to-buy list and the current location of customers. However, Krulwich(1997) does not indicate the characteristics of physical space based on the online commerce context and Keegan and O'Hare(2004) only provides information about store related to a product, while Fano(1998) does not fully consider the relationship between the preference toward the stores and the store itself. The most recent research by Sedah(2003), experimented on campus by suggesting recommender systems that reflect situation and preference information besides the characteristics of the physical space. Yet, there is a potential problem since the researches are based on location and preference information of customers which is connected to the invasion of privacy. The primary beginning point of controversy is an invasion of privacy and individual information in a ubiquitous environment according to researches conducted by Al-Muhtadi(2002), Beresford and Stajano(2003), and Ren(2006). Additionally, individuals want to be left anonymous to protect their own personal information, mentioned in Srivastava(2000). Therefore, in this paper, we suggest a methodology to recommend stores in U-market on the basis of ubiquitous environment not using personal information in order to protect individual information and privacy. The main idea behind our suggested methodology is based on Feature Matrices model (FM model, Shahabi and Banaei-Kashani, 2003) that uses clusters of customers' similar transaction data, which is similar to the Collaborative Filtering. However unlike Collaborative Filtering, this methodology overcomes the problems of personal information and privacy since it is not aware of the customer, exactly who they are, The methodology is compared with single trait model(vector model) such as visitor logs, while looking at the actual improvements of the recommendation when the context information is used. It is not easy to find real U-market data, so we experimented with factual data from a real department store with context information. The recommendation procedure of U-market proposed in this paper is divided into four major phases. First phase is collecting and preprocessing data for analysis of shopping patterns of customers. The traits of shopping patterns are expressed as feature matrices of N dimension. On second phase, the similar shopping patterns are grouped into clusters and the representative pattern of each cluster is derived. The distance between shopping patterns is calculated by Projected Pure Euclidean Distance (Shahabi and Banaei-Kashani, 2003). Third phase finds a representative pattern that is similar to a target customer, and at the same time, the shopping information of the customer is traced and saved dynamically. Fourth, the next store is recommended based on the physical distance between stores of representative patterns and the present location of target customer. In this research, we have evaluated the accuracy of recommendation method based on a factual data derived from a department store. There are technological difficulties of tracking on a real-time basis so we extracted purchasing related information and we added on context information on each transaction. As a result, recommendation based on FM model that applies purchasing and context information is more stable and accurate compared to that of vector model. Additionally, we could find more precise recommendation result as more shopping information is accumulated. Realistically, because of the limitation of ubiquitous environment realization, we were not able to reflect on all different kinds of context but more explicit analysis is expected to be attainable in the future after practical system is embodied.

Design and implementation of smart card-based multi-authentication mechanism for digital contents delivery (디지털콘텐츠 유통을 위한 스마트카드기반의 다중인증처리방법설계 및 구현)

  • Kim, Yong;Lee, Tae-Young
    • Journal of the Korean Society for information Management
    • /
    • v.19 no.1
    • /
    • pp.23-46
    • /
    • 2002
  • With explosively increasing digital contents, library and Information center should have a new role between knowledge providers and knowledge users as information brokering organization. Electronic transaction system should be required for performing this brokering service since economic value is added to information and knowledge in information society. The developments and changes around library are keeping up with increasing building digital library and digitalizing printed sources. With the rapidly changing circumstances, the Internet is currently witnessing an explosive growth. By serving as a virtual information resource. the Internet can dramatically change the way business is conducted and Information is provided. However because of features o( the Internet like openness and information sharing, it has fundamental vulnerabilities in security issues. For Instance, disclosure of private information and line eavesdropping such as password, banking account, transaction data on network and so on are primary obstruction factors to activation of digital contents delivery on network. For high network security and authentication, this paper looks at smart card technologies and proposes multi-authentication protocol based on smart card on open network, implements and analyzes it.

Design and Implementation of an Problem-Solving Based and Self-Directed Learning System on Web (웹에서 문제 해결 기반 및 자기 주도적학습 시스템의 설계와 구현)

  • Kim, Kyung-Deok;Lee, Sang-Woon
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.7
    • /
    • pp.944-955
    • /
    • 2004
  • The modern society as a high-level information-oriented society lays a great emphasis on lifelong education. It emphasizes all the learners' creative learning ability and various teaching-learning methods as well. We need the self-directed learning to meet these requirements, and one of the solutions is the self-directed teaching-learning process employing the web. Though many educators, so far, developed a number of teaching materials, they are no more than web-based teaching materials for simple learning activities or simple item-bank systems. So, this paper suggests an problem-solving based and self-directed learning system on web in order to overcome such simplicities, and it shows design and implementation of the system. Suggested learning system enables learners to get thinking skill though self-directed control of learning level after they learn the basic concepts and principles on the web as self-directed learning. For example, the system was applied to mathematics education for a middle school students. It supports a test of questions chosen from the item bank in a self-directed way, and helps learners to understand their learning levels for themselves and to solve their questions through on-line discussions with their instructor. The system can also be helpful in improving the learners' learning effects by sharing mutual information through the data room or the Q&A between learners and learners or between learners and instructors.

  • PDF

A Study on the Safety Measure for Mega Container Ships Calling at Busan New Port from the Perspective of Pilotage (도선 관점에서 본 초대형 컨테이너 선박의 부산신항 내 안전대책 연구)

  • Kim, Chong-hwan;Park, Young-soo;Kim, Dae-won
    • Journal of Navigation and Port Research
    • /
    • v.44 no.3
    • /
    • pp.174-180
    • /
    • 2020
  • With the removal of underwater obstacles in the Busan New Port, the water depth of the pier has been secured up to 17m, and the port authority is constantly responding to the trend of container vessels becoming larger. Also, in 2020, 24,000TEU class container ships are entering to the port, and it is planned to secure the depth in the port to 23 m later in line with this trend. Mega container ships must check in advance the factors to be considered depending on the situation at the time, and for this, it is judged that information sharing among stakeholders is necessary. In this paper, to understand the effect of the corresponding route because of the mega container ships, a transit safety evaluation was conducted based on statistical data on ship entry and departure and maneuver characteristics of corresponding ships. The result showed that the transit of the mega container ships has increased up to 8.4% comparing to the risk of 4,000TEU class container ships. Additionally, safety measures such as minimum safety depth and tug operation plans were presented by gathering opinions on operational characteristics from the perspective of pilotage for safe transit in the Busan New Port area. Through this, it is considered that it will be possible to contribute to the prevention of accidents when entering and leaving the Busan New Port.

Analyzing adolescent family meal vs. alone meal: Focusing on adolescent time use and family characteristics (청소년의 가족식사와 혼밥 비교분석: 청소년의 시간활용과 가족특성을 중심으로)

  • Cha, Seung-Eun;Lee, Hyun Ah
    • Journal of Family Relations
    • /
    • v.22 no.4
    • /
    • pp.135-156
    • /
    • 2018
  • Objectives: This study aim to determine adolescent meal time, which provides the important context of parent-child sharing time. We divided mealtime into family meal and alone meal, and analyzed the time/space context of each meal time as well as the social determinations. Method: We employed adolescents age 10-18 who live with married patents and attends school at the present (n=5,128) from the original data of Korean Time Use Survey. Results: More adolescent were engaged in family meal rather than eating alone in daily bases. However, the trend show difference by day of week and academic grade; family meal are more prevalent in weekends rather than weekdays. As adolescent reaches high school age, the proportion of eating alone beats the proportion of family meal time. Most of the meal occur at home. Having meal outside was relatively scares, especially on weekdays. Tobit and logistic analysis reveal that, on weekday meal, less school hours, more time spent at the private academy, having family leisure event, and long mother's housework hours were positively associated with family meal time. In weekend model, father's education gradient was associated with family meal time, showing higher the father's education level, there were higher chance of having weekend family meal. As for the eating alone, relevant factors were similar with family meal but the directions were the opposite; having family leisure were negatively associated with alone meal, both weekdays and weekend. Long academy hours, meal preparing and leisure alone were positively associated eating alone. Overall, weekday meal time was strongly linked with adolescent daily schedules and time use, while for weekends meal, in both family meal and alone meal, the influence of parent factors were discovered. Conclusion: The results indicates that alone meal and the family meal are not exclusively related but seem to be complementary. Families tend to enjoy family meal yet, there are some necessary situation that adolescent need to be on their own. Increase in ready-made food industries, growing independence of children by age seem partly allow adolescent children to eat alone. Careful attentions may require for monitoring weekends meal situation and the family factor of adolescent in future studies.

Critical Issues and Practical Strategies in Technology Education: Technology Education Practitioners' Perception in South Korea (기술교육의 쟁점과 실천 전략: 우리나라 기술교육 현장 전문가의 인식)

  • Sung, Eui-Suk;Kwon, Hyuk-Soo
    • 대한공업교육학회지
    • /
    • v.39 no.1
    • /
    • pp.189-208
    • /
    • 2014
  • The purpose of this research was to investigate the critical issues and practical strategies that Korean technology teachers perceived. To accomplish the purpose of this study, a qualitative study was conducted to identify critical issues and practical strategies of Korean technology education targeted on Korean technology teachers. A purposeful sampling for choosing technology teachers was used for this study with three selection conditions: 1) 'Excellent Korean technology teacher' award winning teachers, or 2) technology teachers actively involved in both on-line and off-line teachers' association, and 3) leaders in local technology teachers' association. This study conducted exploratory in-depth interviews with selective 15 technology teachers regarding critical issues and practical strategies of Korean technology teachers. The interpretation of the interview content was conducted by two researchers using the thematic analysis which analyzed the frequency of concepts, words, and meanings held from collected data. In the conclusion, critical issues researchers identified were 1) curriculum problems, 2) education environment and facilities problems, 3) teachers' problems, 4) students' problems, 5) related research institution and college problems, 6) social problems. Secondly, Korean technology teachers agreed with following practical strategies 1) separating technology education from home economic education, 2) sharing practices on managing and improving educational environment and laboratory for technology education, 3) actively involving in technology teachers' group, 4) motivating students using hands-on activity 5) improving the quality and the quantity on technology teachers preparatory institution, 6) advertising the values of technology education to the public. Lastly, the positive factors to succeed technology education were 1) technology education satisfying social needs and 2) technology teachers' will or passion toward improving their technology classrooms. The negative factors to hinder technology education were 1) low self-respect of Korean technology teachers and 2) rejection or retarded acceptance toward social transition. Several recommendations based the conclusion were suggested as 1) implementing supplementary study toward selected critical issues and 2) conducting exemplary case studies regarding concrete practical strategies for improving challenges of Korean technology education.

A Comparative Study on the Effect of Enterprise SNS on Job Performance - Focused on the Mediation Effect of Communication Level and Moderating Effect of Nationality - (기업용 SNS 이용이 업무성과에 미치는 영향의 국가 간 비교연구 - 커뮤니케이션 수준의 매개효과와 국적의 조절효과를 중심으로 -)

  • Chen, Jing-Yuan;Kwon, Sun-Dong
    • Management & Information Systems Review
    • /
    • v.38 no.4
    • /
    • pp.137-157
    • /
    • 2019
  • Companies are trying to use enterprise SNS for collaboration and speedy decision-making. This study verified the mediating effect of communication between enterprise SNS and job performance, and proved the moderating effect of nationality between enterprise SNS and communication. This study collected survey data of 81 Korean and 81 Chinese from employees who have used enterprise SNS in Korea and China. As results of data analysis, first, enterprise SNS improved job performance through speedy information sharing and error reduction. Second, communication mediated the effect of enterprise SNS on job performance. Third, enterprise SNS increased the level of organizational communication through decreasing the burden of offline face-to-face communication. Compared with Chinese corporate organizations, Korean corporate organizations have high power distances, centralized control, and high superior authority. Therefore, in the off-line communication situation, the subordinate feels the social pressure to follow the command of the superior. Thus communication is one-way and closed. In this Korean organizational situation, corporate SNS can be used as a means to bypass rigid offline communication. In the online communication environment of non face-to-face corporate SNS, anxiety and stress of face-to-face communication can be reduced, so communication between the upper and lower sides can flow more smoothly. The contribution of this paper is that it proved that enterprise SNS promotes communication and improve job performance by reducing the anxiety or stress of offline communication, while according to prior research successful adoption of many types of information systems requires the fit between an organization and its organizational culture.