• Title/Summary/Keyword: Distributed Open System

Search Result 297, Processing Time 0.026 seconds

A Study on the Occurrences of Accidents among Children in Nursery School and Kindergartens (도시지역 어린이집 및 유치원 어린이의 안전사고 발생 실태)

  • Lee Eun Suk;Kim Chungnam
    • Journal of Korean Public Health Nursing
    • /
    • v.17 no.1
    • /
    • pp.96-112
    • /
    • 2003
  • The purpose of this study was to determine how often toddlers and preschoolers in kindergartens have accidents and what factors affect the accident rate. The study population consisted of 150 children who were attending at nursery schools and 150 children who were attending at kindergartens. The data was collected from ten nursery schools and five kindergartens from five districts in Daegu. The questionnaires were distributed to teachers of participating nursery schools and kindergartens to be completed using nursing care records in the institutions and by interviewing children's parents about all of the accidents happened in a previous year. Data were collected during the period of August 1 through 31, 2002. The results of the study are as follow: 1. Among 300 children, 282 had 506 accidental injuries during the study period. 2. The month, the day and the time with the highest accident rate were April. Monday, and between 2 and 4 o'clock in the afternoon, respectively. 3. Locations where the injury took place most included nursery schools or kindergartens, around the homes of the children, and inside the home. 4. Most accidents were occurred due to lack of carefulness of the children, and the most prevalent forms of injury was abrasions. 5. Most frequently injured part of the body was legs of the children. 6. Most injuries were healed within three days and required first aid measures to disinfect the wound. Mostly, these were performed by family members at home. Some children go to the hospital to suture the open wound. Most frequent type of complication was scar formation and the cost of the treatment ranged from 9,000 to 30,000 won. 7. Children's age. sex, birth order. personality. type of family composition. type of residency. father's occupation, father's age, and mother's age were significantly related to the frequency of injury among children. Children who were in nursery schools and kindergartens need their assessment for accident involving condition according to seasons, time. place. This study provided a very useful and important data to prepare accident prevention education program and accident prevention strategies, and to develop Injury Surveillance System.

  • PDF

Automatic Recognition of the Front/Back Sides and Stalk States for Mushrooms(Lentinus Edodes L.) (버섯 전후면과 꼭지부 상태의 자동 인식)

  • Hwang, H.;Lee, C.H.
    • Journal of Biosystems Engineering
    • /
    • v.19 no.2
    • /
    • pp.124-137
    • /
    • 1994
  • Visual features of a mushroom(Lentinus Edodes, L.) are critical in grading and sorting as most agricultural products are. Because of its complex and various visual features, grading and sorting of mushrooms have been done manually by the human expert. To realize the automatic handling and grading of mushrooms in real time, the computer vision system should be utilized and the efficient and robust processing of the camera captured visual information be provided. Since visual features of a mushroom are distributed over the front and back sides, recognizing sides and states of the stalk including the stalk orientation from the captured image is a prime process in the automatic task processing. In this paper, the efficient and robust recognition process identifying the front and back side and the state of the stalk was developed and its performance was compared with other recognition trials. First, recognition was tried based on the rule set up with some experimental heuristics using the quantitative features such as geometry and texture extracted from the segmented mushroom image. And the neural net based learning recognition was done without extracting quantitative features. For network inputs the segmented binary image obtained from the combined type automatic thresholding was tested first. And then the gray valued raw camera image was directly utilized. The state of the stalk seriously affects the measured size of the mushroom cap. When its effect is serious, the stalk should be excluded in mushroom cap sizing. In this paper, the stalk removal process followed by the boundary regeneration of the cap image was also presented. The neural net based gray valued raw image processing showed the successful results for our recognition task. The developed technology through this research may open the new way of the quality inspection and sorting especially for the agricultural products whose visual features are fuzzy and not uniquely defined.

  • PDF

The Core Module, "Viz-Data" of the User Interface Platform using the Public Data (공공데이터를 활용한 사용자 인터페이스 플랫폼의 핵심모듈 "Viz-Data")

  • Kim, Mi-Yun
    • Journal of Digital Convergence
    • /
    • v.14 no.1
    • /
    • pp.75-82
    • /
    • 2016
  • The most of public services that we use these days is distributed and supplied as 'App' service because of wide spread of smat phones. Especially, since the interest of general citizens about usabilitu of public data has been increased, in case of Seoul, people can reach the data through 'Seoul Open Data Plaza' of 25 regions of Seoul. It becomes possible to construct various throughout this system. Ultimately, in case of users, they are provided many services through their electronic media. Looking at the development and research of public data service, they are mostly focusing on service or building up the service, but the research on visualization of contents is insufficient. This study is suggesting the specific plan and directionality of building public service using the public data which studied in the advanced research, "The user interface platform". Finally. this research is for a right usage of public data in the smart urban environment in near future and providing the practical public service.

Evaluation of Sphere Faced Type Piston Nipple for Water Feed of Poultry (양계 급수용 구면 피스톤 니플의 성능 평가)

  • Kim, Key-Sun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.5
    • /
    • pp.961-967
    • /
    • 2007
  • Automatic water feeding system for chickens is the one of the most important devices at poultry farms. Chickens drink water directly from a water feeder nipple of the automatic water feeder. Check valve inside the water feeder nipple is open when they drink water and is closed otherwise. There are two types of nipples. One is the piston nipple, and the other is the ball nipple. Because the nipple stick in the ball nipple can move freely, the sloping mechanism of the ball nipple works well. but it has complicated mechanism. On the other hand, the piston nipple has very simple structure, but its movement is limited so it can move only up-and-down. To overcome those limitation, the piston nipple with sphere valve seat face (sphere face piston nipple) has been developed and is just distributed at domestic markets. The experimental performance test of the commercialized sphere piston nipple has been conducted, and compared with the performance of the ball nipple and the piston nipple which are domestic products. As the result, sphere piston nipple shows excellent performance compared to that of the piston nipple but its performance is similar to ball type nipple.

  • PDF

Cryptanalysis and Enhancement of a Remote User Authentication Scheme Using Smart Cards (스마트카드를 이용한 사용자 인증 스킴의 안전성 분석 및 개선)

  • Lee, Young-Sook;Won, Dong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.1
    • /
    • pp.139-147
    • /
    • 2010
  • A remote user authentication scheme is a two-party protocol whereby an authentication server in a distributed system confirms the identity of a remote individual logging on to the server over an untrusted, open network. In 2005, Liao et al. proposed a remote user authentication scheme using a smart card, in which users can be authenticated anonymously. Recently, Yoon et al. have discovered some security flaws in Liao et al.'s authentication scheme and proposed an improved version of this scheme to fix the security flaws. In this article, we review the improved authentication scheme by Yoon et al. and provide a security analysis on the scheme. Our analysis shows that Yoon et al.'s scheme does not guarantee not only any kind of authentication, either server-to-user authentication or user-to-server authentication but also password security. The contribution of the current work is to demonstrate these by mounting two attacks, a server impersonation attack and a user impersonation attack, and an off-line dictionary attack on Yoon et al.'s scheme. In addition, we propose the enhanced authentication scheme that eliminates the security vulnerabilities of Yoon et al.'s scheme.

Complete Genome Sequencing of Bacillus velezensis WRN014, and Comparison with Genome Sequences of other Bacillus velezensis Strains

  • Wang, Junru;Xing, Juyuan;Lu, Jiangkun;Sun, Yingjiao;Zhao, Juanjuan;Miao, Shaohua;Xiong, Qin;Zhang, Yonggang;Zhang, Guishan
    • Journal of Microbiology and Biotechnology
    • /
    • v.29 no.5
    • /
    • pp.794-808
    • /
    • 2019
  • Bacillus velezensis strain WRN014 was isolated from banana fields in Hainan, China. Bacillus velezensis is an important member of the plant growth-promoting rhizobacteria (PGPR) which can enhance plant growth and control soil-borne disease. The complete genome of Bacillus velezensis WRN014 was sequenced by combining Illumina Hiseq 2500 system and Pacific Biosciences SMRT high-throughput sequencing technologies. Then, the genome of Bacillus velezensis WRN014, together with 45 other completed genome sequences of the Bacillus velezensis strains, were comparatively studied. The genome of Bacillus velezensis WRN014 was 4,063,541bp in length and contained 4,062 coding sequences, 9 genomic islands and 13 gene clusters. The results of comparative genomic analysis provide evidence that (i) The 46 Bacillus velezensis strains formed 2 obviously closely related clades in phylogenetic trees. (ii) The pangenome in this study is open and is increasing with the addition of new sequenced genomes. (iii) Analysis of single nucleotide polymorphisms (SNPs) revealed local diversification of the 46 Bacillus velezensis genomes. Surprisingly, SNPs were not evenly distributed throughout the whole genome. (iv) Analysis of gene clusters revealed that rich gene clusters spread over Bacillus velezensis strains and some gene clusters are conserved in different strains. This study reveals that the strain WRN014 and other Bacillus velezensis strains have potential to be used as PGPR and biopesticide.

Development and Application of Water Balance Network Model in Agricultural Watershed (농업용수 유역 물수지 분석 모델 개발 및 적용)

  • Yoon, Dong-Hyun;Nam, Won-Ho;Koh, Bo-Sung;Kim, Kyung-Mo;Jo, Young-Jun;Park, Jin-Hyeon
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.66 no.3
    • /
    • pp.39-51
    • /
    • 2024
  • To effectively implement the integrated water management policy outlined in the National Water Management Act, it is essential to analyze agricultural water supply and demand at both basin and water district levels. Currently, agricultural water is primarily distributed through open canal systems and controlled by floodgates, yet the utilization-to-supply ratio remains at a mere 48%. In the case of agricultural water, when analyzing water balance through existing national basin water resource models (K-WEAP, K-MODISM), distortion of supply and regression occurs due to calculation of regression rate based on the concept of net water consumption. In addition, by simplifying the complex and diverse agricultural water supply system within the basin into a single virtual reservoir, it is difficult to analyze the surplus or shortage of agricultural water for each field within the basin. There are limitations in reflecting the characteristics and actual sites of rural water areas, such as inconsistencies with river and reservoir supply priority sites. This study focuses on the development of a model aimed at improving the deficiencies of current water balance analysis methods. The developed model aims to provide standardized water balance analysis nationwide, with initial application to the Anseo standard watershed. Utilizing data from 32 facilities within the standard watershed, the study conducted water balance analysis through watershed linkage, highlighting differences and improvements compared to existing methods.

Design and Implementation of a Transparent Security Infrastructure using Filter and Transformer (필터와 트랜스포머를 이용한 투명한 보안기반의 설계 및 구현)

  • Kim, Yong-Min;Lee, Do-Heon;Noh, Bong-Nam;Choi, Rak-Man;Ine, So-Ran
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.4
    • /
    • pp.975-983
    • /
    • 1998
  • In these days, information communication systems are based on both open distributed computing technologies and object-oriented techniques like inheritance, encapsulation and object reuse to support various system configuration and application. As information systems are interconnected through unsecure networks, the need for the secure information exchange is more critical than before. In this paper, we have designed and implemented a transparent CORBA-basce Security infrastructure with authentication, security context association, access control and security information management to support a secure applications in distributed object environment. SESAME Ver. 4 was adopted as an external security service to manage user privilege attributes and to distribute keys for data encryption, decryption and integrity. Using filter and transformer with an interface to Object Request Broker, it provides a transparent security service to applications. The filter objects are special classes that allow additional parameters to be inserted into messages before they are sent and removed just after they are received. The transformer objects are special classes that allow direct access to the byte stream of every messages for encryption and decryption before it is sent and just after it is received. This study is to implement the access control interceptor(ACI) and the secure invocation interceptor(SII) of secure ORB defined in CORBA using filter and transformer.

  • PDF

Block Chain Application Technology to Improve Reliability of Real Estate Market (부동산 시장의 신뢰성 향상을 위한 블록체인 응용 기술)

  • Oh, Seoyoung;Lee, Changhoon
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.1
    • /
    • pp.51-64
    • /
    • 2017
  • After Bitcoin was proposed by Satoshi Nakamoto in 2009, studies have been carried out to apply the Block Chain technology in various environment, which was applied as a distributed transaction of Bitcoin. Smart contracts, voting and proof of ownership of digital contents are typical applications of Block Chain. They used the feature that it is impossible to modify or delete once recorded facts. They also applied to prove relevant facts and to provide data integrity. The applied cases are mainly made in an environment where the data should or could be open to the public, and they have been proposed as solutions to solve the problems occurred in relations. This fact has led to the attention that Block Chain can be applied as a good alternative in similar circumstances. In this study, real estate market service was selected to expand the application range of Block Chain. Although there are about 250 applications and web services in total, the satisfaction is not high due to false offerings. Thus we propose a countermeasure against the problem by applying the Block Chain to the real estate market service, and investigate the research direction of the Block Chain in the future market.

Design and Implementation of an Efficient Web Services Data Processing Using Hadoop-Based Big Data Processing Technique (하둡 기반 빅 데이터 기법을 이용한 웹 서비스 데이터 처리 설계 및 구현)

  • Kim, Hyun-Joo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.1
    • /
    • pp.726-734
    • /
    • 2015
  • Relational databases used by structuralizing data are the most widely used in data management at present. However, in relational databases, service becomes slower as the amount of data increases because of constraints in the reading and writing operations to save or query data. Furthermore, when a new task is added, the database grows and, consequently, requires additional infrastructure, such as parallel configuration of hardware, CPU, memory, and network, to support smooth operation. In this paper, in order to improve the web information services that are slowing down due to increase of data in the relational databases, we implemented a model to extract a large amount of data quickly and safely for users by processing Hadoop Distributed File System (HDFS) files after sending data to HDFSs and unifying and reconstructing the data. We implemented our model in a Web-based civil affairs system that stores image files, which is irregular data processing. Our proposed system's data processing was found to be 0.4 sec faster than that of a relational database system. Thus, we found that it is possible to support Web information services with a Hadoop-based big data processing technique in order to process a large amount of data, as in conventional relational databases. Furthermore, since Hadoop is open source, our model has the advantage of reducing software costs. The proposed system is expected to be used as a model for Web services that provide fast information processing for organizations that require efficient processing of big data because of the increase in the size of conventional relational databases.