• Title/Summary/Keyword: Internet-based

Search Result 14,333, Processing Time 0.045 seconds

The Family History of Chronic Diseases, Food Group Intakes, and Physical Activity Practices among School Children in Seoul, Korea (서울지역 일부 초등학생의 생활 습관병 가족력, 식품군 섭취 형태 및 활동량 평가)

  • Lee, Young-Nam;Ha, Ae-Wha
    • Journal of the East Asian Society of Dietary Life
    • /
    • v.17 no.5
    • /
    • pp.644-652
    • /
    • 2007
  • In this study, we examined family history of chronic diseases, food group intake and physical activity in $5^{th}\;and\; 6^{th}$ grade elementary school children. Food group intake was compared with the KDRI food guides for children. The measurements of daily physical activity, television viewing, computer use, and daily servings of five food groups, including grains, meats, dairy products, fruits, and vegetables, were based on child and parent self-reports. As indices of obesity, the obesity index(%) and BMI(Body Mass Index) were used. The results were as follows. In boys, 83.2% were normal weight with 7.4% slightly obese, 7.4% moderately obese, and 2.0 were highly obese while the percentages of normal and slightly obese in girls were 89.9% and 6.2% respectively (p<0.05). The boys had more hours of daily physical activity(p<0.05) and more hours of computer usage(Internet searching or games)(p<0.05) than the girls. Slightly over 50% of the subjects met the daily recommended servings of grains, dairy products, fruits, and vegetables according to the KDRI food guides. However, only 26% of boys and 27% of girls met the recommended daily servings of protein foods such as meats, beans, and eggs. Thirty two percent(32%) of girls consumed high fat snacks everyday while 32% consumed high sugar snacks every day. The girls consumed more vegetables(p<0.05) and more high sugar snacks(p<0.05) than the boys. The children with family histories of obesity showed greater obesity rates(p<0.05) and sedentary lifestyles(p< 0.05) than those children without a family history of obesity. Children with family histories of high blood pressure consumed more sewings of vegetables and high fat snacks than the controls(p<0.05). The children with family histories of obesity consumed more high sugar or high fat snacks than the controls(p<0.05).

  • PDF

Analysis of the Effects of Radio Traffic Information on Urban Worker's Travel Choice Behavior (교통방송이 제공하는 교통정보가 직장인의 통행행태에 미치는 영향 분석)

  • 윤대식
    • Journal of Korean Society of Transportation
    • /
    • v.20 no.5
    • /
    • pp.33-43
    • /
    • 2002
  • Travel choice behavior is affected by real-time traffic information. Recently, in urban area, real-time traffic information is provided by several instruments such as transportation broadcasting, internet PC network and variable message sign, etc. Furthermore, it has been increasing for urban travelers to use real-time traffic information provided by several instruments. The purpose of this study is to analyze the effects of advanced traveler information on urban worker's travel choice behavior. Among several Advanced Traveler Information System(ATIS) employed in urban area. This study focuses on examining the effects of transportation broadcasting on urban worker's travel choice behavior. This study attempts to examine traveler's mode change behavior in the pre-trip stage and traveler's route change behavior in the on-route stage. For this study, the survey data collected from Daegu City in 2000 is used. For empirical analysis, several nested logit models are estimated, and among them, the best models are reported in this paper. Furthermore, based on the empirical models estimated for this research, important findings and their policy implications are discussed.

Trend and future prospect on the development of technology for electronic security system (기계경비시스템의 기술 변화추세와 개발전망)

  • Chung, Tae-Hwang;So, Sung-Young
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.225-244
    • /
    • 2009
  • Electronic security system is composed mainly of electronic-information-communication device, so system technology, configuration and management of the electronic security system could be affected by the change of information-communication environment. This study is to propose the future prospect on the development of technique for electronic security system through the analysis of the trend and the actual condition on the development of technique. This study is based on literature study and interview with user and provider of electronic security system, also survey was carried out by system provider and members of security integration company to come up with more practical result. Hybrid DVR technology that has multi-function such as motion detection, target tracking and image identification is expected to be developed. And 'Embedded IP camera' technology that internet server and image identification software are built in. Those technologies could change the configuration and management of CCTV system. Fingerprint identification technology and face identification technology are continually developed to get more reliability, but continual development of surveillance and three-dimension identification technology for more efficient face identification system is needed. As radio identification and tracking function of RFID is appreciated as very useful for access control system, hardware and software of RFID technology is expected to be developed, but government's support for market revitalization is necessary. Behavior pattern identification sensor technology is expected to be developed and could replace passive infrared sensor that cause system error, giving security guard firm confidence for response. The principle of behavior pattern identification is similar to image identification, so those two technology could be integrated with tracking technology and radio identification technology of RFID for total monitoring system. For more efficient electronic security system, middle-ware's role is very important to integrate the technology of electronic security system, this could make possible of installing the integrated security system.

  • PDF

An Analysis of Efficiency of Security Services : A Comparative Determinants Analysis of Public and Private Security (경호업무 효율성에 관한 연구 : 공공경호와 민간경호의 효율성 영향요인의 비교분석)

  • Park, Moon-Sun
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.67-103
    • /
    • 2009
  • Objectives of this study is develop security services through determinants analysis on the efficiency of security works regarding security and guarding business in Korea because nowadays the modern society like Korea let alone all over the world faces the increase of dangerous factors in every security field of the human societies, and also it is the very present situation that an individual's life even the national security itself can be at the risk without guaranteeing the efficiency of the security services. For this purpose, this study reviewed related documents, surveyed and interviewed security personnels to identify what the potentially influential factors are in both the public and private security organizations regarding the efficiency of present security services and organizations, and what differences are. Also, comparing the public and private security sectors, this study intended to suggest policy agendas how to enhance the efficiency of security services in the future. This study surveyed the 177 agents and former agents of the Presidential Security Service(PSS) for the public security sector, and also surveyed, interviewed, and internet-based polled 821 randomly selected personnels for the private security sector. This research showed that regarding the efficiency of the security services number of independent variables which had positive responses in the public security sector was more than that in the private security sector. Among the 21 questions regarding this issue, there were all of 21 positive responses in the public security sector while there were 18 negative responses in the private security sector. As a result of synthesizing all the answers of the both sides, it is possible to understand that mostly the ratio of the positive response was much higher. In the public security service, statistically significant variables were budget support for events, prior access of information, an integrated teamwork training, organizational atmosphere, morale of organization personnel. However, practical training of the security service and mutual communication showed unexpectedly negative(-) signs. In the private security service, statistically significant variables were budget support for events, integrated teamwork training, socially friendly atmosphere, compensation for the personnels, bullet-proof equipments and vehicles, mood of organization, personnel recruit and disposition, unexpected incidents and basic attitude for security services. In sum, while organizational personnel variables and organizational management variables were significant in the public security service, some organizational management variables and all socio-environment variables were statistically significant at 5% significance level.

  • PDF

Victims of Bullying among Korean Adolescents: Prevalence and Association with Psychopathology Evaluated Using the Adolescent Mental Health and Problem Behavior Screening Questionnaire-II Standardization Study Data (청소년정서행동발달검사 표준화연구 자료를 활용한 학교폭력 피해 전국유병률 및 관련요인 조사)

  • Bhang, Soo-Young;Yoo, Han-Ik K.;Kim, Ji-Hoon;Kim, Bong-Seog;Lee, Young-Sik;Ahn, Dong-Hyun;Suh, Dong-Su;Cho, Soo-Churl;Hwang, Jun-Won;Bahn, Geon-Ho
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.23 no.1
    • /
    • pp.23-30
    • /
    • 2012
  • Objectives : This study was conducted to investigate the prevalence of victims of bullying and the demographic characteristics of victims, and their related psychopathology, in a Korean nationwide sample of youths in middle and high school over a one month period. Methods : During the autumn of 2009, students in the 7th to 12th grades at 23 secondary schools participated in a nationwide, cross-sectional study. The study subjects completed the Adolescent Mental Health and Problem Behavior Screening Questionnaire-II (AMPQ-II) and Symptom Checklist-90-Revision (SCL-90-R). Based on the data acquired, descriptive statistics, correlation coefficients and multiple logistic regression analysis were performed. Results : Among the 3364 participants, 2272 (67.54%) completed the questionnaire. The prevalence of victimization was 28.9%. Male gender was positively associated with victimization, and grade level was negatively related to victimization. The AMPQ-II bullying score (Factor 4) was significantly (p<.001) and positively correlated to the AMPQ-II student total score (r= 0.50), Worry and thought (Factor 1 ; r=0.38), Mood and suicide (Factor 2 ; r=0.31), Academic and Internet-related problems (Factor 3 ; r=0.24), Rule violations (Factor 5 ; r=0.23), and AMPQ-II teacher total score (r=0.11). Somatization (r=0.23), Obsessive-compulsive behavior (r=0.24), Interpersonal sensitivity (r=0.30), Depression (r=0.33), Anxiety (r=0.26), Hostility (r=0.30), Phobic anxiety (r=0.22), Paranoid ideation (r=0.36), and Psychoticism (r=0.31) results from the SCL-90-R were also found to be positively related to the AMPQ-II bullying score, and remained significant after adjusting for age and gender. A total of 26% of the victims reported suicidal ideations as compared to 9% of non-victims over the month prior to the evaluation ($x^2$=119.595, df=1, p<.001). The multiple logistic regression analysis indicated that the AMPQ-II bullying score significantly increased the risk of suicidal ideation [Exp(b)=1.55, df=1, p<.001] after adjusting for age and gender. Conclusion : School bullying was highly prevalent among Korean middle and high school students. This study provided strong evidence that suicidal ideation and psychopathology were serious problems among the victims of bullying.

Comparative analysis of RN-BSN Program in Korea and U. S. A. (간호학사 편입학제도의 교과과정 비교분석)

  • Lee Ok-Ja;Kim Hyun-Sil
    • The Journal of Korean Academic Society of Nursing Education
    • /
    • v.3
    • /
    • pp.99-116
    • /
    • 1997
  • In response of the increasing demand for professional degree in nursing, some university in Korea offers RN-BSN program for R. N. from diploma in nursing. However, RN-BSN program in Korea is in formative period. Therefore, the purpose of this survey study is for the comparative analysis of RN-BSN curriculum in Korea and U.S.A. In this study, subjects consisted of 18 department of nursing in university and 5 RN-BSN programs in Korea and 18 department of nursing in university and 12 RN-BSN programs in U.S.A. For earn the degree of Bachelor of Science in Nursing, the student earns 134 of mean credits in U.S.A., whereas 150.3 of mean credits in Korea. The mean credit for clinical pratice is 30.1 in U.S.A., whereas 23.9 in Korea. Students are assigned to individually planned clinical experiences under the direction of a preceptor in U.S.A. In RN-BSN program, total mean credits through lecture and clinical practice for earn the degree of BSN is 35.5(lecture : 27.7, practice ; 7.8)in U.S.A., whereas,48.1 (lecture;42.1, practice;6.0) in Korea. RN-BSN program can be taken on a full-or-part time basis in U.S.A., whereas didn't in Korea. Especially, emphasis is place on the advanced nursing practicum that focus on the role of the professional nurse in providing health care to individuals, families, and groups in community setting in U.S.A. 27.7 of mean credits was earned through lecture in U.S.A., whereas 42.1 of mean credits in Korea. It means that RN-BSN program in Korea is the lesser development in teaching method and appraisal method than in U.S.A. Students of RN-BSN program in U.S.A. can earns credit through CLEP, NLN achievement test, portfolio review session etc as well as lecture. Therefore, the authors suggests some recommendations for the development of curriculum of RN-BSN program in Korea based on comparative analysis of RN-BSN curricula in U.S.A. and Korea. 1. The curriculum of RN-BSN Program in nursing was required to do some alterations. Nursing care, today, is complex and ever changing. According to change of public need, RN-BSN curriculum intensified primary care program in community setting, geriatric nursing, marketing skill, computer language. 2. The various and new methods of earning credit should be developed. That is, the students will earn credits through the transfer of previous nursing college credits, accredited examination of university, advanced placement examination, portfolio review session, case study, report, self-directed learning and so on. Flexible teaching place should ile offered. 3. Flexible teaching place should be offered. The RN-BSN curriculum should accommodate each RN student's geographical needs and school/work schedule. Therefore, the university should search a variety of teaching places and the RN students can obtain their degrees comfortably throughout the teaching place such as lecture room inside the health care agency and establishment of the branch school in each student's residence area. 4. The RN-BSN program should offer a long distance education to place-bound RN student in many parts of Korea. That is, from the main office of university, the RN-BSN courses are delivered to many areas by Internet, EdNet (satellite telecommunication) and other non-traditional methods. 5. For allowing RN student to take nursing courses, program length should be various, depending upon the student's study/work schedule. That is, the various term systems such as semester, three terms, quarter systems and the student's status like full time or part time should be considered. Therefore, the student can take advantage of the many other educational and professional opportunities, making them available during the school year.

  • PDF

A digital Audio Watermarking Algorithm using 2D Barcode (2차원 바코드를 이용한 오디오 워터마킹 알고리즘)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.97-107
    • /
    • 2011
  • Nowadays there are a lot of issues about copyright infringement in the Internet world because the digital content on the network can be copied and delivered easily. Indeed the copied version has same quality with the original one. So, copyright owners and content provider want a powerful solution to protect their content. The popular one of the solutions was DRM (digital rights management) that is based on encryption technology and rights control. However, DRM-free service was launched after Steve Jobs who is CEO of Apple proposed a new music service paradigm without DRM, and the DRM is disappeared at the online music market. Even though the online music service decided to not equip the DRM solution, copyright owners and content providers are still searching a solution to protect their content. A solution to replace the DRM technology is digital audio watermarking technology which can embed copyright information into the music. In this paper, the author proposed a new audio watermarking algorithm with two approaches. First, the watermark information is generated by two dimensional barcode which has error correction code. So, the information can be recovered by itself if the errors fall into the range of the error tolerance. The other one is to use chirp sequence of CDMA (code division multiple access). These make the algorithm robust to the several malicious attacks. There are many 2D barcodes. Especially, QR code which is one of the matrix barcodes can express the information and the expression is freer than that of the other matrix barcodes. QR code has the square patterns with double at the three corners and these indicate the boundary of the symbol. This feature of the QR code is proper to express the watermark information. That is, because the QR code is 2D barcodes, nonlinear code and matrix code, it can be modulated to the spread spectrum and can be used for the watermarking algorithm. The proposed algorithm assigns the different spread spectrum sequences to the individual users respectively. In the case that the assigned code sequences are orthogonal, we can identify the watermark information of the individual user from an audio content. The algorithm used the Walsh code as an orthogonal code. The watermark information is rearranged to the 1D sequence from 2D barcode and modulated by the Walsh code. The modulated watermark information is embedded into the DCT (discrete cosine transform) domain of the original audio content. For the performance evaluation, I used 3 audio samples, "Amazing Grace", "Oh! Carol" and "Take me home country roads", The attacks for the robustness test were MP3 compression, echo attack, and sub woofer boost. The MP3 compression was performed by a tool of Cool Edit Pro 2.0. The specification of MP3 was CBR(Constant Bit Rate) 128kbps, 44,100Hz, and stereo. The echo attack had the echo with initial volume 70%, decay 75%, and delay 100msec. The sub woofer boost attack was a modification attack of low frequency part in the Fourier coefficients. The test results showed the proposed algorithm is robust to the attacks. In the MP3 attack, the strength of the watermark information is not affected, and then the watermark can be detected from all of the sample audios. In the sub woofer boost attack, the watermark was detected when the strength is 0.3. Also, in the case of echo attack, the watermark can be identified if the strength is greater and equal than 0.5.

Current Status and Future Prospect of Plant Disease Forecasting System in Korea (우리 나라 식물병 발생예찰의 현황과 전망)

  • Kim, Choong-Hoe
    • Research in Plant Disease
    • /
    • v.8 no.2
    • /
    • pp.84-91
    • /
    • 2002
  • Disease forecasting in Korea was first studied in the Department of Fundamental Research, in the Central Agricultural Technology Institute in Suwon in 1947, where the dispersal of air-borne conidia of blast and brown spot pathogens in rice was examined. Disease forecasting system in Korea is operated based on information obtained from 200 main forecasting plots scattered around country (rice 150, economic crops 50) and 1,403 supplementary observational plots (rice 1,050, others 353) maintained by Korean government. Total number of target crops and diseases in both forecasting plots amount to 30 crops and 104 diseases. Disease development in the forecasting plots is examined by two extension agents specialized in disease forecasting, working in the national Agricul-tural Technology Service Center(ATSC) founded in each city and prefecture. The data obtained by the extension agents are transferred to a central organization, Rural Development Administration (RDA) through an internet-web system for analysis in a nation-wide forecasting program, and forwarded far the Central Forecasting Council consisted of 12 members from administration, university, research institution, meteorology station, and mass media to discuss present situation of disease development and subsequent progress. The council issues a forecasting information message, as a result of analysis, that is announced in public via mass media to 245 agencies including ATSC, who informs to local administration, the related agencies and farmers for implementation of disease control activity. However, in future successful performance of plant disease forecasting system is thought to be securing of excellent extension agents specialized in disease forecasting, elevation of their forecasting ability through continuous trainings, and furnishing of prominent forecasting equipments. Researches in plant disease forecasting in Korea have been concentrated on rice blast, where much information is available, but are substan-tially limited in other diseases. Most of the forecasting researches failed to achieve the continuity of researches on specialized topic, ignoring steady improvement towards practical use. Since disease forecasting loses its value without practicality, more efforts are needed to improve the practicality of the forecasting method in both spatial and temporal aspects. Since significance of disease forecasting is directly related to economic profit, further fore-casting researches should be planned and propelled in relation to fungicide spray scheduling or decision-making of control activities.

A Study on Postconventional Christian Education for Intercultural Conflict Resolution (문화 간 갈등해소를 위한 탈인습적 기독교교육에 관한 연구)

  • Kim, Jinyoung
    • Journal of Christian Education in Korea
    • /
    • v.62
    • /
    • pp.257-283
    • /
    • 2020
  • Our current society is experiencing a mass upheaval through globalization: mobility, hybridity, and cultural diversity are part of this world phenomenon. We can say that these changes are a result of people crossing borders due to international travel, immigration, emigration, studying abroad, labor, international marriages, fast and comfortable transportation, and the Internet. According to 2018 UNPD(Untied Nations Population Division)'s data, the international migrants have exceeded 258 million as of 2017. The increased number of migrants signifies that people with various backgrounds move from their own culture to a drastically different one. Interacting with different cultures can give people the chance to experience abundant lifestyles and improve life qualities. During that process, however, the differences between cultures can cause not only misunderstandings, conflicts, and violent collisions, but also xenophobia or radical nationalism. The current society is confronted with a problem: the people cannot stubbornly cling to a homogenous ethnicity anymore, which makes the coexistence between the citizens and immigrants necessary. Through these circumstances, I aim to suggest an educational model and a practical curriculum from a Christian perspective as the aim of this study. It seeks to encourage Christians to flexibly respond to these conflicts and collisions, and to fulfill their social responsibilities faithfully. For this reason, I will explore and seek sharing practical values through both shalom's communality as a theological approach and postconventionality in mature adults as a social-scientific approach. Consequently, I have few requests for the readers. First, approach with openness, understanding, and respect for other culture. Second, see this study as one step of confronting the global problem for coexistence and coprosperity of all social agents in the earth, a limited space. Third, notice that this study uses the interdisciplinary approach (theological and social scientific view) for a shareable, practical value that consistently leads the curriculum of my thesis, and a scientific method to eliminate bias. Lastly, understand that this study will eventually be used in educational practice, and as a result it prioritizes giving thought to the Christian educational environment. This study begins by exploring the conflicts and collisions between diverse cultures of our current society in international and national cases. Afterwards, I will reflect on how we can manage these conflicts and collisions by exploring the social-scientific view, postconventionality in mature adults, the theological view, and shalom's communality as a complement for the postconventionality's personal dimension. In conclusion, I suggest a curriculum that achieves peace as a practical value based on postventionality and shalom's communality for this study's goal.

Korea's Terrorist Environment and Crisis Management Plan (한국의 테러환경과 위기관리 방안)

  • Jang, Sung Jin;Kim, Young-Hyun;Shin, Seung-Cheol
    • Korean Security Journal
    • /
    • no.52
    • /
    • pp.73-91
    • /
    • 2017
  • This study is based on the political and economic standpoint of each country, Use advanced equipment to prevent new terrorism from causing widespread damage, In order to establish a countermeasures against terrorism in accordance with the reality of Korea, which is effective in responding to terrorist attacks, Korea conducted a SWOT analysis of the terrorist environment and terrorist environment through specialists. First, internal strengths of Korea 's terrorist environment include stable security situation, weakness of religious and ethnic conflicts, strong regulation and control of firearms, and counter terrorism capabilities and know - how accumulated during major international events. Second, the internal weaknesses of the terrorist environment in Korea include the insecurity of the people, the instability caused by the military confrontation with North Korea, the absence of anti-terrorism law system, the difficulty of terrorism control and management by the development of the Internet and IT technology. Third, the external opportunities for Korea 's terrorist environment are as follows: ease of supplementation and learning through cases of foreign terrorism failure, ease of increase of terrorist budget and support with higher terrorism issues, strengthening of counterterrorism through military cooperation with allied nationsRespectively. Fourth, the external threats to the terrorist environment in Korea are the increase of social dissatisfaction due to the continuous influx of defectors and foreign workers, the goal of terrorism from international terrorist organizations through alliance with the United States,Increased frequency of incidents, and increased IS coverage of terrorism around the world. In addition, the SWOT in - depth interviews on the terrorist environment of the expert group were conducted to diagnose and analyze the problems, terrorism awareness and legal system in the Korean terror environment. The results of the study are summarized as follows.First, the basic law on terrorism should be enacted.Second, the establishment of an integrated anti-terrorism organization.Third, securing and nurturing specialized personnel in response to terrorism.

  • PDF