• Title/Summary/Keyword: Registering

Search Result 227, Processing Time 0.022 seconds

A Practical Study of Unified Management System for Irrigation and Drainage Facilities (수리시설물 통합관리시스템 실용화 연구)

  • 김선주;박성삼
    • Magazine of the Korean Society of Agricultural Engineers
    • /
    • v.40 no.3
    • /
    • pp.42-53
    • /
    • 1998
  • About 50 percent of irrigation and drainage facilities in our country are deteriorated as they were constructed over 40 years ago. Worsening the problems in function might be caused by these facilities' constant exposure to the elements. With these reason, efficient maintenance and management of irrigation and drainage facili- ties are required. A computerized system is tailored on the basis of the each characteristics'data of irrigation and drainage facilities. The unified management system to be introduced in this study is a package program consisting of three subprograms. Facility Management(FM) system, the first component, is a relational database system for image processing and registering the characteristics of irrigation and drainage facilities. The objective of this program is to manage the ledger of each facilities and to scan the characteristics of facilities. Telemeter(TM) system, the second component, monitors and processes the data from the sensors statistically. This system is preprogramed for the complete design of TC/TM system. Hydrological Data Management(HDM) system, the third component, executes the hydrological analysis using meteorological data. The unified management system can provide the latest information, such as image data, lists and items of facilities, and items of reforming and rebuilding etc., of the facilities to the manager. At the same time, this system can manage hydrological and meteorological data in realtime.

  • PDF

A Design of Access Control Method for Security Enhance based Smart Device (스마트 디바이스 기반의 보안성 강화를 위한 접근제어 기법 설계)

  • Park, Jungoh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.3
    • /
    • pp.11-20
    • /
    • 2018
  • Smart devices refer to various devices and control equipment such as health care devices, imaging devices, motor devices and wearable devices that use wireless network communication (e.g., Wi-fi, Bluetooth, LTE). Commercial services using such devices are found in a wide range of fields, including home networks, health care and medical services, entertainment and toys. Studies on smart devices have also been actively undertaken by academia and industry alike, as the penetration rate of smartphones grew and the technological progress made with the fourth industrial revolution bring about great convenience for users. While services offered through smart devices come with convenience, there is also various security threats that can lead to financial loss or even a loss of life in the case of terrorist attacks. As attacks that are committed through smart devices tend to pick up where attacks based on wireless internet left off, more research is needed on related security topics. As such, this paper seeks to design an access control method for reinforced security for smart devices. After registering and authenticating the smart device from the user's smart phone and service provider, a safe communication protocol is designed. Then to secure the integrity and confidentiality of the communication data, a management process such as for device renewal or cancellation is designed. Safety and security of the existing systems against attacks are also evaluated. In doing so, an improved efficiency by approximately 44% compared to the encryption processing speed of the existing system was verified.

ebXML Business Process Modeler (ebXML 프레임워크 기반의 비즈니스 프로세스 모델러)

  • 문진영;이대하;박찬규;조현규
    • Proceedings of the CALSEC Conference
    • /
    • 2003.09a
    • /
    • pp.115-120
    • /
    • 2003
  • To execute business collaborations, the business process specification is required and it is generated from the business process model. ebXML, which is the XML-based B2B standard framework for organizations over the Internet, recommends process analyst and modeler to use UN/CEFACT Modeling Methodology for modeling. All the artifacts of the modeling and transformed results between different business models may be registered in the business library for the share and re-use. In this paper, we implement the business process modeler including built-in registry client. It provides not only modeling the business process but also generating the specifications, exporting the metadata about the business model, and registering in the business library.

  • PDF

A Case Study on Quality Improvement of the Food Services for Patients - Focused on back-up orders - (환자 급식서비스의 질 향상 사례 연구 - Back-up 처방 중심으로 -)

  • 이승림;장유경
    • Korean Journal of Community Nutrition
    • /
    • v.8 no.5
    • /
    • pp.755-762
    • /
    • 2003
  • The purpose of this research which, surveyed target hospitals, was to evaluate job operations by surveying the influences of Quality Improvement (QI) activities in various divisions related to a decrease in their back-up orders. Statistical data analyses were completed using the SPSS 11.0 program. The results can be summarized as follows Before QI there were 147 cases of back-up orders ; after QI there were 83 cases, decrease of 64 cases. This was 44%, less than the projected goal of 50%. For each item, there was a decrease of 40 nurse cases, 9 patients and patron cases,9 test surgery deliverly cases and 5 doctor cases after QI. The registering of midnight meals was not shown after QI, due to the Order Communication System (OCS) settlement. After performing QI, the average manual operation per month was reduced from 840 minutes to 498 minutes, of which the difference was 342 minutes, and the average of 342 minutes per month could be used for the peculiar operation of each division. This QI activity provided a good opportunity for establishing cooperation among divisions in providing meals to patients through interactions among divisions. It was recognized that these interactions were effective only when medical services were achieved through organized cooperation among divisions. Among the 7 items included on the patient satisfaction questionnaire, “satisfaction with offered menus” (p<0.01) showed significantly higher scores before QI. However “satisfaction with meal times” (p<0.01) showed significantly lower scores before QI.

Effects of Art Therapy on Cognition, Depression, and Quality of Life in Elderly (미술요법이 노인의 인지, 우울 및 삶의 질에 미치는 효과)

  • Choi, Yeon Hee;Jeon, En Young
    • Research in Community and Public Health Nursing
    • /
    • v.24 no.3
    • /
    • pp.323-331
    • /
    • 2013
  • Purpose: The study attempted to examine whether the group art therapy using a collage medium and reminiscence therapy prevented or reversed dementia, prevented depression, and improved the quality of life of elderly women at high risk for dementia in community public health centers. Methods: As a quasi-experimental study with a non-equivalent control group, this study used a pre-post design. The subjects consisted of a random sample of women over 65 years of age who had been registered as being at high-risk for dementia at the Public Health Center of the G City, and the Dementia Support Center. Of these elders, 30 were assigned to the experimental group and 33 to the control group. The intervention was conducted twice a week for 5 weeks. $x^2$-test, t-test, Wilcoxon test were used to analyze the data. Results: After the program, cognitive function, depression, and quality of life were significantly better in the experimental group than in the control group. Conclusion: The group art therapy can be utilized in community-based nursing practices by identifying and registering those who are at high risk for dementia. The results should prove useful when designing future intervention strategies targeting elderly individuals residing in communities.

Extended Design And Implementation of SIP Proxy Server or Improved Additional Internet Telephony Service (향상된 부가 서비스 지원을 위한 SIP 프락시 서버의 확장 설계 및 구현)

  • 민경주;이종화;강신각;박기식
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.875-879
    • /
    • 2002
  • CPL is a technique that serves various additional service in Internet telephony such as call forwarding, call blocking etc. IETF IPTEL working group developed this CPL standard. Users could request various additional services such as call forwarding, call blocking etc. by registering XML scripts to location servers. This paper would describe the design and the implementation skill of SIP proxy server that support these improved functionalities in detail. SIP registrar and SIP proxy server are designed and implemented in Linux platform because this platform serves fast and low cost development environment.

  • PDF

Design of a Sanction System for Six Sigma Project (식스 시그마 프로젝트를 위한 결재 시스템 설계)

  • Kang, Dae-Ki;Chang, Won-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.4
    • /
    • pp.868-874
    • /
    • 2010
  • In this paper, we propose a design of automated electronic sanction system for management of six sigma projects. The proposed system performs diverse operations such as registering and choosing enterprise-wide enhancement project, managing schedules of the project, verifying the validity of the project, and thus managing the whole life cycle of the project. Each six sigma project is stored in the database repository for facilitation of its later use. The proposed system has been effectively applied in a Korean company, and thus, through the proposed system, we expect the effects of innovation-related and enhancement-related activities which six sigma is fundamentally pursuing.

Resolving Occlusion Technique of Virtual Target on Real Image using DEM (DEM을 이용한 실영상기반 가상표적의 폐색처리기법)

  • Cha, Jeong-Hee;Jang, Hyo-Jong;Kim, Gye-Young
    • The KIPS Transactions:PartB
    • /
    • v.13B no.7 s.110
    • /
    • pp.663-670
    • /
    • 2006
  • For virtual target to be displaying on real image realistically, it is essential to determine the location of the virtual object together with producing the occlusions area after registering two world. In this paper, we propose the new method to solve occlusions which happens during virtual target moves according to the simulated route on real image. For this purpose, we first construct three dimensional virtual world by DEM of experimental area and register CCD camera image on it by visual clues. Next, we also propose a method to solve the occlusion using snake and picking algorithm which can extract the three dimensional information of the position happening occlusion in the image and can use it when target moves that area. In the experiment, we proved the effectiveness of the proposed method in the environment which a partial occlusions happens.

Human Activity Recognition Using Body Joint-Angle Features and Hidden Markov Model

  • Uddin, Md. Zia;Thang, Nguyen Duc;Kim, Jeong-Tai;Kim, Tae-Seong
    • ETRI Journal
    • /
    • v.33 no.4
    • /
    • pp.569-579
    • /
    • 2011
  • This paper presents a novel approach for human activity recognition (HAR) using the joint angles from a 3D model of a human body. Unlike conventional approaches in which the joint angles are computed from inverse kinematic analysis of the optical marker positions captured with multiple cameras, our approach utilizes the body joint angles estimated directly from time-series activity images acquired with a single stereo camera by co-registering a 3D body model to the stereo information. The estimated joint-angle features are then mapped into codewords to generate discrete symbols for a hidden Markov model (HMM) of each activity. With these symbols, each activity is trained through the HMM, and later, all the trained HMMs are used for activity recognition. The performance of our joint-angle-based HAR has been compared to that of a conventional binary and depth silhouette-based HAR, producing significantly better results in the recognition rate, especially for the activities that are not discernible with the conventional approaches.

Dietary Behavior by Residence Types of Female College Students in Chungbuk Area (거주형태에 따른 충북지역 여대생의 식행동 비교)

  • Jung, Eun-Hee
    • The Korean Journal of Community Living Science
    • /
    • v.16 no.4
    • /
    • pp.115-123
    • /
    • 2005
  • This study was performed to compare dietary behaviors based on residence types of female college students. Self reports on dietary behavior and one-day dietary records were obtained from 227 female college students using anonymous questionnaires. The mean age of the subjects was $20.4{\pm}1.43$, and the height and weight were $162.5{\pm}4.8cm$ and $52.3{\pm}7.9kg$, respectively, The dietary behavior of female college students was inadequate, showing indifference to dietary balance, irregularity of meals, skipping breakfast, and high experience of drinking. One-day dietary records were obtained from 24k recall methods also showed a high number registering skipped meal status ($55.3\%$) and less diverse food intake (DVS, 12.5; DDS, 3.93). The students in self boarding residence were especially more likely not to eat properly and their dietary behaviors were found to be significantly poor. In the case of home residence, food intake frequency scores for milk and dairy products, fruits, and fishes were significantly higher, however the students in self boarding residences showed high food intake frequency scores in salted food, retort food, canned food, and especially instant ramyun. Therefore, more attention needs to be given to them to recognize the problems in their own dietary behaviors and more practical nutritional supports, like developing a menu for breakfast in college cafeterias, would be helpful to improve their dietary choices.

  • PDF