• Title/Summary/Keyword: School security

Search Result 3,325, Processing Time 0.034 seconds

Estimating the Economic Impact of Smoke-free Policy in Restaurants using an Input-Output Analysis (산업연관분석을 이용한 음식점 금연 정책의 경제적 효과 분석)

  • Seo, Sukyong;Yeon, Seunguk;Yoo, Ki-Bong;Cho, Hong-Jun;Lee, Ju hyun;Noh, Jin-Won
    • Culinary science and hospitality research
    • /
    • v.23 no.5
    • /
    • pp.169-177
    • /
    • 2017
  • Smoking bans at restaurants and bars have recently been introduced in Korea. Researchers and stakeholder are interested in the resulting changes in sales of restaurants and bars and their impact on overall national economy including employment. We examined the input-output tables (2013) issued by The Bank of Korea. The result showed that the production inducement coefficient was about 2.16; employment inducement coefficient was 13.1 for the restaurant and bar industry. The amount of inducement in the national production was calculated by 93,100 billion KRW. Employment inducement was calculated by 1,219,610 persons overall industries for a year. Assuming there comes a change (3%, 5%, 10%) in restaurant and bar production in consequence of the smoking bans, we computed following change in the national production and employment. The resulting changed in national production was 6,033 billion, 10,055 billion, and 20,110 billion KRW, respectively. The impact of employment overall industries was calculated 79,032, 131,720 and 263,441 persons, respectively.

Research on Effective Scientific Investigation Methods with Regards to Explosion Accidents (폭발사고시 효과적인 과학수사 방법에 관한 연구)

  • Jun, Sang-Gun;Chae, Jong-Min
    • Journal of forensic and investigative science
    • /
    • v.1 no.1
    • /
    • pp.72-87
    • /
    • 2006
  • Accidents and terrorist acts that utilize explosives have a great influence on society and thus require a prompt investigation for the arrest of the culprit. However, such investigations are often met with difficulties due to the vastness of the crime scene, restrictions on approaching the scene, fragility of the evidence, complexity of investigation, and the lack of expertise. In spite of such facts, scientific investigation regarding explosives have not been widely studied in Korea. Therefore, the focus of this research primarily concerns the effective scientific investigation methods in cases of accidents that involve chemical explosives. Although the a systematic investigation method is at the heart of scientific investigation in cases of explosive accidents, it is only at its rudimentary stage. Therefore, in this research, a systematic investigation method is put forth for the 'scene investigation, the documentation of the scene, and the collection and processing of evidence. Further, I have set forth a 'scene investigation check list' the ensure a thorough scene investigation and to promote an exhaustive evidence collection that would guarantee the admissibility of such evidence in court. The above efforts were aimed at simplifying the currently complicated investigation system. 1) In the future, a guidebook that can be generally applied to accidents involving explosives in Korea ught to be produced, a continual systematic education and integrated training excises for investigators ought to be established, laws that require additives in explosives ought to be instituted so that the type, components, and source of explosives can be identified, and lastly, a database that contain information on former explosion accidents, trends, and techniques of criminal activities that involve explosion accidents should be compiled.

  • PDF

Development of Hybrid Power Storage System for Urban Railway with UPS Function for Emergency Power Generation (비상발전용 UPS 기능을 갖춘 도시철도용 복합형 전력저장시스템 개발)

  • Hong, Kyungjin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.6
    • /
    • pp.191-196
    • /
    • 2019
  • In the case of urban railway facilities, the power supply should be maintained for the safe movement of passengers in communication facilities, disaster prevention facilities and boarding area security because of the confusion when power supply is cut off due to the nature of public transportation. In addition, considering that the number of trains is running on the urban railway line, it is necessary to operate at least 30 minutes for the bus stop and at least 1 hour for the communication and disaster prevention facilities. Therefore, it is essential to supply emergency power source to maintain stable operation of induction lamp and smoke exhaust system because main power is cut off in order to prevent further spread due to fire in case of the history of urban railway section or vehicle fires. Recently, UPS(Uninterruptible Power Supply) function to prevent power outage in emergency, emergency power generation combined with ESS function which saves electricity at nighttime price time, A hybrid power storage system with a UPS function.

Analysis of The Effectiveness of Server Based Computing Model Schools (SBC 기반 컴퓨터실 시범운영과 효과성 분석)

  • Kim, Han-Sung;Kim, Jin-Il;Jang, Sun-Il;Lee, Won-Gyu
    • The Journal of Korean Association of Computer Education
    • /
    • v.13 no.3
    • /
    • pp.55-63
    • /
    • 2010
  • In order to solve the problems of maintenance and security for information-infrastructure, public organizations and some of leading companies adopted Server Based Computing(SBC) infrastructure. The effectiveness and possibility of SBC has become focused with the Cloud-Computing infrastructure, which is a extended concept of SBC, as it is being magnified as a main part among the internet business models for the next generation. The purpose of this study was to analyze its probability in elementary and secondary school and find out its effectiveness. In order to do this, three model schools have been selected from GyeongBuk, ChungNam, ChungBuk province and they were managed by SBC infrastructure. And We conducted analysis of satisfaction for teachers and students, interview with teachers and classroom observation as a effectiveness verification. As the results of the analysis, First, we can find out which part we should consider more when we are to adopt SBC infrastructure. Second, the level of satisfaction for teachers is 3.45 and students is 3.2. Therefore, this study was concluded to contribute to find directions what should be considered when setting the SBC infrastructure in elementary and secondary schools.

  • PDF

Routing for Enhancing Source-Location Privacy in Wireless Sensor Networks of Multiple Assets

  • Tscha, Yeong-Hwan
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.589-598
    • /
    • 2009
  • In wireless sensor networks, a node that reports information gathered from adjacent assets should relay packets appropriately so that its location context is kept private, and thereby helping ensure the security of the assets that are being monitored. Unfortunately, existing routing methods that counter the local eavesdropping-based tracing deal with a single asset, and most of them suffer from the packet-delivery latency as they prefer to take a separate path of many hops for each packet being sent. In this paper, we propose a routing method, greedy perimeter stateless routing-based source-location privacy with crew size w (GSLP-w), that enhances location privacy of the packet-originating node (i.e., active source) in the presence of multiple assets. GSLP-w is a hybrid method, in which the next-hop node is chosen in one of four modes, namely greedy, random, perimeter, and retreat modes. Random forwarding brings the path diversity, while greedy forwarding refrains from taking an excessively long path and leads to convergence to the destination. Perimeter routing makes detours that avoid the nodes near assets so that they cannot be located by an adversary tracing up the route path. We study the performance of GSLP-w with respect to crew size w (the number of packets being sent per path) and the number of sources. GSLP-w is compared with phantom routing-single path (PR-SP), which is a notable routing method for source-location privacy and our simulation results show that improvements from the point of the ratio of safety period and delivery latency become significant as the number of source nodes increases.

A Convergence Study on Improvement of Emission Regulation in Military Vehicle (군용차량 배출가스 규제 개선에 관한 융합적 고찰)

  • Yoon, Heung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.1
    • /
    • pp.181-186
    • /
    • 2020
  • Civil technologies and parts occupy big ratio in military vehicle as military supply goods were commercialized. In case of the military vehicle engine, the civil purposed engine has been militarized without developing engine for defense industry. Because of this, it happens that Euro-5 version is mounted in spite of Euro-6 at present because the civil laws on the civil purpose engine and required operational capability for militarization are applied by overlapping. Therefore, this study focused on current situation and issues on the military vehicle emission regulation and suggested how to improve through analyzing the theses, articles, Korean laws and systems. For improving methods, imposing the emission certification duty and exempting the certification for the vehicle of high strategical importance were suggested through aligning the related laws. Consequently, it is expected that this study will be used for basics of checking the civil laws and connection with military systems for commercialization of military supplied goods.

Monitoring method of Unlawful Parking Vehicle using RFID technology and Neural Networks (RFID 기술과 신경망 알고리즘을 이용한 불법 주차 차량 감시 방법)

  • Hong, You-Sik;Kim, Cheon-Shik;Han, Chang-Pyoung;Oh, Seon;Yoon, Eun-Jun
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.4
    • /
    • pp.13-20
    • /
    • 2009
  • RFIDs have been used a lot of control systems such as library and security efficiently. Unlawful parking control is one of them and it will bring a lot of merit. Especially, it can be used vehicles. If a vehicle comes to unlawful parking place, reader system read the tag of a vehicle. RFID reader confirm the vehicle and record current time at the same time send information related the vehicle to the server system. After, it can be activated. If the vehicle move from unlawful parking place, RFID reader record departed time. In this paper, we proposed a monitoring system for unlawful parking cars. Especially, it is certain that this proposed modelling is very efficient and correct.

Low-Cost AES Implementation for Wireless Embedded Systems (무선 내장형 시스템을 위한 제비용 AES의 구현)

  • LEE Dong-Ho
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.41 no.12
    • /
    • pp.67-74
    • /
    • 2004
  • AES is frequently used as a symmetric cryptography algorithm for the Internet. Wireless embedded systems increasingly use more conventional wired network protocols. Hence, it is important to have low-cost implementations of AES for thor The basic architecture of AES unrolls oかy one full cipher round which uses 20 S-boxes together with the key scheduler and the algorithm repeatedly executes it. To reduce the implementation cost further, the folded architecture which uses only eight S-box units was studied in the recent years. In this paper, we will study a low-cost AES implementation for wireless communication technology based on the folded architecture. We first improve the folded architecture to avoid the sixteen bytes of additional state memory. Then, we implemented a single byte architecture where only one S-box unit is used for data encryption and key scheduling. It takes 352 clocks to finish a complete encryption. We found that the maximum clock frequency of its FPGA implementation reaches about 40 MHz. It can achieve about 13 Mbps which is enough for 3G wireless communication technology.

Trend Analysis Regarding the Institutional Foodservice-Related Research in Korea from 2005 to 2009 (2005년부터 2009년까지 한국의 단체급식에 관한 연구 동향분석)

  • Ju, Se-Young;Kwon, Yong-Suk;Chung, Hea-Jung
    • The Korean Journal of Community Living Science
    • /
    • v.23 no.2
    • /
    • pp.103-116
    • /
    • 2012
  • The purpose of this study was to investigate the trend of academic journals of institutional foodservice published from 2005 to 2009. This study was conducted by content analysis. We collected 322 articles including the subject of institutional foodservice Industry published from January 1, 2005 to December 31, 2009. Classification based on content analysis was conducted based on research method, statistical analysis, survey area, institution and location, sample type and research subject. First, in case of the research method, primary field survey/monitoring showed the highest rate. In addition, statistical analysis was as follows. Frequency/descriptive analysis were used as the highest rate. Survey area was a high percentage in case of Seoul/Incheon/Gyeong-gi province. In case of the institution and location, school/university showed the highest rate. In the sample type, foodservice employee/dietitian/nutrition teacher showed the highest rate. In this study, the most important research subjects were classified study subjects into seven by taking advantage of the previous studies. The greatest numerical study in seven study subjects was 'service quality and customers'(28.9%), and the following subjects were 'foodservice operation'(26.4%), 'hygiene, security and microbiology' (15.8%), 'organization and human resource' (15.5%). But it is noteworthy that 'marketing and strategic management'(9.6%) and 'education and training'(3.1%) of lower research results in this study are also important fields in institutional foodservice industry. Moreover, the study of such subjects is considered more necessary in the future.

On Determinants of Physician Utilization -A causal analysis- (의료이용(醫療利用)에 영향(影響)을 미치는 요인(要因)에 관(關)한 분석(分析))

  • Bae, Sang-Soo
    • Journal of Preventive Medicine and Public Health
    • /
    • v.18 no.1
    • /
    • pp.13-24
    • /
    • 1985
  • This study seeks to provide a framework for understanding differential access to medical care. The framework is provided by Anderson Model, a model of health services utilization which suggests a sequence of predisposing, enabling, illness-morbidity characteristics that determine the number of times people will visit a physician. The framework in this study is composed of two models, one is for Adults and the other is for Non-Adults. Models are operationalized using stepwise multiple regression analysis and path analysis. The data come from a national health survey conducted in 1983. The findings of the analysis can be summarized as follows : First, the causal models used in this study are able to explain only a small amount of the variance in medical care utilization(Adjusted $R^2$ is .144 in the Model for Adults and .243 in that for Non-Adults). This finding suggests that we reconsider the utility of such existing model using the predisposing, enabling, and illness-morbidity characteristics in light of their poor correspondence with these data. Second, while small amount of the valiance in medical care utilization is explained, most of the explained variance is due to the illness-morbidity characteristics. The path coefficients of study variables except illness-morbidity variables show these characteristics to be substantially unrelated to medical care utilization, and the indirect effects of the predisposing and edabling characteristics on medical care utilization are also negligible. This casts doubt on the importance of the predisposing and enabling characteristics in explaining medical care utilization. Third, among the predisposing and enabling characteristics, Medical Security variable is the only one having significant direct effect on medical care utilization in both models for Adults and for Non-Adults. Fourth, the amount of the variance explained in the Model for Non-Adults is more than in the Model for Adults. This suggests that medical care utilization of adults is more influenced by behavioral factors than that of children.

  • PDF