• Title/Summary/Keyword: Training

Search Result 22,094, Processing Time 1.699 seconds

Nutrition Teachers (Dietitians)' Perceptions of Barriers to Implementation of HACCP System in School Foodservices in the Gyeongnam Area (경남지역 학교급식 HACCP 시스템 적용 장애요인에 대한 영양(교)사의 인지도 분석)

  • Hwang, Hye-Ok;Kim, Hyun-Ah
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.41 no.10
    • /
    • pp.1475-1485
    • /
    • 2012
  • This study was conducted in order to understand nutrition teachers (dietitians)' perceptions of barriers to implementation of HACCP system in school foodservices in Gyeongnam, Korea. Questionnaires were distributed to 350 nutrition teachers (dietitians) from November to December of 2009, and 214 were collected and analyzed. The results of this study were as follows. First, nutrition teachers (dietitians) recognized the following as barriers in implementing the HACCP system: 'the status of facilities and utilities'> 'monitoring'> 'work satisfaction'> 'foodservice employees'> 'cooperation of HACCP team'> 'cooperation of persons concerned besides foodservice employees'> 'understanding the HACCP system'. Second, total working experience was found to be the factor most affecting 'cooperation of HACCP team (p<0.01)', 'cooperation of persons concerned besides foodservice employees (p<0.01)', 'foodservice employees (p<0.05)', and 'work satisfaction (p<0.05)'. Further, 'the status of facilities and utilities' was significantly affected by 'construction/reconstruction of kitchen (p<0.01)', 'division of kitchen area (p<0.01)', 'existence of preliminary preparation room (p<0.01)', and 'existence of dishwashing room (p<0.01)'. Third, dietitians perceived the following concerning hindrance factors of the HACCP system according to CCP stage: 'CCP 1'> 'CCP 3'> 'CCP 2, 'CCP 6'> 'CCP 4'> 'CCP 8'> 'CCP 7'> 'CCP 5'. In conclusion, this study showed that nutrition teachers (dietitians) in the Gyeongnam area recognized 'the status of facilities and utilities' from HACCP areas and 'CCP 1 (menu planning)' from CCP stages as the greatest barriers to implementing the HACCP system in school foodservices. To implement the HACCP system successfully in school foodservices, facilities and utilities should be properly equipped, and menu planning training for nutrition teachers (dietitian) should be conducted.

The Effect of PNF Technique application Using Thera-Band on the Balance and Gait of Females over 65 years old (세라밴드를 이용한 PNF 기법 적용이 65세 이상 여성노인의 균형과 보행에 미치는 영향)

  • Kang, Dal-Won;Kang, Mi-Kyoung;Kang, Eun-Sil;Go, Yu-Ri;Kim, Da-Woon;Kim, Dae-Yong;Kim, Jung-Eun;Kim, Won-Hwang;Kim, Ja-Yeon;Kim, Hwan;Jung, Dae-In;Kim, Myung-Hoon;Kim, Sang-Yup;Lee, Dong-Jin;Kim, Chan-Kyu;Kim, Hyun-Jin
    • Journal of Korean Physical Therapy Science
    • /
    • v.18 no.1
    • /
    • pp.1-10
    • /
    • 2011
  • Purpose: Study on the effect of the use of Proprioceptive Neuromuscular Facilitation(PNF) method by use of the direction and charge regulation which is the advantage of the Thera-band therapy on the walks and balances in old people and comparison with the result after applying the general PNF technique. Method: The study has been performed on 30 females over 65 years old. The study has been done by dividing the object group in 3 patterns, which are number 1, the comparison group of 10, two ones that are applied the PNF technique using Thera-band and third, the ones that are applied only the PNF technique. For the PNF and the Thera-band using PNF, we have divided the group into Combination of Isotonic technique and the Rhythmical stabilization technique according to the patient's acquaintance pattern and applied them to the patient's body. Evaluation was the balancing ability which was calculated by using the BIODEX Balance system / FRT and for the evaluation of walking ability, we have used the speed of walking for 10M / TUG. Result: In the comparison group of 10, the balancing ability and the walking ability did not change much before and after the experiment, which made it possible to compare the group with the other two easily(p>0.05). For the other two groups, we have recognized the enhancement both in the balancing ability and the walking ability, but they did not know much difference between themselves(p<0.05). Conclusion: Though there were not a big difference in the sense of improvement between the Thera-band using PNF and the PNF technique only, we could infer that these two therapy has enhanced much in the walking and balancing ability for people over 65 and through these result we can foresee that not only using the method shown in this study but also by using many advantages of Thera-band, we could diminish the tiredness of healer, enhance the efficiency of exercise in them and also by forming self training program for older people we could help them build the prevention program from falls.

  • PDF

A Study for an Educational Direction in Fashion Design Subjected to Digital Environment I (디지털 환경에 따른 패션분야의 디자인 교육방향 연구 I)

  • 이미량
    • Archives of design research
    • /
    • v.12 no.4
    • /
    • pp.33-44
    • /
    • 1999
  • Fashion is subjected to newness and change by itself. Fashion trend and tendency which could predict next season akeady indicated that digital and cybel11ation environment lliould be factors in fashion. Changes in future life styles and values caused by digital environment must be variables as fashion objects by themselves. Therefore digital environment of a fashion itself and that all encountered in fashion will not only be an existing situation but also an objective and a factor which must be pursued with fashionable sense in future fashion. Advanced technology and social change in relation to digital environment requires that educational method as well as its content will be changed on the scene of education for future. Thus we should seek an educational direction in fashion design for future society in which digital environment requires new paradigm. Subject to these backgrounds this study has an intension to study the change in fashion extensively influenced by expanded digital environment on a limited situational level of fashion design education and to suggest an educational direction for professional in future fashion design who will serve as a core of fashion area in the future. It is essential that education of professional in fashion for future should be achieved by digital-minded level that eagerly understands and accepts future society in which digital environment will be a main axis. It is necessary for this to make them expetience computers, digital media including CAD program. We have to note that education of digital media is more effective and applicable when accomplished in CAI level which can be related and expetienced with fashion education rather than mere functional training in media themselves. Intellectual creativity will be a vety source of producing values and national competence in 21st centtury. Education of design professional in fashion area must positively accept these environmental charactetistics in future society, as well as deeply reflect the education for the future.

  • PDF

Ground Security Activities for Prevention of Aviation Terrorism -Centered on San Francisco International Airport of the U.S.A.- (항공테러방지를 위한 지상 보안활동 -미국 샌프란시스코국제공항을 중심으로-)

  • Kang, Maeng-Jin;Kang, Jae-Won
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.2
    • /
    • pp.195-204
    • /
    • 2008
  • With the growth of airline management, as well as computer and IT security, the international trade in this modern society has been rapidly increasing, Along with the advancing, airplanes have become a universal means of communication. However, the complications associated with airplane safety have also been brought up as a result, the most concerning of which is terrorism. One of the main counterplans for preventing terrorism is Ground security activities the core of Ground security activities is absolute safety for passengers in both passenger terminal and freight terminal. Subastral security refers to physical protection, proximity control and 100% security search and freight guarding of the passengers' possessions, and the personnel's duties to perform such jobs are be! coming more crucial. On the other hand, Airport security check has bee n gradually developing since the 1960's, when hijacking began to take place. Although the airports have been providing more safe and comfortable services to their customers, terrorism is still happening today. When Ground security activities is minute, the users feel displeasure and discomfort, yet considering solely their convenience can brings problems in achieving safety. Since the 9.11 terror in 2001, the idea of improving and strengthening airport security was reinforced and a considerable amount of estate is being spent today for invention and application of new technology. Various nations, including the United States, have been improving their systems of security through public services; public police department is actively carrying out their duties in airports as well. In San Francisco International Airport, private police department is in charge of collection of data, national events, VIP protection, law enforcement, cooperation within facilities, daily-based patrol and traffic control. Under guidance and supervision of national organizations, such as TSA, general police department interprets X-Rays, operates metal detectors, checks passports or IDs and observes reactions to explosives. Under these circumstances, studies about advancement of cooperation and duties of general police department and private police department necessitated: especially about private police department and their training for searching equipments, decrease in number of turn over rate, invention of technology and prior settlement in estate for security. The privacy of the public, who make up the major population of airport passengers, must also be minimized. In the following research, the activities of police departments in San Francisco International Airport will be analyzed in order to understand recent actions of the United States on airport security.

A Study On Irrigation Water Price Structure and Prescription (농업용수의 가격구조에 관한 연구)

  • 심기영
    • Magazine of the Korean Society of Agricultural Engineers
    • /
    • v.15 no.4
    • /
    • pp.3170-3180
    • /
    • 1973
  • This study of the subject will review past and present irrigation development in Korea. Particular attention will be given to water pricing structure and a case study on the purpose of rational operation and management of irrigation water and organizations, and the optimum irrigation water and organizations, and the optimum irrigation water fee inorder to reduce farmers burden and to rationalize the farmland associations management so as to achieve development of the rural environment. In 1971, the reservoir of the Farmland Improvement A sociation (FIA) produced only 775 millison $m^3$ of irrigation water or 77% of planned capacity of 1,015 million $m^3$. It was caused by inefficient maintenance of irrigation facilities; for instance, about 21% of reservoirs, pumping stations and weirs in Korea have been silted by soil erosion which hinder to water production according to an ADC survey. The first Irritation Association was established in 1906, whcih was renamed the Farmland Assoeiation by the Rural Development Enouragement Law in 1970. By the end of 1971, 411,000 ha of rice paddies were under the control of 267 associations nationwide. The average water price assessed by Associations nationwide rose from 790 won per 0.1 ha. in 1966 to 1,886 won in 1971. The annual growth rate was 20%. The highest water price in 1971 was 4,773 won her 0.1 ha. and the lowest was 437 won. This range was caused by differences in debt burden, geographic conditions and management efficiency among the Associations. In 1971, the number of Associations which exceeded the average water price of 1,886 won per 0.1 ha. was 144, or 55.1% of all Association. In determination of water price, there are two principles; one is determined by production cost such as installation cost of irrigation facilities, maintenance cost, management cost and depreciation ect. For instance, the Yong San River Development project was required 33.7 billion won for total construction and maintenance cost is 3.1 billion won for repayment, maintenance and management cost per year. The project produces 590 million $m^3$ of irrigation water annually. Accordingly, the water price per $m^3$ is 5.25 won. The other principle is determined by water value in the crop products and in compared with production of irrigated paddy and non-irrigated paddy. By using this method, water value in compared with paddy rice vs. upland rice(Average of 1967-1971) was 14.15 won per $m^3$ and irrigated paddy vs. non-irrigated paddy was 2.98 won per $m^3$. In contrast the irrigation fee in average association of 1967-1971 was 1.54 won per $m^3$. Accordingly, the current national average irrigation fee(water price) is resonable compared with its water value. In this study, it is found that the ceiling of water price in terms of water value is 2.98 won per $m^3$ or 2,530 won per 0.1 ha. However, in 1971 55% of the associations were above the average of nationwide irrigation fees. which shows the need for rationalization of the Association's management. In connection with rationalization of the Association's management, this study recommends the following matters. (1) Irrigation fee must be assessed according to the amount of water consumption taking intoaccount the farmer's ability. (2) Irrigation fee should be graded according to behefits and crop patterns. (3) Training personnel in the operation and procedures of water management to save O&M costs. (4) Insolvent farmland association should be integrated into larger, sound associations in the same GUN in order to reduce farmers' water cost. (5) The maintenance and repair of existing irrigation facilities is as important as expansion of facilities. (6) Establishment of a new Union of Farmland Association is required to promoted proper maintenance and to protect the huge investment in irrigation facilities by means of technical supervision and guidance.

  • PDF

Estimation of Rice-Planted Area using Landsat TM Imagery in Dangjin-gun area (Landsat TM 화상을 이용한 당진군 일원의 논면적 추정)

  • 홍석영;임상규;이규성;조인상;김길웅
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.3 no.1
    • /
    • pp.5-15
    • /
    • 2001
  • For estimating paddy field area with Landsat TM images, two dates, May 31, 1991 (transplanting stage) and August 19, 1991 (heading stage) were selected by the data analysis of digital numbers considering rice cropping calendar. Four different estimating methods (1) rule-based classification method, (2) supervised classification(maximum likelihood), (3) unsupervised classification (ISODATA, No. of class:15), (4) unsupervised classification (ISODATA, No. of class:20) were examined. Paddy field area was estimated to 7291.19 ha by non-classification method. In comparison with topographical map (1:25,000), accuracy far paddy field area was 92%. A new image stacked by 10 layers, Landsat TM band 3,4,5, RVI, and wetness in May 31,1991 and August 19,1991 was made to estimate paddy field area by both supervised and unsupervised classification method. Paddy field was classified to 9100.98 ha by supervised classification. Error matrix showed 97.2% overall accuracy far training samples. Accuracy compared with topographical map was 95%. Unsupervised classifications by ISODATA using principal axis. Paddy field area by two different classification number of criteria were 6663.60 ha and 5704.56 ha and accuracy compared with topographical map was 87% and 82%. Irrespective of the estimating methods, paddy fields were discriminated very well by using two-date Landsat TM images in May 31,1991 (transplanting stage) and August 19,1991 (heading stage). Among estimation methods, rule-based classification method was the easiest to analyze and fast to process.

  • PDF

The Evolution of Cyber Singer Viewed from the Coevolution of Man and Machine (인간과 기계의 공진화적 관점에서 바라본 사이버가수의 진화과정)

  • Kim, Dae-Woo
    • Cartoon and Animation Studies
    • /
    • s.39
    • /
    • pp.261-295
    • /
    • 2015
  • Cyber singer appeared in the late 1990s has disappeared briefly appeared. although a few attempts in the 2000s, it did not show significant successes. cyber singer was born thanks to the technical development of the IT industry and the emergence of an idol training system in the music industry. It was developed by Vocaloid 'Seeyou' starting from 'Adam'. cyber singer that differenatiated typical digital characters in a cartoon or game may be subject to idolize to the music as a medium. They also feature forming a plurality of fandom. therefore, such attempts and repeated failures, this could be considered a fashion, but it flew content creation and ongoing attempts to take advantage of the new media, such as Vocaloid can see that there are expectations for a true Cyber-born singer. Early-Cyber singer is made only resemble human appearance, but 'Sciart' and 'Seeyou' has been evolving to becoming more like the human capabilities. in this paper, stylized cyber singer had disappeared in the past in the process of developing the technology to evolve into own artificial life does not end in failure cases, gradually led to a change in public perceptions of the image look looking machine was an attempt in that sense. With the direction of the evolution of the mechanical function to obtain a human, fun and human exchanges and mutual feelings. And it is equipped with an artificial life form that evolved with it only in appearance and function. in order to support this logic, I refer to the study of the coevolution of man and machine at every Bruce Mazlish. And, I have analyzed the evolution of cyber singer Bruce research from the perspective of the development process since the late 1990s, the planning of the eight singers who have appeared and design of the cyber character and important voices to be evaluated as a singer (vocal). The machine has been evolving coevolution with humans. cyber singer ambivalent development targets are recognized, but strive to become the new artificial creatures of horror idea of human desire and death continues. therefore, the new Cyber-organisms are likely to be the same style as 'Seeyou'. because, cartoon forms and whirring voice may not be in the form of a signifier is the real human desires, but this is because the contemporary public's desire to be desired and the technical development of this type can be created at the point where the cross-signifier.

An Investigation on Expanding Co-occurrence Criteria in Association Rule Mining (연관규칙 마이닝에서의 동시성 기준 확장에 대한 연구)

  • Kim, Mi-Sung;Kim, Nam-Gyu;Ahn, Jae-Hyeon
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.23-38
    • /
    • 2012
  • There is a large difference between purchasing patterns in an online shopping mall and in an offline market. This difference may be caused mainly by the difference in accessibility of online and offline markets. It means that an interval between the initial purchasing decision and its realization appears to be relatively short in an online shopping mall, because a customer can make an order immediately. Because of the short interval between a purchasing decision and its realization, an online shopping mall transaction usually contains fewer items than that of an offline market. In an offline market, customers usually keep some items in mind and buy them all at once a few days after deciding to buy them, instead of buying each item individually and immediately. On the contrary, more than 70% of online shopping mall transactions contain only one item. This statistic implies that traditional data mining techniques cannot be directly applied to online market analysis, because hardly any association rules can survive with an acceptable level of Support because of too many Null Transactions. Most market basket analyses on online shopping mall transactions, therefore, have been performed by expanding the co-occurrence criteria of traditional association rule mining. While the traditional co-occurrence criteria defines items purchased in one transaction as concurrently purchased items, the expanded co-occurrence criteria regards items purchased by a customer during some predefined period (e.g., a day) as concurrently purchased items. In studies using expanded co-occurrence criteria, however, the criteria has been defined arbitrarily by researchers without any theoretical grounds or agreement. The lack of clear grounds of adopting a certain co-occurrence criteria degrades the reliability of the analytical results. Moreover, it is hard to derive new meaningful findings by combining the outcomes of previous individual studies. In this paper, we attempt to compare expanded co-occurrence criteria and propose a guideline for selecting an appropriate one. First of all, we compare the accuracy of association rules discovered according to various co-occurrence criteria. By doing this experiment we expect that we can provide a guideline for selecting appropriate co-occurrence criteria that corresponds to the purpose of the analysis. Additionally, we will perform similar experiments with several groups of customers that are segmented by each customer's average duration between orders. By this experiment, we attempt to discover the relationship between the optimal co-occurrence criteria and the customer's average duration between orders. Finally, by a series of experiments, we expect that we can provide basic guidelines for developing customized recommendation systems. Our experiments use a real dataset acquired from one of the largest internet shopping malls in Korea. We use 66,278 transactions of 3,847 customers conducted during the last two years. Overall results show that the accuracy of association rules of frequent shoppers (whose average duration between orders is relatively short) is higher than that of causal shoppers. In addition we discover that with frequent shoppers, the accuracy of association rules appears very high when the co-occurrence criteria of the training set corresponds to the validation set (i.e., target set). It implies that the co-occurrence criteria of frequent shoppers should be set according to the application purpose period. For example, an analyzer should use a day as a co-occurrence criterion if he/she wants to offer a coupon valid only for a day to potential customers who will use the coupon. On the contrary, an analyzer should use a month as a co-occurrence criterion if he/she wants to publish a coupon book that can be used for a month. In the case of causal shoppers, the accuracy of association rules appears to not be affected by the period of the application purposes. The accuracy of the causal shoppers' association rules becomes higher when the longer co-occurrence criterion has been adopted. It implies that an analyzer has to set the co-occurrence criterion for as long as possible, regardless of the application purpose period.

The Statistical Approach-based Intelligent Education Support System (통계적 접근법을 기초로 하는 지능형 교육 지원 시스템)

  • Chung, Jun-Hee
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.109-123
    • /
    • 2012
  • Many kinds of the education systems are provided to students. Many kinds of the contents like School subjects, license, job training education and so on are provided through many kinds of the media like text, image, video and so on. Students will apply the knowledge they learnt and will use it when they learn other things. In the existing education system, there have been many situations that the education system isn't really helpful to the students because too hard contents are transferred to them or because too easy contents are transferred to them and they learn the contents they already know again. To solve this phenomenon, a method that transfers the most proper lecture contents to the students is suggested in the thesis. Because the difficulty is relative, the contents A can be easier than the contents B to a group of the students and the contents B can be easier than the contents A to another group of the students. Therefore, it is not easy to measure the difficulty of the lecture contents. A method considering this phenomenon to transfer the proper lecture contents is suggested in the thesis. The whole lecture contents are divided into many lecture modules. The students solve the pattern recognition questions, a kind of the prior test questions, before studying the lecture contents and the system selects and provides the most proper lecture module among many lecture modules to the students according to the score about the questions. When the system selects the lecture module and transfer it to the student, the students' answer and the difficulty of the lecture modules are considered. In the existing education system, 1 kind of the content is transferred to various students. If the same lecture contents is transferred to various students, the contents will not be transferred efficiently. The system selects the proper contents using the students' pattern recognition answers. The pattern recognition question is a kind of the prior test question that is developed on the basis of the lecture module and used to recognize whether the student knows the contents of the lecture module. Because the difficulty of the lecture module reflects the all scores of the students' answers, whenever a student submits the answer, the difficulty is changed. The suggested system measures the relative knowledge of the students using the answers and designates the difficulty. The improvement of the suggested method is only applied when the order of the lecture contents has nothing to do with the progress of the lecture. If the contents of the unit 1 should be studied before studying the contents of the unit 2, the suggested method is not applied. The suggested method is introduced on the basis of the subject "English grammar", subjects that the order is not important, in the thesis. If the suggested method is applied properly to the education environment, the students who don't know enough basic knowledge will learn the basic contents well and prepare the basis to learn the harder lecture contents. The students who already know the lecture contents will not study those again and save more time to learn more various lecture contents. Many improvement effects like these and so on will be provided to the education environment. If the suggested method that is introduced on the basis of the subject "English grammar" is applied to the various education systems like primary education, secondary education, job education and so on, more improvement effects will be provided. The direction to realize these things is suggested in the thesis. The suggested method is realized with the MySQL database and Java, JSP program. It will be very good if the suggested method is researched developmentally and become helpful to the development of the Korea education.

An Integrated Model based on Genetic Algorithms for Implementing Cost-Effective Intelligent Intrusion Detection Systems (비용효율적 지능형 침입탐지시스템 구현을 위한 유전자 알고리즘 기반 통합 모형)

  • Lee, Hyeon-Uk;Kim, Ji-Hun;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.125-141
    • /
    • 2012
  • These days, the malicious attacks and hacks on the networked systems are dramatically increasing, and the patterns of them are changing rapidly. Consequently, it becomes more important to appropriately handle these malicious attacks and hacks, and there exist sufficient interests and demand in effective network security systems just like intrusion detection systems. Intrusion detection systems are the network security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. Conventional intrusion detection systems have generally been designed using the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. However, they cannot handle new or unknown patterns of the network attacks, although they perform very well under the normal situation. As a result, recent studies on intrusion detection systems use artificial intelligence techniques, which can proactively respond to the unknown threats. For a long time, researchers have adopted and tested various kinds of artificial intelligence techniques such as artificial neural networks, decision trees, and support vector machines to detect intrusions on the network. However, most of them have just applied these techniques singularly, even though combining the techniques may lead to better detection. With this reason, we propose a new integrated model for intrusion detection. Our model is designed to combine prediction results of four different binary classification models-logistic regression (LOGIT), decision trees (DT), artificial neural networks (ANN), and support vector machines (SVM), which may be complementary to each other. As a tool for finding optimal combining weights, genetic algorithms (GA) are used. Our proposed model is designed to be built in two steps. At the first step, the optimal integration model whose prediction error (i.e. erroneous classification rate) is the least is generated. After that, in the second step, it explores the optimal classification threshold for determining intrusions, which minimizes the total misclassification cost. To calculate the total misclassification cost of intrusion detection system, we need to understand its asymmetric error cost scheme. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, total misclassification cost is more affected by FNE rather than FPE. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 10,000 samples from them by using random sampling method. Also, we compared the results from our model with the results from single techniques to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell R4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on GA outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that the proposed model outperformed all the other comparative models in the total misclassification cost perspective. Consequently, it is expected that our study may contribute to build cost-effective intelligent intrusion detection systems.