• Title/Summary/Keyword: eIF2

Search Result 1,892, Processing Time 0.043 seconds

A Study Consequence Management System of the Terrorism (테러리즘의 대응관리체제에 관한 고찰 - "9. 11 테러"를 중심으로 -)

  • Kim, Yi-Soo;Ahn, Byung-Soo;Han, Nam-Soo
    • Korean Security Journal
    • /
    • no.7
    • /
    • pp.95-124
    • /
    • 2004
  • It can be said that 'the September 11th Terrorist Attacks' in 2001 were not only the indiscriminate attacks on innocent people but also the whole - political, economical and military - attacks on human life. Also, 'the September 11th Terrorist Attacks' can be regarded as the significant events in the history of world, which were on the peak of the super-terrorism or new-terrorism that had emerged from the 1980s. However, if one would have analysed the developments of terrorism from the 1970s, they could have been foreknown without difficulty. The finding from this study can be summarized as the followings, First, in spite that the USA responsive system against terrorism had been assessed as perfect before 'the September 11th Terrorist Attacks', the fragilities were found in the aspects of the response on the new-terrorism or super-terrorism. The previous responsive system before 'the September 11th Terrorist Attacks' had the following defects as the followings: (1) it was impossible to establish the integrated strategy, because the organizations related to the response against terrorism had not integrated; (2) there were some weakness to collect and diffuse the informations related to terrorism; (3) the security system for the domestic airline service in USA and the responsive system of air defense against terrors on aircraft were very fragile. For these reasons, USA government established the 'Department of Homeland Security' of which the President is the head so that the many organizations related to terrorism were integrated into a single management system. And, it legislated a new act to protect security from terrors, which legalized of the wiretapping in spite of the risk of encroachment upon personal rights, increased the jail terms upon terrorists, froze the bank related to terrorist organization, and could censor e-mails. Second, it seem that Korean responsive system against terrors more fragile than that of USA. One of the reasons is that people have some perception that Korea is a safe zone from terrors, because there were little attacks from international terrorists in Korea. This can be found from the fact that the legal arrangement against terrorism is only the President's instruction No. 47. Under this responsive system against terrorism dependent on only the President's instruction, it is expected that there would be a poor response against terrors due to the lack of unified and integrated responsive agency as like the case of USA before 'the September 11th Terrorist Attacks'. And, where there is no legal countermeasure, it is impossible to expect the binding force on the outside of administrative agencies and the performances to prevent and hinder the terrorist actions can not but be limited. That is to say, the current responsive system can not counteract effectively against the new-terrorism and super-terrorism. Third, although there were some changes in Korean government's policies against terrorism. there still are problems. One of the most important problems is that the new responsive system against terrorism in Korea, different from that of USA, is not a permanent agency but a meeting body that is organized by a commission. This commission is controled by the Prime Minister and the substantial tasks are under the National Intelligence Service. Under this configuration, there can be the lack of strong leadership and control. Additionally, because there is no statute to response against terrorism, it is impossible to prevent and counteract effectively against terrorism. The above summarized suggests that, because the contemporary super-terrorism or new-terrorism makes numerous casualties of unspecified persons and enormous nationwide damages, the thorough prevention against terrorism is the most important challenge, and that the full range of legal and institutional arrangements for the ex post counteraction should be established. In order to do so, it is necessary for the government to make legal and institutional arrangements such as the permanent agency for protection from terrorism in which the related departments cooperates with together and the development of efficient anti-terror programs, and to show its willingness and ability that it can counteract upon any type of domestic and foreign terrorism so that obtain the active supports and confidence from citizens.

  • PDF

Design and Implementation of Clipcast Service via Terrestrial DMB (지상파 DMB를 이용한 클립캐스트 서비스 설계 및 구현)

  • Cho, Suk-Hyun;Seo, Jong-Soo
    • Journal of Broadcast Engineering
    • /
    • v.16 no.1
    • /
    • pp.23-32
    • /
    • 2011
  • Design and Implementation of Clipcast Service via Terrestrial DMB This paper outlines the system design and the implementation process of clipcast service that can send clips of video, mp3, text, images, etc. to terrestrial DMB terminals. To provide clipcast service in terrestrial DMB, a separate data channel needs to be allocated and this requires changes in the existing bandwidth allocation. Clipcast contents can be sent after midnight at around 3 to 4 AM, when terrestrial DMB viewship is low. If the video service bit rate is lowered to 352 Kbps and the TPEG service band is fully used, then 320 Kbps bit rate can be allocated to clipcast. To enable clipcast service, the terminals' DMB program must be executed, and this can be done through SMS and EPG. Clipcast service applies MOT protocol to transmit multimedia objects, and transmits twice in carousel format for stable transmission of files. Therefore, 72Mbyte data can be transmitted in one hour, which corresponds to about 20 minutes of full motion video service at 500Kbps data rate. When running the clip transmitted through terrestrial DMB data channel, information regarding the length of each clip is received through communication with the CMS(Content Management Server), then error-free files are displayed. The clips can be provided to the users as preview contents of the complete VOD contents. In order to use the complete content, the user needs to access the URL allocated for that specific content and download the content by completing a billing process. This paper suggests the design and implementation of terrestrial DMB system to provide clipcast service, which enables file download services as provided in MediaFLO, DVB-H, and the other mobile broadcasting systems. Unlike the other mobile broadcasting systems, the proposed system applies more reliable SMS method to activate the DMB terminals for highly stable clipcast service. This allows hybrid, i.e, both SMS and EPG activations of terminals for clipcast services.

Value of Information Technology Outsourcing: An Empirical Analysis of Korean Industries (IT 아웃소싱의 가치에 관한 연구: 한국 산업에 대한 실증분석)

  • Han, Kun-Soo;Lee, Kang-Bae
    • Asia pacific journal of information systems
    • /
    • v.20 no.3
    • /
    • pp.115-137
    • /
    • 2010
  • Information technology (IT) outsourcing, the use of a third-party vendor to provide IT services, started in the late 1980s and early 1990s in Korea, and has increased rapidly since 2000. Recently, firms have increased their efforts to capture greater value from IT outsourcing. To date, there have been a large number of studies on IT outsourcing. Most prior studies on IT outsourcing have focused on outsourcing practices and decisions, and little attention has been paid to objectively measuring the value of IT outsourcing. In addition, studies that examined the performance of IT outsourcing have mainly relied on anecdotal evidence or practitioners' perceptions. Our study examines the contribution of IT outsourcing to economic growth in Korean industries over the 1990 to 2007 period, using a production function framework and a panel data set for 54 industries constructed from input-output tables, fixed-capital formation tables, and employment tables. Based on the framework and estimation procedures that Han, Kauffman and Nault (2010) used to examine the economic impact of IT outsourcing in U.S. industries, we evaluate the impact of IT outsourcing on output and productivity in Korean industries. Because IT outsourcing started to grow at a significantly more rapid pace in 2000, we compare the impact of IT outsourcing in pre- and post-2000 periods. Our industry-level panel data cover a large proportion of Korean economy-54 out of 58 Korean industries. This allows us greater opportunity to assess the impacts of IT outsourcing on objective performance measures, such as output and productivity. Using IT outsourcing and IT capital as our primary independent variables, we employ an extended Cobb-Douglas production function in which both variables are treated as factor inputs. We also derive and estimate a labor productivity equation to assess the impact of our IT variables on labor productivity. We use data from seven years (1990, 1993, 2000, 2003, 2005, 2006, and 2007) for which both input-output tables and fixed-capital formation tables are available. Combining the input-output tables and fixed-capital formation tables resulted in 54 industries. IT outsourcing is measured as the value of computer-related services purchased by each industry in a given year. All the variables have been converted to 2000 Korean Won using GDP deflators. To calculate labor hours, we use the average work hours for each sector provided by the OECD. To effectively control for heteroskedasticity and autocorrelation present in our dataset, we use the feasible generalized least squares (FGLS) procedures. Because the AR1 process may be industry-specific (i.e., panel-specific), we consider both common AR1 and panel-specific AR1 (PSAR1) processes in our estimations. We also include year dummies to control for year-specific effects common across industries, and sector dummies (as defined in the GDP deflator) to control for time-invariant sector-specific effects. Based on the full sample of 378 observations, we find that a 1% increase in IT outsourcing is associated with a 0.012~0.014% increase in gross output and a 1% increase in IT capital is associated with a 0.024~0.027% increase in gross output. To compare the contribution of IT outsourcing relative to that of IT capital, we examined gross marginal product (GMP). The average GMP of IT outsourcing was 6.423, which is substantially greater than that of IT capital at 2.093. This indicates that on average if an industry invests KRW 1 millon, it can increase its output by KRW 6.4 million. In terms of the contribution to labor productivity, we find that a 1% increase in IT outsourcing is associated with a 0.009~0.01% increase in labor productivity while a 1% increase in IT capital is associated with a 0.024~0.025% increase in labor productivity. Overall, our results indicate that IT outsourcing has made positive and economically meaningful contributions to output and productivity in Korean industries over the 1990 to 2007 period. The average GMP of IT outsourcing we report about Korean industries is 1.44 times greater than that in U.S. industries reported in Han et al. (2010). Further, we find that the contribution of IT outsourcing has been significantly greater in the 2000~2007 period during which the growth of IT outsourcing accelerated. Our study provides implication for policymakers and managers. First, our results suggest that Korean industries can capture further benefits by increasing investments in IT outsourcing. Second, our analyses and results provide a basis for managers to assess the impact of investments in IT outsourcing and IT capital in an objective and quantitative manner. Building on our study, future research should examine the impact of IT outsourcing at a more detailed industry level and the firm level.

A Study on Relationship between Physical Elements and Tennis/Golf Elbow

  • Choi, Jungmin;Park, Jungwoo;Kim, Hyunseung
    • Journal of the Ergonomics Society of Korea
    • /
    • v.36 no.3
    • /
    • pp.183-196
    • /
    • 2017
  • Objective: The purpose of this research was to assess the agreement between job physical risk factor analysis by ergonomists using ergonomic methods and physical examinations made by occupational physicians on the presence of musculoskeletal disorders of the upper extremities. Background: Ergonomics is the systematic application of principles concerned with the design of devices and working conditions for enhancing human capabilities and optimizing working and living conditions. Proper ergonomic design is necessary to prevent injuries and physical and emotional stress. The major types of ergonomic injuries and incidents are cumulative trauma disorders (CTDs), acute strains, sprains, and system failures. Minimization of use of excessive force and awkward postures can help to prevent such injuries Method: Initial data were collected as part of a larger study by the University of Utah Ergonomics and Safety program field data collection teams and medical data collection teams from the Rocky Mountain Center for Occupational and Environmental Health (RMCOEH). Subjects included 173 male and female workers, 83 at Beehive Clothing (a clothing plant), 74 at Autoliv (a plant making air bags for vehicles), and 16 at Deseret Meat (a meat-processing plant). Posture and effort levels were analyzed using a software program developed at the University of Utah (Utah Ergonomic Analysis Tool). The Ergonomic Epicondylitis Model (EEM) was developed to assess the risk of epicondylitis from observable job physical factors. The model considers five job risk factors: (1) intensity of exertion, (2) forearm rotation, (3) wrist posture, (4) elbow compression, and (5) speed of work. Qualitative ratings of these physical factors were determined during video analysis. Personal variables were also investigated to study their relationship with epicondylitis. Logistic regression models were used to determine the association between risk factors and symptoms of epicondyle pain. Results: Results of this study indicate that gender, smoking status, and BMI do have an effect on the risk of epicondylitis but there is not a statistically significant relationship between EEM and epicondylitis. Conclusion: This research studied the relationship between an Ergonomic Epicondylitis Model (EEM) and the occurrence of epicondylitis. The model was not predictive for epicondylitis. However, it is clear that epicondylitis was associated with some individual risk factors such as smoking status, gender, and BMI. Based on the results, future research may discover risk factors that seem to increase the risk of epicondylitis. Application: Although this research used a combination of questionnaire, ergonomic job analysis, and medical job analysis to specifically verify risk factors related to epicondylitis, there are limitations. This research did not have a very large sample size because only 173 subjects were available for this study. Also, it was conducted in only 3 facilities, a plant making air bags for vehicles, a meat-processing plant, and a clothing plant in Utah. If working conditions in other kinds of facilities are considered, results may improve. Therefore, future research should perform analysis with additional subjects in different kinds of facilities. Repetition and duration of a task were not considered as risk factors in this research. These two factors could be associated with epicondylitis so it could be important to include these factors in future research. Psychosocial data and workplace conditions (e.g., low temperature) were also noted during data collection, and could be used to further study the prevalence of epicondylitis. Univariate analysis methods could be used for each variable of EEM. This research was performed using multivariate analysis. Therefore, it was difficult to recognize the different effect of each variable. Basically, the difference between univariate and multivariate analysis is that univariate analysis deals with one predictor variable at a time, whereas multivariate analysis deals with multiple predictor variables combined in a predetermined manner. The univariate analysis could show how each variable is associated with epicondyle pain. This may allow more appropriate weighting factors to be determined and therefore improve the performance of the EEM.

A Mutual P3P Methodology for Privacy Preserving Context-Aware Systems Development (프라이버시 보호 상황인식 시스템 개발을 위한 쌍방향 P3P 방법론)

  • Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.18 no.1
    • /
    • pp.145-162
    • /
    • 2008
  • One of the big concerns in e-society is privacy issue. In special, in developing robust ubiquitous smart space and corresponding services, user profile and preference are collected by the service providers. Privacy issue would be more critical in context-aware services simply because most of the context data themselves are private information: user's current location, current schedule, friends nearby and even her/his health data. To realize the potential of ubiquitous smart space, the systems embedded in the space should corporate personal privacy preferences. When the users invoke a set of services, they are asked to allow the service providers or smart space to make use of personal information which is related to privacy concerns. For this reason, the users unhappily provide the personal information or even deny to get served. On the other side, service provider needs personal information as rich as possible with minimal personal information to discern royal and trustworthy customers and those who are not. It would be desirable to enlarge the allowable personal information complying with the service provider's request, whereas minimizing service provider's requiring personal information which is not allowed to be submitted and user's submitting information which is of no value to the service provider. In special, if any personal information required by the service provider is not allowed, service will not be provided to the user. P3P (Platform for Privacy Preferences) has been regarded as one of the promising alternatives to preserve the personal information in the course of electronic transactions. However, P3P mainly focuses on preserving the buyers' personal information. From time to time, the service provider's business data should be protected from the unintended usage from the buyers. Moreover, even though the user's privacy preference could depend on the context happened to the user, legacy P3P does not handle the contextual change of privacy preferences. Hence, the purpose of this paper is to propose a mutual P3P-based negotiation mechanism. To do so, service provider's privacy concern is considered as well as the users'. User's privacy policy on the service provider's information also should be informed to the service providers before the service begins. Second, privacy policy is contextually designed according to the user's current context because the nomadic user's privacy concern structure may be altered contextually. Hence, the methodology includes mutual privacy policy and personalization. Overall framework of the mechanism and new code of ethics is described in section 2. Pervasive platform for mutual P3P considers user type and context field, which involves current activity, location, social context, objects nearby and physical environments. Our mutual P3P includes the privacy preference not only for the buyers but also the sellers, that is, service providers. Negotiation methodology for mutual P3P is proposed in section 3. Based on the fact that privacy concern occurs when there are needs for information access and at the same time those for information hiding. Our mechanism was implemented based on an actual shopping mall to increase the feasibility of the idea proposed in this paper. A shopping service is assumed as a context-aware service, and data groups for the service are enumerated. The privacy policy for each data group is represented as APPEL format. To examine the performance of the example service, in section 4, simulation approach is adopted in this paper. For the simulation, five data elements are considered: $\cdot$ UserID $\cdot$ User preference $\cdot$ Phone number $\cdot$ Home address $\cdot$ Product information $\cdot$ Service profile. For the negotiation, reputation is selected as a strategic value. Then the following cases are compared: $\cdot$ Legacy P3P is considered $\cdot$ Mutual P3P is considered without strategic value $\cdot$ Mutual P3P is considered with strategic value. The simulation results show that mutual P3P outperforms legacy P3P. Moreover, we could conclude that when mutual P3P is considered with strategic value, performance was better than that of mutual P3P is considered without strategic value in terms of service safety.

Dietary Life Status of Korean Prisoners' and the Background during the Period of Japanese Ruling (일제하(日帝下)(1920년대) 조선인수형인(朝鮮人受刑人)의 식생활상황(食生活狀況)과 그 배경(背景))

  • Kim, Chon-Ho
    • Journal of the Korean Society of Food Culture
    • /
    • v.18 no.1
    • /
    • pp.56-68
    • /
    • 2003
  • The objects of this study are to find out (1) real situation of the food supply in prison under Imperial Government of Japan more cleary (historical meaning) and (2) which might help in understanding wrong present food consumption patterns in Korea which causes environmental as well as health problems. It is generally known that the length of the Japanese occupation for Korea is 36 years. However, it is concluded in this study that it was longer (70 years ; from 1875 to 1945 from when Japanese Army attacked and occupied Yungjongdo and Kanghwado island to e time when they were defeated on World War II.) Korea was annexed by Japan in 1910 then the Imperial Government of Japan dismissed the Korea Army, controlled the Office of Justice and the management of prison by force. Since then about 50% of all land was fell into Japanese Government ownership and 80% of Korean farmers became as tenant. After this change, Korea farmers were forced to pay extremely high rent (up to 80% of its harvest). Forced immigration, low price procurement of grain by Japanese government up to more than 30%of their production, was practiced. Accordingly, the food situation of Korean farmers became miserable, which may caused more violations of Imperial Japanese Law. Malnutrition, epidemic diseases, mortality rate of infants soared and average life expectancy shortened to 20-30 years old. This was the period of World Economic Crises and Food Crises in Japan. It was said then that if one Japanese comes to Korea then 200 Koreans will starved to death. Meanwhile, Proconsul Bureau of Chosun requested to the Department of Medicine, the Imperial University of Kyungsung to survey food supply situation of Koreans in prison throughout Korea. Objectives of the survey then was not only to find out scientifically whether it is agreeable in maintaining prisoner's health and also find out the possibility to save food during food crisis. Survey was started from 1923 and ended in 1945, and it focussed on prisoners in the Seodaemoon Prison. This report is the outcome of the first survey. They concluded that the food supplied was nutritionally (had) no problem, in compare with those of workers in the factory, students in the dormitory in Japan and with those of prisoners in Taiwan, France and Germany. Amount of grain supplied were different according to their work lord and was divided into 9 different levels. Total grain was consisted of 50% millet, 30% soybean and 20% indica rice(variety). However, there were no difference in the amount of supply of side dishes between work groups. For the highest working group, 3280g of boiled grain per day was supplied to make stomach full but as a side dishes, salty fermented bean paste, fermented fish and salty soups, etc. was supplied. Deficiency of animal protein were observed, however, high intake of soybean may possibly caused animal protein deficiency problem. On the contrary, the intake of water soluble vitamins were insufficient but the level of calcium and iron intake seems to be sufficient, however, imbalance of intake of nutrition may caused low absorbtion rate which might caused malnutrition. High intake of dietary fiber and low intake of cholesterol may possibly prohibited them from so called modem disease but may caused the defect in disease resistancy againist epidemics and other traditional disease. Over intake of salt(20-30g per day) was observed. Surveyors who attended in this survey, mentioned that the amount of food intake may nutritionally be sufficient enough but the quality of food(and possibly, the taste of food) were like that of animal feed. For the officials who received this report might consider that considering the war situation and food crisis, the supply situation of food in the prison may considered to be good enough(because they are not starving). But as a Korean who studied this report, one feel extremely pity about those situation because (situation of) those period were very harsh under the Imperial Law and keeping the Law by Koreans were almost impossible, therefore, about one third adult violated the Law and were put into jail. And they were treated like animals.

A Monitoring for the Management of Microbiological Hazard in Rice-cake by Climate Change (기후변화에 따른 떡류의 미생물학적 위해관리를 위한 권역별 모니터링)

  • Choi, Song-Yi;Jeong, Se-Hee;Jeong, Myung-Seop;Park, Ki-Hwan;Jeong, Young-Gil;Cho, Joon-Il;Lee, Soon-Ho;Hwang, In-Gyun;Bahk, Gyung-Jin;Oh, Deog-Hwan;Chun, Hyang-Sook;Ha, Sang-Do
    • Journal of Food Hygiene and Safety
    • /
    • v.27 no.3
    • /
    • pp.301-305
    • /
    • 2012
  • This study was conducted to investigate the microbiological contamination levels in rice cakes and rice flour due to climate change in three areas classified to their temperature and precipitation. We investigated the contamination levels of total aerobic bacteria, coliforms, Escherichia coli, Bacillus cereus, Staphylococcus aureus, Clostridium perfringens of rice flour and 3 rice cakes such as Garaetteok, Sirutteok and Gyeongdan. Contamination levels of total aerobic bacteria in rice flour were 4.9 log CFU/g. In a total of 70 rice flour, yeasts & molds and coliforms were detected in 42 and 52 samples at the levels of 43 CFU/g and 1.29 log CFU/g, respectively. S. aureus were detected in only 1 rice flour (1.66 log CFU/g) out of 70. In an investigation of contamination levels in rice cakes, the population of total aerobic bacteria were highest in Gyeongdan (5.18 log CFU/g) and coliforms were highest in Gareattock (2.93 log CFU/g). There was no detection of E. coli and B. cereus except for only 1 Gareattock (1.20 log CFU/g). There were no differences of contamination levels among the three areas. If constant monitoring of rice cakes and rice flour is conducted on the basis of this study, it is expected to be able to analyze the change of contamination levels in rice cakes and rice flour due to climate change.

Development of Internet Information Push-Delivery System Design of Smoking Cessation for Health Promotion (지역주민의 건강증진을 위한 인터넷 금연 강화 프로그램 개발)

  • Kim, Young-Bok;Shin, Jun-Ho;Kim, Shin-Woel
    • Journal of agricultural medicine and community health
    • /
    • v.29 no.2
    • /
    • pp.287-301
    • /
    • 2004
  • Objectives: The development of internet programs for smoking cessation was motivated to quit smoking in the large group of smokers. This personalized program consisted of tailored message to consider the smokers characteristics, and contain the informations on the outcomes of smoking cessation and the skills to be used in the quit attempts. The purpose of this study was to develop the internet management program and information push-delivery system for smoking cessation to encourage the personal intention to quit smoking. Methods: We conducted in 3 steps as developing push service to encourage intention of smoking cessation, analyzing problems of smoking cessation program through the pilot test and suggesting improvements by implication stages. Results: This program is delivered for 30 days. if the participants do not fail to quit smoking. The contents consisted of 13 stages which were divided on starting period. practical period, maintenance period and success period. And push service afforded the tailored message to participants using their e-mail. According to the evaluation of pilot test, the problems of internet information push-delivery service for smoking cessation were the over-tasks per visiting time, recording style of participants, difficulty of terms and sentences, lack of visual effects, absence of follow-up module and unsuitable link with main homepage. Improvements were divided on 3 stages by implication period. The first stage included the immediate improvements as improving link with homepage, modifying menu of smoking information and upload file of notice part. The second stage included the short term improvements as alleviating condition of withdrawal, coordinating start stage of retrial, modifying errors of information push-delivery service and addition of educational materials. The third stage included the long term improvements as development of follow-up module, cost-effectiveness evaluation, reducing contents quantity, introduction of checking style, compensation of graphics effect and review for SMS utilization. Conclusions: This program contribute to improving smoking cessation rate. Therefore this program should be tested in a community to evaluate the effectiveness. To promote the effectiveness, this program should be developed the contents and the strategies for various targets, and established the follow-up system for ex-smokers.

  • PDF

An Experimental Study on Establishing Criteria of Gripping Work in Construction Site (건설 현장 악력 작업안전 기준 설정에 관한 실험적 연구)

  • 손기상;이인홍;최만진;안병준
    • Journal of the Korean Society of Safety
    • /
    • v.10 no.3
    • /
    • pp.81-95
    • /
    • 1995
  • Now, safety assurance in construction sites should be accomplished by its own organization rather than control of the code or government. It is believed that the safety assurance can be considerably improved by a lecture or an education using the existing theories or literatures up to now, but it is thought that fundamental safety assurance we not able to be accomplished without developing safety devices '||'&'||' equipment or taking fundamental measures, based on the result analyzed from workers behaviors. There are various behaviors of the workers showed in construction site, but only tests for hammerusing works such as form, re-bar, stone workers directly related to the grip strength are mainly performed, investigated and measured here for the study. The above works are similar to power grip, 7th picture on seven items which are categorized for hand grip types(Ammermin 1956 ; Jones ; Kobrick 1958). Measurements of grip strength are commonly taken in anthropometric surveys. They are easy to administer but unfortunately it is rather dubious whether they yield any data that are of interest to the engineer. Very fewer controls of tools are grasped and squeesed studies showed very little overall correlation between grip strength and other measures of bodily strength (Laubach, Kromer, and Thordsen 1972), but hammer-using work which is practically progressed in construction site are mainly influenced with grip strength. According to the investigation on work measurement, it is shown that 77% of form worker are using hammer to be related to grip strength. In this study, it is particularly noticed that wearing safety gloves in construction site is required for workers safety but 20% difference between grip strength with safety gloves and without ones are commonly neglected in the site(Fig. 1). Nevertheless, safety operation with consideration of the above 20% difference is not considered in the construction site. Factors of age, kinds of work, working time, with or without safety gloves are in vestigated '||'&'||' collected at the sites for this study. Test, not at each working hour but at 14 : 00 when the almost all of the workers think the most tired, resulting from the questionaires, also when it is shown on the research report has been performed and compared for main kinds of works : form '||'&'||' re-bar work. Tests were performed with both left SE rightand of the workers simultaneously in construction site using Rand Dynamometer(Model 78010, Lafayette Instrument Co., Indiana, U.S.A) by reading grip strength on the gauge while they are pulling, and then by interviewing on their ages, works, experiences and etc., directly. The above tests have been performed for the dates of 15th march-26th May '95 with consideration of site condition. And even if various factors of ambient temperature on the testing date, working condition, individual worker's habit and worker's condition of the previous ate are concerned with the study. Those are considered as constants in this study. Samples are formwork 53, rebar 62, electrician 5, plumber 4, welding 1 from D construction Co., Ltd, ; formwork 12, re-bar 5, electrician 2, from S construction Co., Ltd, , formwork 78, re-bar 18, plumber 31, electrician 13, labor 48, plumber 31, plasterer 15, concrete placer 6, water proof worker 3, maisony 5 from B construction Co., Ltd. As In the previously mentioned, main aspect to be investigated in this study will be from '||'&'||' re-bar work because grip strength will be directly applied to these two kinds of works ; form '||'&'||' re-bar work, eventhough there are total 405 samples taken. It is thought that a frequency of accident occurrence will be mainly two work postures "looking up '||'&'||' looking down" to be mainly sorted, but this factor is not clarified in this study because It will be needed a lot of work more. Tests has been done at possible large scale of horizontally work-extended sites within one hour in order to prevent or decrease errors '||'&'||' discrepancies from time lag of the test. Additionally, the statistical package computer program SPSS PC+has been used for the study.

  • PDF

A Study of a Teaching Plan for Gifted Students in Elementary School Mathematics Classes (일반학급에서의 초등 수학 영재아 지도 방안 연구)

  • Kim, Myeong-Ja;Shin, Hang-Kyun
    • Journal of Elementary Mathematics Education in Korea
    • /
    • v.13 no.2
    • /
    • pp.163-192
    • /
    • 2009
  • Currently, our country operates gifted education only as a special curriculum, which results in many problems, e.g., there are few beneficiaries of gifted education, considerable time and effort are required to gifted students, and gifted students' educational needs are ignored during the operation of regular curriculum. In order to solve these problems, the present study formulates the following research questions, finding it advisable to conduct gifted education in elementary regular classrooms within the scope of the regular curriculum. A. To devise a teaching plan for the gifted students on mathematics in the elementary school regular classroom. B. To develop a learning program for the gifted students in the elementary school regular classroom. C. To apply an in-depth learning program to gifted students in mathematics and analyze the effectiveness of the program. In order to answer these questions, a teaching plan was provided for the gifted students in mathematics using a differentiating instruction type. This type was developed by researching literature reviews. Primarily, those on characteristics of gifted students in mathematics and teaching-learning models for gifted education. In order to instruct the gifted students on mathematics in the regular classrooms, an in-depth learning program was developed. The gifted students were selected through teachers' recommendation and an advanced placement test. Furthermore, the effectiveness of the gifted education in mathematics and the possibility of the differentiating teaching type in the regular classrooms were determined. The analysis was applied through an in-depth learning program of selected gifted students in mathematics. To this end, an in-depth learning program developed in the present study was applied to 6 gifted students in mathematics in one first grade class of D Elementary School located in Nowon-gu, Seoul through a 10-period instruction. Thereafter, learning outputs, math diaries, teacher's checklist, interviews, video tape recordings the instruction were collected and analyzed. Based on instruction research and data analysis stated above, the following results were obtained. First, it was possible to implement the gifted education in mathematics using a differentiating instruction type in the regular classrooms, without incurring any significant difficulty to the teachers, the gifted students, and the non-gifted students. Specifically, this instruction was effective for the gifted students in mathematics. Since the gifted students have self-directed learning capability, the teacher can teach lessons to the gifted students individually or in a group, while teaching lessons to the non-gifted students. The teacher can take time to check the learning state of the gifted students and advise them, while the non-gifted students are solving their problems. Second, an in-depth learning program connected with the regular curriculum, was developed for the gifted students, and greatly effective to their development of mathematical thinking skills and creativity. The in-depth learning program held the interest of the gifted students and stimulated their mathematical thinking. It led to the creative learning results, and positively changed their attitude toward mathematics. Third, the gifted students with the most favorable results who took both teacher's recommendation and advanced placement test were more self-directed capable and task committed. They also showed favorable results of the in-depth learning program. Based on the foregoing study results, the conclusions are as follows: First, gifted education using a differentiating instruction type can be conducted for gifted students on mathematics in the elementary regular classrooms. This type of instruction conforms to the characteristics of the gifted students in mathematics and is greatly effective. Since the gifted students in mathematics have self-directed learning capabilities and task-commitment, their mathematical thinking skills and creativity were enhanced during individual exploration and learning through an in-depth learning program in a differentiating instruction. Second, when a differentiating instruction type is implemented, beneficiaries of gifted education will be enhanced. Gifted students and their parents' satisfaction with what their children are learning at school will increase. Teachers will have a better understanding of gifted education. Third, an in-depth learning program for gifted students on mathematics in the regular classrooms, should conform with an instructing and learning model for gifted education. This program should include various and creative contents by deepening the regular curriculum. Fourth, if an in-depth learning program is applied to the gifted students on mathematics in the regular classrooms, it can enhance their gifted abilities, change their attitude toward mathematics positively, and increase their creativity.

  • PDF