• Title/Summary/Keyword: management of technology

Search Result 25,252, Processing Time 0.052 seconds

A Development of System Design Approval Criteria for GBAS Operation in Korea (국내 GBAS 운용을 위한 시스템 설계 및 제작 승인 기준 개발)

  • Yun, Young-Sun;Kim, Joo-Kyoung;Cho, Jeong-Ho;Nam, Gi-Wook;Heo, Moon-Beom
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.6
    • /
    • pp.625-632
    • /
    • 2013
  • Since GBAS is a navaid facility to provide precision approach service to aircrafts landing at airports, it must be approved by the air navigation service provider or the aviation regulator to be declared operational. However, Korea has no experience in developing or operating the system so there is no approval criteria for GBAS. In order to develop the criteria in case of the future GBAS procurement, Korea Aerospace Research Institute has been testing the installed commercial GBAS station, SLS-4000, in Gimpo International Airport. This paper summarizes the criteria development results focusing on the system design approval. The criteria have been outlined based on the other leading nations' cases and documentations and established in detail on the basis of the FAA SDA artifacts. Those will be directly used for GBAS approval procedure in Korea and are expected to be useful in system requirement analysis, design, development and artifact management in case of own GNSS-based navaid system development in the future.

A Study on Sustainable Service Improvement - Case of Seoul National University Hospital, Korea - (지속적인 서비스 개선을 위한 연구 - 서울대학교병원 사례를 중심으로 -)

  • Sung, Hyun Jin;Kim, Young Se
    • Korea Science and Art Forum
    • /
    • v.19
    • /
    • pp.417-424
    • /
    • 2015
  • The healthcare service industry has become one of the business industries in South Korea where service design is most actively being researched on and applied. In accordance with the recent upsurge of the interest in health, healthcare service is expanding its area including disease prevention, patient management, and rehabilitation treatment as well as cure and nursing care. The health manpower is the supplier, and their professional knowledge and ability and the patients' trust in medical technology are the most important factors for their customers. In addition, service design has come into the spotlight given that the medical institute system, health manpower attitude, and information delivery system and touch point are considered important factors contributing to customer satisfaction. It is very hard to satisfy customers only through professionalism, the environment, and product improvement because healthcare service deals with much more sensitive and emotional customers compared to other service industries. This means that a change in the service mind-set and the attitude of the health manpower as emotional labourers have practical effects. Therefore, the fundamental solution is to establish a system that provides related education with manpower and that settles various problems by itself. This paper introduces several solutions, such as education for health manpower and a service design system applied to a national-university-affiliated hospital in South Korea, and takes a close look at its effects.

Smartwork Application & Effects: Empirical Test for the Extended Work Design Theory (스마트워크 적용과 효과: 업무 설계 이론을 중심으로)

  • Hyejung Lee;Jun-Gi Park
    • Information Systems Review
    • /
    • v.20 no.2
    • /
    • pp.21-37
    • /
    • 2018
  • Under ubiquitous work environment, innovative changes occur in work process with ICT. The work process for collaboration through mobile devices and network should be investigated. The research model consists of two major antecedents: autonomy and interdependence as a task characteristic and job satisfaction as ultimate consequence followed by work design theory. To elaborate work design theory, smartwork application (app) use, communication extent, and work-life balance were reviewed from the literature. Data were collected from three ICT firms, which adopted certain smartwork app, and a partial least squares analysis was made on 175 data points. The analysis results show that task interdependence exerts a statistically significant effect on the level of smartwork app usage. Communication extent directly affects job satisfaction and work-life balance. The remarkable point is that smartwork app usage does not affect employees' work-life balance; the former can only affect the latter indirectly by increasing communication extent. This study attempts to explain the organizational impact by considering smartwork app and the effects simultaneously. We proposed and empirically tested the extended work design theory including information technology and its environment. Based on the results, other theoretical and practical contributions are discussed at the end with limitations and further studies.

Implementation of Real Time P2P Framework for Spatial Data Sharing between Mobile Devices using SIP (모바일 기기 간의 SIP기반 실시간 공간정보 공유 프레임워크 구현)

  • Park, Key-Ho;Jung, Jae-Gon
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 2008.10a
    • /
    • pp.65-72
    • /
    • 2008
  • Mobile Collaboration is an enabling technology that makes users share information between mobile devices and various Mobile P2P platforms have been designed and implemented for it. There are, however, few research papers on application of SIP protocol to spatial data sharing on mobile devices. In this paper, SIP based real time sharing framework is proposed to compose a mobile P2P platform on which spatial data can be trans(erred. A new protocol based on WKT and WKB is defined to send and receive spatial objects with SIP MESSAGE method. Base maps such as digital maps and parcel maps can be provided by a map server that is integrated with SIP server after a new SIP session established and client agents are registered. The framework proposed based onSIP enables users to transfer spatial data such as maps and satellite images directly between mobile devices during VoIP based voice call and therefore, mobile applications can be applied in various domains such asforest management and national defense.

  • PDF

Historical Review for the Government Contractor Defense (Government Contractor Defense(정부계약자항변)에 대한 연혁적 고찰)

  • Shin, Sung-hwan
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.3
    • /
    • pp.230-242
    • /
    • 2017
  • A significant rise in product-liability cost is expected due to the newly passed product liability amendment Bill approved during the assembly plenary session on March 30, 2017. Korean government legal service(KGLS) filed a damage suit against Korea aerospace industries, Ltd.(KAI) and Hanwha Techwin Co., Ltd., the manufactures of the KUH-1 Surion helicopter crashed. KGLS alleged claims under the product liability Act, the warrant liability Act and the non-performance of contract act. The accountability limits of military aircraft manufacturers was a highly divisive issue among related scholars and legal practitioners. The bottom line was that military aircraft manufacturers had no product-liability insurance available. The United States courts have, therefore, developed the government contractor defense(GCD) and it was recognized by the U.S. Supreme Court in Boyle v. United Technologies corporation(1988). product liability insurances for military aircraft manufacturers are excessively expensive and it cannot be added onto the military procurement cost accounting. However, having an aircraft accident without one can be ruinously expensive. Therefore, the manufacturers should promptly set up appropriate risk management measures. This thesis will first review the advance GCD theory, and then find a way to either reform government contract related regulations.

Analysis of Performance, Energy-efficiency and Temperature for 3D Multi-core Processors according to Floorplan Methods (플로어플랜 기법에 따른 3차원 멀티코어 프로세서의 성능, 전력효율성, 온도 분석)

  • Choi, Hong-Jun;Son, Dong-Oh;Kim, Jong-Myon;Kim, Cheol-Hong
    • The KIPS Transactions:PartA
    • /
    • v.17A no.6
    • /
    • pp.265-274
    • /
    • 2010
  • As the process technology scales down and integration densities continue to increase, interconnection has become one of the most important factors in performance of recent multi-core processors. Recently, to reduce the delay due to interconnection, 3D architecture has been adopted in designing multi-core processors. In 3D multi-core processors, multiple cores are stacked vertically and each core on different layers are connected by direct vertical TSVs(through-silicon vias). Compared to 2D multi-core architecture, 3D multi-core architecture reduces wire length significantly, leading to decreased interconnection delay and lower power consumption. Despite the benefits mentioned above, 3D design technique cannot be practical without proper solutions for hotspots due to high temperature. In this paper, we propose three floorplan schemes for reducing the peak temperature in 3D multi-core processors. According to our simulation results, the proposed floorplan schemes are expected to mitigate the thermal problems of 3D multi-core processors efficiently, resulting in improved reliability. Moreover, processor performance improves by reducing the performance degradation due to DTM techniques. Power consumption also can be reduced by decreased temperature and reduced execution time.

A Study on the Factors Influenced on the Performance of Korean Ventures - Focusing on International Entrepreneurship and Firm's Capabilities - (한국 벤처기업의 경영성과에 미치는 영향요인에 관한 연구 - 국제적 기업가정신과 기업역량을 중심으로 -)

  • Yoon, Ki-Chang
    • International Area Studies Review
    • /
    • v.13 no.2
    • /
    • pp.445-474
    • /
    • 2009
  • This study tries to investigate the factors influenced on the performance by top management team's(TMT's) international entrepreneurship(IE) and firm's capabilities(marketing capability and R&D capability) of Korean Ventures. The research model and hypothesis set that TMT's IE directly affect to the performance directly affects and TMT's IE indirectly affect to the performance through the capabilities(marketing capability and R&D capability) by research prior studies. To verify research model, 115 high-technology based Korean ventures survey to be as samples by structured questionnaires and the data is tested by SEM(structural equation modeling) analysis. The results of analysis are as follow. First, there was no relationship between TMT's IE and performance. Second, the IE positively affected to firm's capabilities(marketing capability and R&D capability). Third, firm's internal capabilities positively affected to performance. These results only few TMT's IE cannot sufficiently affect to performance but IE should be propagated to marketing and R&D departments and then firm's performance can improved. This study respect to provide a meaningful implication to globalization and performance of Korean Ventures.

An Intelligent CCTV-Based Emergency Detection System for Rooftop Access Control Problems (옥상 출입 통제 문제 해결을 위한 지능형 CCTV 기반 비상 상황 감지 시스템 제안)

  • Yeeun Kang;Soyoung Ham;Seungchae Joa;Hani Lee;Seongmin Kim;Hakkyong Kim
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.59-68
    • /
    • 2024
  • With advancements in artificial intelligence technology, intelligent CCTV systems are being deployed across various environments, such as river bridges and construction sites. However, a conflict arises regarding the opening and closing of rooftop access points due to concerns over potential accidents and crime incidents and their role as emergency evacuation spaces. While the relevant law typically mandates the constant opening of designated rooftop access points, closures are often tacitly permitted in practice for security reasons, with a lack of appropriate legal measures. In this context, this study proposes a detection system utilizing intelligent CCTV to respond to emergencies that may occur on rooftops. We develop a system based on the YOLOv5 object detection model to detect assault and suicide attempts by jumping, introducing a new metric to assess them. Experimental results demonstrate that the proposed system rapidly detects assault and suicide attempts with high accuracy. Additionally, through a legal analysis of rooftop access point management, deficiencies in the legal framework regarding rooftop access and CCTV installation are identified, and improvement measures are proposed. With technological and legal improvements, we believe that crime and accident incidents in rooftop environments will decrease.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

Management Policy and Safety Problem of School Food Services (학교급식 안전 문제와 대책)

  • Ha, Sang-Do
    • Safe Food
    • /
    • v.3 no.1
    • /
    • pp.13-21
    • /
    • 2008
  • 우리나라 학교급식의 현재 성적표를 "양적 성공, 질적 실패"로 평가할 수 있다. 2003년 학교급식이 국가적 교육사업이 되어서 초 중 고 특수학교에서 전면급식이 이루어지고 10,343개교에서 704만명의 학생에게 급식을 제공하고 있다. 현재는 양질의 학교급식을 안전하고 저렴하게 공급하고, 국가식량정책과 연계하여 효율적으로 관리하여야 할 시기이다. 그러나 학교급식 소요경비 연 2조3천억원, 영양사 7,196명 등 63,145명이 종사하는 거대한 산업군이라는 규모에도 불구하고 전체 학교의 70%만이 식당시설을 갖추고 있고 급식 만족도가 학생이나 학부모의 기대에 미치지 못하고 있으며, 식중독 발생의 원흉이 되어 국민적 질책의 대상이 되고 있는 것이 현실이다. 이 문제는 1) 영양사 업무과중에 따른 시간부족, 영양사 지식정보 부족 등에 따른 식재료 및 위생관리 소홀, 2) 냉장, 냉동, 오염/비 오염 구획 등에 필요한 시설과 설비 부족, 3) 교육인적자원부의 급식위생관리의 전문성 부족과 담당 인력 및 정책적, 재정적 지원 부족을 원인으로 볼 수 있다. 학교급식 안전대책은 아래 20대 과제를 추진하여 확보하여야 할 것이다. 전략 1은 "우수한 식재료 위생관리"로서 "급식비 인상 및 현실화, 철저한 수입 농수축산물관리, 식재료 공급 및 전처리업 자유업에서 신고제, 허가제로 전환, GAP(우수농산물관리) 제도 도입, 생산이력제도(traceability) 도입, 급식원료 "품질인증 제도" 도입, 식품원료 전처리 시 세척, 소독프로그램 보급, 학교급식 식자재기준, 규격 설정, 과학적이고 쉬운 검수지침 개발 및 보급, 신속검사키트를 활용한 주기적인 미생물 검사 의무화, 위생 전문가에 의한 검수, 식재료별로 분산된 법령과 관리제도 정비(식품안전기본법), 급식식자재 공급 유통 과정의 감시 감독 강화" 등 13개 과제를 제안한다. 전략 2는 "급식위생 확보 인프라구측"으로서 "급식종사자 전문성 확보(조리/영양/위생), 급식전담기구(학교급식진흥원 /학교급식센터 등) 설치, 급식형태 다양화(위탁/직영 균형 발전), 학교급식법 재개정, 학교급식 HACCF제도 확대" 등 4개 과제를 제안한다. 전략 3은 "급식소 시설 설비 현대화 및 환경개선"으로서 "급식시설 설비 현대화 (전처리실, 냉장고, 온장고 구비 등), 급식소 환경 개선 (상수 사용 확대 및 안전강화, 지하수 소독 강화, 정화된 공기 공급 등)" 등 2개 과제를 제안한다. 전략4는 "급식위생제도 및 관리체계 개선"으로서 "전문적 단일기관 안전관리 (식품안전처)" 과제를 제안한다.

  • PDF