• Title/Summary/Keyword: monitoring system

Search Result 12,246, Processing Time 0.044 seconds

The Implementation of a HACCP System through u-HACCP Application and the Verification of Microbial Quality Improvement in a Small Size Restaurant (소규모 외식업체용 IP-USN을 활용한 HACCP 시스템 적용 및 유효성 검증)

  • Lim, Tae-Hyeon;Choi, Jung-Hwa;Kang, Young-Jae;Kwak, Tong-Kyung
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.42 no.3
    • /
    • pp.464-477
    • /
    • 2013
  • There is a great need to develop a training program proven to change behavior and improve knowledge. The purpose of this study was to evaluate employee hygiene knowledge, hygiene practice, and cleanliness, before and after HACCP system implementation at one small-size restaurant. The efficiency of the system was analyzed using time-temperature control after implementation of u-HACCP$^{(R)}$. The employee hygiene knowledge and practices showed a significant improvement (p<0.05) after HACCP system implementation. In non-heating processes, such as seasoned lettuce, controlling the sanitation of the cooking facility and the chlorination of raw ingredients were identified as the significant CCP. Sanitizing was an important CCP because total bacteria were reduced 2~4 log CFU/g after implementation of HACCP. In bean sprouts, microbial levels decreased from 4.20 logCFU/g to 3.26 logCFU/g. There were significant correlations between hygiene knowledge, practice, and microbiological contamination. First, personnel hygiene had a significant correlation with 'total food hygiene knowledge' scores (p<0.05). Second, total food hygiene practice scores had a significant correlation (p<0.05) with improved microbiological qualities of lettuce salad. Third, concerning the assessment of microbiological quality after 1 month, there were significant (p<0.05) improvements in times of heating, and the washing and division process. On the other hand, after 2 months, microbiological was maintained, although only two categories (division process and kitchen floor) were improved. This study also investigated time-temperature control by using ubiquitous sensor networks (USN) consisting of an ubi reader (CCP thermometer), an ubi manager (tablet PC), and application software (HACCP monitoring system). The result of the temperature control before and after USN showed better thermal management (accuracy, efficiency, consistency of time control). Based on the results, strict time-temperature control could be an effective method to prevent foodborne illness.

A Study on the Application of Outlier Analysis for Fraud Detection: Focused on Transactions of Auction Exception Agricultural Products (부정 탐지를 위한 이상치 분석 활용방안 연구 : 농수산 상장예외품목 거래를 대상으로)

  • Kim, Dongsung;Kim, Kitae;Kim, Jongwoo;Park, Steve
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.3
    • /
    • pp.93-108
    • /
    • 2014
  • To support business decision making, interests and efforts to analyze and use transaction data in different perspectives are increasing. Such efforts are not only limited to customer management or marketing, but also used for monitoring and detecting fraud transactions. Fraud transactions are evolving into various patterns by taking advantage of information technology. To reflect the evolution of fraud transactions, there are many efforts on fraud detection methods and advanced application systems in order to improve the accuracy and ease of fraud detection. As a case of fraud detection, this study aims to provide effective fraud detection methods for auction exception agricultural products in the largest Korean agricultural wholesale market. Auction exception products policy exists to complement auction-based trades in agricultural wholesale market. That is, most trades on agricultural products are performed by auction; however, specific products are assigned as auction exception products when total volumes of products are relatively small, the number of wholesalers is small, or there are difficulties for wholesalers to purchase the products. However, auction exception products policy makes several problems on fairness and transparency of transaction, which requires help of fraud detection. In this study, to generate fraud detection rules, real huge agricultural products trade transaction data from 2008 to 2010 in the market are analyzed, which increase more than 1 million transactions and 1 billion US dollar in transaction volume. Agricultural transaction data has unique characteristics such as frequent changes in supply volumes and turbulent time-dependent changes in price. Since this was the first trial to identify fraud transactions in this domain, there was no training data set for supervised learning. So, fraud detection rules are generated using outlier detection approach. We assume that outlier transactions have more possibility of fraud transactions than normal transactions. The outlier transactions are identified to compare daily average unit price, weekly average unit price, and quarterly average unit price of product items. Also quarterly averages unit price of product items of the specific wholesalers are used to identify outlier transactions. The reliability of generated fraud detection rules are confirmed by domain experts. To determine whether a transaction is fraudulent or not, normal distribution and normalized Z-value concept are applied. That is, a unit price of a transaction is transformed to Z-value to calculate the occurrence probability when we approximate the distribution of unit prices to normal distribution. The modified Z-value of the unit price in the transaction is used rather than using the original Z-value of it. The reason is that in the case of auction exception agricultural products, Z-values are influenced by outlier fraud transactions themselves because the number of wholesalers is small. The modified Z-values are called Self-Eliminated Z-scores because they are calculated excluding the unit price of the specific transaction which is subject to check whether it is fraud transaction or not. To show the usefulness of the proposed approach, a prototype of fraud transaction detection system is developed using Delphi. The system consists of five main menus and related submenus. First functionalities of the system is to import transaction databases. Next important functions are to set up fraud detection parameters. By changing fraud detection parameters, system users can control the number of potential fraud transactions. Execution functions provide fraud detection results which are found based on fraud detection parameters. The potential fraud transactions can be viewed on screen or exported as files. The study is an initial trial to identify fraud transactions in Auction Exception Agricultural Products. There are still many remained research topics of the issue. First, the scope of analysis data was limited due to the availability of data. It is necessary to include more data on transactions, wholesalers, and producers to detect fraud transactions more accurately. Next, we need to extend the scope of fraud transaction detection to fishery products. Also there are many possibilities to apply different data mining techniques for fraud detection. For example, time series approach is a potential technique to apply the problem. Even though outlier transactions are detected based on unit prices of transactions, however it is possible to derive fraud detection rules based on transaction volumes.

Nitrogen Removal Rate of A Subsurface Flow Treatment Wetland System Constructed on Floodplain During Its Initial Operating Stage (하천고수부지 수질정화 여과습지의 초기운영단계 질소제거)

  • Yang, Hong-Mo
    • Korean Journal of Environmental Agriculture
    • /
    • v.22 no.4
    • /
    • pp.278-283
    • /
    • 2003
  • This study was carried out to examine the nitrogen removal rate of a subsurface-flow treatment wetland system which was constructed on floodplain of the Kwangju River from May to June 2001. Its dimensions were 29m in length, 9m in width and 0.65m in depth. A bottom layer of 45cm in depth was filled with crushed granite with about $15{\sim}30\;mm$ in diameter and a middle layer of 10cm in depth had pea pebbles with about 10 mm in diameter. An upper layer of 5 cm in depth contained course sand. Reeds (Phragmites australis) were transplanted on the surface of the system. They were dug out of natural wetlands and stems were cut at about 40 cm height from their bottom ends. Water of the Kwangju River flowed into it via a pipe by gravity flow and its effluent was funneled back into the river. The height of reed stems was 44.2 cm in July 2001 and 75.3cm in September 2001. The number of stems was increased from $80\;stems/m^2$ in July 2001 to $136\;stems/m^2$ in September 2001. Volume and water quality of inflow and outflow were analyzed from July 2001 through December 2001. Inflow and outflow averaged 40.0 and $39.2\;m^3/day$, respectively. Hydraulic detention time was about 1.5 days. Average nitrogen uptake by reeds was $69.31\;N\;mg/m^2/day$. Removal rate of $NO_3-N$, $NH_3-N$, T-N averaged 195.58, 53.65, and $628.44\;mg/m^2/day$, respectively. Changes of $NO_3-N$ and $NH_3-N$ abatement rates were closely related to those of wetland temperatures. The lower removal rate of nitrogen species compared with that of subsurface-flow wetlands operating in North America could be attributed to the initial stage of the system and inclusion of two cold months into the six-month monitoring period. Increase of standing density of reeds within a few years will develop both root zones suitable for the nitrification of ammonia and surface layer substrates beneficial to the denitrification of nitrates into nitrogen gases, which may lead to increment in the nitrogen retention rate.

APPLICATION OF FUZZY SET THEORY IN SAFEGUARDS

  • Fattah, A.;Nishiwaki, Y.
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1993.06a
    • /
    • pp.1051-1054
    • /
    • 1993
  • The International Atomic Energy Agency's Statute in Article III.A.5 allows it“to establish and administer safeguards designed to ensure that special fissionable and other materials, services, equipment, facilities and information made available by the Agency or at its request or under its supervision or control are not used in such a way as to further any military purpose; and to apply safeguards, at the request of the parties, to any bilateral or multilateral arrangement, or at the request of a State, to any of that State's activities in the field of atomic energy”. Safeguards are essentially a technical means of verifying the fulfilment of political obligations undertaken by States and given a legal force in international agreements relating to the peaceful uses of nuclear energy. The main political objectives are: to assure the international community that States are complying with their non-proliferation and other peaceful undertakings; and to deter (a) the diversion of afeguarded nuclear materials to the production of nuclear explosives or for military purposes and (b) the misuse of safeguarded facilities with the aim of producing unsafeguarded nuclear material. It is clear that no international safeguards system can physically prevent diversion. The IAEA safeguards system is basically a verification measure designed to provide assurance in those cases in which diversion has not occurred. Verification is accomplished by two basic means: material accountancy and containment and surveillance measures. Nuclear material accountancy is the fundamental IAEA safeguards mechanism, while containment and surveillance serve as important complementary measures. Material accountancy refers to a collection of measurements and other determinations which enable the State and the Agency to maintain a current picture of the location and movement of nuclear material into and out of material balance areas, i. e. areas where all material entering or leaving is measurab e. A containment measure is one that is designed by taking advantage of structural characteristics, such as containers, tanks or pipes, etc. To establish the physical integrity of an area or item by preventing the undetected movement of nuclear material or equipment. Such measures involve the application of tamper-indicating or surveillance devices. Surveillance refers to both human and instrumental observation aimed at indicating the movement of nuclear material. The verification process consists of three over-lapping elements: (a) Provision by the State of information such as - design information describing nuclear installations; - accounting reports listing nuclear material inventories, receipts and shipments; - documents amplifying and clarifying reports, as applicable; - notification of international transfers of nuclear material. (b) Collection by the IAEA of information through inspection activities such as - verification of design information - examination of records and repo ts - measurement of nuclear material - examination of containment and surveillance measures - follow-up activities in case of unusual findings. (c) Evaluation of the information provided by the State and of that collected by inspectors to determine the completeness, accuracy and validity of the information provided by the State and to resolve any anomalies and discrepancies. To design an effective verification system, one must identify possible ways and means by which nuclear material could be diverted from peaceful uses, including means to conceal such diversions. These theoretical ways and means, which have become known as diversion strategies, are used as one of the basic inputs for the development of safeguards procedures, equipment and instrumentation. For analysis of implementation strategy purposes, it is assumed that non-compliance cannot be excluded a priori and that consequently there is a low but non-zero probability that a diversion could be attempted in all safeguards ituations. An important element of diversion strategies is the identification of various possible diversion paths; the amount, type and location of nuclear material involved, the physical route and conversion of the material that may take place, rate of removal and concealment methods, as appropriate. With regard to the physical route and conversion of nuclear material the following main categories may be considered: - unreported removal of nuclear material from an installation or during transit - unreported introduction of nuclear material into an installation - unreported transfer of nuclear material from one material balance area to another - unreported production of nuclear material, e. g. enrichment of uranium or production of plutonium - undeclared uses of the material within the installation. With respect to the amount of nuclear material that might be diverted in a given time (the diversion rate), the continuum between the following two limiting cases is cons dered: - one significant quantity or more in a short time, often known as abrupt diversion; and - one significant quantity or more per year, for example, by accumulation of smaller amounts each time to add up to a significant quantity over a period of one year, often called protracted diversion. Concealment methods may include: - restriction of access of inspectors - falsification of records, reports and other material balance areas - replacement of nuclear material, e. g. use of dummy objects - falsification of measurements or of their evaluation - interference with IAEA installed equipment.As a result of diversion and its concealment or other actions, anomalies will occur. All reasonable diversion routes, scenarios/strategies and concealment methods have to be taken into account in designing safeguards implementation strategies so as to provide sufficient opportunities for the IAEA to observe such anomalies. The safeguards approach for each facility will make a different use of these procedures, equipment and instrumentation according to the various diversion strategies which could be applicable to that facility and according to the detection and inspection goals which are applied. Postulated pathways sets of scenarios comprise those elements of diversion strategies which might be carried out at a facility or across a State's fuel cycle with declared or undeclared activities. All such factors, however, contain a degree of fuzziness that need a human judgment to make the ultimate conclusion that all material is being used for peaceful purposes. Safeguards has been traditionally based on verification of declared material and facilities using material accountancy as a fundamental measure. The strength of material accountancy is based on the fact that it allows to detect any diversion independent of the diversion route taken. Material accountancy detects a diversion after it actually happened and thus is powerless to physically prevent it and can only deter by the risk of early detection any contemplation by State authorities to carry out a diversion. Recently the IAEA has been faced with new challenges. To deal with these, various measures are being reconsidered to strengthen the safeguards system such as enhanced assessment of the completeness of the State's initial declaration of nuclear material and installations under its jurisdiction enhanced monitoring and analysis of open information and analysis of open information that may indicate inconsistencies with the State's safeguards obligations. Precise information vital for such enhanced assessments and analyses is normally not available or, if available, difficult and expensive collection of information would be necessary. Above all, realistic appraisal of truth needs sound human judgment.

  • PDF

A Study on People Counting in Public Metro Service using Hybrid CNN-LSTM Algorithm (Hybrid CNN-LSTM 알고리즘을 활용한 도시철도 내 피플 카운팅 연구)

  • Choi, Ji-Hye;Kim, Min-Seung;Lee, Chan-Ho;Choi, Jung-Hwan;Lee, Jeong-Hee;Sung, Tae-Eung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.2
    • /
    • pp.131-145
    • /
    • 2020
  • In line with the trend of industrial innovation, IoT technology utilized in a variety of fields is emerging as a key element in creation of new business models and the provision of user-friendly services through the combination of big data. The accumulated data from devices with the Internet-of-Things (IoT) is being used in many ways to build a convenience-based smart system as it can provide customized intelligent systems through user environment and pattern analysis. Recently, it has been applied to innovation in the public domain and has been using it for smart city and smart transportation, such as solving traffic and crime problems using CCTV. In particular, it is necessary to comprehensively consider the easiness of securing real-time service data and the stability of security when planning underground services or establishing movement amount control information system to enhance citizens' or commuters' convenience in circumstances with the congestion of public transportation such as subways, urban railways, etc. However, previous studies that utilize image data have limitations in reducing the performance of object detection under private issue and abnormal conditions. The IoT device-based sensor data used in this study is free from private issue because it does not require identification for individuals, and can be effectively utilized to build intelligent public services for unspecified people. Especially, sensor data stored by the IoT device need not be identified to an individual, and can be effectively utilized for constructing intelligent public services for many and unspecified people as data free form private issue. We utilize the IoT-based infrared sensor devices for an intelligent pedestrian tracking system in metro service which many people use on a daily basis and temperature data measured by sensors are therein transmitted in real time. The experimental environment for collecting data detected in real time from sensors was established for the equally-spaced midpoints of 4×4 upper parts in the ceiling of subway entrances where the actual movement amount of passengers is high, and it measured the temperature change for objects entering and leaving the detection spots. The measured data have gone through a preprocessing in which the reference values for 16 different areas are set and the difference values between the temperatures in 16 distinct areas and their reference values per unit of time are calculated. This corresponds to the methodology that maximizes movement within the detection area. In addition, the size of the data was increased by 10 times in order to more sensitively reflect the difference in temperature by area. For example, if the temperature data collected from the sensor at a given time were 28.5℃, the data analysis was conducted by changing the value to 285. As above, the data collected from sensors have the characteristics of time series data and image data with 4×4 resolution. Reflecting the characteristics of the measured, preprocessed data, we finally propose a hybrid algorithm that combines CNN in superior performance for image classification and LSTM, especially suitable for analyzing time series data, as referred to CNN-LSTM (Convolutional Neural Network-Long Short Term Memory). In the study, the CNN-LSTM algorithm is used to predict the number of passing persons in one of 4×4 detection areas. We verified the validation of the proposed model by taking performance comparison with other artificial intelligence algorithms such as Multi-Layer Perceptron (MLP), Long Short Term Memory (LSTM) and RNN-LSTM (Recurrent Neural Network-Long Short Term Memory). As a result of the experiment, proposed CNN-LSTM hybrid model compared to MLP, LSTM and RNN-LSTM has the best predictive performance. By utilizing the proposed devices and models, it is expected various metro services will be provided with no illegal issue about the personal information such as real-time monitoring of public transport facilities and emergency situation response services on the basis of congestion. However, the data have been collected by selecting one side of the entrances as the subject of analysis, and the data collected for a short period of time have been applied to the prediction. There exists the limitation that the verification of application in other environments needs to be carried out. In the future, it is expected that more reliability will be provided for the proposed model if experimental data is sufficiently collected in various environments or if learning data is further configured by measuring data in other sensors.

A Basic Study on the Establishment of Preservation and Management for Natural Monument(No.374) Pyeongdae-ri Torreya nucifera forest of Jeju (천연기념물 제374호 제주 평대리 비자나무 숲의 보존·관리방향 설정을 위한 기초연구)

  • Lee, Won-Ho;Kim, Dong-Hyun;Kim, Jae-Ung;Oh, Hae-Sung;Choi, Byung-Ki;Lee, Jong-Sung
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.32 no.1
    • /
    • pp.93-106
    • /
    • 2014
  • In this study, Analyze environment of location, investigation into vegetation resources, survey management status and establish to classify the management area for Natural monument No.374 Pyengdae-ri Torreya nucifera forest. The results were as follows: First, Torreya nucifera forest is concerned about influence of development caused by utilization of land changes to agricultural region. Thus, establish to preservation management plan for preservation of prototypical and should be excluded development activity to cause the change of terrain that Gotjawal in the Torreya nucifera forest is factor of base for generating species diversity. Secondly, Torreya nucifera forest summarized as 402 taxa composed 91 familly 263 genus, 353 species, 41 varieties and 8 forms. The distribution of plants for the first grade & second grade appear of endangered plant to Ministry of Environment specify. But, critically endangered in forest by changes in habitat, diseases and illegal overcatching. Therefore, when establishing forest management plan should be considered for put priority on protection. Thirdly, Torreya nucifera representing the upper layer of the vegetation structure. But, old tree oriented management and conservation strategy result in poor age structure. Furthermore, desiccation of forest on artificial management and decline in Torreya nucifera habitat on ecological succession can indicate a problem in forest. Therefore, establish plan such as regulation of population density and sapling tree proliferation for sustainable characteristics of the Torreya nucifera forest. Fourth, Appear to damaged of trails caused by use. Especially, Scoria way occurs a lot of damaged and higher than the share ratio of each section. Therefore, share ratio reduction Plan should be considered through the additional development of tourism routes rather than the replacement of Scoria. Fifth, Representing high preference of the Torreya nucifera forest tourist factor confirmed the plant elements. It is sensitive to usage pressure. And requires continuous monitoring by characteristic of Non-permanent. In addition, need an additional plan such as additional development of tourism elements and active utilizing an element of high preference. Sixth, Strength of protected should be differently accordance with importance. First grade area have to maintenance of plant population and natural habitats. Set the direction of the management. Second grade areas focus on annual regeneration of the forest. Third grade area should be utilized demonstration forest or set to the area for proliferate sapling. Fourth grade areas require the introduced of partial rest system that disturbance are often found in proper vegetation. Fifth grade area appropriate to the service area for promoting tourism by utilizing natural resources in Torreya nucifera forest. Furthermore, installation of a buffer zone in relatively low ratings area and periodic monitoring to the improvement of edge effect that adjacent areas of different class.

Analysis of Critical Control Points through Field Assessment of Sanitation Management Practices in Foodservice Establishments (현장실사를 통한 급식유헝별 위생관리실태 분석)

  • Kwak Tong-Kyung;Lee Kyung-Mi;Chang Hye-Ja;Kang Yong-Jae;Hong Wan-Soo;Moon Hye-Kyung
    • Korean journal of food and cookery science
    • /
    • v.21 no.3 s.87
    • /
    • pp.290-300
    • /
    • 2005
  • Increased sanitation management of foodservice establishments is required because most of the reported foodborne-disease outbreaks were in the foodservice industry. The purpose of this study was to determine the important control points for good sanitation. In this study, we inspected twenty foodservice establishments in Seoul, Kyunggi, Kyungnam with a self-developed monitoring tool. These foodservice establishments included secondary schools, universities, and industries. Six of them had appointed as the HACCP-certified establishments from the Korea Food and Drug Administration. The inspection was conducted from June to August in 2002. The inspection tool consisted of nine dimensions and sixty-five items. The dimensions were 'personal sanitation', 'supply of raw food', 'food storage', 'handling of raw food and ready-to-eat', 'cleaning and sterilization', 'waste control', 'pest control', and 'control of establishment and equipment' The highest possible score of this inspection tool is 105 points. Statistical data analysis was completed using the SPSS Package(11.0) for descriptive analysis Kruskal-Wallis. The score for the secondary schools (83.6 points) was higher than for the others and number of in compliance item was 50.9 on average. Therefore, we concluded that the secondary schools' sanitation condition was good. The foodservice establishments acquired HACCP certification was 89.7 points, which was significantly higher than that of establishments not applying foodservices in total score. Instituting the HACCP system in a foodservice is very effective for sanitation management. Many out of the compliance observations were found in the dimensions of 'waste control', 'control of establishment and equipment', and 'supply of raw food' 'Clean condition of refrigerator' item was $65\%$ out of the compliance that was the highest percent in this study. 'Notify and observance of heating/reheating temperature' was $45\%$ out of compliance. Items which were over $30\%$ out of compliance were 'sterilization of knifes and chopping boards in cooking', 'education of workers', 'maintain refrigerator temperature blow $5^{\circ}C$', and 'countermeasure of infection workers' In the results, most of the foodservice establishments were poorly managed in temperature control and cross-contamination. The important control points revealed in this study were preventing contamination, cooking temperature compliance, management of raw food and refrigerator. Therefore foodservice establishments should pay attention to education and training about important control points. The systematic sanitation management monitoring tool developed in this study can be effectively applied for conducting self-inspection and improving the sanitary conditions of their own foodservice operations.

CQI Action Team Approach to Prevent Pressure Sores in Intensive Care Unit of an Acute Hospital Korea (중환자의 욕창 예방 연구 : 욕창 예방 QI팀을 중심으로)

  • Kang, So Young;Choi, Eun-Kyung;Kim, Jin-Ju;Ju, Mi-Jung
    • Quality Improvement in Health Care
    • /
    • v.4 no.1
    • /
    • pp.50-63
    • /
    • 1997
  • Background : A pressure sore was defined as any skin lesion caused by unrelieved pressure and resulting in damage to underlying tissue. The health care institutions in the United States were reported the incident rate of pressure sores ranging from 6 to 14 %. Intensive Care Unit needed highest quality of care has been found over 40% incidence rate of pressure sore. Also, Annual expenditures for the care of pressure sores in patients in the United States have been estimated to be $7.5 billion; furthermore, 50 percent more nursing time is required to care for patients with pressure sore in comparison to the time needed to implement preventive measures against pressure sore formation. However, In Korea, there were little reliable reports, or researches, about incidence rates of pressure sore in health care institution including intensive care unit and about the integrated approach like CQI action team for risk assessment, prevention and treatment of pressure ulcers. Therefore, this study was to develop pressure sore risk assessment tool and the protocol for prevention of pressure sore formation through CQI action team activities, to monitor incident rate of pressure sore and the length of sore formation for patients at high risk, and to approximately estimate nursing time for sore dressing during research period as the effect of CQI action team. Method : CQI action team in intensive care unit, launched since early 1996, reviewed the literature for the standardized risk assessment tool, developed the pressure sore assessment tool based on the Braden Scale, tested its validity, compared on statistics including incidence rate of pressure sore for patients at high risk. Throughout these activities, CQI action team was developed the protocol, called as St. Marys hospital Intensive Care Unit Pressure Sore Protocol, shifted the emphasis from wound treatment to wound prevention. After applied the protocol to patients at high risk, the incident rate and the period of prevention against pressure development were tested with those for patients who received care before implementation of protocol by Chi-square and Kaplan-Meier Method of Survival Analysis. Result : The CQI action team found that these was significant difference of in incidence rate of pressure sores between patients at high risk (control group) who received care before implementation of protocol and those (experimental group) who received it after implementation of protocol (p<.05). 25% possibility of pressure sore formation was shown for the patients with 6th hospital day in ICU in control group. In experimental group, the patients with 10th hospital day had 10% possibility of pressure sore. Therefore, there was significant difference(p<.05) in survival rate between two groups. Also, nursing time for dressing on pressure sore in experimental group was decreased as much as 50% of it in control group. Conclusion : The collaborative team effort led to reduced incidence, increased the length of prevention against pressure sore, and declined nursing care times for sore dressing. However, there have had several suggestions for future study. The preventive care system for pressure sore should be applied to patients at moderate, or low risk throughout continuous CQI team activities based on Bed Sore Indicator Fact Sheet. Hospital-wide supports, such as incentives, would be offered to participants for keeping strong commitment to CQI team. Also, Quality Information System monitoring incidents and estimating cost of poor quality, like workload (full time equivalence) or financial loss, regularly in a hospital has to be developed first for supporting CQI team activities as well as empowering hospital-wide QI implementation. Being several limitations, this study would be one of the report cards for the CQI team activities in intensive care unit of an acute hospital and a trial of quality improvement of health care in Korea.

  • PDF

ICT Medical Service Provider's Knowledge and level of recognizing how to cope with fire fighting safety (ICT 의료시설 기반에서 종사자의 소방안전 지식과 대처방법 인식수준)

  • Kim, Ja-Sook;Kim, Ja-Ok;Ahn, Young-Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.1
    • /
    • pp.51-60
    • /
    • 2014
  • In this study, ICT medical service provider's level of knowledge fire fighting safety and methods on coping with fires in the regions of Gwangju and Jeonam Province of Korea were investigated to determine the elements affecting such levels and provide basic information on the manuals for educating how to cope with the fire fighting safety in medical facilities. The data were analyzed using SPSS Win 14.0. The scores of level of knowledge fire fighting safety of ICT medical service provider's were 7.06(10 point scale), and the scores of level of recognizing how to cope with fire fighting safety were 6.61(11 point scale). level of recognizing how to cope with fire fighting safety were significantly different according to gender(t=4.12, p<.001), age(${\chi}^2$=17.24, p<.001), length of career(${\chi}^2$=22.76, p<.001), experience with fire fighting safety education(t=6.10, p<.001), level of subjective knowledge on fire fighting safety(${\chi}^2$=53.83, p<.001). In order to enhance the level of understanding of fire fighting safety and methods of coping by the ICT medical service providers it is found that: self-directed learning through avoiding the education just conveying knowledge by lecture tailored learning for individuals fire fighting education focused on experiencing actual work by developing various contents emphasizing cooperative learning deploying patients by classification systems using simulations and a study on the implementation of digital anti-fire monitoring system with multipoint communication protocol, a design and development of the smoke detection system using infra-red laser for fire detection in the wide space, video based fire detection algorithm using gaussian mixture mode developing an education manual for coping with fire fighting safety through multi learning approach at the medical facilities are required.

A Study on the Application of Block Chain Technology on EVMS (EVMS 업무의 블록체인 기술 적용 방안 연구)

  • Kim, Il-Han;Kwon, Sun-Dong
    • Management & Information Systems Review
    • /
    • v.39 no.2
    • /
    • pp.39-60
    • /
    • 2020
  • Block chain technology is one of the core elements for realizing the 4th industrial revolution, and many efforts have been made by government and companies to provide services based on block chain technology. In this study we analyzed the benefits of block chain technology for EVMS and designed EVMS block chain platform with increased data security and work efficiency for project management data, which are important assets in monitoring progress, foreseeing future events, and managing post-completion. We did the case studies on the benefits of block chain technology and then conducted the survey study on security, reliability, and efficiency of block chain technology, targeting 18 block chain experts and project developers. And then, we interviewed EVMS system operator on the compatibility between block chain technology and EVM Systems. The result of the case studies showed that block chain technology can be applied to financial, logistic, medical, and public services to simplify the insurance claim process and to improve reliability by distributing transaction data storage and applying security·encryption features. Also, our research on the characteristics and necessity of block chain technology in EVMS revealed the improvability of security, reliability, and efficiency of management and distribution of EVMS data. Finally, we designed a network model, a block structure, and a consensus algorithm model and combined them to construct a conceptual block chain model for EVM system. This study has the following contribution. First, we reviewed that the block chain technology is suitable for application in the defense sector and proposed a conceptual model. Second, the effect that can be obtained by applying block chain technology to EVMS was derived, and the possibility of improving the existing business process was derived.