• Title/Summary/Keyword: passive service

Search Result 339, Processing Time 0.03 seconds

The Study on the Private Security Employee' Education and Training System for the Emergency Management (민간경비원의 위기관리 능력 제고를 위한 교육훈련 시스템 개선방안)

  • Park, Dong-Kyun
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.129-146
    • /
    • 2008
  • When the primary function of private security is to protect lives and property of clients, emergency management should be included in the security service and many countermeasure services should be carried out for that purpose. In theses contexts, private security should develop and maintain a educational program to meet their responsibilities to provide the protection and safety of the clients. Conclusionally, private security industry employers in Korea has not concerned with the importance of training and education by lack of recognition and has been passive about qualified guards. And the authorities supervising and the administrating the guards has not recognized the importance of private security and has neglected the training of the guards. In theses contexts, private security should develop and maintain a educational program of emergency management to meet their responsibilities to provide the protection and safety of the clients.

  • PDF

Practice Experience of Nursing Student in Operating Room (간호대학생의 수술실 실습 경험)

  • Song, Mi-Sook;Park, Kyung-Min
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.2
    • /
    • pp.357-367
    • /
    • 2020
  • This study is a qualitative study conducted to understand and explain the operating room practice experience of nursing college students. Participants in this study were 67 nursing college students in 3rd and 4th grade at a university in C-gun, Gyeongsangbuk-do who participated in the practice of operating rooms. The data collection period was from January 14, 2019 to January 13, 2020, and the data collection was carried out through an open self-report-style reflection log, and the collected data was analyzed using the traditional content analysis method of Krippendorff [21]. Analysis of the operating room practice experience of nursing college students resulted in 27 sub-themes, 12 themes and 5 categories. The five categories are "Being seized with complicated feelings," "Being faced with dissection body," "Learning the characteristics of the operating room, " "Being confronted with the limits of clinical practice" and "Self-reflection." The results of this study provided an understanding of the operating room practice experience of nursing students and are expected to be used as basic data to improve the quality of practice of nursing students.

A Movie Rating Prediction System of User Propensity Analysis based on Collaborative Filtering and Fuzzy System (협업적 필터링 및 퍼지시스템 기반 사용자 성향분석에 의한 영화평가 예측 시스템)

  • Lee, Soo-Jin;Jeon, Tae-Ryong;Baek, Gyeong-Dong;Kim, Sung-Shin
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.2
    • /
    • pp.242-247
    • /
    • 2009
  • Recently an intelligent system is developed for the service what users want not a passive system which just answered user's request. This intelligent system is used for personalized recommendation system and representative techniques are content-based and collaborative filtering. In this study, we propose a prediction system which is based on the techniques of recommendation system using a collaborative filtering and a fuzzy system to solve the collaborative filtering problems. In order to verify the prediction system, we used the data that is user's rating about movies. We predicted the user's rating using this data. The accuracy of this prediction system is determined by computing the RMSE(root mean square error) of the system's prediction against the actual rating about the each movie and is compared with the existing system. Thus, this prediction system can be applied to base technology of recommendation system and also recommendation of multimedia such as music and books.

Secure Location Information Protection Scheme from the Network Provider and the third party in Mobile Communication Environments (이동통신 환경에서 네트워크 제공자 및 제 3자로부터 안전한 위치정보 보호기법)

  • Kim, Soon-Seok;Lee, Chang-Hun
    • The KIPS Transactions:PartC
    • /
    • v.10C no.7
    • /
    • pp.867-878
    • /
    • 2003
  • In thls Paper, we Propose a new scheme, protecting information about the location of a mobile user against attacks from inside users of the mobile communication, especially the network providers. There have already been some proposals about how to protect location information of user in mobile communication environments〔1-5〕. Among them, Kesdogan et al.〔2, 3〕 proposed a new method, using so-called temporary pseudonyms and also described protection method against a passive and an active attack of network providers. However, the description of protection method against the active attack between the two is not clear. Moreover, there is an additional load that it should append a reachability manager〔1, 6〕 to the proposed system. Therefore, we propose a new scheme improving the above method of Kesdogan et al. and analyze its security and effectiveness.

An Authentication and Key Management Protocol for Secure Data Exchange in EPON MAC Layer (EPON MAC 계층의 안전한 데이터 전송을 위한 인증 및 키관리 프로토콜)

  • Kang, In-kon;Lee, Do-Hoon;Lee, Bong-Ju;Kim, Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.1B
    • /
    • pp.1-10
    • /
    • 2003
  • An EPON which is going on standardization in IEEE 802.3ah, is tree topology consists of a OLT and multiple ONU using passive optical components, so this network is susceptible to variable security threats - eavesdropping, masquerading, denial of service and so on. In this paper, we design a security protocol supporting authentication and confidentiality services in MAC layer in order to prevent these security threats and to guarantee secure data exchange The designed security protocol introduce public-key based authentication and key management protocols for efficient key management, and choose Rijndael algorithm, which is recent standard of AES, to provide the confidentiality of EPON Proposed authentication and key management protocols perform authentication and public-key exchange at a time, and are secure protocols using derived common cipher key by exchanging public random number To implement the designed security protocol, we propose the procedures of authentication and public-key exchange, session key update, key recovery. This proposed protocol is verified using unknown session key, forward secrecy, unknown key-share, key-compromise impersonation.

A Position Tracking System Using Pattern Matching and Regression Curve (RFID 태그를 이용한 실내 위치 추적 시스템에 관한 연구)

  • Cho, Jaehyung
    • Journal of Digital Convergence
    • /
    • v.17 no.12
    • /
    • pp.211-217
    • /
    • 2019
  • Location positioning systems are available in applications such as mobile, robotic tracking systems and Wireless location-based service (LBS) applications. The GPS system is the most well-known location tracking system, but it is not easy to use indoors. The method of radio frequency identification (RFID) location tracking was studied in terms of cost-effectiveness for indoor location tracking systems. Most RFID systems use active RFID tags using expendable batteries, but in this paper, an inexpensive indoor location tracking system using passive RFID tags has been developed. A pattern matching method and a system for tracing location by generating regression curves were studied to use precision tracking algorithms. The system was tested by verifying the level of error caused by noise. The three-dimensional curves are produced by the regression equation estimated the statistically meaningful coordinates by the differential equation. The proposed system could also be applied to mobile robot systems, AGVs and mobile phone LBSs.

Dual GPS Scheduler for Delay-Constraint Applications in E-PON (이더넷수동형 광 네트워크에서 지연 제약을 고려한 Dual-GPS 스케줄러)

  • An, Eung-Suk;Zhang, Lin;Youn, Chan-Hyun;Yeo, Hwan-Geun;Yang, Sun-Hee;Kim, Young-Sun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.4B
    • /
    • pp.270-281
    • /
    • 2003
  • E-PON supports efficiently the increased Internet data traffic and efficient bandwidth assignment function by which the shared upstream bandwidth in the broadband access networks. In this paper, when different types of incoming sources are mapped into QoS-aware source and Best-Effort(BE) source, we propose the Dual-GPS schedulaer in E-PON that has the characteristics to provide delay and delay-constraint application, and maximizes the bandwidth to best-effort service. When transmit upstream data in E-PON, The proposed scheme supports the control capabilities of delay and delay-variation for required QoS flow through the novel bandwidth assignment scheme. Simulation results show our scheme outperforms the conventional bandwidth allocation scheme in controlling the delay and delay-variation of E-PON system.

Physical Therapy Session Duration in patients with Shoulder pain: Descriptive Research (견부통 환자에 대한 물리치료방법의 적용 시간을 중심으로 한 기술적 연구)

  • Kim, Suhn-Yeop;Chae, Jung-Byung;Kwon, Jae-Hoak
    • Journal of Korean Physical Therapy Science
    • /
    • v.9 no.4
    • /
    • pp.119-130
    • /
    • 2002
  • Objective: The purpose of this research was to use data for furnish quality physical therapy service. The research subjects were admitted shoulder pain patients treated with physical therapy that was to grasp physical therapy method as distinguishing application time. Subject: Total number of distributed questionnaire was 563 persons that was to utilized physical therapy room of 56th medical institution and distributed it to each physical therapist in charge. Method: The research used questionnaire in order to research itemized treatment application time that is according to physical therapy method to applicated with shoulder pain patient. The research contents is to received shoulder pain diagnosis period, total duration of utilizing physical therapy room, the number of times per week to used physical therapy room, etc. And we had physical therapist recording the time of application physical therapy method come under the items. Result: The average treatment time was 59.2 minutes at all patients. During this time, 39.7 min was modality treatment. Active movement treatment was only 7.1 min. Total treatment time was longest in general hospital at 64.9 min, it was shortest in clinical hospital at 53.3 min. Treatment time was difference as hospital scale(p<0.001). Active movement treatment time was longest in general hospital at 11.5 min. The average treatment time was 4.5 min in clinical hospital. Therefore, it was related to hospital scale(p<0.05). The average of manual therapy time by physical therapist was 7.5 min. General hospital was linger at 8.6 min than clinical hospital at 6.7 min(p<0.05). Patient of 90.2 % were treated to hot pack, ultra-sound treatment was next as 50.1%. Active strengthening exercise was most carrying out of the active treatment as 25.4 %. Active sensorimotor exercise was practiced only 28 persons of 5.0 %. Most joint mobilization (38.4 %) was used of the passive manual therapy items, next to soft tissue mobilization (33.0 %), and next to manual distraction therapy(14.0 %).

  • PDF

A Study on Repair Method of Concrete Structures using the Solution of Removing Chloride (염분제거용 약액을 이용한 콘크리트 구조물의 보수공법에 관한 연구)

  • Kim, Woonhak;Hwang, Sungwoon;Kang, Seokwon
    • Journal of the Society of Disaster Information
    • /
    • v.13 no.4
    • /
    • pp.562-569
    • /
    • 2017
  • Reinforced concrete is used for bridges and large structures that are constructed with social overhead capital because they are economically and semi-permanently integrated with reinforcing bar and concrete. However, when the chloride ion in the concrete destroys the passive film of the reinforcing bar by the marine exposure environment and the snow remover used in the winter season, and the reinforcing bar is corroded by various chemical and physical actions, the durability is deteriorated in a short period, and the life span is shortened. In this study, a repair method to recover the durability of the initial structure by effectively removing chloride ion from the damage caused by salting of the above mentioned reinforced concrete was conducted.

A Study on the Implementation of an SDI Profiler System for Enhancing the SDI Services in University Libraries (대학 도서관의 SDI 서비스 활성화를 위한 프로파일러(profiler) 체계 적용 연구)

  • Bae, Chang-Sub;Kim, Hyun-Hee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.43 no.3
    • /
    • pp.313-333
    • /
    • 2009
  • Offering subject-oriented services by subject experts is an effective method of enhancing the quality of digital reference services in university libraries. However, it is not easy to implement due to the Korean librarian education system and a shortage of human resources. Thus, as an alternative, we proposed an SDI (selective dissemination of information) profiler system using the concept of a profiler which is used in crime psychology as a specialist who studies a person's behavior for clues to psychology to aid in capturing them, under the assumption that conducting SDI services is one of the subject experts' key roles. And we also mentioned the procedures and methods of how to apply it to the reference services of university libraries. The proposed SDI profiler system can change the roles of university librarians from passive to active. Furthermore, it also allows librarians to provide their clients with customized SDI services, thus improving reference services.