• Title/Summary/Keyword: 기능적 요구사항

Search Result 1,172, Processing Time 0.028 seconds

Development of Safety Activity Application and Usability Evaluation to Improve Risk Perception for Industrial Accident Prevention (산업재해 예방을 위한 위험 지각 증진 안전 활동 어플리케이션 개발 및 사용성 평가)

  • Jong Hyun Lee;Sieun Kim;Eunsol Cho;Kwangsu Moon
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.2
    • /
    • pp.241-253
    • /
    • 2023
  • Purpose: The purpose of this study is to introduce the structure and functions of an application developed for enhancing risk knowledge/perception, called KNOWRISK, and to identify and determine problems and requirements based on the usability evaluation results of the application. Method: The evaluation was conducted using the Mobile App Rating Scale (MARS) with a sample of 43 application users and related experts. Result: The application received a satisfactory evaluation score with an overall average of 4.074 points, and there was no significant difference in evaluation scores between experts and users. The highest score was for ease of use at 4.47, while the lowest score was for cost payment usage at 2.88. Conclusion: The results of this study suggest that efforts to increase risk knowledge and promote safe behavior using a mobile application can be an effective and efficient strategy for preventing industrial accidents and enhancing safety management.

A Study on Speech Synthesizer Using Distributed System (분산형 시스템을 적용한 음성합성에 관한 연구)

  • Kim, Jin-Woo;Min, So-Yeon;Na, Deok-Su;Bae, Myung-Jin
    • The Journal of the Acoustical Society of Korea
    • /
    • v.29 no.3
    • /
    • pp.209-215
    • /
    • 2010
  • Recently portable terminal is received attention by wireless networks and mass capacity ROM. In this result, TTS(Text to Speech) system is inserted to portable terminal. Nevertheless high quality synthesis is difficult in portable terminal, users need high quality synthesis. In this paper, we proposed Distributed TTS (DTTS) that was composed of server and terminal. The DTTS on corpus based speech synthesis can be high quality synthesis. Synthesis system in server that generate optimized speech concatenation information after database search and transmit terminal. Synthesis system in terminal make high quality speech synthesis as low computation using transmitted speech concatenation information from server. The proposed method that can be reducing complexity, smaller power consumption and efficient maintenance.

Trend Analysis of Foreign Academic Libraries' Development Plan (해외 대학도서관 발전계획 동향 분석)

  • Ye Jin Choi;Chohae Kim;Jee Yeon Lee
    • Journal of the Korean Society for information Management
    • /
    • v.40 no.3
    • /
    • pp.163-196
    • /
    • 2023
  • The academic library development plan has external importance as it explicitly declares the library's role and development direction. Internally, it is also a library service guideline. To develop the development plan, libraries must understand the trends and needs of international, national, and affiliating universities and their constituents. Accordingly, this research includes case, content, and network analyses of foreign academic libraries' development plans to identify the trends. The analysis results show most foreign academic libraries employed various strategies and plans, which can be characterized as 'collaboration,' 'collection development,' and 'research support.' Consequently, we propose the following factors to consider when developing an academic library development plan: specification of mission, vision, and core values; recognition of core values such as diversity, equity, and inclusion; awareness of the significance of collaboration and partnership with other units within the universities and external organizations; and utilization of university library development plans as tools for achieving management objectives.

A Study on the Role Model of Joint School-Public Libraries for Rural Communities (지역사회 개방을 위한 학교도서관의 역할모델에 관한 연구)

  • Lee, Mi-Young;Nam, Young-Joon
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.47 no.2
    • /
    • pp.25-43
    • /
    • 2013
  • South Korea has fewer public libraries than other developed nations of OECD. This calls for a more diverse role of school libraries in the geographically isolated areas. School libraries should provides services for not only its students and faculty, but also the surrounding neighborhood as a part of cultural community. Based on the needs for an expanded role of school libraries, this research aims to identify the necessary factors for school libraries to provide services to their local residents. Two things should be identified for this research. First, we should confirm the necessity of policies that provide library services to local residents of school libraries. Second, we should propose a way to have the libraries as a part of cultural community where meet the information and cultural demand of their local residents. The study surveyed users, school principals and working-level staff members of cultural communities in order to study the two questions. These groups were from Uri-school Village Library, which is supported by the NHN Culture Foundation. Through the survey, the research confirmed the need for a consistent outside assistance, job training, open door policy for local residents and diverse library services in order for school libraries to serve their local community.

The design of communication protocol for controlling efficiently modular medical instruments (모듈화된 의료장비들의 효율적 제어를 위한 통신 프로토콜 설계)

  • 신창민;김영길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.10a
    • /
    • pp.284-287
    • /
    • 2000
  • Recently, developing medical devices have a tendency becoming the module for satisfying user's mutual complex needs. Because the most effective method for the observation of patients condition a diagnosis and a treatment is collecting data from various devices and controling operation following it. Module tendency is more popular due to manage easily totally many individual systems. This study implemented communication protocol to control by one control system connecting modular medical devices. Implemented system consist of one master module controlling all module and managing communication and many Slave modules. Communication between each modules introduced SPI(Serial Peripheral Interface) among many synchronous serial communication methods for the exact transmission and receipt of data. All communication executes by packet format. This can detect error. And, this protocol introduced PNP(Plug And Play) function that auto-detect connecting or removing module during running. This protocol exactly transmitted and received in faster speed more than 1Mbps. And in practical application to the ventilator this confirmed to give and take real-time data. And various functions by th central control system is implemented in this protocol.

  • PDF

Implant supported removable dental prosthesis with magnetic attachment in crossed occlusion: A case report (엇갈린 교합에서 implant와 magnetic attachment를 이용한 국소의치 증례)

  • Lee, Yu Jin;Lee, Richard sungbok;Lee, Suk Won;Park, Su Jung;Ahn, Su Jin
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.55 no.1
    • /
    • pp.53-60
    • /
    • 2017
  • When attempting to restore the oral function of a partially edentulous patient, there are a number of prosthetic treatment options available, depending on the structure of remaining teeth. For example, when only one set of maxillary and mandibular teeth are diagonally in place across from each other, it is difficult to gain stable occlusion. In this case, implants can be put in place at the corresponding edentulous area to achieve balance. By doing so, a stable occlusion can be achieved. For this case report, a patient with crossed occlusion after extraction was treated with maxillary RDP (removable dental prosthesis) and mandibular implant-supported RDP (removable dental prosthesis). Moreover, an implant fixture was placed under the posterior molar of the distal extension base diagonally across from the remaining maxillary teeth. Then, magnetic attachment was implemented. According to the patient who received the treatment, the result was functionally and aesthetically satisfactory.

All-on-6 implant fixed prosthesis restoration with full-digital system on edentulous patient: A case report (무치악 환자에서 완전 디지털 시스템을 활용한 All-on-6 임플란트 고정성 보철물 수복 증례)

  • Lee, SeungJin;Jeong, Seung-Mi;Chung, Chae-Heon;Fang, YiQin;Choi, Byung-Ho
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.59 no.4
    • /
    • pp.497-507
    • /
    • 2021
  • All-on-six concept can be used as one of the treatment options to maximize the use of available residual alveolar bone for implant-supported fixed prosthesis on edentulous patients. But this process is complex and cumbersome. Digital system can be used at multiple steps, from implantation to prosthetic restoration, to overcome this shortcoming. In this case of a maxillary edentulous patient aged 76, digital system was used for restoration of 1-piece design, screw retained fixed prosthesis from diagnosis, implant surgery to fabrication of provisional and final prosthesis. For preoperative diagnosis and treatment planning stage, intra-oral information of a patient was digitalized by direct intra-oral scan. Surgical guide and immediate provisional prosthesis was designed based on this digitalized data. Patient's inconvenience was minimized by applying immediate provisional prosthesis, which was delicately fabricated according to the location data of six implants on most suitable residual alveolar bone. Then, final prosthesis was designed and fabricated going through new interim prosthesis which was newly designed and fabricated, considering patient's requests, stable vertical dimension and occlusion, and esthetic factors using digital system. We hereby report a case successfully applying digital system to multiple steps including implant surgery to fabricating prosthesis, to simplify existing complicated implant treatment procedure to an edentulous patient.

A Study on the Development of Consortium Blockchain Governance Framework (컨소시엄 블록체인 거버넌스 프레임워크 개발에 관한 연구)

  • Park, Jin-Sang;Kim, Jung-Duk
    • Journal of Digital Convergence
    • /
    • v.17 no.8
    • /
    • pp.89-94
    • /
    • 2019
  • Due to the limitations of public and private blockchain, several organizations are implementing consortium blockchain systems. In order for an organization to conduct business using blockchain, it must consider 'blockchain governance' factors, such as decision rights, accountability and incentives over on-chain and off-chain, depending on the organization's strategy and objectives. If an organization conducts business without blockchain governance, it cannot achieve its strategy and objectives systematically, effectively and efficiently, and cannot comply with internal external requirements such as the expectations of stakeholders and laws. However, as businesses using consortium blockchain expand, there is no research on consortium blockchain governance. Thus, in this study, the consortium blockchain governance framework, including functions, roles and responsibilities, was developed to help organizations effectively and efficiently conduct business using consortium blockchain. In addition, to review the feasibility of the developed consortium blockchain governance framework, the framework was reviewed through an advisory committee consisting of experts on blockchain and governance over two occasions. As a result of the review, components of the consortium blockchain governance framework, including functions, roles and responsibilities, were considered complete and relevant.

Monitoring-Based Secure Data Aggregation Protocol against a Compromised Aggregator in Wireless Sensor Networks (무선 센서 네트워크에서 Compromised Aggregator에 대응을 위한 모니터링 기반 시큐어 데이터 병합 프로토콜)

  • Anuparp, Boonsongsrikul;Lhee, Kyung-Suk;Park, Seung-Kyu
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.303-316
    • /
    • 2011
  • Data aggregation is important in wireless sensor networks. However, it also introduces many security problems, one of which is that a compromised node may inject false data or drop a message during data aggregation. Most existing solutions rely on encryption, which however requires high computation and communication cost. But they can only detect the occurrence of an attack without finding the attacking node. This makes sensor nodes waste their energy in sending false data if attacks occur repeatedly. Even an existing work can identify the location of a false data injection attack but it has a limitation that at most 50% of total sensor nodes can participate in data transmission. Therefore, a novel approach is required such that it can identify an attacker and also increase the number of nodes which participate in data transmission. In this paper, we propose a monitoring-based secure data aggregation protocol to prevent against a compromised aggregator which injects false data or drops a message. The proposed protocol consists of aggregation tree construction and secure data aggregation. In secure data aggregation, we use integration of abnormal data detection with monitoring and a minimal cryptographic technique. The simulation results show the proposed protocol increases the number of participating nodes in data transmission to 95% of the total nodes. The proposed protocol also can identify the location of a compromised node which injects false data or drops a message. A communication overhead for tracing back a location of a compromised node is O(n) where n is the total number of nodes and the cost is the same or better than other existing solutions.