• Title/Summary/Keyword: 사전 예방

Search Result 1,202, Processing Time 0.028 seconds

The Blueprint of Service Encounter by Types of Restaurants (레스토랑 유형별 서비스 인카운터 청사진 설계 및 비교)

  • Jo, Mi-Na;Shin, Seo-Young
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.35 no.8
    • /
    • pp.1088-1096
    • /
    • 2006
  • The purpose of this study was to identify the service encounter blueprint by types of restaurants in order to manage moment of truth when customers who visit a restaurant encounter services. The service encounter blueprint gives an overall picture of the service provision to visualize an entire service process and its integrated structure. The blueprint is used for service process analysis technique. The random samples of 15 customers were observed by types of restaurants and the records were collected for three-days' observation. Interviews were performed by 3 managers, 3 service encounter employees, 3 cashiers, 3 cooks and 10 customers by types of restaurants. After drawing the first service blueprint, it was revised by the interview with the 3 managers and 6 service encounter employees. In this paper, restaurant service processes are reviewed and analyzed. By use of service blueprint, the processes are analyzed to find a fail point, customer wait, employee decision. As a result of making a blueprint of service encounter by types of restaurant, blueprints of fine-dining restaurants and family restaurants were similar, while fast-food restaurants showed a little difference. In particular, difference was indicated in a point where interaction of service encounter occurred. Difference was indicated depending on types of restaurants. Therefore, the efforts to improve this problem were needed. The blueprint is a map or flowchart (called a process chart in manufacturing) of all transactions constituting the service delivery process. The results showed that service encounter blueprint can be used to improve the service process in the restaurant's encounter.

An Analysis on the Prevention Effects of Forward and Chain Collision based on Vehicle-to-Vehicle Communication (차량 간 통신 기반 전방추돌 및 연쇄추돌 방지 효과 분석)

  • Jung, Sung-Dae;Kim, Tae-Oh;Lee, Sang-Sun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.10 no.4
    • /
    • pp.36-43
    • /
    • 2011
  • The forward collision of vehicles in high speed can cause a chain collisions and high fatality rate. Most of the forward collisions are caused by insufficient braking distance due to detection time of driver and safe distance. Also, accumulated detection time of driver is cause of chain collisions after the forward collision. The FVCWS prevents the forward collision by maintaining the safety distance inter-vehicle and reducing detection time of driver. However the FVCWS can cause chain collisions because the system that interacts only forward vehicle has accumulated detection time of driver. In this paper, we analyze forward and chain collisions of normal vehicles and FVCWS vehicles on static traveling scenario. And then, we analyze and compare V2V based FVCWS with them after explaining the system. The V2V FVCWS reduces detection time of driver alike FVCWS as well as remove accumulated detection time of driver by broadcasting emergence message to backward vehicles at the same time. Therefore, the system decrease possibility of forward and chain collisions. All backward normal vehicles and 3~4 backward FVCWS vehicles have possibility of forward and chain collisions in result of analysis. However V2V FVCWS vehicles almost do not chain collisions in the result.

Design of Dynamic Buffer Assignment and Message model for Large-scale Process Monitoring of Personalized Health Data (개인화된 건강 데이터의 대량 처리 모니터링을 위한 메시지 모델 및 동적 버퍼 할당 설계)

  • Jeon, Young-Jun;Hwang, Hee-Joung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.187-193
    • /
    • 2015
  • The ICT healing platform sets a couple of goals including preventing chronic diseases and sending out early disease warnings based on personal information such as bio-signals and life habits. The 2-step open system(TOS) had a relay designed between the healing platform and the storage of personal health data. It also took into account a publish/subscribe(pub/sub) service based on large-scale connections to transmit(monitor) the data processing process in real time. In the early design of TOS pub/sub, however, the same buffers were allocated regardless of connection idling and type of message in order to encode connection messages into a deflate algorithm. Proposed in this study, the dynamic buffer allocation was performed as follows: the message transmission type of each connection was first put to queuing; each queue was extracted for its feature, computed, and converted into vector through tf-idf, then being entered into a k-means cluster and forming a cluster; connections categorized under a certain cluster would re-allocate the resources according to the resource table of the cluster; the centroid of each cluster would select a queuing pattern to represent the cluster in advance and present it as a resource reference table(encoding efficiency by the buffer sizes); and the proposed design would perform trade-off between the calculation resources and the network bandwidth for cluster and feature calculations to efficiently allocate the encoding buffer resources of TOS to the network connections, thus contributing to the increased tps(number of real-time data processing and monitoring connections per unit hour) of TOS.

Nonchange of Grounding Current due to Equipment Measuring Insulation Resistance (절연저항 측정 장치에 의한 지락사고 전류의 비변화)

  • Um, Kee-Hong;Lee, Kwan-Woo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.175-180
    • /
    • 2015
  • With progress in industrialization, facilities for generating, delivering, and receiving high levels of electric power are in great demand. The scale of electric power equipment is increasing in both size and complexity. This has contributed to the development of our modern, high-tech and information-based society. However, if the generation of electric power is suspended due to unexpected accidents at power facilities or power stations, a range of equipment the operations of which are dependent on electric power can be damaged, causing substantial socioeconomic losses in an industrial society. A great deal of time and money would be expended to repair damaged facilities at a power station, causing enormous economic loss.In order to detect the deterioration processes of power cables, and to prevent the destruction of power cables, the operation status of power cables should be monitored on a regular basis. We have installed equipment at Korea Western Power Co., Ltd., located in Taean, in order to predict and prevent the destruction of power cables. This is an entirely new installation: a set of equipment invented specifically to measure the insulation resistance of power cables. Installation of the equipment does not cause the flow of earth fault current. This ensures accurate measurement of insulation resistance values by the equipment. We have been studying this equipment in order to develop preventive technology that would show the deterioration processes of power cables.

Comparison of peripheral vascular compliance between normal and diabetic groups using the second derivative of photoplethysmogram (PPG 2차 미분을 이용한 정상인과 당뇨병 환자의 말초혈관 탄성도 비교)

  • Kim, Sung-Woo;Lee, Ju-Hyung;Nam, Ki-Chang;Kim, Su-Chan;Cha, Eun-Jong;Kim, Deok-Won
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.44 no.4 s.316
    • /
    • pp.15-20
    • /
    • 2007
  • Recently the prevalence rate of diabetes in Korea has been increasing rapidly due to high growth of economy and changes in dietary lifestyle. Vascular complication is one of diabetic complications which have frequently occurred by obesity, hyperglycemia and impaired glucose metabolism. Photoplethysmogram(PPG) measured from finger and toe is very useful for evaluation of vascular aging and sclerosis level since the PPG signal represents characteristics of peripheral vascular Several researchers have reported that second derivative of the finger PPG waveform was useful to evaluate vascular compliance and developed various analysis methods for vascular compliance. However, peripheral vascular compliance study for diabetic patient was never evaluated by using second derivative of PPG. Therefore, we aimed to objectively compare and to assess normal(n=850) and diabetic(n=50) groups vascular compliance using the second derivative of PPG waveform in this study. The evaluated factors of the second derivative of PPG are 'a', 'b', 'c', 'd', 'e' and b/a rapresents vascular compliance. This study found out that when vascular compliance is decreased, the absolute value of b/a is decreased. The average vascular compliance of 50 diabetic patients with neuropathy, $-1.09{\pm}0.14$ is statistically lower than the normal group, $-0.81{\pm}0.09$ (p<0.05). In conclusion, we suggest an objective evaluation of peripheral vascular compliance for diabetic patients and prevention of vascular complication.

Development of Driver's Emotion and Attention Recognition System using Multi-modal Sensor Fusion Algorithm (다중 센서 융합 알고리즘을 이용한 운전자의 감정 및 주의력 인식 기술 개발)

  • Han, Cheol-Hun;Sim, Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.6
    • /
    • pp.754-761
    • /
    • 2008
  • As the automobile industry and technologies are developed, driver's tend to more concern about service matters than mechanical matters. For this reason, interests about recognition of human knowledge and emotion to make safe and convenient driving environment for driver are increasing more and more. recognition of human knowledge and emotion are emotion engineering technology which has been studied since the late 1980s to provide people with human-friendly services. Emotion engineering technology analyzes people's emotion through their faces, voices and gestures, so if we use this technology for automobile, we can supply drivels with various kinds of service for each driver's situation and help them drive safely. Furthermore, we can prevent accidents which are caused by careless driving or dozing off while driving by recognizing driver's gestures. the purpose of this paper is to develop a system which can recognize states of driver's emotion and attention for safe driving. First of all, we detect a signals of driver's emotion by using bio-motion signals, sleepiness and attention, and then we build several types of databases. by analyzing this databases, we find some special features about drivers' emotion, sleepiness and attention, and fuse the results through Multi-Modal method so that it is possible to develop the system.

Usefulness of Chlorine Dioxide to Airborne Bacteria at a Hospital Using Biological Information (생물학적 정보를 활용한 병원에서 존재하는 공기중 부유 세균에 대한 이산화염소의 유용성)

  • Jung, Suk-Yul
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.2
    • /
    • pp.19-24
    • /
    • 2020
  • In the present study, using biological information of bacteria and biochemical information of chlorine dioxide gas, Gram-positive bacteria, e.g., Alloiococcus otitis, Erysipelothrix rhusiopathiae, Staphylococcus caprae, Staphylococcus lentus, and gram-negative bacteria, e.g., Acinetobacter baumannii complex, Aeromonas salmonicida, Brucella melitensis, Oligella ureolytica were used whether a plastic kit to release ClO2 gas could inhibit their growth. Overall, chlorine dioxide gas showed about 99% inhibition of bacterial growth, with less than 10 CFU. However, it was found that Gram positive Alloiococcus otitis and Gram negative Aeromonas salmonicida had more than about 50 CFU. When comparing the results of experiments with several bacteria, it suggested that the concentration of chlorine dioxide gas would be at least 10 ppm to 400 ppm for the bacterial inhibition. The results of this study could be used as basic data to evaluate the clinical usefulness of chlorine dioxide gas. If this study helps with prior knowledge to help clinicians to recognize and prevent the presence of micro-organisms that cause infections in hospitals, it would be helpful for activities such as patient care as a convergence field. In the future, it is considered that the research results will be the basis for rapidly inhibiting the microbes infected with patients by utilizing data of the information of the microbes that are inhibited for chlorine dioxide gas.

A Study on the Architecture Modeling of Information System using Simulation (시뮬레이션을 이용한 정보시스템 아키텍쳐 모델링에 관한 연구)

  • Park, Sang-Kook;Kim, Jong-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.455-458
    • /
    • 2013
  • The conventional design of the information system architecture based on the personal experience of information systems has been acted as a limit in progress utilizing appropriate resource allocation and performance improvements. Architecture design depending on personal experience makes differences in variance of a designer's experience, intellectual level in related tasks and surroundings, and architecture quality according to individual's propensity. After all these problems cause a waste of expensive hardware resources. At working place, post-monitoring tools are diversely developed and are running to find the bottleneck and the process problems in the information operation. However, there are no simulation tools or models that are used for expecting and counteracting the problems at early period of designing architecture. To solve these problems we will first develop a simulation model for designing information system architecture in a pilot form, and will verify validity. If an error rate is found in the permissible range, then it can be said that the simulation reflects the characteristic of information system architecture. After the model is developed in a level that can be used in various ways, more accurate performance computation will be able to do, getting out of the old way relying on calculations, and prevent the existence of idle resources and expense waste that comes from the wrong design of architecture.

  • PDF

An efficient cloud security scheme for multiple users (다중 사용자를 위한 효율적인 클라우드 보안 기법)

  • Jeong, Yoon-Su
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.2
    • /
    • pp.77-82
    • /
    • 2018
  • Recently, as cloud services become popular with general users, users' information is freely transmitted and received among the information used in the cloud environment, so security problems related to user information disclosure are occurring. we propose a method to secure personal information of multiple users by making personal information stored in the cloud server and a key for accessing the shared information so that the privacy information of the multi users using the cloud service can be prevented in advance do. The first key used in the proposed scheme is a key for accessing the user 's personal information, and is used to operate the information related to the personal information in the form of a multi - layer. The second key is the key to accessing information that is open to other users than to personal information, and is necessary to associate with other users of the cloud. The proposed scheme is constructed to anonymize personal information with multiple hash chains to process multiple kinds of information used in the cloud environment. As a result of the performance evaluation, the proposed method works by allowing third parties to safely access and process the personal information of multiple users processed by the multi - type structure, resulting in a reduction of the personal information management cost by 13.4%. The efficiency of the proposed method is 19.5% higher than that of the existing method.

A Study on the IT Outsourcing for Service Level Agreement in Public Agencies (공공기관에서의 서비스 수준 협약(SLA)에 따른 IT 아웃소싱에 관한 연구)

  • Lee, Sung Ho;Kim, Hee Wan;Kim, Dong Soo
    • Journal of Service Research and Studies
    • /
    • v.2 no.1
    • /
    • pp.47-59
    • /
    • 2012
  • With the rapid development of the Internet, public agencies and private companies introduced 'IT outsourcing in order to maintain and repair the information systems. Also they have utilized the SLA in order to manage it. Although IT outsourcing as a way to promote effective SLA are being introduced, the introduction of service level agreements or those introduced universal effectiveness did not demonstrate in the public agencies. The importance of outsourcing in the information systems is growing, but the increase in size of the business information, IT technology diversification, expansion of information between systems interconnection, information system operating and maintenance costs with the increase of information systems to streamline operations, increase the need for versatility is growing gradually. In this paper we investigates IT outsourcing in public agencies as a way to promote effective service level agreement(SLA) with the introduction and consideration, and through the application of SLA mutual customers and IT service organizations make a clear point of management and IT service levels and IT services for improved mind and strengthen the effectiveness of preventive activities can be seen.

  • PDF