• Title/Summary/Keyword: 시간 관리 서비스

Search Result 1,258, Processing Time 0.033 seconds

간호사의 영양교육에 대한 인식 및 영양지식

  • 윤현숙;최윤영
    • Proceedings of the KSCN Conference
    • /
    • 2003.11a
    • /
    • pp.1087-1088
    • /
    • 2003
  • 영양사들이 영양서비스에 대한 중요성을 인지하고 있으나 과중한 급식업무에 많은 시간을 할애하고 있으며, 또한 영양사 인력부족으로 인하여 환자에 대한 영양상담이나 영양교육이 제대로 이루어지지 않은 병원도 있어 간호사들이 영양교육을 실시하는 병원도 있는 형편이다. 따라서 영양사의 원활한 업무수행 및 역할 확대를 위하여서는 이에 영향을 미칠 수 있는 의사, 간호사 등 타 의료진의 영양관리에 대한 인식파악이 필요하다고 생각되어 마산시와 창원시 및 경남 함안군에 위치한 2-3차 의료기관에 종사하는 보건의료인 중 간호사(197명)와 간호조무사(94명) 291명을 대상으로 영양관리 중 영양교육에 대한 인식 및 영양지식을 조사하였다. 환자에 대한 영양교육이 ‘매우 필요하다’에 74.2%, ‘약간 필요하다’에 32.8%를 보였으며, 간호사와 전문대 졸업이상에서 간호조무사와 고졸자에 비하여 영양교육의 필요성에 대한 인식이 높게 나타났다(P < 0.001). 영양관련 과목을 이수하지 않은 자는 47.9%, 이수한 자는 52.1%이였으며, 간호조무사(60.4%)가 간호사(42.1%)에 비하여 (P < 0.01), 그리고 근무경력 2년 이상(51.5-59.4%)에서 2년 미만(34.4%)에 비하여(p < 0.05) 영양관련 과목을 이수하지 않은 율이 높게 나타났다. 영양관련 과목 이수자 중 영양지식 습득정도는58.7%가 ‘부족’한 것으로, 40.6%가 ‘보통’인 것으로 답하여 대체적으로 부족하다고 인정하고 있었으며, 학력이 낮을수록 ‘부족’하다고 답하여 학력에 따른 유의적인 차이가 있었다(P <0.05). 영양교육 연수경험이 있는 대상자는 8.6%, 없는 자는 91.4%로 간호사에게 영양교육 연수가 거의 없는 것으로 나타났다. 영양교육 담당자의 적임자로는 영양사 69.3%, 간호사 21.3%로 답하였으며, 간호조무사는 영양교육 적임자로 영양사 82.7%, 간호사 5.8%로 답한 반면 간호사는 영양사 63.5%, 간호사 27.9%로 답하여 유의적인 차이가 있었다(p<0.001). 기회가 주어지면 영양교육에 참여하겠다는 대상자가 47.2%, 참여하지 않겠다는 자가 52.8%로 약1/2정도는 기회가 온다면 참여하겠다는 의지를 보였다. 영양교육에 참여하지 않겠다는 대상자의 43.4%가 ‘전문지식 부족’, 40.5%가 ‘전문가가 담당하는 것이 바람직하다’, 11.9%가 ‘업무량 과중’을 이유로 들었다. 환자치료 시에 영양에 대한 내용을 지도한 경험이 있는 대상자는 48.8%, 지도경험이 없는 자는 51.2%로 나타났으며, 간호사(60.9%)가 간호조무사(23.4%)에 비하여 지도경험율이 높고(p <0.001), 기혼자(57.4%)가 미혼자(44.2%)에 비하여 높으며(p < 0.05), 근무경력 2년 이상이 2년 미만에 비하여(P <0.05), 그리고 전문대 졸업 이상이 고졸에 비하여 유의적으로 높게 나타났다(p<0.001). 영양지식점수의 분포는 good group 55.3%, fair group 41.2%, Poor group이 3.4%이었으며, good group의 평균 점수는 16.1 $\pm$ 1.1점, fair group은 12.7 $\pm$ 1.4점, poor group은 6.6 $\pm$ 2.8점으로 세 군간에 유의적인 차이가 있었다(p < 0.001). 영양지식 점수의 전체평균은 20점 만점에 14.3 $\pm$ 2.5점이였다. 이상의 결과에서 환자의 영양교육 및 상담업무를 원활하게 수행하기 위하여 영양과 내에 급식관리와는 별도로 임상영양 및 영양교육을 담당하는 부서가 설치되어야 하며 영양사의 인력확보가 필요하다고 사료된다. 이상의 연구결과에서 간호사들은 영양교육이 필요하다고 인식하고 있었으나 간호사를 영양교육의 적임자로 보는 시각이 비교적 높았고 약 1/2정도는 영양교육에 참여하겠다는 의지를 가지고 있을 뿐만 아니라 실제로 영양지도를 한 경험이 있는 것으로 나타났다. 그러나 1/2 정도가 영양관련과목을 이수하지 않았으며, 91.4%가 영양교육 연수경험이 없는 것으로 나타났다.

  • PDF

Performance Evaluation and Analysis on Single and Multi-Network Virtualization Systems with Virtio and SR-IOV (가상화 시스템에서 Virtio와 SR-IOV 적용에 대한 단일 및 다중 네트워크 성능 평가 및 분석)

  • Jaehak Lee;Jongbeom Lim;Heonchang Yu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.2
    • /
    • pp.48-59
    • /
    • 2024
  • As functions that support virtualization on their own in hardware are developed, user applications having various workloads are operating efficiently in the virtualization system. SR-IOV is a virtualization support function that takes direct access to PCI devices, thus giving a high I/O performance by minimizing the need for hypervisor or operating system interventions. With SR-IOV, network I/O acceleration can be realized in virtualization systems that have relatively long I/O paths compared to bare-metal systems and frequent context switches between the user area and kernel area. To take performance advantages of SR-IOV, network resource management policies that can derive optimal network performance when SR-IOV is applied to an instance such as a virtual machine(VM) or container are being actively studied.This paper evaluates and analyzes the network performance of SR-IOV implementing I/O acceleration is compared with Virtio in terms of 1) network delay, 2) network throughput, 3) network fairness, 4) performance interference, and 5) multi-network. The contributions of this paper are as follows. First, the network I/O process of Virtio and SR-IOV was clearly explained in the virtualization system, and second, the evaluation results of the network performance of Virtio and SR-IOV were analyzed based on various performance metrics. Third, the system overhead and the possibility of optimization for the SR-IOV network in a virtualization system with high VM density were experimentally confirmed. The experimental results and analysis of the paper are expected to be referenced in the network resource management policy for virtualization systems that operate network-intensive services such as smart factories, connected cars, deep learning inference models, and crowdsourcing.

A Study on the Implementation Status of CBD Program of Work on Protected Area (생물다양성협약의 보호지역 실행프로그램 이행상황 고찰 - 국립공원을 중심으로 -)

  • Heo, Hag-Young;Park, Mun-Gyu
    • Journal of Environmental Policy
    • /
    • v.6 no.1
    • /
    • pp.1-40
    • /
    • 2007
  • The research in this paper, for the effective implementation of CBD PoW PA(Program of Work on Protected Areas of Convention on Biological Diversity) that was adopted by CBD COP7(Conference of the Parties) in 2004, shows the objectives and activities of 9 each subject in PoW PA regarding domestic status and cases of national park management. Before anything else, according to the result of the review on the status of protected areas in Korea, there are 1,119 protected areas which are classified into 14 types and the total area is about $15,621km^2$. After a thorough review on 9 each subject about the implementation of CBD PoW PA, we found out that some parts such as management planning, prevention and alleviation of threats, and establishment of PAs system, are improved while financial support, improved social benefit, and MEE(Management Effectiveness Evaluation} fields are need to be improved. Especially regarding time-bound, ecological gap analysis on national level and MEE are need to be improved immediately. This paper could help us to understand the current status of PAs management system in Korea and to prepare national reports of CBD and implementation report of PoW PA. Based on research and results of this paper, we need to find the fields that have gaps in order to meet the requirements of the CBD PoW PA and the implementation tools that are suitable for managing Korea's protected areas. To effectively implement the various activities which require a systematic approach on the national level, the establishment of the networks among relevant organizations for protected areas are vital. To effectively reach the ultimate goal of CBD PoW PA, reducing the rate of biodiversity loss, it is essential that lots of plans established by authorities must be carried out in a constant manner to achieve goals of CBD PoW PA.

  • PDF

Location Prediction of Mobile Objects using the Cubic Spline Interpolation (3차 스플라인 보간법을 이용한 이동 객체의 위치 추정)

  • 안윤애;박정석;류근호
    • Journal of KIISE:Databases
    • /
    • v.31 no.5
    • /
    • pp.479-491
    • /
    • 2004
  • Location information of mobile objects is applied to vehicle tracking, digital battlefields, location based services, and telematics. Their location coordinates are periodically measured and stored in the application systems. The linear function is mainly used to estimate the location information that is not in the system at the query time point. However, a new method is needed to improve uncertainties of the location representation, because the location estimation by linear function induces the estimation error. This paper proposes an application method of the cubic spline interpolation in order to reduce deviation of the location estimation by linear function. First, we define location information of the mobile object moving on the two-dimensional space. Next, we apply the cubic spline interpolation to location estimation of the proposed data model and describe algorithm of the estimation operation. Finally, the precision of this estimation operation model is experimented. The experimentation comes out more accurate results than the method by linear function, although the proposed location estimation function uses the small amount of information. The proposed method has an advantage that drops the cost of data storage space and communication for the management of location information of the mobile objects.

E-Discovery Process Model and Alternative Technologies for an Effective Litigation Response of the Company (기업의 효과적인 소송 대응을 위한 전자증거개시 절차 모델과 대체 기술)

  • Lee, Tae-Rim;Shin, Sang-Uk
    • Journal of Digital Convergence
    • /
    • v.10 no.8
    • /
    • pp.287-297
    • /
    • 2012
  • In order to prepare for the introduction of the E-Discovery system from the United States and to cope with some causable changes of legal systems, we propose a general E-Discovery process and essential tasks of the each phase. The proposed process model is designed by the analysis of well-known projects such as EDRM, The Sedona Conference, which are advanced research for the standardization of E-Discovery task procedures and for the supply of guidelines to hands-on workers. In addition, Machine Learning Algorithms, Open-source libraries for the Information Retrieval and Distributed Processing technologies based on the Hadoop for big data are introduced and its application methods on the E-Discovery work scenario are proposed. All this information will be useful to vendors or people willing to develop the E-Discovery service solution. Also, it is very helpful to company owners willing to rebuild their business process and it enables people who are about to face a major lawsuit to handle a situation effectively.

Design of a Smart Application for Remote Diagnosis in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서 원격진단을 위한 스마트 응용의 설계)

  • Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.81-87
    • /
    • 2016
  • With the rapid growth of the up-to-date smartphone and wireless network technologies, huge and various types of smart applications using these technologies are actively developed recently. Especially, multiplex types of smart applications using smartphone are developed and diffused with the rapid development of the ubiquitous sensor network technology using various sensors and the mobile computing technology that enables us to get network services at any time in any places. In this paper, we design a smart application that can accurately diagnose and process the current state of the local environment, objects, and persons remotely based on the context information such as local ecology, circumstances, medical or healthcare records and realtime sound or motion pictures using up-to-date samrtphone technology on the USN based mobile computing environment.

Study on Windows Event Log-Based Corporate Security Audit and Malware Detection (윈도우 이벤트 로그 기반 기업 보안 감사 및 악성코드 행위 탐지 연구)

  • Kang, Serim;Kim, Soram;Park, Myungseo;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.591-603
    • /
    • 2018
  • Windows Event Log is a format that records system log in Windows operating system and methodically manages information about system operation. An event can be caused by system itself or by user's specific actions, and some event logs can be used for corporate security audits, malware detection and so on. In this paper, we choose actions related to corporate security audit and malware detection (External storage connection, Application install, Shared folder usage, Printer usage, Remote connection/disconnection, File/Registry manipulation, Process creation, DNS query, Windows service, PC startup/shutdown, Log on/off, Power saving mode, Network connection/disconnection, Event log deletion and System time change), which can be detected through event log analysis and classify event IDs that occur in each situation. Also, the existing event log tools only include functions related to the EVTX file parse and it is difficult to track user's behavior when used in a forensic investigation. So we implemented new analysis tool in this study which parses EVTX files and user behaviors.

Educational Utilization of Smart Devices in the Convergence Education Era (융복합 교육 시대에 스마트기기의 교육적 활용방안)

  • Pi, Su-Young
    • Journal of Digital Convergence
    • /
    • v.13 no.6
    • /
    • pp.29-37
    • /
    • 2015
  • Entering the convergence education era, the emergence of smart devices removed the constraint of time and space for study, so if we use smart devices appropriately for education, it will strengthen students' abilities and cultivate creative human resource. Therefore the current study analyzed the general application condition of the smart devices through surveys targeted to students and proposed a measure in applying the smart device as an educational information. In relation to information application, a test was proceeded after carrying out education targeted to experiment group students by naming the group information search, communication, cooperation, sharing, report generation, data storage, online assessment and project management activity. Through the test and survey analysis, it was discovered that the experiment group students displayed higher self-efficacy and ability in applying the smart device as information compared to the control group.

An Efficient Hierarchical Authentication Scheme through Brokers in Mobile IPv6 Networks (브로커를 통한 모바일 IPv6 네트워크의 효율적인 계층적 인증기법)

  • Jung, Ha-Gwon;Jeong, Jong-Pil
    • Journal of Internet Computing and Services
    • /
    • v.12 no.4
    • /
    • pp.15-26
    • /
    • 2011
  • As quick and secure mobility service is becoming a critical issue in the ubiquitous environment. Internet Engineering Task Force (IETF) has done a lot of meaningful work in order to cope with the critical issues, which is a key technology of guaranteeing the legally and safely using of network resources, they has proposed Hierarchical Mobile IPv6 (HMIPv6) to complement for such problems as handover latency and signaling overhead in existing MIPv6. Most of the current research about HMIPv6 focuses on how to optimize the interactive processes between the HMIPv6 and AAA (Authentication, Authorization, Accounting) protocol. This paper describes a cost-effective hierarchical authentication scheme, which makes its focus on minimizing the authentication latency in AAA processing. In this scheme, a hierarchical AAA architecture is proposed, in which the AAA servers are deployed on the Mobility Anchor Point (MAP), the Root AAA server manages several Leaf AAA servers and the Brokers on behalf of the AAA server in home domain. The simulation results shows that the proposed scheme reduces the handoff and authentication latency evidently compared to the previous traditional authentication combination modeling.

A Study on Performance Evaluation of Conveyor System in Corrugated Mamanufacturing Industry (골판지 제조업체의 컨베이어 시스템 성능평가 사례연구)

  • Lee, Yeong-Jae;Kim, Jae-Sik
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.1
    • /
    • pp.1-8
    • /
    • 1996
  • A conveyor system in corrugated manufacturing industry may be in charge of carriage/storage, and may control logistics flow and production activities of products in a manufacturing process which consists of corrugators, conveyors, and printer-slotter systems. It identifies problems that the conveyor system in this case study is overloaded and often operated manually. This research is to evaluate e the conveyor system though simulation model of technological evaluation beyond d eco-nomic and qualitative one. The rate of operation and the load of the conveyor system are used as parameters in the simulation. This paper suggests a direction to a new conveyor system implementation the basis of the results that are derived by new alternatives based on current model. The best alternative is supposed to be the number of conveyors and the operation times of the printer-slotter that may be increased at the same time.

  • PDF