• Title/Summary/Keyword: 연구리더

Search Result 933, Processing Time 0.034 seconds

The Relationship between the Leadership and the Organizational Effectiveness of the Dental Hygienists (치과위생사의 코칭리더십과 조직 효과성과의 관련성)

  • Lee, Sook-Jeong;Jang, Kyeung-Ae
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.3
    • /
    • pp.133-140
    • /
    • 2017
  • The purpose of this study was to determine the effects of coaching leadership on organizational effectiveness of dental hygienists. A survey was conducted on dental hygienists in Busan and Kyungnam from December 7, 2016 to January 15, 2017. A total of 215 questionnaires were included in analysis. The influence factors of coaching leadership on the rapport-building between the leaders and the members included the leader's direction (p<0.001) and relationship (p<0.001). The influence factors of coaching leadership on organizational commitment included the leader's relationship (p<0.001), direction (p<0.05), development (p<0.05), and accountability (p<0.05). The influence factors of coaching leadership on job satisfaction included the leader's relationship (p<0.001) and development (p<0.01). The coaching leadership of dental hygienists has been found to make a positive influence on the organizational effectiveness. It is believed that systematic and comprehensive coaching leadership training for dental hygienists must be conducted to build up trust between the leaders and the members, facilitate communication, and enhance job commitment and performance. Furthermore.

Location Estimation Algorithm with TDOA Scheme in Real Time Location System (RTLS에서 TDOA 기법을 이용한 위치추정 알고리즘)

  • Jeong, Seung-Hee;Kang, Chul-Gyu;Oh, Chang-Heon;Lim, Choon-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.459-462
    • /
    • 2005
  • In this paper, we investigate the high precision location estimation algorithm in 2.45GHz band RTLS with multiple tags. The location is estimated in LOS environments, 300m ${\times}$ 300m area, and 2D coordinates adopting a TDOA scheme which is not necessitate the transmission time of tags. We evaluate the average estimation error in distance assuming that tags are randomly distributed and the readers(3${\sim}$8) are uniformly(equal space) placed in test area. In results, average estimation error is 3.12m and 1.47m at reader numbers of 4 and 8, respectively. Minimum estimation error is obtained when the accumulated receiving signal from a tag is 3 or 4 regardless of available reader numbers. The error is less than 3m, satisfies the specification of RTLS.

  • PDF

A Secure and Efficient RFID Tag Search Protocol Protecting Mobile Reader's Privacy (이동형 리더의 프라이버시를 보호하는 안전하고 효율적인 RFID 태그 검색 프로토콜)

  • Choi, Hyun-Woo;Yeo, Don-Gu;Jang, Jae-Hoon;Youm, Heung-Youl
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.9
    • /
    • pp.109-117
    • /
    • 2010
  • Recently, study on RFID Tag Searching technique which is used to find a specific tag in particular tag group were developed continuously. RFID tag searching technique can be applicate in various fields such as product management, finding children, and electronic anklet. To implement a RFID tag search system, RFID tag searching protocol should be considered various security threats such as reader and tag tracking, privacy, etc. For implementing a safe RFID tag lookup system, it is important to consider the potential security threats such as the tag tracking problem, and the privacy of the owner of the tag reader problem. There exists an RFID tag lookup system that satisfies a few security requirements, but the privacy of the owner of the tag reader problem has still been left unsolved, and even if it were solved, it requires a considerable amount of cryptographic operations to be performed which results in a decrease in performance. This paper proposes a system that does not degrade the performance while solving the privacy of the owner of the tag reader problem.

RFID Authentication Protocol Verification in Serverless Environment (Serverless 환경에서 RFID 인증프로토콜 검증)

  • Chung, Jang-Young;Hong, Young-Sik
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06a
    • /
    • pp.140-145
    • /
    • 2008
  • 최근 바코드를 대신하여 많이 사용되는 RFID의 상용화와 이에 관련된 기술에 대한 연구가 활발히 진행되고 있다. 하지만 RF를 이용한 기술은 구조적 특성상 프로톨콜이 노출 되는 문제점이 발생한다. 또한 광범위한 지역에서 RFID사용과 임시적인 RFID사용은 비용상 문제점이 있다. 본 논문은 RFID의 요소 중 DB(Server)를 제외한 리더와 태그 간의 통신을 통한 인증 프로토콜을 제안한다. 또한 리더와 태크만의 구성으로 비용을 절감하고자 하며, AVISPA를 이용하여 제안한 프로토콜의 안전성을 검증 한다.

  • PDF

Study of E-book Terminal on the Embedded Linux (내장형 리눅스를 이용한 e-book 단말기 연구)

  • 노영욱
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.11b
    • /
    • pp.905-908
    • /
    • 2003
  • 본 논문에서는 내장형 리눅스 환경에서 XML기반 EBKS용 전자책 리더 개발에 대한 내용이다. 개발된 단말기는 내장형 리눅스 타겟보드에서 한국형 전자책 문서 표준에 기반한 XML 문서를 Qt SAX 파서를 이용하여 파싱하고, 크로스 플랫폼형 윈도우 시스템인 QWS(Qt windows system)를 이용하여 디스플레이한다. 개발된 전자책 리더는 리눅스 환경 뿐만 아니라 다양한 윈도우 플랫폼에서 신속하고 쉽게 개발 가능하며 SAX 파서를 사용하므로 DOM 인터페이스에 비해 메모리를 적게 사용한다.

  • PDF

그룹항법시스템의 선행 선박 추종 알고리즘 개발

  • 최원진;전승환
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.05a
    • /
    • pp.91-92
    • /
    • 2023
  • 이 연구에서는 선박이 군집을 이뤄 항해하는 방법으로, 추종 선박이 리더 선박의 궤적을 따라 항해하는 추종 알고리즘을 구현하고, 성능 검증을 위해 소형 RC 모형 보트를 사용하여 해상 실험을 수행하였다. 이 알고리즘은 추종 선박이 리더 선박의 궤적을 추종점으로 저장하고, 추종점까지의 목표 침로를 계산하여 추종하는 방법이다. 목표 침로는 시선각 유도법칙을 통해 계산하였으며, 목표 침로를 추종하기 위해 PD 제어를 적용한 침로 제어기를 구현하였다. 또한, 전방 선박과의 충돌을 방지하기 위해 전방 선박과의 거리에 따라 속력을 제어하는 알고리즘을 구현하였다. 구현된 알고리즘을 검증하기 위해 해상 실험을 진행하였으며, 결과를 분석하였다.

  • PDF

The Effects of Transformational Leadership on Organizational Culture and Innovation in the Fire Fighting Organization (소방조직의 변혁적 리더십이 조직문화와 혁신에 미치는 영향)

  • Park, Chang-Soon;Choi, Kyu-Chool
    • Fire Science and Engineering
    • /
    • v.27 no.6
    • /
    • pp.104-114
    • /
    • 2013
  • This study is intended to figure out the effects of supervisors' transformational leadership on organizational culture and innovation in the fire fighting organization. To achieve this, a survey was carried out to fire officers from the National Emergency Management Agency and Seoul Metropolitan Fire & Disaster Headquarters. The results are as follows. First, the effect of supervisors' transformational leadership on organizational culture showed that supervisors' transformational leadership had an effect on group culture, norm culture and rational culture by sub-factors of organizational culture in the fire fighting organization. Second, the effect of organizational culture on organizational innovation showed that group culture and rational culture had an effect on organizational innovation. Third, the effect of supervisors' transformational leadership on organizational innovation showed that supervisors' transformational leadership had an effect on organizational innovation. As for findings stated above, supervisors' transformational leadership had positive effects on organizational culture and innovation in the fire fighting organization. Consequently, supervisors' energetic and change-seeking leader-ship for junior staffs with existing organization-and new generation-oriented new thinking system can contribute to rational culture and development-oriented innovation based on norms in the group.

Development of a Portable Card Reader for the Visually Impaired using Raspberry Pi (라즈베리 파이를 적용한 시각장애인을 위한 휴대용 카드 리더기 개발)

  • Lee, Hyun-Seung;Choi, In-Moon;Lim, Soon-Ja
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.10
    • /
    • pp.131-135
    • /
    • 2017
  • We developed a portable card reader for the visually impaired. In South Korea, there is insufficient development of lifestyle aids for people with disabilities. Living aids for people with disabilities are being developed using information technology, smart phones, Internet of Things(IoT) devices, 3D printers, and so on. Blind people were interviewed, which showed that the card recognition function using a currently developed smart phone app was not able to recognize the screen of the smart phone by the hand of the visually impaired, and it was inconvenient to operate. In recent years, devices that enable the visually impaired to recognize cards have been studied in foreign countries and are emerging prototypes. But what is currently available is expensive and inconvenient. In addition, visually impaired people are most vulnerable to low-income families, which makes it difficult to purchase and use expensive devices. In this study, we developed a card reader that recognizes a card using a Raspberry Pi, which is an open-source hardware that can be applied to IoT. The card reader plays it by voice and vibration, and the visually impaired can use it at a low price.

Secure Mutual Authentication Protocol for RFID System without Online Back-End-Database (온라인 백-엔드-데이터베이스가 없는 안전한 RFID 상호 인증 프로토콜)

  • Won, Tae-Youn;Yu, Young-Jun;Chun, Ji-Young;Byun, Jin-Wook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.63-72
    • /
    • 2010
  • RFID is one of useful identification technology in ubiquitous environments which can be a replacement of bar code. RFID is basically consisted of tag, reader, which is for perception of the tag, and back-end-database for saving the information of tags. Although the usage of mobile readers in cellular phone or PDA increases, related studies are not enough to be secure for practical environments. There are many factors for using mobile leaders, instead of static leaders. In mobile reader environments, before constructing the secure protocol, we must consider these problems: 1) easy to lose the mobile reader 2) hard to keep the connection with back-end-database because of communication obstacle, the limitation of communication range, and so on. To find the solution against those problems, Han et al. suggest RFID mutual authentication protocol without back-end-database environment. However Han et al.'s protocol is able to be traced tag location by using eavesdropping, spoofing, and replay attack. Passive tag based on low cost is required lots of communication unsuitably. Hence, we analyze some vulnerabilities of Han et al.'s protocol and suggest RFID mutual authentication protocol without online back-end-database in aspect of efficiency and security.