• Title/Summary/Keyword: 클라이언트 프로그램

Search Result 329, Processing Time 0.023 seconds

The Influence of Social Workers' Self-efficacy on Job Satisfaction : Focusing on the Moderating effect of Supervision (사회복지사의 자기효능감이 직무만족에 미치는 영향에 관한 연구 : 슈퍼비전 조절효과를 중심으로)

  • Shin, Moon-young;Park, Jong-du
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.7
    • /
    • pp.98-107
    • /
    • 2020
  • Job satisfaction is an important part of social workers who strive to improve the quality of life and independence of their clients. The goal of this study was to reveal the correlation between social workers' self-efficacy, job satisfaction, and supervision to determine whether supervision regulated the effect of social worker's self-efficacy on job satisfaction. In addition, the effect of social worker's self-efficacy on job satisfaction was grasped, and the control effect of supervision regarding the process of social worker's self-efficacy on job satisfaction was identified. For the study, 150 social workers at 10 community welfare centers in Gyeonggi-do and North Seoul area were surveyed, and the statistical program PASW (SPSS) 25.0 was used for data analysis. As a result of the study, it was confirmed that the social worker's self-efficacy had a significant effect on job satisfaction, and that the social worker's self-efficacy had a significant static effect on job satisfaction. In addition, in the process of social worker's self-efficacy affecting job satisfaction, the mediating effect of the supervision function (administrative, educational, and supportive) was found to be significant, so it turned out that the supervision function for social workers was crucial to enhance self-efficacy.

A Study on the Inter-organizational Network of the School Social Work for the Children in Low-income Families (학교사회복지 관련 조직간 네트워크의 특성에 관한 연구 I : 서울시 강서구 교육복지투자우선지역 지원사업을 중심으로)

  • Lee, Hye-Won;Woo, Soo-Myoung
    • Korean Journal of Social Welfare
    • /
    • v.57 no.4
    • /
    • pp.119-146
    • /
    • 2005
  • The purpose of this study is to find out the structural and developmental characteristics of inter-organizational community network of the school social work and the characteristics of direct workers and the school social work organizations delivering services to the children in low-income families, and to identify the magnitude of efficient structure for networking for the children living in Kayang-dong. By searching out the central organization and block modeling, this study attempted to show the characteristics of inter-organizational community network for the children. The research sample was 18 organizations, and the data were collected by a survey questionnaire and analyzed by SPSSWIN 12.0 and UCINET 6.29. The main results show that the social welfare organization is the central organization in almost every dimensions(information exchange, client referral, cooperation, resource exchange) and education organizations play an important role in betweenness centrality. Also it can be evaluated that the present developmental stage of the network is collaboration. Based on the research results, implications for the future practice are discussed.

  • PDF

IEEE 802.11a Technnical Analysis and Research for Development of Unmanned Vehicle System (무인자동차 시스템 개발을 위한 IEEE 802.11a 기술 분석 및 연구)

  • Kim, Young-Hyuk;Choi, Sang-Wook;Lim, Il-Kwon;Choi, Jeong-Dan;Lee, Jae-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.108-111
    • /
    • 2009
  • In this paper, the development of unmanned vehicle systems to analysis applicable communications and alternative IEEE 802.11a. IEEE 802.11b/g uses the 2.4GHz. So, using the 5GHz OFDM in IEEE 802.11a interference phenomenon better. IEEE 802.11a has a maximum speed of 54Mbps. Indoors and apartment parking on experiment to soft roaming, hard roaming. Test equipments are AP four units(RSU), reliable results for the AP one unit Bridge, Switch one unit, one server notebook, one notebook(OBU), one car. Use Softwares are Wireshark, Jperf, Ping and million second transfer was used to develop the program. So the actual car was similar to the environment. With the results of the experiment for the unmanned vehicle systems will provide the best method.

  • PDF

A Study on Human Rights Sensitivity in Korean Occupational Therapist (국내 작업치료사의 인권감수성에 관한 연구)

  • Hong, Ki-Hoon
    • The Journal of Korean society of community based occupational therapy
    • /
    • v.8 no.3
    • /
    • pp.49-57
    • /
    • 2018
  • Objective : The purpose of this study was to investigate the level of human rights sensitivity of occupational therapist and to compare the difference of the human rights sensitivity according to their characteristics and to provide basic data for the development of human rights education programs for occupational therapists in the future and to emphasize their role as human rights advocates. Methods : The subjects for this study were occupational therapists who chosen by snowball sampling method. The questionnaire consisted of 5 episodes and 30 questions to measure the level of occupational therapist's human rights sensitivity and 7 questions for identifying general characteristics of subjects. We distributed the questionnaire by on-line. 165 copies were collected and used to final data analysis. Results : The average of occupational therapists' human rights sensitivity was $33.52{\pm}14.96$. According to the subcategories, the average of perception of situation was $20.44{\pm}2.32$, perception of result was $19.85{\pm}2.32$, and the perception of responsibility was $19.14{\pm}2.21$. Among 5 episodes, The highest score was the right to pursue one's happiness of the elderly($12.72{\pm}1.56$), and the lowest score was the right to personal freedom in disabled ($11.04{\pm}2.23$). There were significantly differences of the subjects' age, educational level, organization type, and the level of clinical experiences. Conclusion : Occupational therapists' human rights sensitivity increased with age and the level of clinical experiences. And the human rights sensitivity increased as they were exposed to various human rights related circumstances. The reason of the highest score for situational awareness was that empathy for the client-centered intervention is important. This study confirmed that it is necessary to have human rights education and various educational programs.

A Performance Comparison of the Mobile Agent Model with the Client-Server Model under Security Conditions (보안 서비스를 고려한 이동 에이전트 모델과 클라이언트-서버 모델의 성능 비교)

  • Han, Seung-Wan;Jeong, Ki-Moon;Park, Seung-Bae;Lim, Hyeong-Seok
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.3
    • /
    • pp.286-298
    • /
    • 2002
  • The Remote Procedure Call(RPC) has been traditionally used for Inter Process Communication(IPC) among precesses in distributed computing environment. As distributed applications have been complicated more and more, the Mobile Agent paradigm for IPC is emerged. Because there are some paradigms for IPC, researches to evaluate and compare the performance of each paradigm are issued recently. But the performance models used in the previous research did not reflect real distributed computing environment correctly, because they did not consider the evacuation elements for providing security services. Since real distributed environment is open, it is very vulnerable to a variety of attacks. In order to execute applications securely in distributed computing environment, security services which protect applications and information against the attacks must be considered. In this paper, we evaluate and compare the performance of the Remote Procedure Call with that of the Mobile Agent in IPC paradigms. We examine security services to execute applications securely, and propose new performance models considering those services. We design performance models, which describe information retrieval system through N database services, using Petri Net. We compare the performance of two paradigms by assigning numerical values to parameters and measuring the execution time of two paradigms. In this paper, the comparison of two performance models with security services for secure communication shows the results that the execution time of the Remote Procedure Call performance model is sharply increased because of many communications with the high cryptography mechanism between hosts, and that the execution time of the Mobile Agent model is gradually increased because the Mobile Agent paradigm can reduce the quantity of the communications between hosts.

A proper folder recommendation technique using frequent itemsets for efficient e-mail classification (효과적인 이메일 분류를 위한 빈발 항목집합 기반 최적 이메일 폴더 추천 기법)

  • Moon, Jong-Pil;Lee, Won-Suk;Chang, Joong-Hyuk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.33-46
    • /
    • 2011
  • Since an e-mail has been an important mean of communication and information sharing, there have been much effort to classify e-mails efficiently by their contents. An e-mail has various forms in length and style, and words used in an e-mail are usually irregular. In addition, the criteria of an e-mail classification are subjective. As a result, it is quite difficult for the conventional text classification technique to be adapted to an e-mail classification efficiently. An e-mail classification technique in a commercial e-mail program uses a simple text filtering technique in an e-mail client. In the previous studies on automatic classification of an e-mail, the Naive Bayesian technique based on the probability has been used to improve the classification accuracy, and most of them are on an e-mail in English. This paper proposes the personalized recommendation technique of an email in Korean using a data mining technique of frequent patterns. The proposed technique consists of two phases such as the pre-processing of e-mails in an e-mail folder and the generating a profile for the e-mail folder. The generated profile is used for an e-mail to be classified into the most appropriate e-mail folder by the subjective criteria. The e-mail classification system is also implemented, which adapts the proposed technique.

The effect of musical application to develop the emotional expression of mentally retarded adults (성인정신지체인의 감정 표현 향상을 위한 음악 활용의 효과)

  • Jin, Sun Ju
    • Journal of Music and Human Behavior
    • /
    • v.2 no.1
    • /
    • pp.17-33
    • /
    • 2005
  • Music has a vital meaning in peoples' lives, mostly as a communication medium for thoughts and feelings. Because music is nonthreatening and nonjudgmental, its viability works for everyone. The purpose of this research is firstly to compare the effectiveness of existing social rehabilitation program and music integrated social rehabilitation program for people with mental retardation. Secondly, the study purported to find out if the music integrated social rehabilitation program was effective, then how various musical activities can assist communication and expression, and further assist social interactions among the people with mental retardation. The data were collected using Emotions Assessment Tool, Social Skills Assessment, and Skills development in Music were used. Also, verbal contents, voices, gestures, nonverbal expressions were observed and analyzed. As the result, it is shown that the music integrated social rehabilitation program has enhanced communicative and expressive skills of adults with mental retardation, and further improved social interactive skills. This implies that music had positive effects to the mental patients on their social relationship activities, than the program without music integration. The results support previous findings that music can be an effective communicative and expression tool.

  • PDF

Design and Implementation of an E-mail Worm-Virus Filtering System on MS Windows (MS 윈도우즈에서 E-메일 웜-바이러스 차단 시스템의 설계 및 구현)

  • Choi Jong-Cheon;Chang Hye-Young;Cho Seong-Je
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.37-47
    • /
    • 2005
  • Recently, the malicious e-mail worm-viruses have been widely spreaded over the Internet. If the recipient opens the e-mail attachment or an e-mail itself that contains the worm-virus, the worm-virus can be activated and then cause a tremendous damage to the system by propagating itself to everyone on the mailing list in the user's e-mail package. In this paper, we have designed and implemented two methods blocking e-mail worm-viruses. In the fist method, each e-mail is transmitted only by sender activity such as the click of button on a mail client application. In the second one, we insert the two modules into the sender side, where the one module transforms a recipient's address depending on a predefined rule only in time of pushing button and the other converts the address reversely with the former module whenever an e-mail is sent. The lader method also supports a polymorphism model in order to cope with the new types of e-mail worm-virus attacks. The two methods are designed not to work for the e-mail viruses. There is no additional fraction on the receiver's side of the e-mail system. Experimental results show that the proposed methods can screen the e-mail worm-viruses efficiently with a low overhead.

Medical Information Dynamic Access System in Smart Mobile Environments (스마트 모바일 환경에서 의료정보 동적접근 시스템)

  • Jeong, Chang Won;Kim, Woo Hong;Yoon, Kwon Ha;Joo, Su Chong
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.47-55
    • /
    • 2015
  • Recently, the environment of a hospital information system is a trend to combine various SMART technologies. Accordingly, various smart devices, such as a smart phone, Tablet PC is utilized in the medical information system. Also, these environments consist of various applications executing on heterogeneous sensors, devices, systems and networks. In these hospital information system environment, applying a security service by traditional access control method cause a problems. Most of the existing security system uses the access control list structure. It is only permitted access defined by an access control matrix such as client name, service object method name. The major problem with the static approach cannot quickly adapt to changed situations. Hence, we needs to new security mechanisms which provides more flexible and can be easily adapted to various environments with very different security requirements. In addition, for addressing the changing of service medical treatment of the patient, the researching is needed. In this paper, we suggest a dynamic approach to medical information systems in smart mobile environments. We focus on how to access medical information systems according to dynamic access control methods based on the existence of the hospital's information system environments. The physical environments consist of a mobile x-ray imaging devices, dedicated mobile/general smart devices, PACS, EMR server and authorization server. The software environment was developed based on the .Net Framework for synchronization and monitoring services based on mobile X-ray imaging equipment Windows7 OS. And dedicated a smart device application, we implemented a dynamic access services through JSP and Java SDK is based on the Android OS. PACS and mobile X-ray image devices in hospital, medical information between the dedicated smart devices are based on the DICOM medical image standard information. In addition, EMR information is based on H7. In order to providing dynamic access control service, we classify the context of the patients according to conditions of bio-information such as oxygen saturation, heart rate, BP and body temperature etc. It shows event trace diagrams which divided into two parts like general situation, emergency situation. And, we designed the dynamic approach of the medical care information by authentication method. The authentication Information are contained ID/PWD, the roles, position and working hours, emergency certification codes for emergency patients. General situations of dynamic access control method may have access to medical information by the value of the authentication information. In the case of an emergency, was to have access to medical information by an emergency code, without the authentication information. And, we constructed the medical information integration database scheme that is consist medical information, patient, medical staff and medical image information according to medical information standards.y Finally, we show the usefulness of the dynamic access application service based on the smart devices for execution results of the proposed system according to patient contexts such as general and emergency situation. Especially, the proposed systems are providing effective medical information services with smart devices in emergency situation by dynamic access control methods. As results, we expect the proposed systems to be useful for u-hospital information systems and services.