• Title/Summary/Keyword: 한진수

Search Result 573, Processing Time 0.029 seconds

Study on the Awareness, Satisfaction and Job Stress of Nurses using EMR System (EMR System을 이용하는 간호사의 인식도, 만족도와 직무스트레스에 관한 연구)

  • Oh, Jae-Woo;Han, Jin-Sook;Moon, Young-Sook
    • Journal of Digital Convergence
    • /
    • v.10 no.8
    • /
    • pp.257-264
    • /
    • 2012
  • This study was conducted to arrange the basic data for the ways to operate the effective nursing programs and reduce job stress by grasping the awareness, satisfaction and job stress of the nurses due to the introduction of EMR(EMR : Electronic Medical Record) system and clarifying the relationship among them. Methods: Of the hospitals which introduced EMR, the study was conducted for 356 nurses who used EMR in a university hospital in D city and the data was collected from June 1 to June 30. The collected data was analyzed with real number, percentage, T-test, ANOVA, and Pearson correlation coefficient. Results: The results of the study above, it could be certified that the higher the satisfaction and awareness of the users of EMR were, the more the job stress of them decreased. Therefore, the qualitative nursing should be provided to the patients by reducing job stress with the improvement of the awareness and satisfaction of the nurses of EMR, and shortening the time in keeping the records of patients, in order to enhance the satisfaction of EMR, there should be a proper management, such as a regular EMR education, and there must be the ways to reduce the job stress of the nurses and strengthen the satisfaction of EMR.

A Built-In Self-Test Architecture using Self-Scan Chains (자체 스캔 체인을 이용한 Built-In Self-Test 구조에 관한 연구)

  • Han, Jin-Uk;Min, Hyeong-Bok
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.39 no.3
    • /
    • pp.85-97
    • /
    • 2002
  • STUMPS has been widely used for built-in self-test of scan design with multiple scan chains. In the STUMPS architecture, there is very high correlation between the bit sequences in the adjacent scan chains. This correlation causes circuits lower the fault coverage. In order to solve this problem, an extra combinational circuit block(phase shifter) is placed between the LFSR and the inputs of STUMPS architecture despite the hardware overhead increase. This paper introduces an efficient test pattern generation technique and built-in self-test architecture for sequential circuits with multiple scan chains. The proposed test pattern generator is not used the input of LFSR and phase shifter, hence hardware overhead can be reduced and sufficiently high fault coverage is obtained. Only several XOR gates in each scan chain are required to modify the circuit for the scan BIST, so that the design is very simple.

A Smart Phone based Family Network Service System using LBS (LBS를 이용한 스마트 폰 기반의 패밀리 네트워크 서비스 시스템)

  • Lee, Dong-Yun;Ahn, Yoon-Ae;Jung, Jin-Young;Lee, Jun-Hwan;Cho, Han-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.7
    • /
    • pp.60-69
    • /
    • 2011
  • As the mobile industry has developed, people have become to pursue more delicate information exchange and close relationships between individuals through it. According to such a request, Social Networking Services have been activated based on short messages. Moreover, in combination with smart phones, the needs for adding location information is recently increasing more and more. Security and Privacy problems, however, are raised because such location information is so sensitive and may be used maliciously by someone else. Especially, storing location information of family members in a public server may become a negative factor to hinder people from utilizing such services. Therefore, this paper proposes a location based SNS service using smart phones for home community that runs on a home server in a house so that relationships between family members at home may be closer and improved through utilizing the service.

An Analysis of the Vulnerability of SSL/TLS for Secure Web Services (안전한 웹 서비스를 위한 SSL/TLS 프로토콜 취약성 분석)

  • 조한진;이재광
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.10
    • /
    • pp.1269-1284
    • /
    • 2001
  • The Secure Sockets Layer is a protocol for encryption TCP/IP traffic that provides confidentiality, authentication and data integrity. Also the SSL is intended to provide the widely applicable connection-oriented mechanism which is applicable for various application-layer, for Internet client/server communication security. SSL, designed by Netscape is supported by all clients' browsers and server supporting security services. Now the version of SSL is 3.0. The first official TLS vl.0 specification was released by IETF Transport Layer Security working group in January 1999. As the version of SSL has had upgraded, a lot of vulnerabilities were revealed. SSL and TLS generate the private key with parameters exchange method in handshake protocol, a lot of attacks may be caused on this exchange mechanism, also the same thing may be come about in record protocol. In this paper, we analyze SSL protocol, compare the difference between TLS and SSL protocol, and suggest what developers should pay attention to implementation.

  • PDF

A Study on the Analysis of Relative Efficiency of Logistics Facilities in Korea (DEA기법을 이용한 한국 물류시설의 효율성 분석)

  • Lee, Kwangbae;Choi, Yongseok
    • Journal of Korea Port Economic Association
    • /
    • v.29 no.2
    • /
    • pp.159-171
    • /
    • 2013
  • This paper aims to analyse the relative efficiency of logistics facilities and suggest the policy alternatives for exploring and activating them. This study also divides the logistics facilities into airport terminals, logistics complexes, container terminals, and trucking freight terminals. For this purpose, the CCR-DEA as well as the BCC-DEA techniques are employed to show which part explains the primary cause of inefficiencies of each DMU(Decision Making Unit). The empirical results indicate that the efficiency of logistics complex is the lowest of all, while freight trucking terminal has the highest efficiency. This study also reveals that operation inefficiency is greater than scale inefficiency in most of DMUs, showing that much more effort be done for alleviating the cost resulting from irrational management.

A Study on Production Capacity Considering Fluctuation and Subordination (변동성과 종속성을 고려한 생산능력에 관한 연구)

  • Han, Jin-Yeol;Hwang, Seung-Gook;Kang, Sung-Soo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.2
    • /
    • pp.179-184
    • /
    • 2005
  • An accurate evaluation of a production capacity is an important role for production planning in manufacturing industry. The study has been partly done about the fluctuation in the conventional study of the production capacity, but the study of the subordination has been hardly done. Therefore, in this paper, we will devide by the production capacity which is formed into the production subjects to evaluate objectively the differences of between the actual capacity and the designed capacity in manufacturing industry and will suggest production capacity estimation model which is considered the fluctuation and the subordination, the decreasing causes of the production capacity. The weight of fluctuation which is used for the computation of the ratio of fluctuation and the ratio of subordination and the subordination are denoted to the interval number Thus, the production capacity is denoted to the interval numbers. The efficiency of the proposed model will show through the case study.

A Study on the Regulation Improvement Measures for Activation of Internet of Things and Big Data Convergence (사물 인터넷과 빅데이터 융복합 활성화를 위한 규제 개선 방안에 관한 연구)

  • Kim, Ki-Bong;Cho, Han-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.5
    • /
    • pp.29-35
    • /
    • 2017
  • Korea has been showing a high interest in convergence centered on information and communication technologies for the past 10 years. However, with successful convergence of broadcasting and telecommunication sectors, successful convergence cases such as IPTV have been excluded. In some fields, The performance that citizens can experience is limited. In addition, the combination of the Internet of things and the big data shows that infinite data in the natural and social environment surrounding service users can be created and utilized to create better services. However, the division between departments and departments, And the limitations of policies and systems that can promote convergence of information and communication technologies. Therefore, in order to create new industries through the fusion of the Internet of things and big data, it is necessary to investigate what kind of inhibitory enzymes are present, to investigate the problems, to solve the problems, to develop technologies for activating the Internet and big data, And suggests ways to utilize the policy to promote convergence of related technologies.

Acoustic Signal Processing for ADCP using Zoom FFT Method to increase Frequency Resolution (주파수 해상도 증가를 위해 Zoom FFT 기법을 사용한 ADCP 음향신호처리)

  • Han, Jin-Hyun;Shim, Tae-Bo
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.47 no.5
    • /
    • pp.229-234
    • /
    • 2010
  • This paper proposed the acoustic signal processing techniques, which are applicable even in the shallow river, and will enhance the frequency resolution of the ADCP (Acoustic Doppler Current profiler). ADCP is a device that measures the velocity of a moving fluid. ADCP, in general, can be operated at ~300 Khz of center frequency due to no depth limit in the sea. However, it can hardly be used due to water depth of 30cm or shallower during the dry season in the river. Therefore, existing signal processing methods are not suitable to use in the shallow river. We are proposing an alternative acoustic signal processing method using Zoom FFT. Simulation results show that errors are reduced ${\pm}62\;cm/s$ in theory, and ${\pm}93\;cm/s$ in the experiment. The existing algorithm could not estimate the current speed at the shallow river below 30 cm, but proposed algorithm estimated the current speed that was faster than 20 cm/s at the shallow river below 30 cm.

Implementation of Secure E-Mail System based on lava (자바기반의 안전한 전자 메일 시스템 구현)

  • 이원구;김성준;이희규;조한진;이재광
    • Journal of Internet Computing and Services
    • /
    • v.2 no.3
    • /
    • pp.51-62
    • /
    • 2001
  • Recently, as computers and networks become popular, distributing information on the Internet is common In our daily life. also, the explosion of the Internet. of wireless digital communication and data exchange on Internet has rapidly changed the way we connect with other people. The e-mail has been commonly used by users as well recognizing It as the standard of manners among users on the Internet. In the past, e-mail has been the primary choice of exchanging Information, but secure mail is gaining popularity abroad and domestically because of their nature of providing security. That is. it has been used a variety of fields such as general mail and e-mail for advertisement. But, As the data transmitted on network can be easily opened or forged with simple operations. most of existing e-mail system don't have any security on the transmitted information. Thus. security mail system need to provide security including message encryption, content Integrity, message origin authentication, and non-repudiation. In this paper, we design implement secure mail system with non-repudiation service and encryption capability to provide services for certification of delivery and certification of content as well as the basic security services. API.

  • PDF

Public Key Infrastructure of Electronic Bidding System using the Fingerprint Information (지문 정보를 이용한 공개키 기반의 전자입찰시스템)

  • Park, So-Ah;Chae, Cheol-Joo;Cho, Han-Jin;Lee, Jae-Kwang
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.2
    • /
    • pp.69-77
    • /
    • 2012
  • In the case of the password-based PKI technology, because it protects by using the password which is easy that user memorizes the private key, he has the problem about the password exposure. In addition, in the system of electronic bidding, the illegal use using the authentic certificate of the others increases. Recently, in order to solve this problem, the research about the PKI technology using the biometrics is actively progressed. If the bio information which the user inputs for the bio authentication is converted to the template, the digest access authentication in which the security is strengthened than the existing authentication technology can be built. Therefore, in this paper, we had designed and developed the system of electronic bidding which it uses the most widely used fingerprint information in the biometrics, it stores the user fingerprint information and certificate in the fingerprint security token and can authenticate the user. In case of using the system of electronic bidding of the public key infrastructure using the fingerprint information proposed in this paper the agent bid problem that it uses the certificate of the others in not only user authentication intensification but also system of electronic bidding can be concluded.