• 제목/요약/키워드: Address Information

Search Result 3,290, Processing Time 0.033 seconds

Relationship between Dietary Habits, Life Stress and Nutrition Knowledge of High School Students in Gyeonggi Area (경기지역 일부 고등학생의 식습관, 생활스트레스 및 영양지식과의 관계)

  • Park, Kyung Ae;Lee, Hongmie;Song, Kyunghee
    • Korean Journal of Community Nutrition
    • /
    • v.25 no.2
    • /
    • pp.126-136
    • /
    • 2020
  • Objectives: This study was performed to examine dietary habits, life stress, and nutrition knowledge among high school students in Gyeonggi area. Methods: A total of 431 high school students (210 males, 221 females) in Gyeonggi area participated in this study from November to December of 2011. The study was a questionnaire-based survey that included dietary habits, dietary attitudes, life stress, and nutrition knowledge. Results: Body weight, height, and body mass index were all higher in male students than in female students (P < 0.001, respectively). For dietary habits, the average score (P < 0.01) and scores for considering combination of food groups (P < 0.05), eating green and orange vegetables (P < 0.05), eating meat, fish, eggs, or beans everyday (P < 0.05), drinking milk (P < 0.001), and eating seaweed (P < 0.01) were higher in male students than in female students. For dietary attitudes, the average score (P < 0.05) and scores for the five items were significantly different between male and female students. Male students showed a significantly lower nutrition knowledge score than female students (P < 0.05). Life stress score of students largely was attributable to academic factors, and female students showed higher stress score for academic, personal, and surrounding environmental (P < 0.05, respectively) factors than male students. Dietary habit score (P < 0.01) and nutrition knowledge score (P < 0.05) in female students as well as dietary attitude score (P < 0.05) in male students were negatively correlated with life stress score. Dietary habit scores in male and female students were positively correlated with dietary attitude score (P < 0.01, respectively). Need for nutrition education was significantly higher in female students than in male students (P < 0.05). Conclusions: This study provides basic information on dietary habits, dietary attitudes, life stress, and nutrition knowledge according to sex and suggests gender-specific practical nutrition education programs to address undesirable dietary habits and attitudes in students with higher stress levels.

A Space-Time Cluster of Foot-and-Mouth Disease Outbreaks in South Korea, 2010~2011 (구제역의 시.공간 군집 분석 - 2010~2011 한국에서 발생한 구제역을 사례로 -)

  • Pak, Son Il;Bae, Sun Hak
    • Journal of the Korean association of regional geographers
    • /
    • v.18 no.4
    • /
    • pp.464-472
    • /
    • 2012
  • To assess the space-time clustering of FMD(Foot-and-Mouth Disease) epidemic occurred in Korea between November 2010 to April 2011, geographical information system (GIS)-based spatial analysis technique was used. Farm address and geographic data obtained from a commercial portal site were integrated into GIS software, which we used to map out the color-shading geographic features of the outbreaks through a process called thematic mapping, and to produce a visual representation of the relationship between epidemic course and time throughout the country. FMD cases reported in northern area of Gyounggi province were clustered in space and time within small geographic areas due to the environmental characteristics which livestock population density is high enough to ease transmit FMD virus to the neighboring farm, whereas FMD cases were clustered in space but not in time for southern and eastern area of Gyounggi province. When analyzing the data for 7-day interval, the mean radius of the spatial-time clustering was 25km with minimum 5.4km and maximum 74km. In addition, the radius of clustering was relatively small in the early stage of FMD epidemic, but the size was geographically expanded over the epidemic course. Prior to implementing control measures during the outbreak period, assessment of geographic units potentially affected and identification of risky areas which are subsequently be targeted for specific intervention measures is recommended.

  • PDF

How to Reflect Sustainable Development in Overseas Investment including Equator Principles (해외투자(海外投資)와 지속가능발전 원칙 - 적도원칙(赤道原則)(Equator Principles)을 중심으로 -)

  • Park, Whon-Il
    • 한국무역상무학회:학술대회논문집
    • /
    • 2006.06a
    • /
    • pp.45-72
    • /
    • 2006
  • The Equator Principles are a set of voluntary environmental and social guidelines for ethical project finance. These principles commit banks and other signatories to not finance projects that fail to meet these guidelines. The principles were conceived in 2002 on an initiative of the International Finance Corporation and launched in 2003. Since then, dozens of major banks have adopted the Principles, and with these banks among them accounting for more than three quarters of all project loan market volume the Principles have become the de facto standard for all banks and investors on how to deal with potential social and environmental effects of projects to be financed. While regarding the Principles an important initiative, NGOs have criticised the Principles for not producing real changes in financing activities and for allowing projects to go through that should have been screened out by the Principles, such as the Sakhalin-II oil and gas project in Russia. In early 2006, a process of revision of the principles was begun. The Equator Principles state that endorsing banks will only provide loans directly to projects under the following circumstances: - The risk of the project is categorized in accordance with internal guidelines based upon the environmental and social screening criteria of the International Finance Corporation (IFC). - For all medium or high risk projects (Category A and B projects), sponsors complete an Environmental Assessment, the preparation of which must meet certain requirements and satisfactorily address key environmental and social issues. - The Environmental Assessment report addresses baseline environmental and social conditions, requirements under host country laws and regulations, applicable international treaties and agreements, sustainable development and use of renewable natural resources, protection of human health, cultural properties, and biodiversity, including endangered species and sensitive ecosystems, use of dangerous substances, major hazards, occupational health and safety, fire prevention and life safety, socio-economic impacts, land acquisition and land use, involuntary resettlement, impacts on indigenous peoples and communities, cumulative impacts of existing projects, the proposed project, and anticipated future projects, participation of affected parties in the design, review and implementation of the project, consideration of feasible environmentally and socially preferable alternatives, efficient production, delivery and use of energy, pollution prevention and waste minimization, pollution controls (liquid effluents and air emissions) and solid and chemical waste management. - Based on the Environmental Assessment, Equator banks then make agreements with their clients on how they mitigate, monitor and manage those risks through an 'Environmental Management Plan'. Compliance with the plan is required in the covenant. If the borrower doesn't comply with the agreed terms, the bank will take corrective action, which if unsuccessful, could ultimately result in the bank canceling the loan and demanding immediate repayment. - For risky projects, the borrower consults with stakeholders (NGO's and project affected groups) and provides them with information on the risks of the project. - If necessary, an expert is consulted. The Principles only apply to projects over 50 million US dollars, which, according to the Equator Principles website, represent 97% of the total market. In early 2006, the financial institutions behind the Principles launched stakeholder consultations and negotiations aimed at revising the principles. The draft revised principles were met with criticism from NGO stakeholders, who in a joint position paper argued that the draft fails by ignoring the most serious critiques of the principles: a lack of consistent and rigorous implementation.

  • PDF

Improvement of Unicast Traffic Performance in High-availability Seamless Redundancy (HSR) Using Port Locking (PL) Algorithm (Port Locking (PL) 알고리즘을 이용한 HSR (High-availability Seamless Redundancy)의 유니캐스트 트래픽 성능개선)

  • Abdulsam, Ibraheem Read;Kim, Se Mog;Choi, Young Yun;Rhee, Jong Myung
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.1
    • /
    • pp.51-56
    • /
    • 2014
  • High-availability seamless redundancy (HSR) is a protocol for fault-tolerant Ethernet (FTE) networks. It provides two frame copies and each copy is forwarded on a separate physical path, which provides zero fail-over time. Therefore, the HSR is becoming a potential candidate for various real-time FTE applications. However, the generation and circulation of unnecessary frames due to the duplication of every sending frame is inherent drawback of HSR. Such drawback degrades the performance of the network and may deplete its resources. In this paper, we present a new algorithm called port locking (PL) based on the media access control (MAC) address to solve the abovementioned problem in popular connected-rings network. Our approach makes the network gradually learn the locations of the source and the destination nodes without relying on network control frames. It then prunes all the rings that do not contain the destination node by locking corresponding rings' entrance ports. With the PL algorithm, the traffic can be significantly reduced and therefore the network performance will be greatly enhanced specially in a large scale connected-rings network. Analytical results are provided to validate the PL algorithm.

A Software Vulnerability Analysis System using Learning for Source Code Weakness History (소스코드의 취약점 이력 학습을 이용한 소프트웨어 보안 취약점 분석 시스템)

  • Lee, Kwang-Hyoung;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.11
    • /
    • pp.46-52
    • /
    • 2017
  • Along with the expansion of areas in which ICT and Internet of Things (IoT) devices are utilized, open source software has recently expanded its scope of applications to include computers, smart phones, and IoT devices. Hence, as the scope of open source software applications has varied, there have been increasing malicious attempts to attack the weaknesses of open source software. In order to address this issue, various secure coding programs have been developed. Nevertheless, numerous vulnerabilities are still left unhandled. This paper provides some methods to handle newly raised weaknesses based on the analysis of histories and patterns of previous open source vulnerabilities. Through this study, we have designed a weaknesses analysis system that utilizes weakness histories and pattern learning, and we tested the performance of the system by implementing a prototype model. For five vulnerability categories, the average vulnerability detection time was shortened by about 1.61 sec, and the average detection accuracy was improved by 44%. This paper can provide help for researchers studying the areas of weaknesses analysis and for developers utilizing secure coding for weaknesses analysis.

Implementation of UDP-Tunneling Based Multicast Connectivity Solution for Multi-Party Collaborative Environments (다자간 협업 환경을 위한 UDP 터널링 기반의 멀티캐스트 연결성 솔루션의 구현)

  • Kim, Nam-Gon;Kim, Jong-Won
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.3
    • /
    • pp.153-164
    • /
    • 2007
  • The Access Grid (AG) provides collaboration environments over the IP multicast networks by enabling efficient exchange of multimedia contents among remote users; however, since lots of current networks are still multicast-disabled, it is not easy to deploy this multicast-based multi-party AG. For this problem, the AG provides multicast bridges as a solution by putting a relay server into the multicast networks. Multicast-disabled clients make UDP connections with this relay server and receive forwarded multicast traffics in unicast UDP packets. This solution is facing several limitations since it requires duplicate forwarding of the same packet for each unicast peer. Thus, in this paper, we propose an alternate solution for the multicast connectivity problem of the AG based on the UMTP (UDP multicast tunneling protocol). By taking advantage of flexibilities of UMTP, the proposed solution is designed to improve the efficiency of network and system utilization, to allow reuse of multicast-based AG applications without modification, and to partially address the NAT/firewall traversal issues. To verify the feasibility of proposed solution, we have implemented a prototype AG connectivity tool based on the UMTP, named as the AG Connector.

Art and Collectivity (미술과 집단성)

  • Kwok, Kian-Chow
    • The Journal of Art Theory & Practice
    • /
    • no.4
    • /
    • pp.181-202
    • /
    • 2006
  • "When it comes to art, nationalism is a goodticket to ride with", says the title of a report in the Indian Express (Mumbai, 29 Oct 2000). The newspaper report goes on to say that since Indian art was kept "ethnic" by colonialism, national liberation meant opening up to the world on India's own terms. Advocacy, at the tail end of the 20th century, would contrast dramatically with the call by Rabindranath Tagore, the founder of the academy at Santiniketan in 1901, to guard against the fetish of nationalism. "The colourless vagueness of cosmopolitanism," Tagore pronounced, "nor thefierce self-idolatry of nation-worship, is the goal of human history" (Nationalism, 1917). This contrast is significant on two counts. First is the positive aspect of "nation" as a frame in art production or circulation, at the current point of globalization when massive expansion of cultural consumers may be realized through prevailing communication networks and technology. The organization of the information market, most vividly demonstrated through the recent FIFA World Cup when one out of every five living human beings on earth watched the finals, is predicated on nations as categories. An extension of the Indian Express argument would be that tagging of artworks along the category of nation would help ensure greatest reception, and would in turn open up the reified category of "art," so as to consider new impetus from aesthetic traditions from all parts of the world many of which hereto fore regarded as "ethnic," so as to liberate art from any hegemony of "international standards." Secondly, the critique of nationalism points to a transnational civic sphere, be it Tagore's notion of people-not-nation, or the much mo re recent "transnational constellation" of Jurgen Habermas (2001), a vision for the European Union w here civil sphere beyond confines of nation opens up new possibilities, and may serve as a model for a liberated sphere on global scale. There are other levels of collectivity which art may address, for instance the Indonesian example of local communities headed by Ketua Rukun Tetangga, the neighbourhood headmen, in which community matters of culture and the arts are organically woven into the communal fabric. Art and collectivity at the national-transnational level yield a contrasting situation of, on the idealized end, the dual inputs of local culture and tradition through "nation" as necessary frame, and the concurrent development of a transnational, culturally and aesthetically vibrant civic sphere that will ensure a cosmopolitanism that is not a "colourless vagueness." In art historical studies, this is seen, for instance, in the recent discussion on "cosmopolitan modernisms." Conversely, we may see a dual tyranny of a nationalism that is a closure (sometimes stated as "ethno-nationalism" which is disputable), and an internationalism that is evolved through restrictive understanding of historical development within privileged expressions. In art historical terms, where there is a lack of investigation into the reality of multiple modernisms, the possibility of a democratic cosmopolitanism in art is severely curtailed. The advocacy of a liberal cosmopolitanism without a democratic foundation returns art to dominance of historical privileged category. A local community with lack of transnational inputs may sometimes place emphasis on neo-traditionalism which is also a double edged sword, as re kindling with traditions is both liberating and restrictive, which in turn interplays with the push and pull of the collective matrix.

  • PDF

Impact of Pursuit Sought on Satisfaction Level and Behavioral Intention among Visitors in a Health Care and Medical Equipment Fair (보건의료기기 박람회 참관객의 추구편익이 만족도 및 행동의도에 미치는 영향)

  • Moon, Tae-Young;Rho, Sang-Gyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.8
    • /
    • pp.2926-2934
    • /
    • 2010
  • The purpose of this study was to examine the satisfaction level and behavioral intention of visitors in a health care and medical equipment fair in consideration of their benefits sought. The purpose is basically meant to identify the relationship of variables related to the satisfaction level of the visitors, their satisfaction level with benefits sought and behavioral intention to provide useful information to hosts of health care and medical equipment fairs and related people. The subjects in this study were 250 people who were selected from among the visitors in a health care and medical equipment fair in Wonju. After a survey was conducted, the collected data were analyzed by SPSS 14.0 and AMOS 16.0 programs, and descriptive statistics, factor analysis, reliability analysis and structural equation modelling were utilized. The findings of the study were as follows: Benefits sought had a significant impact on satisfaction level and behavioral intention, and satisfaction level affected behavioral intention in a significant manner as well. So all the hypotheses formulated in the study were accepted, and those who hosted a health care and medical equipment fair should try to address the needs of participants in the light of their characteristics and provide appropriate event products and services to stir up their satisfaction level and behavioral intention.

Efficient Time-Series Subsequence Matching Using MBR-Safe Property of Piecewise Aggregation Approximation (부분 집계 근사법의 MBR-안전 성질을 이용한 효율적인 시계열 서브시퀀스 매칭)

  • Moon, Yang-Sae
    • Journal of KIISE:Databases
    • /
    • v.34 no.6
    • /
    • pp.503-517
    • /
    • 2007
  • In this paper we address the MBR-safe property of Piecewise Aggregation Approximation(PAA), and propose an of efficient subsequence matching method based on the MBR-safe PAA. A transformation is said to be MBR-safe if a low-dimensional MBR to which a high- dimensional MBR is transformed by the transformation contains every individual low-dimensional sequence to which a high-dimensional sequence is transformed. Using an MBR-safe transformation we can reduce the number of lower-dimensional transformations required in similar sequence matching, since it transforms a high-dimensional MBR itself to a low-dimensional MBR directly. Furthermore, PAA is known as an excellent lower-dimensional transformation single its computation is very simple, and its performance is superior to other transformations. Thus, to integrate these advantages of PAA and MBR-safeness, we first formally confirm the MBR-safe property of PAA, and then improve subsequence matching performance using the MBR-safe PAA. Contributions of the paper can be summarized as follows. First, we propose a PAA-based MBR-safe transformation, called mbrPAA, and formally prove the MBR-safeness of mbrPAA. Second, we propose an mbrPAA-based subsequence matching method, and formally prove its correctness of the proposed method. Third, we present the notion of entry reuse property, and by using the property, we propose an efficient method of constructing high-dimensional MBRs in subsequence matching. Fourth, we show the superiority of mbrPAA through extensive experiments. Experimental results show that, compared with the previous approach, our mbrPAA is 24.2 times faster in the low-dimensional MBR construction and improves subsequence matching performance by up to 65.9%.

Synthesizable Interface Verification for Hardware/Software Co-verification (하드웨어/소프트웨어 동시검증을 위한 합성 가능한 인터페이스 검증 기법)

  • Lee, Jae-Ho;Han, Tai-Sook;Yun, Jeong-Han
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.4
    • /
    • pp.323-339
    • /
    • 2010
  • The complexity of embedded systems and the effort to develop them has been rising in proportion with their importance. Also, the heterogeneity of the hardware and software parts in embedded systems makes it more challenging to develop. Errors caused by hardware/software interfaces, especially, account for up to 13 percent of failures with an increasing trend. Therefore, verifying the interface between hardware and software in embedded system is one of the most important research areas. However, current approaches such as co-simulation method and model checking have explicit limitations. In this paper, we propose the synthesizable interface co-verification framework for hardware/software co-design. Firstly, we introduce the separate interface specifications for the heterogeneous components to describe hardware design and software design. Our specifications are expressive enough to describe both. We also provide the transformation rules from the software specification to the hardware specification so that the whole system can be described from the software view. Secondly, we address the solution of verifying the interface of the software and hardware design by adopting and extending existing verification-techniques and extending them. In hardware interface verification, we exploit the model checking technique and provide more efficient verification by closing the hardware design from the assumption of the software behavior which is ensured by software verification step. Lastly, we generate the interface codes such as device APIs, device driver, and device controller from the specification so that verified hardware and software codes can be synthesized without extra efforts.