• Title/Summary/Keyword: Client Program

Search Result 430, Processing Time 0.02 seconds

Disabled workers living facilities in the organizational environment, relationships and relevance of the exhaustion of the working environment and clients (장애인생활시설 종사자의 조직 환경, 직무 환경 및 클라이언트와의 관계성과 소진의 관련성)

  • Kim, Min-Cheol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.12
    • /
    • pp.8234-8242
    • /
    • 2015
  • This study aims to explore ways to provide a high quality work environment services to social workers to analyze the relevance of relationships and exhaustion of the organizational environment, and the working environment and clients with disabilities living facility workers Gwangju and Jeonnam 252 people were targeting professionals working with people with disabilities living facility located on the main results are as follows. Organizational environment, work environment, organizational environment results by setting the relationship with the client as independent variables conducted a regression analysis to investigate the factors that influence independent of exhaustion (${\beta}$=-.200, p=.001) and Job environment (${\beta}$=-.460, p<.001) was a significant independent explanatory factor was 31.0%. However, relationships with clients (${\beta}$=-.059, p=0.258) were not significant factors in exhaustion. Consequently, practitioners must always have the confidence to actively work with pride and facilities are needed to improve the organizational environment and the working environment.

A Study on Improvement and Analysis of Beauty Information in KOREA (우리나라 미용 정보화에 대한 분석과 개선에 관한 연구)

  • Park Dae-woo;Kang Nam-soon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.3
    • /
    • pp.13-25
    • /
    • 2004
  • In this paper, We would research and analysis for actual beauty information condition in Korea on the end of July 2004. We make an investigation into 3 beauty subject that Web service were operated by 100% regular school education. 15.5% Private school in 363 teaching institutions, 8.74% of 767 material dealers, 0.38% of 77,546 beauty salons. There are 12 companies of client management program and 3 hair changing programs. It bring to be few of technical beauty information data and creature value added that lack of full-time lecturer, according1y, KBMC and Ministry of Health & Welfare would constitute beauty information commit that make connection of each 3 beauty subjects and web database for technical beauty information data. As a result of unification and communization for beauty information system. It should be take synergy effect for Korean Beauty.

  • PDF

Client-based Digital Advanced Advertising (클라이언트 기반 광고 삽입 기술)

  • Ahn, Sung-Wook;Kim, Kwang-Hyuk;Hong, Gyung-Pyo
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2008.11a
    • /
    • pp.145-148
    • /
    • 2008
  • 방송에서의 광고의 비중이 높아짐에 따라 광고 수익을 극대화하기 위한 기술의 발전이 활발히 이루어지고 있다. 최근의 이러한 광고 관련 기술들을 일반적으로 Advanced Advertising 이라고 하며 그 중 시청자의 선호에 맞는 광고만을 시청자에게 제공하는 타깃광고(Targeted Advertising) 방식 등 수신기별로 특화된 광고를 제공하는 기술을 클라이언트 기반 광고 삽입 방식이라고 한다. 북미의 인터랙티브 케이블방송 규격인 OCAP(OpenCable Application Platform)은 OCAP DPI(Digital Program Insertion) 라는 명칭의 클라이언트 기반 광고 삽입 방식에 대한 북미 일부 지역에서의 시험 방송의 성공한 후 관련 규격을 OCAP1.1-I01 에 발표하기에 이르렀다. 조만간 상용화되면 OCAP DPI 를 통해 북미 케이블방송 사업자들의 광고 수익 향상에 기여할 것은 물론이고 시청자들의 만족도를 향상시킬 것이다. 이런 움직임은 케이블 진영뿐만 아니라 Open IPTV Forum, ATSC 등 IPTV 나 지상파 TV 진영에서도 이 기술에 대한 타당성 검증 및 표준화가 논의가 활발히 진행되고 있는 실정이다. 본 논문은 클라이언트 기반 광고 삽입 기술에 대해 OCAP DPI 를 구현한 경험을 바탕으로 그 원리 및 동작을 설명하고, DVR(Digital Video Recorder) 또는 PVR(Personal Video Recorder)의 주요 기능인 스토리지에 방송스트림을 저장하고 재생하는 기능을 이용하는 광고 삽입 방법에 대해 제안하며, Cable-IPTV Hybrid 의 웹 접근성을 이용하여 웹 서버에 저장되어 관리 및 운용되는 광고컨텐츠의 스트리밍을 통한 광고 삽입 방법에 대한 제안하고, 마지막으로 실제 이러한 광고 삽입 기술을 적용하는 데에 있어 발생되는 문제점들을 언급하고 그 해결에 대한 의견을 제시한다.

  • PDF

Factors Associated with the Stage of Change of Smoking Cessation Behavior in Adolescents

  • Park, Nam-Hee;Kim, Jung-Soon;Lee, Yun-Mi
    • Journal of Korean Academy of Nursing
    • /
    • v.33 no.8
    • /
    • pp.1101-1110
    • /
    • 2003
  • Purpose. The purpose of this study was to identify the stage of change of smoking cessation behavior and investigate factors associated with the stage of smoking cessation behavior according to the transtheoretical model. Methods. The participants, 297 smokers & quitters were selected by a stratified random sampling from 127 high school sophomore students in B city. Data were collected from April 6th to 16th, in 2002 using the structured self-report questionnaire. Results. The subjects were distributed in each stage of change of smoking cessation behavior: there were 46 subjects (15.5%) in precontemplation, 73 subjects (24.6%) in contemplation, 67 subjects(22.3%) in preparation, 56 subjects (18.5%) in action, 55 subjects (18.5%) in maintenance. Compared to the precontemplation and contemplation, people in preparation tended to smoke daily more and smoked for a shorter time, and as precontemplation progressed to the maintenance, past 1 year smoking cessation frequency increased and friends smoking decreased. Smoking onset age was the earliest in preparation, and the latest in maintenance. Helping relationships and self relationships are used a lot in precontemplation and also in contemplation. In preparation, self liberation and helping relationships are used a lot, in action, self liberation and helping relationships, and in maintenance, self liberation and environmental reevaluation. At each stage, the score of negative affect situation was the highest, but the one of negative affect situation, positive social situation, habitual strength, weight control decreased as precontemplation progressed to the maintenance. While the score of social pros and coping pros decreased with increasing stage, the one of cons tended to increase. Through stepwise discriminant analysis, it was found that social pros, smoking onset age, delf-libration were the most influencing powers among factors associated with the stages of smoking cessation behavior. Conclusions. This study suggested that, in developing an effective smoking cessation intervention for adolescents, all the stage of a client's cessation had to be assessed prior to applying intervention programs. In addition, the results of this study will become a pillar of smoking cessation program planning and application.

A Study of Nurse Legal Obligation and Responsibility Related to their work (간호업무와 관련한 법적 의무 및 책임에 대한 조사 연구)

  • Yang, Kyung-Hee;Hwang, Jong-Hoon;Kim, Young-Hee
    • Research in Community and Public Health Nursing
    • /
    • v.9 no.2
    • /
    • pp.303-312
    • /
    • 1998
  • The purpose of this study was to survey the knowledge level, attitude and practice of nurses toward their work. The subjects of the study were composed of 98 nurses from 3 general hospitals, 1 oriental medical hospital, 2 health centers and several community health posts and schools. Data were collected from May to October, 1998. In data analysis, an SPSS PC program was utilized for descriptions. 1) 16 nurses (16.3%) experienced medical accidents on the 7 nurses(7.1%) 1 time, 6 nurses (6.1%) 2 times, and 3 nurses(3.1%) 3 times. 2) Concerning knowledge of their legal obligations ; the prohibition of telling secrets was .89, the prohibition of reading medical records was .58, the keeping of medical records was 1.0 and the teaching of recuperation was. 79. The total mean score was. 86. Concerning attitude and practice; the prohibition of telling secrets was 81.6%, 63.3%. The prohibition of reading medical records was 61.2%, 60.2%. The keeping of medical records was 98%, 98%. The explanation for treatment, care and test was 91.8%, 66.3%. The teaching for recuperation was 63.3%, 63.3%. 3) Knowledge of their legal responsibilities; 29. 6% of the subjects thought that they should report a medical accident to their headnurse, but 75.5% of the subjects actually reported to the headnurse. 39.8% of the subjects thought that nurses were liable for the faults of nursing aides. The total mean score was .45. 46% of the subjects asked a senior staff's advide on difficult affairs. Nurses obeyed legal obligations when concern ing the protection of a client, but were passive when concerning self protection. Also, headnurses were required as adviser, guide and advocate.

  • PDF

A Study on the Development of a Database for a Health Care System - Focusing on Health Care Management for Hypertensive Patients and Middle-aged Women - (보건소 건강증진사업을 위한 데이터베이스 시스템 구축 - 고혈압과 갱년기 여성건강관리를 중심으로 -)

  • Lee, Hae-Ja;Kim, Chun-Mi;Choi, Jeong-Myung
    • Research in Community and Public Health Nursing
    • /
    • v.15 no.3
    • /
    • pp.365-375
    • /
    • 2004
  • Purpose: This study intends to make a database for hypertensive patients and middle-aged women who are visiting the Yeojoo County Health Center. While building up the database, the study reviewed the current assessment tools used in the health center, developed appropriate health care programs, and designed a computerized health care system. Method: The modeling of a database for the system was constructed by MS-Access for DBMS (Database Management System) and Visual Basic. The system is to be used only in the health center by being designed as a client server method, making it possible for many public employees to be interconnected, and enables them to retrieve and search data from the database simultaneously. Results: The health management system systematically follows nursing processes including assessment, diagnosis, intervention and evaluation. Diagnosis. once it is done according to the self determined criteria, saves time and provides appropriate health information for the members. Also, the health education program was developed to follow up on the health status of the members on a continuous basis. Conclusion: Based on these results, it is required to evaluate health care programs provided for the members by using the database system and to develop more practical health care programs. It is also necessary to connect the system to other databases. which contain information about members.

  • PDF

A Study on the New Trends of EDI based Internet (인터넷을 기반으로 하는 EDI 신조류)

  • 조원길
    • The Journal of Information Technology
    • /
    • v.4 no.1
    • /
    • pp.125-139
    • /
    • 2001
  • EDI(Electronic Data Interchange) works by providing a collection of standard message formats and element dictionary in a simple way for businesses to exchange data via any electronic messaging service. Open-edi is electronic data interchange among autonomous parties using public standards and aiming towards interoperability over time, business sectors, information technology and data types. The number of Internet services using XML/EDI has grown rapidly since it is easily expansible and exchangeable. To use this service, the client does not have to install EDI S/W but only needs internet browser. Consequently, it became much easier and faster to handle the trading process in an office. eBusiness SML (extensible markup language) electronic data interchange. eXedi is the service that realizes B2B of XML/EDI. eXedi can be used easily in small and medium sized companies. Companies in any place can access to eXedi using the existing Internet connection. XML/EDI provides a standard framework to exchange different types of data -- for example, an invoice, healthcare claim, project status -- so that the information be it in a transaction, exchanged via an Application Program Interface (API), web automation, database portal, catalog, a workflow document or message can be searched, decoded, manipulated, and displayed consistently and correctly by first implementing EDI dictionaries and extending our vocabulary via on-line repositories to include our business language, rules and objects.

  • PDF

Implementation of a unified live streaming based on HTML5 for an IP camera (IP 카메라를 위한 HTML5 기반 통합형 Live Streaming 구현)

  • Ryu, Hong-Nam;Yang, Gil-Jin;Kim, Jong-Hun;Choi, Byoung-Wook
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.28 no.9
    • /
    • pp.99-104
    • /
    • 2014
  • This paper presents a unified live-streaming method based on Hypertext Mark-up Language 5(HTML5) for an IP camera which is independent of browsers of clients and is implemented with open-source libraries. Currently, conventional security systems based on analog CCTV cameras are being modified to newer surveillance systems utilizing IP cameras. These cameras offer remote surveillance and monitoring regardless of the device being used at any time, from any location. However, this approach needs live-streaming protocols to be implemented in order to verify real-time video streams and surveillance is possible after installation of separate plug-ins or special software. Recently, live streaming is being conducted through HTML5 using two different standard protocols: HLS and DASH, that works with Apple and Android products respectively. This paper proposes a live-streaming approach that is linked on either of the two protocols which makes the system independent with the browser or OS. The client is possible to monitor real-time video streams without the need of any additional plug-ins. Moreover, by implementing open source libraries, development costs and time were economized. We verified usefulness of the proposed approach through mobile devices and extendability to other various applications of the system.

The Password base System for the safe and Efficient Identification (안전하고 효율적인 신원확인을 위한 암호기반 시스템)

  • Park, Jong-Min;Park, Byung-Jun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.1
    • /
    • pp.81-86
    • /
    • 2009
  • Almost all network systems provide an authentication mechanism based on user ID and password. In such system, it is easy to obtain the user password using a sniffer program with illegal eavesdropping. The one-time password and challenge-response method are useful authentication schemes that protect the user passwords against eavesdropping. In client/server environments, the one-time password scheme using time is especially useful because it solves the synchronization problem. In this paper, we propose a new identification scheme One Pass Identification. The security of Password base System is based on the square root problem, and Password base System is secure against the well known attacks including pre-play attack, off-line dictionary attack and server comprise. A number of pass of Password base System is one, and Password base System processes the password and does not need the key. We think that Password base System is excellent for the consuming time to verify the prover.

Design and Implementation of a Mobile Framework for Efficient Inventory Management of Refrigerated Warehouses (효율적인 냉동창고 재고관리를 위한 모바일 프레임워크의 설계 및 구현)

  • Ban, ChaeHoon;Kim, DongHyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.2
    • /
    • pp.341-346
    • /
    • 2013
  • Refrigerated warehouse inventory management program which manages the logistics of shipping&receiving and inventory quickly and accurately is a costly and labor-intensive maintenance because it is operated in the legacy system on a closed client-server environment. There are no services available for consignees who are the consumers of refrigerated warehouses except fax or phone for orders which makes the business process inefficient and creates many problems such as error and inaccuracy. In this paper, we design and implement a mobile framework with a legacy system supporting various services to the consignees for solving problems of outdated legacy systems and no services to use. The system supports promptness and accuracy which give the users improved satisfaction by providing orders and queries of inventory for the consignees on mobile devices.