• Title/Summary/Keyword: Connection Management)

Search Result 1,438, Processing Time 0.031 seconds

A Study on the Perception Level of Health and Safety among the Participants for Optimization of Risk Assessment in Construction Industry (건설업 위험성 평가 최적화를 위한 운영 주체간 안전보건 인식도 조사 연구)

  • Paek, Chung-Hyeun;Cho, Ur-Ryong
    • Journal of the Korea Safety Management & Science
    • /
    • v.17 no.3
    • /
    • pp.23-32
    • /
    • 2015
  • Recently, the Ministry of Labour, published clause 2 of Article 41 (Risk Assessment) of the Act "Industrial Safety and Health" dated 12 June 2013 in connection with continuous increase of accidents at construction sites in order to prevent accidents in industrial safety and health in new construction in accordance with the risk assessment on construction projects are realized after March 13, 2014. In this paper, positive method of calculating risk discussed by performing research the awareness of general contractors and sub-contractors with presenting risky situation is considered. The purpose will be a positive method of calculating risk and would be a sufficient base and give a positive direction in the development of new systems currently working in the construction and risk assessment which consider the characteristics of sufficient risk assessment system for future research.

Hybrid Approach of Ruptured Type B Aortic Dissection with an Aberrant Subclavian Artery in a Single Patient with Turner Syndrome: A Case Report

  • Son, Shin-Ah;Lim, Kyoung Hoon;Kim, Gun-Jik
    • Vascular Specialist International
    • /
    • v.34 no.4
    • /
    • pp.121-126
    • /
    • 2018
  • Turner syndrome, also described as 45, X, may present with most serious cardiovascular anomalies including risk of aortic dissection and rupture. In emergency situation, management for aortic dissection with complicated anatomy accompanying vascular anomaly is challenging. Here, we report a rare case of ruptured type B aortic dissection with aberrant subclavian artery and partial anomalous pulmonary venous connection in a Turner syndrome. Through right carotid-subclavian artery bypass and thoracic endovascular aortic repair, successful hybrid endovascular management correlated with a favorable result in this emergency situation.

Practical Examples of the Comprehensive Strategy of Japanese Dementia Policy: Kumamoto Model by Kumamoto Province (일본 인지증 정책 종합 추진전략의 실천 사례: 쿠마모토현의 쿠마모토 모델)

  • Joo, Jungmin;Kwon, Yong-Jin
    • Health Policy and Management
    • /
    • v.29 no.1
    • /
    • pp.11-18
    • /
    • 2019
  • The purpose of this research is to introduce the best practice of the Japanese national dementia strategy and explore implications to the Korean national dementia strategy. Interview was conducted among professions those who is in charge of Kumamoto dementia care practice in Kumamoto province, upon review of related literature and public documents. The Kumamoto model is implemented by the department of neuropsychiatry in public university hospitals, which can offer dementia-specialized medical services. Medical centers for dementia in public university hospitals play a leading role for managing practice and training local dementia centers specialist, coordinating medical services among medical institutions and community welfare facilities. In reference to the Kumamoto model, the Korean national dementia strategy can find implications in the direction of current system, specifically its approaches toward policy governance.

Study on Application Method of QFD in the Test Evaluation Phase in Connection with Se Process (SE 프로세스와 연계한 시험평가 단계의 QFD 적용방안 연구)

  • Park, Jong Wan;Lee, Jae Woo
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.14 no.2
    • /
    • pp.1-7
    • /
    • 2018
  • The research and development stage can improve the goal level of the project through systematic operation and management of systems engineering. The test evaluation tasks in the R&D process have a lot of connections with the system engineering in terms of requirement management, and the methodology for deriving the requirements when establishing the test evaluation items has been consistently required. In this paper, we propose the process of effectively establishing and using QFD (Quality Function Deployment), a tool to manage customer requirement, and drawing up HOQ (House of Quality) in the search and exploratory development stage of the self - propelled mortar project.

Mobile health service user characteristics analysis and churn prediction model development (모바일 헬스 서비스 사용자 특성 분석 및 이탈 예측 모델 개발)

  • Han, Jeong Hyeon;Lee, Joo Yeoun
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.17 no.2
    • /
    • pp.98-105
    • /
    • 2021
  • As the average life expectancy is rising, the population is aging and the number of chronic diseases is increasing. This has increased the importance of healthy life and health management, and interest in mobile health services is on the rise thanks to the development of ICT(Information and communication technologies) and the smartphone use expansion. In order to meet these interests, many mobile services related to daily health are being launched in the market. Therefore, in this study, the characteristics of users who actually use mobile health services were analyzed and a predictive model applied with machine learning modeling was developed. As a result of the study, we developed a prediction model to which the decision tree and ensemble methods were applied. And it was found that the mobile health service users' continued use can be induced by providing features that require frequent visit, suggesting achievable activity missions, and guiding the sensor connection for user's activity measurement.

Cybersecurity Risk Assessment of a Diverse Protection System Using Attack Trees (공격 트리를 이용한 다양성보호계통 사이버보안 위험 평가)

  • Jung Sungmin;Kim Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.3
    • /
    • pp.25-38
    • /
    • 2023
  • Instrumentation and control systems measure and control various variables of nuclear facilities to operate nuclear power plants safely. A diverse protection system, a representative instrumentation and control system, generates a reactor trip and turbine trip signal by high pressure in a pressurizer and containment to satisfy the design requirements 10CFR50.62. Also, it generates an auxiliary feedwater actuation signal by low water levels in steam generators. Cybersecurity has become more critical as digital technology is gradually applied to solve problems such as performance degradation due to aging of analog equipment, increased maintenance costs, and product discontinuation. This paper analyzed possible cybersecurity threat scenarios in the diverse protection system using attack trees. Based on the analyzed cybersecurity threat scenario, we calculated the probability of attack occurrence and confirmed the cybersecurity risk in connection with the asset value.

Analyzing User Feedback on a Fan Community Platform 'Weverse': A Text Mining Approach

  • Thi Thao Van Ho;Mi Jin Noh;Yu Na Lee;Yang Sok Kim
    • Smart Media Journal
    • /
    • v.13 no.6
    • /
    • pp.62-71
    • /
    • 2024
  • This study applies topic modeling to uncover user experience and app issues expressed in users' online reviews of a fan community platform, Weverse on Google Play Store. It allows us to identify the features which need to be improved to enhance user experience or need to be maintained and leveraged to attract more users. Therefore, we collect 88,068 first-level English online reviews of Weverse on Google Play Store with Google-Play-Scraper tool. After the initial preprocessing step, a dataset of 31,861 online reviews is analyzed using Latent Dirichlet Allocation (LDA) topic modeling with Gensim library in Python. There are 5 topics explored in this study which highlight significant issues such as network connection error, delayed notification, and incorrect translation. Besides, the result revealed the app's effectiveness in fostering not only interaction between fans and artists but also fans' mutual relationships. Consequently, the business can strengthen user engagement and loyalty by addressing the identified drawbacks and leveraging the platform for user communication.

Key Factors in the Implementation of Research Data Management Services (연구데이터 관리서비스의 구현 시 고려사항에 관한 연구)

  • Kim, Seonghun;Oh, Sam G.
    • Journal of the Korean Society for information Management
    • /
    • v.35 no.2
    • /
    • pp.141-165
    • /
    • 2018
  • The purpose of this study is to determine crucial factors of consideration in ensuring the successful implementation of research data management services. The study begins by extracting a range of service areas from their equivalent in existing research on data management services. It then collects relevant information via e-mail survey from eight individuals respectively overseeing research data management services at six university libraries and one institution located throughout the United States, Germany, and Australia. Having originated in overseas cases, the resulting factors of consideration were reviewed by domestic experts in research data management services. The finalized areas of research data management services consist of nine categories. The crucial factors of consideration in RDM services are connection between research services and research data management services; national/university-level/institutional agreements; metadata entry personnel and required elements; strategies for the provision of specialized staff; major service area selection through user demand analysis; effective linkage between research data and research results; and close cooperation with users and related organizations.

The research regarding an information system risk management process characteristics (정보시스템 위험관리 프로세스 특성에 관한 연구)

  • Kim, Tai-Dal;Lee, Hyung-Won
    • The KIPS Transactions:PartD
    • /
    • v.14D no.3 s.113
    • /
    • pp.303-310
    • /
    • 2007
  • Information system failure is various such as program test unpreparedness, physical facilities for damage prevention unpreparedness from simple software error. Although cross is trifling the result causes vast damage. Recently, became difficult by simple outside security system to solve this problem. Now, synthetic countermove establishment and suitable confrontation connected with danger came in necessary visual point about general Information Technology of enterprise. In connection with, in this paper, various informations and system and control about data that can happen information inside and outside considering integrity for IT resource, solubility, confidentiality within organization studied about special quality to model synthetic Risk Management System that can of course and cope in danger.

The Comparison Analysis of Recognition about Disaster Management Organization of Seoul between Fire Fighters and Regular Officers (서울재난관리조직에 대한 재난관리공무원간의 인식비교분석)

  • Song, Yun-Suk
    • Fire Science and Engineering
    • /
    • v.23 no.4
    • /
    • pp.154-164
    • /
    • 2009
  • The administration of Korean local governments in charge of natural disaster management and manmade disaster management has been completely or partially integrated to the fire fighting headquarters since 1990's. Therefore the relationship between the fire fighters and the regular officers has been more important. So in this study, I made a questionnaire about management ability, rescue activities, disaster, business efficiency of the disaster management organization. And then I did a question research to the comparison analysis of recognition between fire fighter and regular officers of Seoul disaster management organization. As a result of the comparative analysis of understanding, there is a meaningful difference among facilities of management ability, man-made disaster of disaster, business cooperation and business connection of business efficiency. Through the comparison analysis of recognition, I tried to present the improvement of Seoul disaster management organization.