• Title/Summary/Keyword: Search software

Search Result 784, Processing Time 0.019 seconds

Perception of Undergraduate Environmental Education Program Students of Hangu University on Their Career Prospect and Career Preparation (항구대학교 환경교육과 학생들의 진로전망인식과 진로준비 고찰)

  • Ahn, Sun-Young;Lee, Yong-Hwan;Yang, An-Na;Kum, Ji-Hun
    • Hwankyungkyoyuk
    • /
    • v.21 no.1
    • /
    • pp.82-96
    • /
    • 2008
  • The primary purpose of this research is to examine the career development of under-graduate environmental education program students. More specifically, it intends to understand how they perceive their career prospect, how they prepare for they career and what kind of career development assistance they receive from their school. For most of college students, a primary purpose for attending college is to prepare for a career, but often academic preparation in college is not enough to get the job they aspire. Career preparation becomes even more complex when their major does not dictate any specific career path or when the major does dictate a specific career path but it does not provide sufficient and quality job opportunities. Undergraduate environmental education programs are typical examples of the latter. To illuminate the understanding of the context surrounding undergraduate environmental education program students, semi-structured interviews were conducted through an instance message software program from August 17th, 2007 to August 20th, 2007. The subjects of this study consisted of 4 undergraduate students and 2 graduates of Hangu University (a tentative name). Each participant was interviewed once or twice for about 2 hours each interview. The findings of the study are as follow. First, they maintain a positive attitude regarding the career outlook and the career decision but it is not well founded. Second, career search and career preparation are conducted individually, and their school does not provide much systematic career assistance. Third, they did not see the relevance of the curriculum of their program to their future career. A few preliminary implications for practices related to career development may be drawn from the findings reported in this study. First, undergraduate students in environmental education programs appear to be in need of comprehensive career development assistance ranging from exploration of job opportunities related to majors, to development of job-seeking skills, to general issues of career preparation and choice. Experiential modes of career exploration seem to be helpful in clarifying their interest and aptitude in the area of environmental education. Second, career development assistance for these students should start at early college years. Third, these students may need help in exploring diverse opportunities related to their major as well as other academic areas. Finally, it is recommended to create more careers in the area of environmental education.

  • PDF

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

A Systematic Study of the Intervention Effect of Social Stories in Children with Sleep Disorders (수면장애 아동을 위한 사회적 이야기 중재 효과: 체계적 고찰)

  • Kim, Ji-Ho;Yoo, Eun-Young
    • The Journal of Korean Academy of Sensory Integration
    • /
    • v.21 no.2
    • /
    • pp.69-83
    • /
    • 2023
  • Objective : This study sought to systematically examine the intervention effect of social stories when applied in relation to children with sleep disorders. Methods : Studies available in the SCOPUS, ScienceDirect, PsycArticles, and PubMed databases that were published from 2001 to 2022 were searched. The keywords used for the search were as follows: ("social story" OR "social stories") AND ("sleep" OR "sleep disorders" OR "sleep wake disorder bedtimes" OR "sleep initiation and maintenance disorders" OR "sleep wake disorder" OR "sleep arousal disorders"). Based on the selection criteria, six experimental studies were selected and analyzed. Results : The selected studies were two randomized controlled trials, three individual trials, and one case study. The subjects were mostly children diagnosed with autism spectrum disorder who were school-aged or adolescent. The intervention types were often complex interventions, including social stories and other interventions, while the durations of the interventions varied from one day to more than 40 days. The interventions had a positive effect on the subjects' sleep quality, with night wakings, sleep onset delay, and sleep anxiety all being improved. As standardized assessment tools to evaluate the effectiveness of social stories, the Child Sleep Habits Questionnaire and the Child Behavior Checklist were used in two papers each, and were the most commonly used. As non-standardized assessment tools, each of the four papers used turbulence and sleep diaries as assessment tools. Conclusion : The effect of social story mediation can be divided into sleep quality and sleep-related behavior. In terms of sleep quality, studies showing improvements in night wakings, sleep onset delay, and sleep anxiety accounted for a large proportion of the sample. The detailed effect area of sleep quality showed a significant improvement after the interventions in most studies, and in all six studies analyzed in the present study, the continuation of the effect after the intervention was confirmed via follow-up tests. Thus, the findings of this study are expected to be helpful when applying social stories in children with sleep disorders in clinical practice due to presenting the intervention effects, outcome evaluation tools, and intervention periods in children with sleep disorders in prior investigations involving social stories.

An Ontology Model for Public Service Export Platform (공공 서비스 수출 플랫폼을 위한 온톨로지 모형)

  • Lee, Gang-Won;Park, Sei-Kwon;Ryu, Seung-Wan;Shin, Dong-Cheon
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.149-161
    • /
    • 2014
  • The export of domestic public services to overseas markets contains many potential obstacles, stemming from different export procedures, the target services, and socio-economic environments. In order to alleviate these problems, the business incubation platform as an open business ecosystem can be a powerful instrument to support the decisions taken by participants and stakeholders. In this paper, we propose an ontology model and its implementation processes for the business incubation platform with an open and pervasive architecture to support public service exports. For the conceptual model of platform ontology, export case studies are used for requirements analysis. The conceptual model shows the basic structure, with vocabulary and its meaning, the relationship between ontologies, and key attributes. For the implementation and test of the ontology model, the logical structure is edited using Prot$\acute{e}$g$\acute{e}$ editor. The core engine of the business incubation platform is the simulator module, where the various contexts of export businesses should be captured, defined, and shared with other modules through ontologies. It is well-known that an ontology, with which concepts and their relationships are represented using a shared vocabulary, is an efficient and effective tool for organizing meta-information to develop structural frameworks in a particular domain. The proposed model consists of five ontologies derived from a requirements survey of major stakeholders and their operational scenarios: service, requirements, environment, enterprise, and county. The service ontology contains several components that can find and categorize public services through a case analysis of the public service export. Key attributes of the service ontology are composed of categories including objective, requirements, activity, and service. The objective category, which has sub-attributes including operational body (organization) and user, acts as a reference to search and classify public services. The requirements category relates to the functional needs at a particular phase of system (service) design or operation. Sub-attributes of requirements are user, application, platform, architecture, and social overhead. The activity category represents business processes during the operation and maintenance phase. The activity category also has sub-attributes including facility, software, and project unit. The service category, with sub-attributes such as target, time, and place, acts as a reference to sort and classify the public services. The requirements ontology is derived from the basic and common components of public services and target countries. The key attributes of the requirements ontology are business, technology, and constraints. Business requirements represent the needs of processes and activities for public service export; technology represents the technological requirements for the operation of public services; and constraints represent the business law, regulations, or cultural characteristics of the target country. The environment ontology is derived from case studies of target countries for public service operation. Key attributes of the environment ontology are user, requirements, and activity. A user includes stakeholders in public services, from citizens to operators and managers; the requirements attribute represents the managerial and physical needs during operation; the activity attribute represents business processes in detail. The enterprise ontology is introduced from a previous study, and its attributes are activity, organization, strategy, marketing, and time. The country ontology is derived from the demographic and geopolitical analysis of the target country, and its key attributes are economy, social infrastructure, law, regulation, customs, population, location, and development strategies. The priority list for target services for a certain country and/or the priority list for target countries for a certain public services are generated by a matching algorithm. These lists are used as input seeds to simulate the consortium partners, and government's policies and programs. In the simulation, the environmental differences between Korea and the target country can be customized through a gap analysis and work-flow optimization process. When the process gap between Korea and the target country is too large for a single corporation to cover, a consortium is considered an alternative choice, and various alternatives are derived from the capability index of enterprises. For financial packages, a mix of various foreign aid funds can be simulated during this stage. It is expected that the proposed ontology model and the business incubation platform can be used by various participants in the public service export market. It could be especially beneficial to small and medium businesses that have relatively fewer resources and experience with public service export. We also expect that the open and pervasive service architecture in a digital business ecosystem will help stakeholders find new opportunities through information sharing and collaboration on business processes.