• Title/Summary/Keyword: Self-Location Information

Search Result 165, Processing Time 0.034 seconds

Perceived Performance of Sanitary Management of School Food Service Managers in the Seoul Area (서울지역 초등학교 급식관리 영양사의 위생관리와 관련된 직무 수행도)

  • 정유경;곽동경
    • Korean Journal of Community Nutrition
    • /
    • v.5 no.1
    • /
    • pp.100-108
    • /
    • 2000
  • Seven constructs of sanitary management :time temperature, storage, cross-contamination, personal hygiene, equipment facility and documentation management were evaluated to investigate the perceived performance of sanitary management for school food service managers, Using a four-part questionnaire containing the seven constructs of sanitary management HACCP program, demographic information and characteristics of food service facilities participants rated their self-perceptions regarding sanitary management. Of the 550 possible respondents, 248(45.1%) completed the study. For the perceived sanitary manage-ment variables, the participants rated them between 2.66 and 4.16(5-point Likert scale). Temperature management presented the lowest performances while storage management showed the highest. The number of years of work experience of the food service managers and the serving location correlated significantly to sanitary management variables. Documentation management was also highly correlated to the other sanitary management constructs. The respondents ranked the managers leadership and professional knowledge regrading HACCP as most important, followed by the facilitys supporting equipment and human resources second, to successfully implement the HACCP system at the school food service facilites, Awareness of this study indicating low performance on temperature management suggests an active training program is needed for sanitary management of school food service.

  • PDF

Estimation of Deterioration and Weighting Factors in Pipes of Water Supply Systems (상수관로의 노후도 영향인자 및 가중치 산정에 관한 연구)

  • Kim, Eung-Seok;Kim, Joong-Hoon;Lee, Hyun-Dong
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.16 no.6
    • /
    • pp.686-699
    • /
    • 2002
  • The purpose of this study is to estimate deterioration factors and weighting factors in pipe network which each local self-governments takes rehabilitation and replacement work present time. Deterioration factors in pipe network are able to effected of specific province or location related with water supply. Most of water supply pipes are laid under the ground, it is hard to quantify deterioration degree of water system. Moreover, the timing and economic limitation and insufficient information on the spot survey gives a difficulty to look over how old water supply system is. Accordingly, this study collects and analyses five data as the laying environment, visual analysis, analysis of soil contents, analysis of pipe material, and questionary survey data in water pipe of A city. The deterioration factor estimates 14 factors with excavation and experimental analysis and 9 factors without excavation and experimental analysis. Also, the weighting factors are estimated by using the multiple linear regressions and the linear programming. The estimated deterioration factor and weighting results are compared the analysis result of visual, pipe material, and soil contents with the Probabilistic Neural Network Model. Consequently, the model results of estimated 9 factors in this study and 14 factors show the 1-2% difference. The result show that the proposed model could be used to decide the deterioration condition of pipe line with real excavation and experimental analysis.

Development of a GIS Application Model for Evaluating Forest Functions (산림기능평가를 위한 GIS 응용모델의 개발)

  • Kim, Hyung-Ho;Chong, Se-Kyung;Chung, Joo-Sang
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.9 no.4
    • /
    • pp.1-11
    • /
    • 2006
  • This paper aims to develop a GIS(Geographic Information System) application model as a decision-making support system in order to evaluate the potential of forests according to their functions, or to classify forest functions. The forest functions analyzed in this study are as follows: production of timber, stable supply of water resources, forest hazards prevention, recreation in forests, conservation of living conditions and natural environment. Using a model possible to evaluate the potential of each forest function and to assort forest functions by making priority-based decisions according to the functions, as well as allowing for various possible analysis environments, its application has been reviewed. Factors for assessing the forest functions could be built by using the following three categories: four maps-topographical map, vegetation map, forest site map and basic forest land use map-whose quantitative drawings had already been made; other self-established maps, such as one indicating the location of sawmills, location map of expressway interchanges, and spatial data of national population distribution map; and attribute data of population and precipitation. The GIS application developed here contributes to the evaluation of forest functions in all the subject areas by map units and national forest management districts based upon the assessment system.

  • PDF

Design of Operation-Level Simulator for Wireless Sensor Network (무선센서네트워크용 동작레벨 시뮬레이터 설계)

  • Lee, Doo-Wan;Kim, Min-Je;Lee, Kang-Whan;Jang, Kyung-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.3
    • /
    • pp.733-739
    • /
    • 2011
  • Recently, a lots of research proposals and results on mobile sensor network are actively announced. The most of such works are based on general-purposed network simulators such as ns-2, mathlab, etc. But, It is not easy to model and simulate the detail activities of each sensor node, data deliveries between them, and its cost such as power consumption and resource utilization, so that the simulation results of those simulators show the limited aspects of overall networks features or performance metrics. In this paper proposed, power consumption of each node, performance, mobility, and location information in operation-level of the network that can simulate a wireless sensor network simulator platform. Because the network routing algorithm analysis of being developed in an existing becomes available, the proposed simulator can usability in the new network routing algorithm development.

Environment Adaptive Emergency Evacuation Route GUIDE through Digital Signage Systems

  • Lee, Dongwoo;Kim, Daehyun;Lee, Junghoon;Lee, Seungyoun;Hwang, Hyunsuk;Mariappan, Vinayagam;Lee, Minwoo;Cha, Jaesang
    • International Journal of Advanced Culture Technology
    • /
    • v.5 no.1
    • /
    • pp.90-97
    • /
    • 2017
  • Nowadays, the most of commercial buildings are build-out with complex architecture and decorated with more complicated interiors of buildings so establishing intelligible escape routes becomes an important case of fire or other emergency in a limited time. The commercial buildings are already equipped with multiple exit signs and these exit signs may create confusion and leads the people into different directions under emergency. This can jeopardize the emergency situation into a chaotic state, especially in a complex layout buildings. There are many research focused on implementing different approached to improve the exit sign system with better visual navigating effects, such as the use of laser beams, the combination of audio and video cues, etc. However the digital signage system based emergency exit sign management is one of the best solution to guide people under emergency situations to escape. This research paper, propose an intelligent evacuation route GUIDE that uses the combination centralized Wireless Sensor Networks (WSN) and digital signage for people safety and avoids dangers from emergency conditions. This proposed system applies WSN to detect the environment condition in the building and uses an evacuation algorithm to estimate the safe route to escape using the sensor information and then activates the signage system to display the safe evacuation route instruction GUIDE according to the location the signage system is installed. This paper presented the prototype of the proposed signage system and execution time to find the route with future research directions. The proposed system provides a natural intelligent evacuation route interface for self or remote operation in facility management to efficiently GUIDE people to the safe exit under emergency conditions.

Velocity based Self-Configuring Time Division Broadcasting Protocol for Periodic Messages in Vehicle-to-Vehicle Communication (차량 간 통신에서 주기적 메시지를 위한 속도 기반의 자가 구성형 시분할 브로드캐스팅 방법)

  • Lee, Donggeun;Chang, Sang-Woo;Lee, Sang-Sun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.3
    • /
    • pp.169-179
    • /
    • 2014
  • For vehicle safety-related services using wireless communications, reliable collection of various driving informations transmitted periodically by neighbor vehicles is the most important. Every host vehicle analyses them to estimate a potential dangerous situation in a very short time and warns drivers to prevent an accident. However tremendous amount of periodic messages can cause the wireless communication in chaos and the services not in safe. In this paper, we propose a time-division broadcasting protocol to mitigate the communication congestion. It utilizes the received information of vehicle velocity and location, i.e. vehicle traffic density on a road to adjust the number of time slots in a given broadcasting period, and transmission power. The simulation results show that message reception ratio is changed to approximately 40% and channel access time also decreased from 10ms to 0.23ms.

A Random ID-based RFID Mutual authentication protocol for detecting Impersonation Attack against a back-end server and a reader (서버와 리더의 위장공격 탐지가 가능한 랜덤 ID기반 RFID 상호 인증 프로토콜)

  • Yeo, Don-Gu;Lee, Sang-Rae;Jang, Jae-Hoon;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.89-108
    • /
    • 2010
  • Recently many mutual authentication protocol for light-weight hash-based for RFID have been proposed. Most of them have assumed that communications between a backend server and reader are secure, and not considered threats for backend server and RFID reader impersonation. In the real world, however, attacks against database or reader are more effective rather than attacks against RFID tag, at least from attacker's perspective. In this paper, we assume that all communications are not secure to attackers except the physical attack, and considering realistic threats for designing a mutual authentication protocol based on hash function. And It supports a mutual authentication and can protect against the replay attack, impersonation attack, location tracking attack, and denial of service attack in the related work. We besides provide a secure and efficient RFID mutual authentication protocol which resists impersonation attacks on all of the entities and alow a backend server to search tag-related information efficiently. We conclude with analyzing the safety and efficiency among latest works.

Display of Irradiation Location of Ultrasonic Beauty Device Using AR Scheme (증강현실 기법을 이용한 초음파 미용기의 조사 위치 표시)

  • Kang, Moon-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.9
    • /
    • pp.25-31
    • /
    • 2020
  • In this study, for the safe use of a portable ultrasonic skin-beauty device, an android app was developed to show the irradiation locations of focused ultrasound to a user through augmented reality (AR) and enable stable self-surgery. The utility of the app was assessed through testing. While the user is making a facial treatment with the beauty device, the user's face and the ultrasonic irradiation location on the face are detected in real-time with a smart-phone camera. The irradiation location is then indicated on the face image and shown to the user so that excessive ultrasound is not irradiated to the same area during treatment. To this end, ML-Kit is used to detect the user's face landmarks in real-time, and they are compared with a reference face model to estimate the pose of the face, such as rotation and movement. After mounting a LED on the ultrasonic irradiation part of the device and operating the LED during irradiation, the LED light was searched to find the position of the ultrasonic irradiation on the smart-phone screen, and the irradiation position was registered and displayed on the face image based on the estimated face pose. Each task performed in the app was implemented through the thread and the timer, and all tasks were executed within 75 ms. The test results showed that the time taken to register and display 120 ultrasound irradiation positions was less than 25ms, and the display accuracy was within 20mm when the face did not rotate significantly.

A Study on Act on Certified Detective and Certified Detective Business (공인탐정 관련 법률(안)의 문제점과 개선방안에 관한 연구)

  • Kim, Bong-Soo;Choo, Bong-Jo
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.285-305
    • /
    • 2019
  • In the bill of [Act on Certified Detective and Certified Detective Business] (hereinafter referred to as the Certified Detective Act) proposed and represented by the member of National Assembly, Lee Wan-Yong in 2017, the legislative point of view showed that various incidents and accidents, including new crimes, are frequently increasing as society develops and becomes more complex, however, it is not possible to solve all the incidents and accidents with the investigation force of the state alone due to manpower and budget, and therefore, a certified detective or private investigator are required. According to the decision of the Constitutional Court in June 2018, Article 40 (4) of the Act on the Use and Protection of Credit Information is concerned with 'finding the location and contact information of a specific person or investigating privacy other than commerce relations such as financial transactions' are prohibited. It is for the purpose of preventing illegal acts in the process of investigation such as the location, contact information, and the privacy of a specific person and protecting the privacy and tranquility of personal privacy from misuse and abuse of the personal information etc. Such 'privacy investigation business' currently operates in the form of self-employment business, which becomes a social issue as some companies illegally collect and provide such privacy information by using illegal cameras or vehicle location trackers and also comes to be the objects of clampdown of the investigative agency. Considering this reality, because it is difficult to find a resolution to materialize the legislative purpose of the Act on the use and protection of credit information other than prohibiting 'investigation business including privacy etc' and it is possible to run a similar type of business as a detective business in the scope that the laws of credit research business, security service business, the position of the Constitutional Court is that 'the ban on the investigations of privacy etc' does not infringe the claimant's freedom to choose a job. In addition to this decision, the precedent positions of the Constitutional Court have been that, in principle, the legislative regulation of a particular occupation was a matter of legislative policy determined by the legislator's political, economic and social considerations, unless otherwise there were any special circumstances, and. the Constitutional Court also widely recognized the legislative formation rights of legislators in the qualifications system related to the freedom of a job. In this regard, this study examines the problems and improvement plans of the certified detective system, focusing on the certified detective bill recently under discussion, and tries to establish a legal basis for the certified detective and certified detective business, in order to cultivate and institutionalize the certified detective business, and to suggest methodologies to seek for the development of the businesses and protect the rights of the people.

Effects of Marketing Strategy on Brand attitude, Store affect, and Store loyalty: A comparison between Global and Korean SPA brands (마케팅 전략이 브랜드 태도, 점포감정, 점포충성도에 미치는 효과: 글로벌 SPA 대 한국형 SPA 비교)

  • Ko, Soon Hwa;Kim, Eun Young
    • Fashion & Textile Research Journal
    • /
    • v.16 no.3
    • /
    • pp.386-395
    • /
    • 2014
  • This study was to identify underlying dimension of marketing strategy, and to examine effect of the marketing strategic factors on store affect, brand attitude, and brand loyalty in global and domestic SPA brands. Based on pilot study, four SPA brands of which consumers were most aware were selected: Korean SPAs (e.g., Codes-Combine, Basic House) and global brands (e.g., Zara and Uniqlo). A self-administered questionnaire was developed based on literatures. By using intercept survey, 421 respondents were obtained from consumers shopping at the selected SPA retail stores located in cities (Seoul, Daejon, Chongju) in Korea. Result showed that SPA brand marketing strategy consisted of four factors: Product differentiation, store location, in-store VMD, and price value. The marketing strategic factors had partially significant effects on brand attitude, store affect and store loyalty. However, there was significant differences in those effects between global and Korean SPA brands. Specifically, the effect of in-store VMD on brand attitude was higher in Korean SPA brands, whereas the effect of price value was higher in global SPA brand. Also, the price value was significant predictor of store affects in global SPAs, while in-store VMD was significant predictor of store loyalty in Korean SPA brands. This study discussed a managerial implication for creating brand attitude and emotional responses, which obtains comparative advantages in the competing marketplace.