• Title/Summary/Keyword: Situation Training

Search Result 850, Processing Time 0.027 seconds

Basic Research on the Environment of Oral Health Promotion in the Parent Cooperating Daycare Facilities Based on the Survey for the Nursery Teacher (일부 부모협동보육시설 보육교사 대상의 시설내 구강건강증진 환경에 관한 조사)

  • Kim, Cheoul-Sin;Han, Sun-Young;Gim, Ah-Reum;Bae, Soo-Myong;Jung, Se-Hwan
    • Journal of dental hygiene science
    • /
    • v.8 no.4
    • /
    • pp.331-336
    • /
    • 2008
  • The purpose of this research was to collect basic data to develop a project of oral health that fits for particularity for parent cooperating daycare facilities for infants and children. For this purpose, we gave out the self administrated surveys to the teachers at parent cooperating daycare facilities, and analyzed surveys made by teachers. The results of this research could be summarized as follows ;1.The snacks and drinks provided by parent cooperating daycare center tend to provide more non-cariogenic snacks and drinks such as fruit, vegetables and fruit juice. 2. Activities related to dental health was done in parents corporative daycare center are: Children participate in the activities and training related to food (87.9%), catering staff receive education about nutrition (78.2%), avoiding sugary food at a birthday party (74.0%), annual dental health check-up by a dentist (33.5%). 3. 88.9% of teachers agreed parents' involvement of developing policies of oral health. 4. The percentages of guiding principles based on documentation in the topic of the oral heath were: Involving parents in the formation of the pre-school group's health policy (47.8%), advising the needs of a child for dental service to parents (44.9%), coping with a situation where a child injured his or her teeth (44.9%).

  • PDF

A Study on Improvement of the police disaster crisis management system (경찰의 재난위기관리 개선에 관한 연구)

  • Chun, Yongtae;Kim, Moonkwi
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.4
    • /
    • pp.556-569
    • /
    • 2015
  • With about 75% of the population of Korea criticizing the government's disaster policy and a failure to respond to large-scale emergency like the Sewol ferry sinking means that there is a deep distrust in the government. In order to prevent dreadful disasters such as the Sewol ferry sinking, it is important to secure a prime time with respect to disaster safety. Improving crisis management skills and managerial role of police officers who are in close proximity to the people is necessary for the success of disaster management. With disaster management as one of the most essential missions of the police, as a part of a national crisis management, a step by step strengthening of the disaster safety management system of the police is necessary, as below. First, at the prevention phase, law enforcement officers were not injected into for profit large-scale assemblies or events, but in the future the involvement, injection should be based on the level of potential risk, rather than profitability. In the past and now, the priortiy was the priority was on traffic flow, traffic communication, however, the paradigm of traffic policy should be changed to a safety-centered policy. To prevent large-scale accidents, police investigators should root out improper routines and illegal construction subcontracting. The police (intelligence) should strengthen efforts to collect intelligence under the subject of "safety". Second, with respect to the preparatory phase, on a survey of police officers, the result showed that 72% of police officers responded that safety management was not related to the job descriptions of the police. This, along with other results, shows that the awareness of disaster safety must be adopted by, or rather changed in the police urgently. The training in disaster safety education should be strengthened. A network of experts (private, administrative, and police) in safety management should be established to take advantage of private resources with regard to crisis situtions. Third, with respect to the response phase, for rapid first responses to occur, a unified communication network should be established, and a real-time video information network should be adopted by the police and installed in the police situation room. Fourth, during the recovery phase, recovery teams should be injected, added and operated to minimize secondary damage.

A Study on the Major Attraction and Space Recognition in Anuisamdong(安義三洞), through the People of the 16th to 19th centuries (16~19세기 인물을 통해 본 안의삼동(安義三洞)의 주요 유람처와 공간인식)

  • Kim, Dong-Hyun;Shin, Hyun-Sil;Lee, Won-Ho
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.37 no.3
    • /
    • pp.49-61
    • /
    • 2019
  • This study aims to examine the spatial recognition of the characters who visited Anuisamdong(安義三洞) in the past and left it in the literature. Thus, the school's relationship between people identified in the relevant literature was analyzed and the elements of landscape were extracted. The results were as follows; First, The figures who authored the literature on Anuisamdong were related to scholars living in Anuihyun(安義縣), along with the Yeongnam confucian genealogy. Starting with Jung, Yeo-Chang(鄭汝昌) in the 15th century, a relationship centered on Nammyeong School(南溟學派) in the 16th century was formed. At that time, people had toured the Anuisamdong regardless of the academic background. In the 17th century, Nammyeong School were in conflict with Toegye School(退溪學派), so Toegye School's influence had no record. In the 18th century, the proportion of Nammyeong School, Toegye School, and Kiho School(畿湖學派) appeared similar as they evolved into the Yeongnam School(嶺南學派). After the 19th century, the proportion of patriots who participated in the anti-Japanese movement was higher than that of schools. Second, The main places used in the literature related to Anuisamdongwere the order of Wonhakdong(猿鶴洞), Hwrimdong(花林洞) and Simjindong(尋眞洞). There are a total of 21 major elements used for the related literature, of which Suseungdae Rock(搜勝臺), Morijae House(某里齋), Nongwaljeong Pavilion(弄月亭), Sasundae Rock(四仙臺) and Cheoksuam Rock(滌愁巖) were the main subjects. Elements of Wonhakdong have been in the spotlight since the 16th century, focusing on Suseungdae Rock. Although the elements of Hwarimdong have been increasing gradually since the 18th century, the ratio of Simjindong to Wonhakdong and Hwarimdong was relatively small. Third, The relationship between the figures who visited the Anuisamdong and the spatial recognition of the Anuisamdong was divided into landscape awareness, emotional awareness and symbolic recognition. The Anuisamdong's scenic view is mostly identified by its description of the waterscape and topographical landscape, which people may have perceived as a scenic site centered on the valley view at the time. The mutual influence of Nammyeong School and Toegye School in the 16th and 17th centuries led to a scene in which the major figures of each school recognized pleasure as a culture of training, and a feeling of longing for the traces of past ancestors as the 18th century travel culture and the 19th century chaotic situation. In addition, the symbolic expression that usually appears is likely to have been recognized as a unworldly place, as the location of the immortal world is confirmed.

PRESENT SITUATION AND PROSPECT OF PEDIATRIC DENTISTRY IN KOREA - FOCUSED ON MANAGEMENT OF DENTAL CARIES - (한국 소아치과의 현재와 전망 - 치아우식증관리 분야를 중심으로 -)

  • Lee, Sang-Ho
    • Journal of the korean academy of Pediatric Dentistry
    • /
    • v.39 no.2
    • /
    • pp.206-225
    • /
    • 2012
  • General status of pediatric dentistry in Korea is to conduct vigorous academic activities and specialized medical care centering the Korean Association of Pediatric Dentistry (KAPD) that has about 1,000 pediatric dentists as members, pediatric dentistry departments of 11 Colleges of Dentistry, numbers of pediatric dentistry training institutions and private clinics specialized in children. From 1996, the accredited pediatric dentists were produced by the KAPD and from 2008, the state began to produce the accredited pediatric dentists. Since then, doctors with expertise in pediatric care had opened private clinics in addition to the university hospitals, it became the basis of a momentum to deepen the specialty of pediatric dentistry. The Dentistry community of Korea is going through rapid and profound changes recently, and the underlying reasons for such changes can be classified largely into a few categories: (1) Decreasing population and structural changes in population (2) Increase in numbers of dentists, (3) Changes in the pattern of dental diseases and (4) Changes in medical environment. In Korea, the children population in the age range of 0 ~ 14 years old had been decreased by 2 million in 2010 compared to that of 2000 due to reduction of birth rate. The current population of children in the age range of 0 ~ 4 years old in 2010 takes up 16.2% of the total population, but it is estimated that such percentage would decrease to 8.0% by 2050. Such percentage is largely behind the estimated mean global population of 19.6% by 2050. On the other hand, the number of dentists had been largely increased from 18,000 in 2000 to 25,000 in 2010. And it is estimated that the number will be increased to 41,000 by 2030. In addition, the specialized personnel of Pediatric dentistry had been shown as increased by 2.5 times during past 10 years. For the changes in the pattern of dental diseases, including dental caries, each df rate of 5 years old children and 12 years old children had been decreased by 21.9% and 16.7% respectively in 2010 compared to 2000. Each df Index also had been decreased by 2.5 teeth and 1.2 teeth respectively. The medical expenditure of Korea is less than that of OECD and more specifically, the expenditure from the National Health Plan is less than OECD but the expenditure covered by households is larger than OECD. These facts indicate that it is considered as requiring the coverage of the national health plan to be reinforced more in the future and as such reinforcement needs continuous promotion. In medical examination pattern of Pediatric dentistry, the preventive and corrective treatment were increased whereas the restorative treatment was decreased. It is considered that such change is caused from decrease of dental caries from activation of the prevention project at national level. For the restorative treatment, the restorations in use of dental amalgam, pre-existing gold crowning and endodontic treatment had been decreased in their proportion while the restorative treatment in use of composite resin had been increased. It is considered that such changes is caused by the change of demands from patients and family or guardians as they desired more aesthetic improvement along with socio-economic growth of Korean society. Due to such changes in dentistry, the pediatric dentistry in Korea also attempts to have changes in the patterns of medical examination as follows; It tends to implement early stage treatment through early diagnosis utilizing various diagnostic tools such as FOTI or QLF. The early stage dental caries so called white spot had been included in the subjects for dental care or management and in order to do so, the medical care guidelines essentially accompanied with remineralization treatment as well as minimally invasive treatment is being generalized gradually. Also, centering the Pediatric dentists, the importance of caries risk assessment is being recognized, in addition that the management of dental caries is being changed from surgical approach to internal medicinal approach. Recently, efforts began to emerge in order to increase the target patients to be managed by dentists and to expand the application scope of Pediatric dentistry along with through such changes. The interest and activities of Pediatric dentists which had been limited to the medical examination room so far, is now being expanded externally, as they put efforts for participating in the preventive policy making process of the community or the state, and to support the political theories. And also opinions are being collected into the direction that the future- oriented strategic political tasks shall be selected and researches as well as presentations on the theoretical rationale of such tasks at the association level.

The Development of National Competency Standard(NCS) Regarding Casino Operations Management (카지노운영관리 직무에 관한 국가직무능력표준(NCS) 개발)

  • Kim, Dong-Yeon;Oh, Seung-Gyun;Koo, Ja-Gil;Kim, Jinsoo
    • 대한공업교육학회지
    • /
    • v.39 no.1
    • /
    • pp.143-163
    • /
    • 2014
  • This study developed a National Competency Standard(NCS) regarding the casino operations management based on the manual for developing National Competency Standard of 13 years and a revised classification system chart of the National Competency Standard. For the research method, this study developed a national competency standard of relevant jobs after going through review, consultation, modification, supplementation, and reporting procedures 10 times with development experts of the National Competency Standard, the industrial setting professionals, education and training experts, qualification(job analysis) experts, facilitators, and a working group of job verification committee based on the phased range and DACUM procedure of study. The major development results of this study are as follows. First, this study selected and defined duties based on the revised classification system chart of the National Competency Standard, then drew and developed total 8 ability units based on the applicable duties. Secondly, based on the developed ability units, total 27 ability unit factors were deduced and developed. Thirdly, a standard system by ability unit factor was developed based on the level of the national competency standard and revised classification system chart, then this study deduced and developed a supra-domain of the standard system by competency units using the standard tranquility value by these competency unit factors. Based on such development contents and guidelines for the national competency standard ability unit classification number, this study deduced and developed category numbers by relevant competency unit. Fourthly, total 27 relevant performance standard by competency units and knowledge, skill, and attitude were deduced and developed. Fifthly, this study deduced and developed a scope of application, work situation, evaluation guide, core competency, and development history in reference to the total 8 relevant competency units based on the duties.

A Study for an Educational Direction in Fashion Design Subjected to Digital Environment I (디지털 환경에 따른 패션분야의 디자인 교육방향 연구 I)

  • 이미량
    • Archives of design research
    • /
    • v.12 no.4
    • /
    • pp.33-44
    • /
    • 1999
  • Fashion is subjected to newness and change by itself. Fashion trend and tendency which could predict next season akeady indicated that digital and cybel11ation environment lliould be factors in fashion. Changes in future life styles and values caused by digital environment must be variables as fashion objects by themselves. Therefore digital environment of a fashion itself and that all encountered in fashion will not only be an existing situation but also an objective and a factor which must be pursued with fashionable sense in future fashion. Advanced technology and social change in relation to digital environment requires that educational method as well as its content will be changed on the scene of education for future. Thus we should seek an educational direction in fashion design for future society in which digital environment requires new paradigm. Subject to these backgrounds this study has an intension to study the change in fashion extensively influenced by expanded digital environment on a limited situational level of fashion design education and to suggest an educational direction for professional in future fashion design who will serve as a core of fashion area in the future. It is essential that education of professional in fashion for future should be achieved by digital-minded level that eagerly understands and accepts future society in which digital environment will be a main axis. It is necessary for this to make them expetience computers, digital media including CAD program. We have to note that education of digital media is more effective and applicable when accomplished in CAI level which can be related and expetienced with fashion education rather than mere functional training in media themselves. Intellectual creativity will be a vety source of producing values and national competence in 21st centtury. Education of design professional in fashion area must positively accept these environmental charactetistics in future society, as well as deeply reflect the education for the future.

  • PDF

An Integrated Model based on Genetic Algorithms for Implementing Cost-Effective Intelligent Intrusion Detection Systems (비용효율적 지능형 침입탐지시스템 구현을 위한 유전자 알고리즘 기반 통합 모형)

  • Lee, Hyeon-Uk;Kim, Ji-Hun;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.125-141
    • /
    • 2012
  • These days, the malicious attacks and hacks on the networked systems are dramatically increasing, and the patterns of them are changing rapidly. Consequently, it becomes more important to appropriately handle these malicious attacks and hacks, and there exist sufficient interests and demand in effective network security systems just like intrusion detection systems. Intrusion detection systems are the network security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. Conventional intrusion detection systems have generally been designed using the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. However, they cannot handle new or unknown patterns of the network attacks, although they perform very well under the normal situation. As a result, recent studies on intrusion detection systems use artificial intelligence techniques, which can proactively respond to the unknown threats. For a long time, researchers have adopted and tested various kinds of artificial intelligence techniques such as artificial neural networks, decision trees, and support vector machines to detect intrusions on the network. However, most of them have just applied these techniques singularly, even though combining the techniques may lead to better detection. With this reason, we propose a new integrated model for intrusion detection. Our model is designed to combine prediction results of four different binary classification models-logistic regression (LOGIT), decision trees (DT), artificial neural networks (ANN), and support vector machines (SVM), which may be complementary to each other. As a tool for finding optimal combining weights, genetic algorithms (GA) are used. Our proposed model is designed to be built in two steps. At the first step, the optimal integration model whose prediction error (i.e. erroneous classification rate) is the least is generated. After that, in the second step, it explores the optimal classification threshold for determining intrusions, which minimizes the total misclassification cost. To calculate the total misclassification cost of intrusion detection system, we need to understand its asymmetric error cost scheme. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, total misclassification cost is more affected by FNE rather than FPE. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 10,000 samples from them by using random sampling method. Also, we compared the results from our model with the results from single techniques to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell R4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on GA outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that the proposed model outperformed all the other comparative models in the total misclassification cost perspective. Consequently, it is expected that our study may contribute to build cost-effective intelligent intrusion detection systems.

Product Recommender Systems using Multi-Model Ensemble Techniques (다중모형조합기법을 이용한 상품추천시스템)

  • Lee, Yeonjeong;Kim, Kyoung-Jae
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.2
    • /
    • pp.39-54
    • /
    • 2013
  • Recent explosive increase of electronic commerce provides many advantageous purchase opportunities to customers. In this situation, customers who do not have enough knowledge about their purchases, may accept product recommendations. Product recommender systems automatically reflect user's preference and provide recommendation list to the users. Thus, product recommender system in online shopping store has been known as one of the most popular tools for one-to-one marketing. However, recommender systems which do not properly reflect user's preference cause user's disappointment and waste of time. In this study, we propose a novel recommender system which uses data mining and multi-model ensemble techniques to enhance the recommendation performance through reflecting the precise user's preference. The research data is collected from the real-world online shopping store, which deals products from famous art galleries and museums in Korea. The data initially contain 5759 transaction data, but finally remain 3167 transaction data after deletion of null data. In this study, we transform the categorical variables into dummy variables and exclude outlier data. The proposed model consists of two steps. The first step predicts customers who have high likelihood to purchase products in the online shopping store. In this step, we first use logistic regression, decision trees, and artificial neural networks to predict customers who have high likelihood to purchase products in each product group. We perform above data mining techniques using SAS E-Miner software. In this study, we partition datasets into two sets as modeling and validation sets for the logistic regression and decision trees. We also partition datasets into three sets as training, test, and validation sets for the artificial neural network model. The validation dataset is equal for the all experiments. Then we composite the results of each predictor using the multi-model ensemble techniques such as bagging and bumping. Bagging is the abbreviation of "Bootstrap Aggregation" and it composite outputs from several machine learning techniques for raising the performance and stability of prediction or classification. This technique is special form of the averaging method. Bumping is the abbreviation of "Bootstrap Umbrella of Model Parameter," and it only considers the model which has the lowest error value. The results show that bumping outperforms bagging and the other predictors except for "Poster" product group. For the "Poster" product group, artificial neural network model performs better than the other models. In the second step, we use the market basket analysis to extract association rules for co-purchased products. We can extract thirty one association rules according to values of Lift, Support, and Confidence measure. We set the minimum transaction frequency to support associations as 5%, maximum number of items in an association as 4, and minimum confidence for rule generation as 10%. This study also excludes the extracted association rules below 1 of lift value. We finally get fifteen association rules by excluding duplicate rules. Among the fifteen association rules, eleven rules contain association between products in "Office Supplies" product group, one rules include the association between "Office Supplies" and "Fashion" product groups, and other three rules contain association between "Office Supplies" and "Home Decoration" product groups. Finally, the proposed product recommender systems provides list of recommendations to the proper customers. We test the usability of the proposed system by using prototype and real-world transaction and profile data. For this end, we construct the prototype system by using the ASP, Java Script and Microsoft Access. In addition, we survey about user satisfaction for the recommended product list from the proposed system and the randomly selected product lists. The participants for the survey are 173 persons who use MSN Messenger, Daum Caf$\acute{e}$, and P2P services. We evaluate the user satisfaction using five-scale Likert measure. This study also performs "Paired Sample T-test" for the results of the survey. The results show that the proposed model outperforms the random selection model with 1% statistical significance level. It means that the users satisfied the recommended product list significantly. The results also show that the proposed system may be useful in real-world online shopping store.

A Study on Streamlining the Legal Framework for the Efficient Management of Protection and Security of the Government Complexes (정부청사의 효율적 방호·보안관리를 위한 법령체계 정비방안에 대한 소고)

  • Shin, Hyeong-Seok
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.39-57
    • /
    • 2019
  • The executive authority of the Ministry of Public Administration and Security on the 'management of security of the government complexes' is not sufficiently secured only with the organization law, the Government Organization Act. It is needed to establish an administrative actions law, an individual law that sets detailed contents and limitations of the executive authority to be stipulated. The current regulation, Regulation on the Management of the Government Complexes which is a Presidential Decree, is a legal decree that lacks a legal basis. The decree does not match with the current constitutional framework and raises the issue of its legality. The regulation may have the characteristics as a public property management law so far as it stipulates such matters as supply and maintenance management for the complexes, acquisition and disposition of complexes, facilities management of complexes, etc. However, the regulation includes high authority actions by an administrative organization, such as facilities security and order maintenance including restriction and control of access. This makes the regulation have the characteristics of a public property policy act as well. To supplement the legal framework for this situation, it is needed to level up some of the provisions relating to protection and security management to the level of an act as they stipulate high authority actions by an administrative organization. Other matters in the Regulation on the Management of the Government Complexes such as provisions relating to supply and allocation of complexes, etc. may be maintained as they are. In addition, the protection officers (general service official) does not own legal authority and have limitations on securing the capability to deal with the situations on implementing the on-site protection duty. Therefore, it is needed for the protection officers to secure protection duty-related authority by stipulating in a law. The main contents of the law on the protection and security of the government complexes may be those matters providing reservations on the implementations of laws. These may include the limitation of rights of and charging obligations on the people such as restricting the actions of personnel in the complex, rights and obligations of protection personnels relating to their duties, use of weapons, training of protection personnel, penal provisions, etc. These legal reservations should be included in an individual act.

IT Service Strategy on Development of Online Floral Distribution Service : A Typhoon Positioning Strategy (화훼소매점의 온라인 유통서비스 진화에 따른 정보기술서비스 전략 - A Typhoon Positioning Strategy를 중심으로 -)

  • Lee, Seung-chang;Ahn, Sung-hyuck;Lee, Soong
    • Journal of Distribution Science
    • /
    • v.7 no.4
    • /
    • pp.15-26
    • /
    • 2009
  • The internet has dramatically changed a way of business management and competition in the business environment. Especially, it stimulated not only to evolve online floral distribution service but also to change a phase of competition among floral retail stores in industry. And that also led to keen competition among IT service providers as well. This study is to examine how floral retail stores have been evolved and competed with the radical situation of the floral distribution industry through IT service in the aspect of business and information technology. In addition, the Typhoon Positioning Strategy(TPS), a strategy for the IT service positioning, is introduced from IT service provider's perspective. For IT service providers to create high business value and continuous service providing, IT service should be positioned on the customers' "core business" and developed to the level of "solution." The Typhoon Positioning Strategy(TPS) is a strategy for the IT service positioning, indicating that IT service should be positioned according to a Business Process-Service model with the consideration of business development direction, IT service trend, and user's IT capability. That is, IT service providers should find out customers' "core business" area first to provide a right IT service to the company, and the IT service provided should meet to the level of business solution. The capability of the IT solution users is also an important factor to be considered for the advanced IT service. There are four principles of the Typhoon Positioning Strategy(TPS). Principle 1) IT service provided should be an IT solution Map suitable for customer business processes. Principle 2) IT service provided should be able to support customer core business. Principle 3) IT service provided should be a business solution. Principle. 4) IT service provided should be applied differently according to the level of customer's IT capability.

  • PDF