• Title/Summary/Keyword: Situation-based Design

Search Result 1,172, Processing Time 0.028 seconds

A Study on Furniture Making Program Development for Children's Designing Creativity (어린이 디자인 창의성 개발을 위한 D.I.Y 가구 만들기 프로그램 개발에 관한 연구)

  • Kim, Young Joo
    • Journal of the Korea Furniture Society
    • /
    • v.26 no.3
    • /
    • pp.187-195
    • /
    • 2015
  • School activities which are opened after-school or during a vacation have been social issues as our society is nuclearized and both parents are working, so that elementary school students and middle school students are less taken care of and less concerned by their parents. It is regrettable that students are spending too much time on private academies in the situation where they cannot help but staying alone after school and where frantic fever of private education pervades their lives. For the sake of those students, the Ministry of Education announced, "Each school can open its after-school programs or vacation programs based on students and their parents' demands making it a rule of a student's voluntary participation. After school programs for elementary and middle school students are operated by local communities providing extra courses or programs in addition to regular classes. Those programs are paid by participants or supported by financial aids in order to decrease parents' burdens of costs of private education and to reduce educational gaps between rich and poor children or between the regions. After school programs are either curricular or non-curricular educational activities with students' voluntary participation, and the programs are meant to supplement and strengthen the role of public school education. Non-curricular courses that consist of various programs, in particular, are receiving good reputations by students and parents. Therefore, this study develops and operates "children's making D.I.Y. furniture" program that is one of non-curricular courses and an activity-oriented art program for children to improve their designing creativity and to help them experience their future jobs in advance. The purpose of this study is to analyze advantages and disadvantages of the program using survey and assessment methods and to find out a developmental direction focused on future-oriented and specialized educational programs for children.

A Case Study on the NATM Tunnel Excavation under the Soft Soil Ground Condition by Back Analysis Method (역해석 기법에 의한 연약지반 NATM터널 굴착사례 연구)

  • JO, Hyun;PARK, Jong-In;LEE, Ki-Hwan
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.2 no.3
    • /
    • pp.71-81
    • /
    • 2000
  • For the construction of NATM tunnel, it is required a design based on the accurate soil condition from soil investigation. However, in practice, it often designs tunnels without fully understanding the condition. Especially, when soft soil comes up, or ground water breaks out suddenly on the construction, it needs to secure the stability of tunnel by appropriate reinforcing construction according to the results of measurements on field superlatively reflecting the faced situation. This report reviews the mostsuitable stability of tunnel in the construction of soft soil of tunnel by numerical analysis using FDM after re-evaluated the soil properties through back analysis using the results of measurements to simulate abruptly occurred deformation. And applying steel pipe grouting row by row on the wall and the low part of tunnel and also applying the construction method of temporary invert after excavation of the upper part of tunnel, the excavation of soft soil tunnel secured the structural stability of tunnel has been completed.

  • PDF

CGV's China Market-Oriented Growth Strategy for the Korean Wave (한류 증진을 위한 CGV의 성장 전략: 중국 시장을 중심으로)

  • Kwon, Sang-Jib
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.6
    • /
    • pp.576-588
    • /
    • 2016
  • The main objective of this study is to investigate the overseas performance of CGV in order to boost Korean wave and movie platform competitiveness. The focus of this study is to on how CGV may enhance the market share of china market, emphasizing the entrepreneurial orientation of top management team and differentiated entrant strategy based on Korean wave. This study suggests key factors in the china movie platform market expansion process of CGV. In order to analyze this mechanism, we employ a case study method design. The case study results show that there are differences of CGV strategy in movie platform characteristics and the important key factors of growth depending on market situation. The most important thing is that entrepreneurial orientation of top management including differentiated entrant strategy and Korean wave-oriented vision enhance between brand loyalty and market share in china market. In addition, growing overseas impacts of CGV support on Korean wave entertainment and globalization of movie platform industry. Contributions and implications for the academic and managerial field are discussed.

Design and Implementation of A Weakness Analyzer for Mobile Applications (모바일 애플리케이션을 위한 취약점 분석기의 설계 및 구현)

  • Mun, Il-Yong;Oh, Se-Man
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.10
    • /
    • pp.1335-1347
    • /
    • 2011
  • The dissemination and use of mobile applications have been rapidly expanding these days. And in such a situation, the security of mobile applications has emerged as a new issue. Although the safety of general software such as desktop and enterprise software is systematically achieved from the development phase to the verification phase through secure coding, there have been not sufficient studies on the safety of mobile applications yet. This paper deals with deriving weakness enumeration specialized in mobile applications and implementing a tool that can automatically analyze the derived weakness. Deriving the weakness enumeration can be achieved based on CWE(Common Weakness Enumeration) and CERT(Computer Emergency Response Team) relating to the event-driven method that is generally used in developing mobile applications. The analysis tool uses the dynamic tests to check whether there are specified vulnerabilities in the source code of mobile applications. Moreover, the derived vulnerability could be used as a guidebook for programmers to develop mobile applications.

Design of Prevention Model according to a Dysfunctional of Corporate Information (기업 정보화 역기능에 따른 피해를 최소화하기 위한 기업 정보 처리 모델 설계)

  • Jeong, Yoon-Su
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.2
    • /
    • pp.11-17
    • /
    • 2016
  • Recently, As the IT skills development, the different kinds of data (or information) generated by the company are becoming more frequent leaked to outside organizations and individuals. However, it is insufficient situation to reduce the dysfunctional corporate information at the enterprise level. In this paper, we propose a role-based enterprise information processing model to minimize the dysfunctions of corporate information. The proposed model is to allow you to set protect corporate information through the relevant departments for the management and supervision of enterprise information, and rapid and systematic recovery and operating strategy was to improve the efficiency of enterprise information services. The proposed model is caught blocking access to information access to information to establish a rapid and systematic recovery and operational continuity strategy after the administrator user permissions and roles that access to information is centrally managed by the user when the abnormality. In experimental results, virus damage was lower 48.8% than the previous model. In addition, information on the number of dysfunction distribution occurring within the company gained 17.9% lower results than the previous model.

Development and Application of a Specialized Mentor Program for New Graduate Nurses - Focused on Intensive Care Unit of a Tertiary University Hospital - (신규간호사를 위한 맞춤형 멘토 프로그램(새싹프로그램)의 개발 및 적용 - 일개 대학병원 중환자실을 중심으로 -)

  • Kwon, Eun-Ok;Cho, Jung-Sook;Song, Kyung-Ja;Choi-Kwon, Smi;Chang, Sun-Ju;Kim, Ju-Hee;Park, Seung-Hyun;Shin, Hyo-Youn;Yu, Mi;Kim, Jeong-Ah
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.15 no.4
    • /
    • pp.563-570
    • /
    • 2009
  • Purpose: The purpose of this study was to develop specialized mentor program to improve adaptation for new nurses of intensive care unit and to identify the effect of the program on early resignation rate. Methods: The study adopted nonequivalent control group, non synchronized design. Based on the identification of problems and the needs of new nurses, a 6 month specialized mentor program was developed. The program was consisted of three parts; developing knowledge, improving interpersonal relationship and increasing coping competency for emergency situation. Data were collected between July 2006 and 2008 from 37 nurses and the early resignation rate was compared before and after the implementation of the mentoring program. Results: Early resignation rate of the nurses who received the mentor program was significantly lower than that of the nurses who didn't. The resignation rate within 1 year dropped from 44.5% to 8.3%(p=.034). Conclusions: The specialized six month mentoring program was effective in reducing early resignation rate.

  • PDF

Optimal Flow Experience In Web Based Instruction (웹 기반 교육에서 최적몰입경험)

  • Heo, Gyun;Rha, Ilju
    • The Journal of Korean Association of Computer Education
    • /
    • v.6 no.2
    • /
    • pp.71-79
    • /
    • 2003
  • In the flow state, people are absorbed in their activities, while irrelevant thoughts and perceptions are screened out. In Csikszentmihalyi's view, the term 'flow' is used in describing the best feeling in human lives. Flow has been conceptualized as an optimal experience that stems from people's perception on challenges and skills in a given situation. We can easily observe that students who are learning from WBI experience flow state occasionally. If we identify the related factors that make flow experiences possible in WBI, the designers and instructors of WBI might be greatly benefitted by having ideas of how to provide optimal flow experiences to their students. In this article, we attempted to analyze what are critical Flow factors in WBI and provided guidelines on how to design optimal flow experiences in WBI.

  • PDF

Design of data integration model between hospitals for healthcare information collection (헬스케어 정보 수집을 위한 병원간 데이터 통합 모델 설계)

  • Jeong, Yoon-Su;Han, Kun-Hee
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.6
    • /
    • pp.1-7
    • /
    • 2018
  • As IT technology develops recently, medical equipment used in hospitals is demanding high performance. However, since the user visits different hospitals depending on the user's situation, the medical information treated at the hospital is distributed among the hospitals. In this paper, we propose a model to efficiently integrate the health care information of the users stored in the hospital in order to collect the healthcare information of the users who visited the different hospitals. The proposed model synchronizes users' healthcare information collected from personal wearable devices to collect user - centered healthcare information. In addition, the proposed model performs integrity and validity check related to user's healthcare information in a database existing in a cloud environment in order to smoothly share data with the healthcare service center. In particular, the proposed model enables tree - based data processing to smoothly manage healthcare information collected from mobile platforms.

Mobile Healthcare System for Personalized Emergency Management (사용자 맞춤형 응급 관리를 위한 모바일 헬스케어 시스템)

  • Chun, Seung-Man;Choi, Joo-Yeon;Park, Jong-Tae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.6
    • /
    • pp.50-59
    • /
    • 2014
  • In mobile healthcare service, the accurate detection and the notification of the emergency situation are important to chronic patients' life. In the existing healthcare service, the medical staff or medical service provider always judges patients' health status by monitoring from the measured from bio-data. However, it is difficult to monitor many patients in real-time simultaneously, because the medical staff should monitor the health status continuously. Furthermore, an emergency condition diagnosis based solely on the statistical level of the bio-data may be difficult, since the emergency judgment of the bio-data might differ depending on the health characteristics of each person such as age, history of disease, gender, etc. In order to solve this problem, this article presents an mobile healthcare system for emergency bio-data management using a personalized emergency policy. The salient feature of the proposed mobile healthcare system is that the characteristics of the health status of an unique patient is defined to the policy, which is used to judge the emergency condition of the bio-data measured from the patient. The prototype of proposed mobile healthcare system has been built to demonstrate the design concept.

Design of COS for smart card user authentication using signature (서명을 이용한 스마트카드 사용자 인증을 위한 COS 설계)

  • 송영상;신인철
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.41 no.4
    • /
    • pp.103-112
    • /
    • 2004
  • This paper suggests the way to realize smart card security system by using handwritten signature instead of a password which is traditionally used for user authentication. Because of the familiarity of signature we don't need to try to remember the password and signature is difficult to be used by guess or illegal forced situation. The feature data of handwritten signature is large, so we designed COS which is consist of special commands for processing user's handwritten signature data, user authentication, and basic commands based on ISO 7816-3. Also protocol among user, smart card terminal and DB server is designed. In registration process, the feature data of user signature is saved in both a DB server and a smart card. User authentication is processed by comparing the user signature and the saved feature data in a smart card and in a DB server. And the authentication result and hash value of signature data in DB server are transferred to smart card. During this process the authentication between DB server and user is finished. The proposed security system has more higher level of security in user authentication of smart card and it will Provide safer and more convenient security services.