• Title/Summary/Keyword: Web Service

Search Result 3,774, Processing Time 0.035 seconds

Adaptation to Motherhood in Central Asian-Korean Immigrants to Korea: A Grounded Theory Study (한국으로 이주한 고려인 여성의 모성 적응과정: 근거이론연구)

  • Kim, Su Hyun;Cho Chung, Hyang-In
    • Journal of Korean Academy of Nursing
    • /
    • v.49 no.6
    • /
    • pp.677-689
    • /
    • 2019
  • Purpose: This qualitative study aimed to develop a substantive theory of the process of adaptation to motherhood in Central Asian-Korean immigrants to Korea. Methods: Individual, in-depth interviews were conducted from July to September 2017, with 18 women who emigrated of Korean ethnicity from Central Asia to Korea, and took care of their baby for at least a year after their first delivery in Korea. The interviews were audio-recorded and transcribed verbatim. Data from the transcriptions were analyzed through Strauss and Corbin's grounded theory method, and data analysis was conducted simultaneously with data collection. Results: As a result of categorizing the interview data through the process of open coding, 10 categories, with 31 subcategories and 102 concepts were drawn, and "growth as a Central Asian-Korean mother in an unfamiliar, historical hometown" was found to be the core category of the process of adaptation to motherhood in Central Asian-Korean immigrants to Korea. Conclusion: A characteristic of the process of adaptation to motherhood in Central Asian-Korean immigrants to Korea, drawn from this study, is that it differs according to the level of initiative to carry out interaction strategies, and the use of various supportive social resources. The findings indicate the need for Medicare eligibility adjustment for antenatal care, the extension of the visa renewal period during childbirth, the development of web- or mobile application-based educational programs in Russian language, and the establishment of integrated visiting healthcare services, community service resources, and policy support to enable these women to utilize various supportive social resources.

Distributed Intrusion Detection System for Safe E-Business Model (안전한 E-Business 모델을 위한 분산 침입 탐지 시스템)

  • 이기준;정채영
    • Journal of Internet Computing and Services
    • /
    • v.2 no.4
    • /
    • pp.41-53
    • /
    • 2001
  • Multi-distributed web cluster model built for high availability E-Business model exposes internal system nodes on its structural characteristics and has a potential that normal job performance is impossible due to the intentional prevention and attack by an illegal third party. Therefore, the security system which protects the structured system nodes and can correspond to the outflow of information from illegal users and unfair service requirements effectively is needed. Therefore the suggested distributed invasion detection system is the technology which detects the illegal requirement or resource access of system node distributed on open network through organic control between SC-Agents based on the shared memory of SC-Server. Distributed invasion detection system performs the examination of job requirement packet using Detection Agent primarily for detecting illegal invasion, observes the job process through monitoring agent when job is progressed and then judges the invasion through close cooperative works with other system nodes when there is access or demand of resource not permitted.

  • PDF

Design and Implementation of USN Middleware using DTD GenerationTechnique (DTD 자동 생성 기법을 이용한 USN 미들웨어 설계 및 구현)

  • Nam, Si-Byung;Kwon, Ki-Hyeon;Yu, Myung-Han
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.3
    • /
    • pp.41-50
    • /
    • 2012
  • In the monitoring system based on web service application, it is faced with the problems like code reproduction, difficult scalability and error recovery derived from the frequent change of data structure. So we propose a technique of monitoring system by DTD(Document Type Definition) automatic generation. This technique is to use dynamic server-side script to cope with the change of sensor data structure, generate the DTD dynamically. An it also adapt the AJAX(Asynchronous JavaScript and XML) for XML data parsing, it can support mass data transmission and exception processing for data loss and damage. This technique shows the result of recovery time is decreased about 44.8ms in case of temporary data failure by comparing to the conventional XML method.

A Method for Specifying the Access Control of XML Document using Process Algebra (프로세스 대수를 이용한 XML 문서의 접근권한 표현법)

  • Lee, Ji-Yeon;Kim, Il-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.3
    • /
    • pp.251-258
    • /
    • 2007
  • With the increase of a web service technology, a new access control mechanism has developed for XML documents. As a result, as legacy access control systems, access control systems has become an active research topic. In this paper, we propose a methodology to translate access control policies for XML documents into formal specification language CSP. To do this, first, we introduce a method to translate a hierarchical access to XML documents using XPath language into CSP process algebra. Second, we explain a method to represent a XML schema as a formal model like automata. Third, we present a method for representing the semantics of access control policies such as the scope of rules and confliction resolution into a process algebra language. Finally, a CSP specification example of an XML schema and path expressions aye shown to illustrate the validity of our approach.

  • PDF

IoT-enabled Solutions for Tour Photography Services

  • Jeong, Isu;Baek, Seungwoo;An, Eunsol;Kim, Yujin;Choi, Jiwoo;Yun, Jaeseok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.5
    • /
    • pp.127-135
    • /
    • 2020
  • In this paper, we propose an IoT-enabled solution for tour photography services with small-size investment and resources in the travel and tourism industries, being able to impact on economic, social, and cultural values. An IoT-enabled camera is developed based on an open hardware and software platform complying with oneM2M, which can make traditional embedded systems oneM2M-compliant devices due to a middleware solution called TAS (thing adaptation software). IoT cameras deployed around photo zones in a tour site could be remotely controlled via an IoT gateway with a Web-based application on a smartphone. Users would perform a pan and tilt camera control if they want and then take and download a perfect photo picture (even though they are away from the tour site). We expect that the proposed solution will promote the deployment IoT-enabled technologies in tour and travel industries which are important parts of the tertiary sector.

Management Efficiency Estimation of Social Enterprises with Data Envelopment Analysis (사회적 기업의 자료포락분석(DEA)을 통한 경영효율성 평가)

  • Lee, Sang-Yun;Lim, Sungmook;Chae, Myungsin
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.40 no.2
    • /
    • pp.121-128
    • /
    • 2017
  • This paper was to evaluate social enterprises' management efficiency with Data Envelope Analysis (DEA). The data was based on the 168 social enterprises' of annual performance reports published in 2015. The research focused on to measure both financial efficiency and social impact of the companies simultaneously. To apply DEA, the paper classified the enterprises into seven types based on types of socal impacts which each company provides before the estimation of the efficiency. The research results showed that group D, which employes disadvantaged people, provides social services and shares resources was the most efficient group and had higest net worths in Pure Technical Efficiency. In contrast, Group B, which only employs social advantage people and provides social service, was the least efficient one. The research suggests a practical and efficient framework in measuring social enterprises' management efficiency, including both the financial performance and social impacts simultaneously with their self-publishing reports. Because the Korea Social Enterprise Promotion Agency does not open business reports which social enterprises submit each year, there are basic limitations on researchers attempting to analyse with data from all social enterprises in Korea. Thus, this study dealt with only 10% of the social enterprises which self-published their performance report on the Korea Social Enterprise Promotion Agency's web site. Regardless of these limitations, this study suggested substantial methods to estimate management efficiency with the self-published reports. Because self-publishing is increasing each year, it will be the main source of information for researchers in examining and evaluating social enterprises' financial performance or social contribution. The research suggests a practical and efficient framework in measuring social enterprises' management efficiency, including both the financial performance and social impacts simultaneously with their self-publishing reports. The research results suggest not only list of efficient enterprises but also methods of improvement for less efficient enterprises.

A study on the Tendencies of Oriental Pediatrics by Researching Academic Journal of Oriental Medicine in Modern Korea (from 1910 to 1960) (한의학술잡지(韓醫學術雜誌)를 중심으로 살펴본 근세(近世) 한방소아과(韓方小兒科)의 학술적(學術的) 경향(傾向)(1910년(年)부터 1960년(年)까지))

  • Seo, Young-Min;Kim, Jang-Hyun
    • The Journal of Dong Guk Oriental Medicine
    • /
    • v.10
    • /
    • pp.62-76
    • /
    • 2008
  • Object: Oriental pediatrics at the Late-Joseon had constantly developed positively, independently, originally, but depressed since Japanese imperialism because the western medicine flowed into Korea and Japanese imperialism carried out the oriental medical obliterating policy. As a effort of oriental medical group that coped with the obliterating of policy of Japanese imperialism, there were publication of oriental medical academic journal and it is important data that we comprehended the tendencies of oriental pediatrics in modern korea. Method: We studied academic journals on oriental medicine in Knowledge of Oriental Medicine Web Service and selected 31 volumes of nine academic journals out of 80 volumes of twelve academic journals, which is contained pediatrics contents. Result & Conclusion: Research into these journals has derived the conclusion that the oriental pediatrics academic trend at the time were transformed into new state which brought the interaction and balanced the merit of oriental-western medicine.

  • PDF

A Study about problem and a correspondence strategy along a beauty culture-Ubiquitous implementation (미용 부분의 유비쿼터스 구현에 따른 문제점과 대응전략에 관한 연구)

  • Lim Jin-Sook;Kang Jang-Mook
    • Journal of Digital Contents Society
    • /
    • v.5 no.3
    • /
    • pp.163-170
    • /
    • 2004
  • Ubiquitous is an agriculture revolution, the Industrial Revolution, the fourth revolution to equal an information revolution are Ubiquitous. Historic agriculture was revolutionary, but the Industrial Revolution was a revolution of the physics space that was a base of a mankind civilization, and the informatization revolution that Cyber Space saw a prime while world wide web service was expended was a revolution of cyber space. Be charmed with this, and, as for the Ubiquitous revolution, it is achieved a physics space and an intelligent union of cyber space in the space where an off-line space was integrated with compunction on-line. It is combined with a life space naturally, and Ubiquitous technology. Also, I presented the plan that derivation tried a problem about Ubiquitous, and can solve an each problem. Specially, infringement about personal privacy very has a lot of possession to occur in the world that radio communication between all appliances is possible. It is Ubiquitous by becoming the data which is useful to thorough preparation about the Ubiquitous world to come with presenting policy a little technical solution plan about this to the future Republic of Korea. many company has been cracked by crackers information security and everyday new computer virus come out.

  • PDF

Same music file recognition method by using similarity measurement among music feature data (음악 특징점간의 유사도 측정을 이용한 동일음원 인식 방법)

  • Sung, Bo-Kyung;Chung, Myoung-Beom;Ko, Il-Ju
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.3
    • /
    • pp.99-106
    • /
    • 2008
  • Recently, digital music retrieval is using in many fields (Web portal. audio service site etc). In existing fields, Meta data of music are used for digital music retrieval. If Meta data are not right or do not exist, it is hard to get high accurate retrieval result. Contents based information retrieval that use music itself are researched for solving upper problem. In this paper, we propose Same music recognition method using similarity measurement. Feature data of digital music are extracted from waveform of music using Simplified MFCC (Mel Frequency Cepstral Coefficient). Similarity between digital music files are measured using DTW (Dynamic time Warping) that are used in Vision and Speech recognition fields. We success all of 500 times experiment in randomly collected 1000 songs from same genre for preying of proposed same music recognition method. 500 digital music were made by mixing different compressing codec and bit-rate from 60 digital audios. We ploved that similarity measurement using DTW can recognize same music.

  • PDF

Access Control Mechanism Based on Key Assignment and User Trust Level for Social Network Services (소셜 네트워크 서비스를 위한 키 분배와 사용자 평판을 이용한 접근 제어 메커니즘)

  • Quan, Wenji;Hwang, Junho;Yoo, Myungsik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.5
    • /
    • pp.410-415
    • /
    • 2013
  • Recently, as Internet enters WEB 2.0, many social network services through such as Facebook, Twitter and Youtube appeared. In these social network sites, users can easily make friends, join groups and access others personal information. Therefore, a malicious user can easily gather information of others. In order to protect user's personal information from the unauthenticated users, we propose privacy protection mechanism based on key assignment and user's trust level. A master-key is generated for each users and is segmented into a core-key and several sub-key. The master-key stores at the information owner's side and the sub-key will be distributed to requestor according to the relation and trust level. At last, in order to proof the efficiency, the performance of our proposed mechanism is compared with those of existing mechanisms.