• Title/Summary/Keyword: Work management system

Search Result 3,462, Processing Time 0.032 seconds

Advancement Plans for Linkage of National Archives Portal Service to Improve Accessibility and Usability of National Records (국가기록물 접근성 및 활용성 향상을 위한 국가기록포털 연계 개선방안)

  • Yoona, Kang;Young Jun, Jo;Minjung, Kim;Hyo-Jung, Oh
    • Journal of the Korean Society for information Management
    • /
    • v.39 no.4
    • /
    • pp.99-125
    • /
    • 2022
  • In order to understand a record, not only the contents of the record but also the production background and work context of the record must be grasped. It also requires a function that makes it easy to find related records scattered across various departments and agencies. Accordingly, the 'linkage' of information in archival information services is becoming more important. NAK also emphasizes 'linkage' as a search service function of the archives management system, but some problems were identified at the National Archives Portal Service (NAPS) such as a lack of linkage with authority data, disruption of internal service, and absence of linkage with other related organizations. To solve the limitations of the NAPS, we selected and analyzed advanced record management institutions that have built an ideal linkage service; checked the overall linkage structure of these institutions; and identified characteristics that could not be seen by other institutions. Also, elements that can be adopted from the NAPS were derived. Next, the current status of the NAPS linkage structure was analyzed to identify the parts that were not linked and the items that need to be improved in the linkage method, and specific advancement plans were suggested to solve these problems. The purpose of this study is to increase users' satisfaction with search and to advance the accessibility and utilization of records and internal services through improved linkage services of NAPS.

Study on the Damage Pattern Analysis of a 3 Phase 22.9/3.3kV Oil Immersed Transformer and Judgment of the Cause of Its Ignition (3상 22.9/3.3kV 유입변압기의 소손패턴 해석 및 발화원인 판정에 관한 연구)

  • Choi, Chung-Seog
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.60 no.6
    • /
    • pp.1274-1279
    • /
    • 2011
  • The purpose of this paper is to present the manufacturing defect and damage pattern of a 3 phase 22.9/3.3kV oil immersed transformer, as well as to present an objective basis for the prevention of a similar accident and to secure data for the settlement of PL related disputes. It was found that in order to prevent the occurrence of accidents to transformers, insulating oil analysis, thermal image measurement, and corona discharge diagnosis, etc., were performed by establishing relevant regulation. The result of analysis performed on the external appearance of a transformer to which an accident occurred, the internal insulation resistance and protection system, etc., showed that most of the analysis items were judged to be acceptable. However, it was found that the insulation characteristics between the primary winding and the enclosure, those between the ground and the secondary winding, and those between the primary and secondary windings were inappropriate due to an insulating oil leak caused by damage to the pressure relief valve. From the analysis of the acidity values measured over the past 5 years, it is thought that an increase in carbon dioxide (CO2) caused an increase in the temperature inside the transformer and the increase in the ethylene gas increased the possibility of ignition. Even though 17 years have passed since the transformer was installed, it was found that the system's design, manufacture, maintenance and management have been performed well and the insulating paper was in good condition, and that there was no trace of public access or vandalism. However, in the case of transformers to which accidents have occurred, a melted area between the upper and the intermediate bobbins of the W-phase secondary winding as well as between its intermediate and lower bobbins. It can be seen that a V-pattern was formed at the carbonized area of the transformer and that the depth of the carbonization is deeper at the upper side than the lower side. In addition, it was found that physical bending and deformation occurred inside the secondary winding due to non-uniform pressure while performing transformer winding work. Therefore, since it is obvious that the accident occurred due to a manufacturing defect (winding work defect), it is thought that the manufacturer of the transformer is responsible for the accident and that it is lawful for the manufacture to investigate and prove the concrete cause of the accident according to the Product Liability Law (PLL).

An Efficient Query-based XML Access Control Enforcement Mechanism (효율적인 질의 기반 XML 접근제어 수행 메커니즘)

  • Byun, Chang-Woo;Park, Seog
    • Journal of KIISE:Databases
    • /
    • v.34 no.1
    • /
    • pp.1-17
    • /
    • 2007
  • As XML is becoming a de facto standard for distribution and sharing of information, the need for an efficient yet secure access of XML data has become very important. To enforce the fine-level granularity requirement, authorization models for regulating access to XML documents use XPath which is a standard for specifying parts of XML data and a suitable language for both query processing. An access control environment for XML documents and some techniques to deal with authorization priorities and conflict resolution issues are proposed. Despite this, relatively little work has been done to enforce access controls particularly for XML databases in the case of query access. Developing an efficient mechanism for XML databases to control query-based access is therefore the central theme of this paper. This work is a proposal for an efficient yet secure XML access control system. The basic idea utilized is that a user query interaction with only necessary access control rules is modified to an alternative form which is guaranteed to have no access violations using tree-aware metadata of XML schemes and set operators supported by XPath 2.0. The scheme can be applied to any XML database management system and has several advantages over other suggested schemes. These include implementation easiness, small execution time overhead, fine-grained controls, and safe and correct query modification. The experimental results clearly demonstrate the efficiency of the approach.

Identifying Risk Management Locations for Synthetic Natural Gas Plant Using Pipe Stress Analysis and Finite Element Analysis (배관응력해석 및 유한요소해석에 의한 SNG플랜트의 리스크 관리 위치 선정)

  • Erten, Deniz Taygun;Yu, Jong Min;Yoon, Kee Bong;Kim, Ji Yoon
    • Journal of Energy Engineering
    • /
    • v.26 no.2
    • /
    • pp.1-11
    • /
    • 2017
  • While they are becoming more viable, synthetic natural gas (SNG) plants, with their high temperatures and pressures, are still heavily dependent on advancements in the state-of-the-art technologies. However, most of the current work in the literature is focused on optimizing chemical processes and process variables, with little work being done on relevant mechanical damage and maintenance engineering. In this study, a combination of pipe system stress analysis and detailed local stress analysis was implemented to prioritize the inspection locations for main pipes of SNG plant in accordance to ASME B31.3. A pipe system stress analysis was conducted for pre-selecting critical locations by considering design condition and actual operating conditions such as heat-up and cool-down. Identified critical locations were further analyzed using a finite element method to locate specific high-stress points. Resultant stress values met ASME B31.3 code standards for the gasification reactor and lower transition piece (bend Y in Fig.1); however, it is recommended that the vertical displacement of bend Y be restricted more. The results presented here provide valuable information for future risk based maintenance inspection and further safe operation considerations.

Part-of-speech Tagging for Hindi Corpus in Poor Resource Scenario

  • Modi, Deepa;Nain, Neeta;Nehra, Maninder
    • Journal of Multimedia Information System
    • /
    • v.5 no.3
    • /
    • pp.147-154
    • /
    • 2018
  • Natural language processing (NLP) is an emerging research area in which we study how machines can be used to perceive and alter the text written in natural languages. We can perform different tasks on natural languages by analyzing them through various annotational tasks like parsing, chunking, part-of-speech tagging and lexical analysis etc. These annotational tasks depend on morphological structure of a particular natural language. The focus of this work is part-of-speech tagging (POS tagging) on Hindi language. Part-of-speech tagging also known as grammatical tagging is a process of assigning different grammatical categories to each word of a given text. These grammatical categories can be noun, verb, time, date, number etc. Hindi is the most widely used and official language of India. It is also among the top five most spoken languages of the world. For English and other languages, a diverse range of POS taggers are available, but these POS taggers can not be applied on the Hindi language as Hindi is one of the most morphologically rich language. Furthermore there is a significant difference between the morphological structures of these languages. Thus in this work, a POS tagger system is presented for the Hindi language. For Hindi POS tagging a hybrid approach is presented in this paper which combines "Probability-based and Rule-based" approaches. For known word tagging a Unigram model of probability class is used, whereas for tagging unknown words various lexical and contextual features are used. Various finite state machine automata are constructed for demonstrating different rules and then regular expressions are used to implement these rules. A tagset is also prepared for this task, which contains 29 standard part-of-speech tags. The tagset also includes two unique tags, i.e., date tag and time tag. These date and time tags support all possible formats. Regular expressions are used to implement all pattern based tags like time, date, number and special symbols. The aim of the presented approach is to increase the correctness of an automatic Hindi POS tagging while bounding the requirement of a large human-made corpus. This hybrid approach uses a probability-based model to increase automatic tagging and a rule-based model to bound the requirement of an already trained corpus. This approach is based on very small labeled training set (around 9,000 words) and yields 96.54% of best precision and 95.08% of average precision. The approach also yields best accuracy of 91.39% and an average accuracy of 88.15%.

A Survey on Perception Level of the Radiological Technologist's about Culture of Patient Safety (환자안전 문화에 대한 방사선사의 인식도 조사)

  • Jeon, Min-Cheol;Kim, Young-Il;Jang, Jae-Uk;Han, Man-Seok;Seo, Sun-Youl
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.423-430
    • /
    • 2014
  • Patient safety culture for the general hospital to investigate the perception of radiological technologists, managing of the patient safety provides the Foundation for the safety activities as a basis to develop a program for providing. Patient safety culture for the general hospital to investigate the perception of Radiological technologists, the duration of the survey of the study on June 13, 2012 to June 20, and five general hospitals worked on Radiological technologists workers were material and analyzed the target of 198 (SPSS ver. 19.0). Patient safety activities within the Department, the factors affecting direct care, communication, medical malpractice, hospitals rated, safe for the patient safety culture and the reported accidents, dangerous and caused an accident, most feel that patient safety incident reporting system according to the results of evaluating medical accidents patient safety culture regarding recognition, work appeared in more than 25 years, even the most highly evaluated, the working period of 10 patient safety to 15 years the most highly. Therefore, General Hospital, Director of the patient safety culture improvement of radiation in order to have sufficient staffing, aggressive approach to patient safety issues, and safe working period of relapse prevention of accidents to the radiation as well as giving systematic consideration of mission medical accident reporting system will be active.

A Multistage Authentication Strategy for Reliable N-to-N Communication in CGSR based Mobile Ad Hoc Networks (CGSR 기반의 이동 애드 흑 네트워크에서 신뢰성 있는 통신을 위한 노드간 인증 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.659-667
    • /
    • 2005
  • A Mobile Ad Hoc Network(MANET) is a multi hop wireless network with no prepared base stations or centralized administrations, where flocks of peer systems gather and compose a network. Each node operates as a normal end system in public networks. In addition to it, a MANET node is required to work as a router to forward traffic from a source or intermediate node to others. Each node operates as a normal end system in public networks, and further a MANET node work as a router to forward traffic from a source or intermediate node to the next node via routing path. Applications of MANET are extensively wide, such as battle field or any unwired place; however, these are exposed to critical problems related to network management, node's capability, and security because of frequent and dynamic changes in network topology, absence of centralized controls, restricted usage on network resources, and vulnerability oi mobile nodes which results from the special MANET's character, shared wireless media. These problems induce MANET to be weak from security attacks from eavesdropping to DoS. To guarantee secure authentication is the main part of security service In MANET because networks without secure authentication are exposed to exterior attacks. In this paper, a multistage authentication strategy based on CGSR is proposed to guarantee that only genuine and veritable nodes participate in communications. The proposed authentication model is composed of key manager, cluster head and common nodes. The cluster head is elected from secure nodes, and key manager is elected from cluster heads. The cluster head will verify other common nodes within its cluster range in MANET. Especially, ID of each node is used on communication, which allows digital signature and blocks non repudiation. For performance evaluation, attacks against node authentication are analyzed. Based on security parameters, strategies to resolve these attacks are drawn up.

An Operating Scheme for the Course-based Qualification System at the Four-Year University Level: Focused on the KOREATECH Case (4년제 대학 과정평가형 자격과정 운영방안: 코리아텍 사례를 중심으로)

  • Oh, Chang-Heon;Kang, Seung-Chan;Min, Dong-Kyun;Om, Kiyong
    • Journal of Practical Engineering Education
    • /
    • v.8 no.1
    • /
    • pp.39-47
    • /
    • 2016
  • Owing to increasing concern that jobseekers are wasting too much time and effort building up so-called "spec" skills to get a decent job, many companies including state-run enterprises are now hiring rookies based on their job competency rather than test scores unrelated to the job. However, universities which are mainly responsible for training professional personnel needed for various kinds of companies and factories are reluctant to adopt NCS-based educational courses. The NCS defines how much knowledge and skill are required to work in a certain industry and then evaluates them. Although the Korean government and several junior colleges have been tentatively operating the course-based qualification system at the "industrial technician" level since 2014, the results are falling far short of diverse stakeholders' expectations. Therefore, there are urgent needs to study how to develop NCS-based curriculum at the university level, and how to strengthen the linkage between work, training, and qualification.

Police Officers' Cognitions of Police Investigation Specialization (수사경과제에 대한 경찰공무원의 인식)

  • Choi, Mu-Chan
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.6
    • /
    • pp.289-299
    • /
    • 2009
  • This study set out to analyze the perceptions of investigative police officers and division police officers regarding Police Investigation Specialization, which had been in effect for four years, identify the problems, and search for alternative policies. The results led to the following alternative policies; first, the communication among the members should be facilitated by trading the jobs between investigative policemen and division members in certain percentage regularly, integrating job education and special work, and developing diverse support programs for detective activities to provide them with opportunities to experience and understand investigation. The second suggestion concerns the investigation members' morale. There should be a range of measures to boost their moral such as allocating separate budget and personnel to support the investigation department and the treatment of major criminal and civil cases, giving each investigation team an office and investigation room to improve their working environment, readjusting the promotion ratio of Police Investigation Specialization to introduce a promotion system proper for each investigation's characteristics. The third suggestion is to secure job efficiency. It's required to reinforce the current short-term specialized education program to bring up practical and professional investigators, open the certification exam of professional investigators to all members so that every policeman can have their abilities recognized and approved as long as they have the demanded capabilities, and create a system of shedding off the members idle at work by reflecting low performance records when evaluating the members to decide who to dismiss from Police Investigation Specialization. And finally, it's important to divide duties rationally. The rationality of duties division can be guaranteed by setting the guidelines for direct handling for the team leader to help him devote himself to his duties, defining objective criteria of measuring investigation workload, and creating devoted systems and teams for simple and small accidents so that experienced investigators can deal with high-profile cases.

A Study on the Factors Affect on Opticians' Customer Orientation (안경사의 고객지향성에 영향을 미치는 요인에 관한 연구)

  • Choi, Youngro;Park, Inn-Jee
    • The Korean Journal of Vision Science
    • /
    • v.20 no.4
    • /
    • pp.403-411
    • /
    • 2018
  • Purpose : The purpose of this study is to analyze how the certain efforts of the optical shops affect on opticians' job satisfaction and organizational commitment, and to analyze how opticians' job satisfaction and organizational commitment affect on the customer orientation and to suggest the method of maintaining competitiveness. Methods : Two hundred opticians took participations on the surveys via the Internet survey method and social network system (SNS), and SPSS 18.0 statistics program was used for data analysis; frequency analysis, T-test, factor analysis, reliability analysis, and multiple linear regression analysis were conducted. Results : It is analyzed the differences on the job satisfaction and organizational commitment in accordance with type of optical shops, conducting 5 working days/week and flexible time. As a result, higher job satisfaction is presented with 5 working days/week. Relationships with co-workers statistically affect on job satisfaction positively and emotional labor and work overload statistically affect on job satisfaction negatively. In addition, relationships with co-workers and reward statistically affect on organizational commitment positively and emotional labor and work overload statistically affect on organizational commitment negatively. And opticians' job satisfaction and organizational commitment statistically affect on customer satisfaction positively. Conclusion : It is necessary for the optical shops to make an effort for their opticians to improve the job satisfaction and organizational commitment. And to do so, it is needed to form trusting and respecting relationships with co-workers or superiors. In addition, it is necessary to have continuous communication and education for opticians' self-management. Also, it is needed to establish an effective reward system.