• Title/Summary/Keyword: computer education

Search Result 8,018, Processing Time 0.039 seconds

A Web-based Internet Program for Nutritional Counseling and Diet management of Patient with Diabetes Mellitus (당뇨병 환자의 웹기반 식사관리 및 영양상담 프로그램)

  • 한지숙;정지혜
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.33 no.1
    • /
    • pp.114-122
    • /
    • 2004
  • The purpose of this study was to develop a web-based internet program for nutritional counseling and diet management of patient with diabetes mellitus. The program consisted of four parts according to their functions and contents. The first part explained the metabolism of glucose and mechanism of insulin and insulin receptor expressed by flash 6.0, and defined the diabetes mellitus. The second part is to assess the general health status such as body weight, obesity index, basal metabolic rate and total energy requirement by the input of age, sex, height, weight and degree of activity. This part also provides tlne patient with menu lists and one day menu suitable to his weight and activity, and offers the information for food selection, snacks, convenience foods, dine-out, behavioral modification, cooking methods, food exchange lists, dietary education using buffet, and information on energy and nutrients of foods and drinks, and top 20 foods classified by nutrients. The third part is designed to investigate dietary history of patient, that is, to find out his inappropriate dietary habit and give him some suggestions for appropriate dietary behavior. This part also offers on-line counseling, follow-up management and frequently asked questions. The fourth part is evaluating their energy and nutrients intake by comparing with recommended dietary allowance for Koreans or standardized data for patient with diabetes mellitus. In this part, it is also analyzing energy and nutrients of food consumed by food group and meals, and evaluating the status of nutrient intake. These results are finally displayed as tabular forms and graphical forms on the computer screen. Therefore it is expected that the web-based internet program developed in this study will play a role in their health promotion as widely using by diabetic patients.

A Study on Needs of the Families of Head Injury Patients (두부 손상환자 가족의 간호요구에 대한 연구)

  • Cho Gyoo-Yeong;Park Hyoung-Sook
    • Journal of Korean Academy of Fundamentals of Nursing
    • /
    • v.6 no.3
    • /
    • pp.414-433
    • /
    • 1999
  • The purpose of this study is to identify the needs which are perceived by one of the familiy members who have head injury parients by traffic accidents in the intensive care units. Subjects were 70 families members of head injury patients admitted to 2 general hospitals NICU located Pusan city, 1 general hospital NICU located Ulsan city from December 1. 1998 to February 28. 1999. For this study, 70 family members were interviewed with aid of a Likert scale which was developed by researcher for this study. For development of the survey instrument, literature review and open questionnaire technique with family members and the nurses working in NICU. The 50needs-items were classified into 7 groups according to the homogeneity of the items with the support of literature review. For the content validity, the instrument was reviewed by 1 nursing professor and the internal reliability of this instrument was Cronbach alpha=0.94 which is highly accepted. Data was analyzed by a SPSS computer program. Data analysis included frequency. percentage, mean, standard variance and t-test or ANOVA. The results were as followings : 1. The general characteristics of head injury patients shows that the male was 74.3%, the female was 25.7% and age distribution shows that the fifty-fifty nine years was 30%, the highest. Of religion the buddhism was the most, The diagnosis distribution shows that epidural hematoma was 32.9% and subdural hematoma was 24.3%. The mentalility distribution shows that semicoma was 31.4% and stupor was 31.4%. Hemiplegia was 42.9% 2. The general charaterisrics of the family needs of head injury patients shows that thirty-thirty nine years was 31.4%, the highest. sex distribution shows that the male was 20%, the female was 80%. Of religion the buddism was the most. 3. The family needs of head injury patients was $3.03{\pm}0.42$, needs for the information of a patient's condition was $3.65{\pm}0.48$, the highest. And needs for the information of care and treatment was $3.48{\pm}0.48$, needs to be supplied with comfortable facilities for family was $3.04{\pm}0.66$, needs to be participate in a patient's care was $2.90{\pm}0.55$, needs to be informed about the available resources was $2.83{\pm}0.59$, needs to be supported emotionally for family was $2.79{\pm}0.55$, needs for religious assistance was $2.51{\pm}0.85$. 4. Examining the family needs of head injury patients according to patient's characteristics, mentality, plegia degree and operation were shown be variables to make an effect on the needs for the head injury patients family. At all, according to severity of head. injury, the family needs of head injury patients was high. 5. Examining the family needs of head injury patients according to their general characteristics, we could know that religion, job. income were shown to be variables to make an effect on the family needs. Through the examination it can be seen that the characteristics of head injury patients and the family needs of head injury patients. In conclusion, the family needs of head injury patients was almost same the family needs of ICU patients. Therefore we must involve the family's care of head injury patients and we must provide exact and repeated explanation, education and support the family of head injury patients. As this study was resulted in selecting the families admitted to NICU of some general hospital, we couldn't stretch the result in our favor. Therefore, continuous studies are suggested.

  • PDF

Impact of Net-Based Customer Service on Firm Profits and Consumer Welfare (기업의 온라인 고객 서비스가 기업의 수익 및 고객의 후생에 미치는 영향에 관한 연구)

  • Kim, Eun-Jin;Lee, Byung-Tae
    • Asia pacific journal of information systems
    • /
    • v.17 no.2
    • /
    • pp.123-137
    • /
    • 2007
  • The advent of the Internet and related Web technologies has created an easily accessible link between a firm and its customers, and has provided opportunities to a firm to use information technology to support supplementary after-sale services associated with a product or service. It has been widely recognized that supplementary services are an important source of customer value and of competitive advantage as the characteristics of the product itself. Many of these supplementary services are information-based and need not be co-located with the product, so more and more companies are delivering these services electronically. Net-based customer service, which is defined as an Internet-based computerized information system that delivers services to a customer, therefore, is the core infrastructure for supplementary service provision. The importance of net-based customer service in delivering supplementary after-sale services associated with product has been well documented. The strategic advantages of well-implemented net-based customer service are enhanced customer loyalty and higher lock-in of customers, and a resulting reduction in competition and the consequent increase in profits. However, not all customers utilize such net-based customer service. The digital divide is the phenomenon in our society that captures the observation that not all customers have equal access to computers. Socioeconomic factors such as race, gender, and education level are strongly related to Internet accessibility and ability to use. This is due to the differences in the ability to bear the cost of a computer, and the differences in self-efficacy in the use of a technology, among other reasons. This concept, applied to e-commerce, has been called the "e-commerce divide." High Internet penetration is not eradicating the digital divide and e-commerce divide as one would hope. Besides, to accommodate personalized support, a customer must often provide personal information to the firm. This personal information includes not only name and address, but also preferences information and perhaps valuation information. However, many recent studies show that consumers may not be willing to share information about themselves due to concerns about privacy online. Due to the e-commerce divide, and due to privacy and security concerns of the customer for sharing personal information with firms, limited numbers of customers adopt net-based customer service. The limited level of customer adoption of net-based customer service affects the firm profits and the customers' welfare. We use a game-theoretic model in which we model the net-based customer service system as a mechanism to enhance customers' loyalty. We model a market entry scenario where a firm (the incumbent) uses the net-based customer service system in inducing loyalty in its customer base. The firm sells one product through the traditional retailing channels and at a price set for these channels. Another firm (the entrant) enters the market, and having observed the price of the incumbent firm (and after deducing the loyalty levels in the customer base), chooses its price. The profits of the firms and the surplus of the two customers segments (the segment that utilizes net-based customer service and the segment that does not) are analyzed in the Stackelberg leader-follower model of competition between the firms. We find that an increase in adoption of net-based customer service by the customer base is not always desirable for firms. With low effectiveness in enhancing customer loyalty, firms prefer a high level of customer adoption of net-based customer service, because an increase in adoption rate decreases competition and increases profits. A firm in an industry where net-based customer service is highly effective loyalty mechanism, on the other hand, prefers a low level of adoption by customers.

The Effect of Herding Behavior and Perceived Usefulness on Intention to Purchase e-Learning Content: Comparison Analysis by Purchase Experience (무리행동과 지각된 유용성이 이러닝 컨텐츠 구매의도에 미치는 영향: 구매경험에 의한 비교분석)

  • Yoo, Chul-Woo;Kim, Yang-Jin;Moon, Jung-Hoon;Choe, Young-Chan
    • Asia pacific journal of information systems
    • /
    • v.18 no.4
    • /
    • pp.105-130
    • /
    • 2008
  • Consumers of e-learning market differ from those of other markets in that they are replaced in a specific time scale. For example, e-learning contents aimed at highschool senior students cannot be consumed by a specific consumer over the designated period of time. Hence e-learning service providers need to attract new groups of students every year. Due to lack of information on products designed for continuously emerging consumers, the consumers face difficulties in making rational decisions in a short time period. Increased uncertainty of product purchase leads customers to herding behaviors to obtain information of the product from others and imitate them. Taking into consideration of these features of e-learning market, this study will focus on the online herding behavior in purchasing e-learning contents. There is no definite concept for e-learning. However, it is being discussed in a wide range of perspectives from educational engineering to management to e-business etc. Based upon the existing studies, we identify two main view-points regarding e-learning. The first defines e-learning as a concept that includes existing terminologies, such as CBT (Computer Based Training), WBT (Web Based Training), and IBT (Internet Based Training). In this view, e-learning utilizes IT in order to support professors and a part of or entire education systems. In the second perspective, e-learning is defined as the usage of Internet technology to deliver diverse intelligence and achievement enhancing solutions. In other words, only the educations that are done through the Internet and network can be classified as e-learning. We take the second definition of e-learning for our working definition. The main goal of this study is to investigate what factors affect consumer intention to purchase e-learning contents and to identify the differential impact of the factors between consumers with purchase experience and those without the experience. To accomplish the goal of this study, it focuses on herding behavior and perceived usefulness as antecedents to behavioral intention. The proposed research model in the study extends the Technology Acceptance Model by adding herding behavior and usability to take into account the unique characteristics of e-learning content market and e-learning systems use, respectively. The current study also includes consumer experience with e-learning content purchase because the previous experience is believed to affect purchasing intention when consumers buy experience goods or services. Previous studies on e-learning did not consider the characteristics of e-learning contents market and the differential impact of consumer experience on the relationship between the antecedents and behavioral intention, which is the target of this study. This study employs a survey method to empirically test the proposed research model. A survey questionnaire was developed and distributed to 629 informants. 528 responses were collected, which consist of potential customer group (n = 133) and experienced customer group (n = 395). The data were analyzed using PLS method, a structural equation modeling method. Overall, both herding behavior and perceived usefulness influence consumer intention to purchase e-learning contents. In detail, in the case of potential customer group, herding behavior has stronger effect on purchase intention than does perceived usefulness. However, in the case of shopping-experienced customer group, perceived usefulness has stronger effect than does herding behavior. In sum, the results of the analysis show that with regard to purchasing experience, perceived usefulness and herding behavior had differential effects upon the purchase of e-learning contents. As a follow-up analysis, the interaction effects of the number of purchase transaction and herding behavior/perceived usefulness on purchase intention were investigated. The results show that there are no interaction effects. This study contributes to the literature in a couple of ways. From a theoretical perspective, this study examined and showed evidence that the characteristics of e-learning market such as continuous renewal of consumers and thus high uncertainty and individual experiences are important factors to be considered when the purchase intention of e-learning content is studied. This study can be used as a basis for future studies on e-learning success. From a practical perspective, this study provides several important implications on what types of marketing strategies e-learning companies need to build. The bottom lines of these strategies include target group attraction, word-of-mouth management, enhancement of web site usability quality, etc. The limitations of this study are also discussed for future studies.

Characteristics of Methicillin-resistant Staphylococcus aureus Nasal Colonization Among Neonatal Unit Staff and Infection Control Measures (일개 병원 신생아실 근무 의료인에서 시행한 비강 내 MRSA 집락의 특성 및 전파예방에 관한 보고)

  • Kim, Dong Hwan;Kim, Sun Mi;Park, Ji Young;Cho, Eun Young;Choi, Chang Hee
    • Pediatric Infection and Vaccine
    • /
    • v.16 no.2
    • /
    • pp.131-141
    • /
    • 2009
  • Purpose : In February 2007, an outbreak of methicillin-resistant Staphylococcus aureus (MRSA) skin and soft tissue infections occurred in two newborns in the neonatal unit of Sahmyook Seoul Hospital. We performed this study to investigate the characteristics of MRSA nasal carriage among neonatal unit staffs and the effective infection control measures. Methods : Nasal swab specimens were obtained from the neonatal unit staff for the presence of MRSA. MRSA-colonized staffs were offered decolonization therapy with oral trimethoprim-sulfamethoxazole or 2% mupirocin ointment. Every 2-4months after decolonizaton, repeat nasal swab specimens were obtained. Also, samples from the neonatal unit environment and room air were collected. Results : Successful decolonization was achieved in 92% of the cases in 2 weeks after decolonization therapy, but most of the staffs were recolonized after several months. The nature of antibiotic susceptibility was changed from multi-drugsusceptible to multi-drug-resistant. The most frequently contaminated objects were dressing carts, computer keyboards, bassinets and washbowls. In environmental cultures using the settle microbe count method, the colony counts were decreased significantly at the last study period compared with the first study period in the neonatal room, breastfeeding room, service room, and dressing room (P <0.05). Conclusion : Effective control of sustained MRSA transmission within an institution may require prompt identification, treatment, and monitoring of colonized and/or infected staffs. However, nasal decolonization therapy may induce multi-drugresistant MRSA infection and had no effect on decreasing the MRSA nasal carriage rate in our study. Other factors might be more important, such as improving staff education, increasing hand hygiene practices, and environmental sterilization for controlling MRSA infections.

  • PDF

Korean athlete's recognition of sports dentistry and condition of teeth wear (한국 운동선수의 스포츠 치의학에 대한 인지도 및 치아교모상태에 관한 연구)

  • Lee, Sung-Bok;Choi, Dae-Gyun;Han, Kwang-Heung
    • Journal of Dental Rehabilitation and Applied Science
    • /
    • v.18 no.4
    • /
    • pp.235-249
    • /
    • 2002
  • This study was accompolished to analyze and compare the number and area of the occlusal contact points in healthy volunteers and athletes with normal occlusion. Before the study, 89 athletes(sports career:8.6 years, average age 20) at Kyung Hee University were selected, and survey was accomplished for athlete's recognition about sports dentistry. For this study, 15 athletes(13 amles and 2 females with average age 20) and 21 healthy volunteers(14 mles and 7 females with average age 20.09) at Kyung Hee University were selected. The visual display acquired by scanning of occlusal record in maximal intercuspation was converted into 16 gray value image. Then, using computer program(J & Lee Occlusal Analyser), the pixel which was in definite range of the gray value was recognized, and the numbers of recognized pixel were calculated to area. The results were as follows : (1) On the survey about sports dentistry, 28% of 89 athletes didn't agree that human occlusion may be important, and 30% didn't have any idea of the influence of human occlusion during their sports activities. (2) The average numbers of total occlusal contact points were 31.05 in control group, and 34.67 in athlete group. The average area of total occlusal contacts was $100.25mm^2$ in control group, and $127.78mm^2$ in athlete group. (3) In control group, the average numbers of occlusal contact points were revealed in order as follows; the first molar(8.48), the second molar(8.24), the second premolar(4.71), the lateral incisor(2.90), the first premor(2.43), the central incisor(2.19), and the canine(2.1). The least average in canine(2.1) was similar to the average(2.19) in central incisor and (2.09) in lateral incisor. In athlete group, the average numbers of occlusal contact points were revealed in order as follows; the first molar(8.87), the second molar(8.47), the second premolar(5.60), the canine(3.80), the lateral incisor(3.33), the first premolar(2.67), and the central incisor(1.93). (4) In control group, the average areas of occlusal contact surface were revealed in order as follows; the first molar($39.47mm^3$), the second molar($37.54mm^3$), the second premolar($9.54mm^3$) the first premolar($6.18mm^3$), canine($3.49mm^3$), the central incisor($2.76mm^3$), and the lateral incisor($1.28mm^3$). In athlete group, the average areas of occlusal contact surface were revealed in order as follows; the first molar($44.11mm^3$), the second molar($40.69mm^3$), the second premolar($16.50mm^3$), the first premolar($9.39mm^3$), the canine($5.08mm^3$), the lateral incisor($3.7mm^3$), and the central incisor($2.25mm^3$). (5). With aging in both control and athlete group, there was a decreasing tendancy in average number of occlusal contact point, and was an increasing tendancy in average area of occlusal contact surface. In comparison at each age, both the numbers and area of occlusal contact were greater in athlete group than in control group. It was not significant in the numbers of occlusal contact points beween athlete and control group(p>0.1), but significant in the area of occlusal contact surface(p<0.05). (6) In comparision as to the kind of sports(Gymnastics:2, Rugby:3, Soccor:5, Ice hocky:5), the numbers of occlusal contact points were the most in ice hocky, and the area of occlusal contact surface was the greatest in gymnastics. With increasing a career in athlete group, there was a decreasing tendancy in average numbers of occlusal contact points, and was an increasing tendancy in average area of occlusal contact surface.

A Proposed Algorithm and Sampling Conditions for Nonlinear Analysis of EEG (뇌파의 비선형 분석을 위한 신호추출조건 및 계산 알고리즘)

  • Shin, Chul-Jin;Lee, Kwang-Ho;Choi, Sung-Ku;Yoon, In-Young
    • Sleep Medicine and Psychophysiology
    • /
    • v.6 no.1
    • /
    • pp.52-60
    • /
    • 1999
  • Objectives: With the object of finding the appropriate conditions and algorithms for dimensional analysis of human EEG, we calculated correlation dimensions in the various condition of sampling rate and data aquisition time and improved the computation algorithm by taking advantage of bit operation instead of log operation. Methods: EEG signals from 13 scalp lead of a man were digitized with A-D converter under the condition of 12 bit resolution and 1000 Hertz of sampling rate during 32 seconds. From the original data, we made 15 time series data which have different sampling rate of 62.5, 125, 250, 500, 1000 hertz and data acqusition time of 10, 20, 30 second, respectively. New algorithm to shorten the calculation time using bit operation and the Least Trimmed Squares(LTS) estimator to get the optimal slope was applied to these data. Results: The values of the correlation dimension showed the increasing pattern as the data acquisition time becomes longer. The data with sampling rate of 62.5 Hz showed the highest value of correlation dimension regardless of sampling time but the correlation dimension at other sampling rates revealed similar values. The computation with bit operation instead of log operation had a statistically significant effect of shortening of calculation time and LTS method estimated more stably the slope of correlation dimension than the Least Squares estimator. Conclusion: The bit operation and LTS methods were successfully utilized to time-saving and efficient calculation of correlation dimension. In addition, time series of 20-sec length with sampling rate of 125 Hz was adequate to estimate the dimensional complexity of human EEG.

  • PDF

Research about CAVE Practical Use Way Through Culture Content's Restoration Process that Utilize CAVE (가상현실시스템(CAVE)을 활용한 문화 Content의 복원 과정을 통한 CAVE활용 방안에 대한 연구)

  • Kim, Tae-Yul;Ryu, Seuc-Ho;Hur, Yung-Ju
    • Journal of Korea Game Society
    • /
    • v.4 no.3
    • /
    • pp.11-20
    • /
    • 2004
  • Virtual reality that we have seen from the movies in 80's and 90's is hawing near based on the rapid progress of science together with a computer technology. Various virtual reality system developments (such as VRML, HMD FishTank, Wall Type, CAVE Type, and so on) and the advancement of those systems make for the embodiment of virtual reality that gives more sense of the real. Virtual reality is so immersive that makes people feel like they are in that environment and enable them to manipulate without experiencing the environment at first hand that is hard to experience in reality. Virtual reality can be applied to the spheres, such as education, high-level programming, remote control, surface exploration of the remote satellite, analysis of exploration data, scientific visualization, and so on. For some connote examples, there are training of a tank and an aeroplane operation, fumiture layout design, surgical operation practice, game, and so on. In these virtual reality systems, the actual operation of the human participant and virtual workspace are connected each other to the hardware that stimulates the five senses adequately to lend the sense of the immersion. There are still long way to go, however, before long it will be possible to have the same feeling in the virtual reality as human being can have by further study and effort. In this thesis, the basic definition, the general idea, and the kind of virtual reality were discussed. Especially, CAVE typed in reality that is highly immersive was analyzed in definition, and then the method of VR programming and modeling in the virtual reality system were suggested by showing the restoration process of Kyongbok Palace (as the content of the original form of the culture) that was made by KISTI(Korea Institute of Science and Technology Information) in 2003 through design process in virtual reality system. Through these processes, utilization of the immersive virtual reality system was discussed and how to take advantage of this CAVE typed virtual reality system at the moment was studied. In closing the problems that had been exposed in the process of the restoration of the cultural property were described and the utilization plan of the virtual reality system was suggested.

  • PDF

An Experimental Study on Establishing Criteria of Gripping Work in Construction Site (건설 현장 악력 작업안전 기준 설정에 관한 실험적 연구)

  • 손기상;이인홍;최만진;안병준
    • Journal of the Korean Society of Safety
    • /
    • v.10 no.3
    • /
    • pp.81-95
    • /
    • 1995
  • Now, safety assurance in construction sites should be accomplished by its own organization rather than control of the code or government. It is believed that the safety assurance can be considerably improved by a lecture or an education using the existing theories or literatures up to now, but it is thought that fundamental safety assurance we not able to be accomplished without developing safety devices '||'&'||' equipment or taking fundamental measures, based on the result analyzed from workers behaviors. There are various behaviors of the workers showed in construction site, but only tests for hammerusing works such as form, re-bar, stone workers directly related to the grip strength are mainly performed, investigated and measured here for the study. The above works are similar to power grip, 7th picture on seven items which are categorized for hand grip types(Ammermin 1956 ; Jones ; Kobrick 1958). Measurements of grip strength are commonly taken in anthropometric surveys. They are easy to administer but unfortunately it is rather dubious whether they yield any data that are of interest to the engineer. Very fewer controls of tools are grasped and squeesed studies showed very little overall correlation between grip strength and other measures of bodily strength (Laubach, Kromer, and Thordsen 1972), but hammer-using work which is practically progressed in construction site are mainly influenced with grip strength. According to the investigation on work measurement, it is shown that 77% of form worker are using hammer to be related to grip strength. In this study, it is particularly noticed that wearing safety gloves in construction site is required for workers safety but 20% difference between grip strength with safety gloves and without ones are commonly neglected in the site(Fig. 1). Nevertheless, safety operation with consideration of the above 20% difference is not considered in the construction site. Factors of age, kinds of work, working time, with or without safety gloves are in vestigated '||'&'||' collected at the sites for this study. Test, not at each working hour but at 14 : 00 when the almost all of the workers think the most tired, resulting from the questionaires, also when it is shown on the research report has been performed and compared for main kinds of works : form '||'&'||' re-bar work. Tests were performed with both left SE rightand of the workers simultaneously in construction site using Rand Dynamometer(Model 78010, Lafayette Instrument Co., Indiana, U.S.A) by reading grip strength on the gauge while they are pulling, and then by interviewing on their ages, works, experiences and etc., directly. The above tests have been performed for the dates of 15th march-26th May '95 with consideration of site condition. And even if various factors of ambient temperature on the testing date, working condition, individual worker's habit and worker's condition of the previous ate are concerned with the study. Those are considered as constants in this study. Samples are formwork 53, rebar 62, electrician 5, plumber 4, welding 1 from D construction Co., Ltd, ; formwork 12, re-bar 5, electrician 2, from S construction Co., Ltd, , formwork 78, re-bar 18, plumber 31, electrician 13, labor 48, plumber 31, plasterer 15, concrete placer 6, water proof worker 3, maisony 5 from B construction Co., Ltd. As In the previously mentioned, main aspect to be investigated in this study will be from '||'&'||' re-bar work because grip strength will be directly applied to these two kinds of works ; form '||'&'||' re-bar work, eventhough there are total 405 samples taken. It is thought that a frequency of accident occurrence will be mainly two work postures "looking up '||'&'||' looking down" to be mainly sorted, but this factor is not clarified in this study because It will be needed a lot of work more. Tests has been done at possible large scale of horizontally work-extended sites within one hour in order to prevent or decrease errors '||'&'||' discrepancies from time lag of the test. Additionally, the statistical package computer program SPSS PC+has been used for the study.

  • PDF

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.