• Title/Summary/Keyword: computer science education

Search Result 2,726, Processing Time 0.025 seconds

A Web-based Internet Program for Nutritional Counseling and Diet management of Patient with Diabetes Mellitus (당뇨병 환자의 웹기반 식사관리 및 영양상담 프로그램)

  • 한지숙;정지혜
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.33 no.1
    • /
    • pp.114-122
    • /
    • 2004
  • The purpose of this study was to develop a web-based internet program for nutritional counseling and diet management of patient with diabetes mellitus. The program consisted of four parts according to their functions and contents. The first part explained the metabolism of glucose and mechanism of insulin and insulin receptor expressed by flash 6.0, and defined the diabetes mellitus. The second part is to assess the general health status such as body weight, obesity index, basal metabolic rate and total energy requirement by the input of age, sex, height, weight and degree of activity. This part also provides tlne patient with menu lists and one day menu suitable to his weight and activity, and offers the information for food selection, snacks, convenience foods, dine-out, behavioral modification, cooking methods, food exchange lists, dietary education using buffet, and information on energy and nutrients of foods and drinks, and top 20 foods classified by nutrients. The third part is designed to investigate dietary history of patient, that is, to find out his inappropriate dietary habit and give him some suggestions for appropriate dietary behavior. This part also offers on-line counseling, follow-up management and frequently asked questions. The fourth part is evaluating their energy and nutrients intake by comparing with recommended dietary allowance for Koreans or standardized data for patient with diabetes mellitus. In this part, it is also analyzing energy and nutrients of food consumed by food group and meals, and evaluating the status of nutrient intake. These results are finally displayed as tabular forms and graphical forms on the computer screen. Therefore it is expected that the web-based internet program developed in this study will play a role in their health promotion as widely using by diabetic patients.

Korean athlete's recognition of sports dentistry and condition of teeth wear (한국 운동선수의 스포츠 치의학에 대한 인지도 및 치아교모상태에 관한 연구)

  • Lee, Sung-Bok;Choi, Dae-Gyun;Han, Kwang-Heung
    • Journal of Dental Rehabilitation and Applied Science
    • /
    • v.18 no.4
    • /
    • pp.235-249
    • /
    • 2002
  • This study was accompolished to analyze and compare the number and area of the occlusal contact points in healthy volunteers and athletes with normal occlusion. Before the study, 89 athletes(sports career:8.6 years, average age 20) at Kyung Hee University were selected, and survey was accomplished for athlete's recognition about sports dentistry. For this study, 15 athletes(13 amles and 2 females with average age 20) and 21 healthy volunteers(14 mles and 7 females with average age 20.09) at Kyung Hee University were selected. The visual display acquired by scanning of occlusal record in maximal intercuspation was converted into 16 gray value image. Then, using computer program(J & Lee Occlusal Analyser), the pixel which was in definite range of the gray value was recognized, and the numbers of recognized pixel were calculated to area. The results were as follows : (1) On the survey about sports dentistry, 28% of 89 athletes didn't agree that human occlusion may be important, and 30% didn't have any idea of the influence of human occlusion during their sports activities. (2) The average numbers of total occlusal contact points were 31.05 in control group, and 34.67 in athlete group. The average area of total occlusal contacts was $100.25mm^2$ in control group, and $127.78mm^2$ in athlete group. (3) In control group, the average numbers of occlusal contact points were revealed in order as follows; the first molar(8.48), the second molar(8.24), the second premolar(4.71), the lateral incisor(2.90), the first premor(2.43), the central incisor(2.19), and the canine(2.1). The least average in canine(2.1) was similar to the average(2.19) in central incisor and (2.09) in lateral incisor. In athlete group, the average numbers of occlusal contact points were revealed in order as follows; the first molar(8.87), the second molar(8.47), the second premolar(5.60), the canine(3.80), the lateral incisor(3.33), the first premolar(2.67), and the central incisor(1.93). (4) In control group, the average areas of occlusal contact surface were revealed in order as follows; the first molar($39.47mm^3$), the second molar($37.54mm^3$), the second premolar($9.54mm^3$) the first premolar($6.18mm^3$), canine($3.49mm^3$), the central incisor($2.76mm^3$), and the lateral incisor($1.28mm^3$). In athlete group, the average areas of occlusal contact surface were revealed in order as follows; the first molar($44.11mm^3$), the second molar($40.69mm^3$), the second premolar($16.50mm^3$), the first premolar($9.39mm^3$), the canine($5.08mm^3$), the lateral incisor($3.7mm^3$), and the central incisor($2.25mm^3$). (5). With aging in both control and athlete group, there was a decreasing tendancy in average number of occlusal contact point, and was an increasing tendancy in average area of occlusal contact surface. In comparison at each age, both the numbers and area of occlusal contact were greater in athlete group than in control group. It was not significant in the numbers of occlusal contact points beween athlete and control group(p>0.1), but significant in the area of occlusal contact surface(p<0.05). (6) In comparision as to the kind of sports(Gymnastics:2, Rugby:3, Soccor:5, Ice hocky:5), the numbers of occlusal contact points were the most in ice hocky, and the area of occlusal contact surface was the greatest in gymnastics. With increasing a career in athlete group, there was a decreasing tendancy in average numbers of occlusal contact points, and was an increasing tendancy in average area of occlusal contact surface.

Research about CAVE Practical Use Way Through Culture Content's Restoration Process that Utilize CAVE (가상현실시스템(CAVE)을 활용한 문화 Content의 복원 과정을 통한 CAVE활용 방안에 대한 연구)

  • Kim, Tae-Yul;Ryu, Seuc-Ho;Hur, Yung-Ju
    • Journal of Korea Game Society
    • /
    • v.4 no.3
    • /
    • pp.11-20
    • /
    • 2004
  • Virtual reality that we have seen from the movies in 80's and 90's is hawing near based on the rapid progress of science together with a computer technology. Various virtual reality system developments (such as VRML, HMD FishTank, Wall Type, CAVE Type, and so on) and the advancement of those systems make for the embodiment of virtual reality that gives more sense of the real. Virtual reality is so immersive that makes people feel like they are in that environment and enable them to manipulate without experiencing the environment at first hand that is hard to experience in reality. Virtual reality can be applied to the spheres, such as education, high-level programming, remote control, surface exploration of the remote satellite, analysis of exploration data, scientific visualization, and so on. For some connote examples, there are training of a tank and an aeroplane operation, fumiture layout design, surgical operation practice, game, and so on. In these virtual reality systems, the actual operation of the human participant and virtual workspace are connected each other to the hardware that stimulates the five senses adequately to lend the sense of the immersion. There are still long way to go, however, before long it will be possible to have the same feeling in the virtual reality as human being can have by further study and effort. In this thesis, the basic definition, the general idea, and the kind of virtual reality were discussed. Especially, CAVE typed in reality that is highly immersive was analyzed in definition, and then the method of VR programming and modeling in the virtual reality system were suggested by showing the restoration process of Kyongbok Palace (as the content of the original form of the culture) that was made by KISTI(Korea Institute of Science and Technology Information) in 2003 through design process in virtual reality system. Through these processes, utilization of the immersive virtual reality system was discussed and how to take advantage of this CAVE typed virtual reality system at the moment was studied. In closing the problems that had been exposed in the process of the restoration of the cultural property were described and the utilization plan of the virtual reality system was suggested.

  • PDF

Development Plan of Guard Service According to the LBS Introduction (경호경비 발전전략에 따른 위치기반서비스(LBS) 도입)

  • Kim, Chang-Ho;Chang, Ye-Chin
    • Korean Security Journal
    • /
    • no.13
    • /
    • pp.145-168
    • /
    • 2007
  • Like to change to the information-oriented society, the guard service needs to be changed. The communication and hardware technology develop rapidly and according to the internet environment change from cable to wireless, modern person can approach every kinds of information service using wireless communication machinery which can be moved such as laptop, computer, PDA, mobile phone and so on, LBS field which presents the needing information and service at anytime, anywhere, and which kinds of device expands it's territory all the more together with the appearance of ubiquitous concept. LBS use the chip in the mobile phone and make to confirm the position of the joining member anytime within several tens centimeters to hundreds meters. LBS can be divided by the service method which use mobile communication base station and apply satellite. Also each service type can be divided by location chase service, public safe service, location based information service and so on, and it is the part which will plan with guard service development. It will be prospected 8.460 hundred million in 2005 years and 16.561 hundred million in 2007 years scale of market. Like this situation, it can be guessed that the guard service has to change rapidly according to the LBS application. Study method chooses documentary review basically, and at first theory method mainly uses the second documentary examination which depends on learned journal and independent volume which published in the inside and the outside of the country, internet searching, other kinds of all study report, statute book, thesis which published at public order research institute of the Regional Police Headquarter, police operation data, data which related with statute, documents and statistical data which depend on private guard company and so on. So the purpose of the study gropes in accordance with the LBS application, and present the problems and improvement method to analyze indirect of manager side of operate guard adaptation service of LBS, government side which has to activate LBS, systematical, operation management, manpower management and education training which related with guard course side which has to study and educate in accordance with application of the new guard service, as well as intents to excellent quality service of guard.

  • PDF

A Study on Public Interest-based Technology Valuation Models in Water Resources Field (수자원 분야 공익형 기술가치평가 시스템에 대한 연구)

  • Ryu, Seung-Mi;Sung, Tae-Eung
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.3
    • /
    • pp.177-198
    • /
    • 2018
  • Recently, as economic property it has become necessary to acquire and utilize the framework for water resource measurement and performance management as the property of water resources changes to hold "public property". To date, the evaluation of water technology has been carried out by feasibility study analysis or technology assessment based on net present value (NPV) or benefit-to-cost (B/C) effect, however it is not yet systemized in terms of valuation models to objectively assess an economic value of technology-based business to receive diffusion and feedback of research outcomes. Therefore, K-water (known as a government-supported public company in Korea) company feels the necessity to establish a technology valuation framework suitable for technical characteristics of water resources fields in charge and verify an exemplified case applied to the technology. The K-water evaluation technology applied to this study, as a public interest goods, can be used as a tool to measure the value and achievement contributed to society and to manage them. Therefore, by calculating the value in which the subject technology contributed to the entire society as a public resource, we make use of it as a basis information for the advertising medium of performance on the influence effect of the benefits or the necessity of cost input, and then secure the legitimacy for large-scale R&D cost input in terms of the characteristics of public technology. Hence, K-water company, one of the public corporation in Korea which deals with public goods of 'water resources', will be able to establish a commercialization strategy for business operation and prepare for a basis for the performance calculation of input R&D cost. In this study, K-water has developed a web-based technology valuation model for public interest type water resources based on the technology evaluation system that is suitable for the characteristics of a technology in water resources fields. In particular, by utilizing the evaluation methodology of the Institute of Advanced Industrial Science and Technology (AIST) in Japan to match the expense items to the expense accounts based on the related benefit items, we proposed the so-called 'K-water's proprietary model' which involves the 'cost-benefit' approach and the FCF (Free Cash Flow), and ultimately led to build a pipeline on the K-water research performance management system and then verify the practical case of a technology related to "desalination". We analyze the embedded design logic and evaluation process of web-based valuation system that reflects characteristics of water resources technology, reference information and database(D/B)-associated logic for each model to calculate public interest-based and profit-based technology values in technology integrated management system. We review the hybrid evaluation module that reflects the quantitative index of the qualitative evaluation indices reflecting the unique characteristics of water resources and the visualized user-interface (UI) of the actual web-based evaluation, which both are appended for calculating the business value based on financial data to the existing web-based technology valuation systems in other fields. K-water's technology valuation model is evaluated by distinguishing between public-interest type and profitable-type water technology. First, evaluation modules in profit-type technology valuation model are designed based on 'profitability of technology'. For example, the technology inventory K-water holds has a number of profit-oriented technologies such as water treatment membranes. On the other hand, the public interest-type technology valuation is designed to evaluate the public-interest oriented technology such as the dam, which reflects the characteristics of public benefits and costs. In order to examine the appropriateness of the cost-benefit based public utility valuation model (i.e. K-water specific technology valuation model) presented in this study, we applied to practical cases from calculation of benefit-to-cost analysis on water resource technology with 20 years of lifetime. In future we will additionally conduct verifying the K-water public utility-based valuation model by each business model which reflects various business environmental characteristics.

The Framework of Research Network and Performance Evaluation on Personal Information Security: Social Network Analysis Perspective (개인정보보호 분야의 연구자 네트워크와 성과 평가 프레임워크: 소셜 네트워크 분석을 중심으로)

  • Kim, Minsu;Choi, Jaewon;Kim, Hyun Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.177-193
    • /
    • 2014
  • Over the past decade, there has been a rapid diffusion of electronic commerce and a rising number of interconnected networks, resulting in an escalation of security threats and privacy concerns. Electronic commerce has a built-in trade-off between the necessity of providing at least some personal information to consummate an online transaction, and the risk of negative consequences from providing such information. More recently, the frequent disclosure of private information has raised concerns about privacy and its impacts. This has motivated researchers in various fields to explore information privacy issues to address these concerns. Accordingly, the necessity for information privacy policies and technologies for collecting and storing data, and information privacy research in various fields such as medicine, computer science, business, and statistics has increased. The occurrence of various information security accidents have made finding experts in the information security field an important issue. Objective measures for finding such experts are required, as it is currently rather subjective. Based on social network analysis, this paper focused on a framework to evaluate the process of finding experts in the information security field. We collected data from the National Discovery for Science Leaders (NDSL) database, initially collecting about 2000 papers covering the period between 2005 and 2013. Outliers and the data of irrelevant papers were dropped, leaving 784 papers to test the suggested hypotheses. The co-authorship network data for co-author relationship, publisher, affiliation, and so on were analyzed using social network measures including centrality and structural hole. The results of our model estimation are as follows. With the exception of Hypothesis 3, which deals with the relationship between eigenvector centrality and performance, all of our hypotheses were supported. In line with our hypothesis, degree centrality (H1) was supported with its positive influence on the researchers' publishing performance (p<0.001). This finding indicates that as the degree of cooperation increased, the more the publishing performance of researchers increased. In addition, closeness centrality (H2) was also positively associated with researchers' publishing performance (p<0.001), suggesting that, as the efficiency of information acquisition increased, the more the researchers' publishing performance increased. This paper identified the difference in publishing performance among researchers. The analysis can be used to identify core experts and evaluate their performance in the information privacy research field. The co-authorship network for information privacy can aid in understanding the deep relationships among researchers. In addition, extracting characteristics of publishers and affiliations, this paper suggested an understanding of the social network measures and their potential for finding experts in the information privacy field. Social concerns about securing the objectivity of experts have increased, because experts in the information privacy field frequently participate in political consultation, and business education support and evaluation. In terms of practical implications, this research suggests an objective framework for experts in the information privacy field, and is useful for people who are in charge of managing research human resources. This study has some limitations, providing opportunities and suggestions for future research. Presenting the difference in information diffusion according to media and proximity presents difficulties for the generalization of the theory due to the small sample size. Therefore, further studies could consider an increased sample size and media diversity, the difference in information diffusion according to the media type, and information proximity could be explored in more detail. Moreover, previous network research has commonly observed a causal relationship between the independent and dependent variable (Kadushin, 2012). In this study, degree centrality as an independent variable might have causal relationship with performance as a dependent variable. However, in the case of network analysis research, network indices could be computed after the network relationship is created. An annual analysis could help mitigate this limitation.