• 제목/요약/키워드: implementation Analysis

검색결과 6,470건 처리시간 0.036초

An Analysis of Changes in Social Issues Related to Patient Safety Using Topic Modeling and Word Co-occurrence Analysis (토픽 모델링과 동시출현 단어 분석을 활용한 환자안전 관련 사회적 이슈의 변화)

  • Kim, Nari;Lee, Nam-Ju
    • The Journal of the Korea Contents Association
    • /
    • 제21권1호
    • /
    • pp.92-104
    • /
    • 2021
  • This study aims to analyze online news articles to identify social issues related to patient safety and compare the changes in these issues before and after the implementation of the Patient Safety Act. This study performed text mining through the R program, wherein 7,600 online news articles were collected from January 1, 2010, to March 5, 2020, and examined using keyword analysis, topic modeling, and word co-occurrence network analysis. A total of 2,609 keywords were categorized into 8 topics: "medical practice", "medical personnel", "infection and facilities", "comprehensive nursing service", "medicine and medical supplies", "system development and establishment for improvement", "Patient Safety Act" and "healthcare accreditation". The study revealed that keywords such as "patient safety awareness", "infection control" and "healthcare accreditation" appeared before the implementation of the Patient Safety Act. Meanwhile, keywords such as "patient safety culture". and "administration and injection" appeared after the act's implementation with improved ranking of importance pertaining to nursing-related terminology. Interest in patient safety has increased in the medical community as well as among the public. In particular, nursing plays an important role in improving patient safety. Therefore, the recognition of patient safety as a core competency of nursing and the persistent education of the public are vital and inevitable.

A Study on the Digital Restoration Policy Implementation Process of Donuimun Gate (돈의문의 디지털 복원 정책집행 과정에 관한 연구)

  • CHOE Yoosun
    • Korean Journal of Heritage: History & Science
    • /
    • 제56권2호
    • /
    • pp.246-262
    • /
    • 2023
  • This study analyzed policy implementation factors focusing on how Donuimun, a demolished cultural heritage, was digitally restored and the policy implementation process of Donuimun Gate restoration. Through this, the characteristics of the implementation process of the digital Donuimun Gate restoration policy promoted by public-private multilateral collaboration were examined and implications were sought for how institutions with different interests solved problems and collaborated in the implementation process. The research method was focused on policy implementation factors including policy executive factors, policy content factors, policy resource factors, and policy environment factors, and the process was analyzed for each detailed component. Along with literature analysis, in-depth interviews were conducted with participants in policy implementation. As a result of the study, first, it was found in the policy executive factor that the quick decision-making leadership of the policy manager and the flexible attitude of the person in charge of the government agency had a positive effect on preventing conflicts between different interest groups. Second, in terms of policy content, establishing a common goal that everyone can accept and moving forward consistently gave trust and created synergy. Third, in the policy implementation resource factor, the importance of the budget was emphasized. Finally, as an environmental factor for policy implementation, the opening of 5G mobile communication for the first time along with the emergence of the Fourth Industrial Revolution at the time of policy implementation acted as a timely factor. The digital Donuimun Gate was the first case of restoring a lost cultural heritage with AR and VR, and received attention and support from the mass media and the public. This also shows that digital restoration can be a model case that can be a solution without conflicts with local residents where cultural heritages are located or conflicts between stakeholders in the preservation and restoration of real objects.

A case study about the user's degree of satisfaction after ERP Implementation (ERP 구축 후 사용자만족도에 관한 사례연구)

  • Moon, Chan-Oh;Kim, Chang-Eun
    • Journal of the Korea Safety Management & Science
    • /
    • 제10권2호
    • /
    • pp.175-185
    • /
    • 2008
  • The research it sees the many enterprises ERP system Go-Live after, which fail are appearing to are actuality plentifully with continuous change management insufficiency. One objective of the research it sees the ERP system effect leads simple with successful ERP system embodiment end me, the thing knows, the successful change management to ERP system Go-Live after and there is report that the effect appears. The ERP system Go-Live after the domestic enterprise 2 year above is analysis about the user's degree of satisfaction.

Implementation of HMM-Based Speech Recognizer Using TMS320C6711 DSP

  • Bae Hyojoon;Jung Sungyun;Bae Keunsung
    • MALSORI
    • /
    • 제52호
    • /
    • pp.111-120
    • /
    • 2004
  • This paper focuses on the DSP implementation of an HMM-based speech recognizer that can handle several hundred words of vocabulary size as well as speaker independency. First, we develop an HMM-based speech recognition system on the PC that operates on the frame basis with parallel processing of feature extraction and Viterbi decoding to make the processing delay as small as possible. Many techniques such as linear discriminant analysis, state-based Gaussian selection, and phonetic tied mixture model are employed for reduction of computational burden and memory size. The system is then properly optimized and compiled on the TMS320C6711 DSP for real-time operation. The implemented system uses 486kbytes of memory for data and acoustic models, and 24.5 kbytes for program code. Maximum required time of 29.2 ms for processing a frame of 32 ms of speech validates real-time operation of the implemented system.

  • PDF

Implementation of a Web-Based Intelligent Decision Support System for Apartment Auction (아파트 경매를 위한 웹 기반의 지능형 의사결정지원 시스템 구현)

  • Na, Min-Yeong;Lee, Hyeon-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • 제6권11호
    • /
    • pp.2863-2874
    • /
    • 1999
  • Apartment auction is a system that is used for the citizens to get a house. This paper deals with the implementation of a web-based intelligent decision support system using OLAP technique and data mining technique for auction decision support. The implemented decision support system is working on a real auction database and is mainly composed of OLAP Knowledge Extractor based on data warehouse and Auction Data Miner based on data mining methodology. OLAP Knowledge Extractor extracts required knowledge and visualizes it from auction database. The OLAP technique uses fact, dimension, and hierarchies to provide the result of data analysis by menas of roll-up, drill-down, slicing, dicing, and pivoting. Auction Data Miner predicts a successful bid price by means of applying classification to auction database. The Miner is based on the lazy model-based classification algorithm and applies the concepts such as decision fields, dynamic domain information, and field weighted function to this algorithm and applies the concepts such as decision fields, dynamic domain information, and field weighted function to this algorithm to reflect the characteristics of auction database.

  • PDF

A Secure Social Networking Site based on OAuth Implementation

  • Brian, Otieno Mark;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • 제19권2호
    • /
    • pp.308-315
    • /
    • 2016
  • With the advancement in the area of cloud storage services as well as a tremendous growth of social networking sites, permission for one web service to act on the behalf of another has become increasingly vital as social Internet services such as blogs, photo sharing, and social networks. With this increased cross-site media sharing, there is a upscale of security implications and hence the need to formulate security protocols and considerations. Recently, OAuth, a new protocol for establishing identity management standards across services, is provided as an alternative way to share the user names and passwords, and expose personal information to attacks against on-line data and identities. Moreover, OwnCloud provides an enterprise file synchronizing and sharing that is hosted on user's data center, on user's servers, using user's storage. We propose a secure Social Networking Site (SSN) access based on OAuth implementation by combining two novel concepts of OAuth and OwnCloud. Security analysis and performance evaluation are given to validate the proposed scheme.

Analysis of School Autonomy Policy based on the System Thinking (시스템 사고에 의한 학교 자율화 정책 분석)

  • Park, Soo-Jung;Kwon, Soon-Hyoung
    • Korean System Dynamics Review
    • /
    • 제15권1호
    • /
    • pp.5-27
    • /
    • 2014
  • The purpose of this study is to analyze the school autonomy policy based on the system thinking perspective using causal loop diagrams. School autonomy was the main educational policy concerning school domain during the last government and was the instrument for school-based management, but it was not implemented effectively in site. The school autonomy policy practically disappeared as an explicit policy agenda in the current government. This study displays causal loop diagrams about the policy's logic and contents of school autonomy, in terms of curriculum, human resource management, and a supportive system. The causal loop diagrams depicting the implementation of the school autonomy policy are suggested concerning excessive enforcement and the confirmative mechanism for policy implementation. The conclusion provides some research implications and future directions.

  • PDF

Development of Efficient Dynamic Bandwidth Allocation Algorithm for XGPON

  • Han, Man Soo;Yoo, Hark;Lee, Dong Soo
    • ETRI Journal
    • /
    • 제35권1호
    • /
    • pp.18-26
    • /
    • 2013
  • This paper proposes an efficient bandwidth utilization (EBU) algorithm that utilizes the unused bandwidth in dynamic bandwidth allocation (DBA) of a 10-gigabit-capable passive optical network (XGPON). In EBU, an available byte counter of a queue can be negative and the unused remainder of an available byte counter can be utilized by the other queues. In addition, EBU uses a novel polling scheme to collect the requests of queues as soon as possible. We show through analysis and simulations that EBU improves performance compared to that achieved with existing methods. In addition, we describe the hardware implementation of EBU. Finally we show the test results of the hardware implementation of EBU.

The Analysis of New Video Conference System Based Secure Authentication

  • Jung Yong Deug;Kim Gil Choon;Jun Moon Seog
    • Proceedings of the IEEK Conference
    • /
    • 대한전자공학회 2004년도 학술대회지
    • /
    • pp.600-607
    • /
    • 2004
  • The paper describes the implementation of the video conferencing system using public key infrastructure which is used for user authentication and media stream encryption. Using public key infrastructure, we are able to reinforce the authentication for conference participant and block several malicious hacking while protecting conference control information. The paper shows the implementation of the transportation layer secure protocol in conformity with Korea public key authentication algorithm standard and symmetric key encryption algorithm (RC2, SEED, DES and 3DES) for media stream encryption. The feature of the paper is transportation layer secure protocol that is implemented for protection of information on a user authentication and video conference and the media streaming encryption algorithm also can be envisioned with another block encryption algorithm. The key for media streaming encryption may be safely distributed by the transportation layer secure protocol.

  • PDF

Design and Implementation of Korean Tet-to-Speech System (다이폰을 이용한 한국어 문자-음성 변환 시스템의 설계 및 구현)

  • 정준구
    • Proceedings of the Acoustical Society of Korea Conference
    • /
    • 한국음향학회 1994년도 제11회 음성통신 및 신호처리 워크샵 논문집 (SCAS 11권 1호)
    • /
    • pp.91-94
    • /
    • 1994
  • This paper is a study on the design and implementation of the Korean Tet-to-Speech system. In this paper, parameter symthesis method is chosen for speech symthesis method and PARCOR coeffient, one of the LPC analysis, is used as acoustic parameter, We use a diphone as synthesis unit, it include a basic naturalness of human speech. Diphone DB is consisted of 1228 PCM files. LPC synthesis method has defect that decline clearness of synthesis speech, during synthesizing unvoiced sound In this paper, we improve clearness of synthesized speech, using residual signal as ecitation signal of unvoiced sound. Besides, to improve a naturalness, we control the prosody of synthesized speech through controlling the energy and pitch pattern. Synthesis system is implemented at PC/486 and use a 70Hz-4.5KHz band pass filter for speech imput/output, amplifier and TMS320c30 DSP board.

  • PDF