• Title/Summary/Keyword: inappropriate behavior

Search Result 129, Processing Time 0.024 seconds

Effect of Weight-Related Concerns and Dietary Behavior on Eating Disorder Risk in Korean Women

  • Kim, Jung-Hyun;Lim, Yun-Sook;Jun, In-Kyung
    • International Journal of Human Ecology
    • /
    • v.9 no.1
    • /
    • pp.97-106
    • /
    • 2008
  • This study investigated the relationships between eating disorder risk, body image perception, weight control, and dietary habits in Korean women. Body shape perception, the Eating Attitude Test (EAT-26) and dietary habit information were collected by a self-administered questionnaire to 373 adult women and the data were analyzed by the Chi-square test. 31.4% of the women were classified in the eating disorder group by a score of over 20 points on the EAT-26. Compared to the normal group, more women in the eating disorder risk group perceived that a thin body shape was the ideal body shape and were dissatisfied with their body shape. This group was also more interested in weight control and more likely to try weight control methods. The eating disorder risk group was more likely to skip meals and snacks than the normal group. In addition, they had a greater appetite and a higher frequency of overeating than the normal group. Over 30% of the Korean women surveyed were categorized at high risk of eating disorders. They were more likely to overestimate body weight and shape and tried to control their weight by inappropriate methods. To prevent eating disorders in adult women, nutrition education programs should incorporate strategies to change inaccurate self-body image and to disseminate information about healthy weight control methods.

Prediction Model for the Microstructure and Properties in Weld Heat Affected Zone: III. Prediction Model for the Austenite Grain Growth Considering the Influence of Initial Austenite Grain Size in Weld HAZ of Precipitates Free Low Alloyed Steel (용접 열영향부 미세조직 및 재질 예측 모델링 : III. 석출물 - Free 저합금강의 초기 오스테나이트 결정립크기의 영향을 고려한 용접 열영향부 오스테나이트 결정립성장 예측 모델)

  • Uhm, Sang-Ho;Moon, Joon-Oh;Jeong, Hong-Chul;Lee, Jong-Bong;Lee, Chang-Hee
    • Journal of Welding and Joining
    • /
    • v.24 no.4
    • /
    • pp.39-49
    • /
    • 2006
  • The austenite grain growth model in low alloyed steel HAZ without precipitates was proposed by analyzing isothermal grain growth behavior. Steels used in this study were designed to investigate the effect of alloying elements. Meanwhile, a systematic procedure was proposed to prevent inappropriate neglect of initial grain size (D0) and misreading both time exponent and activation energy for isothermal grain growth. It was found that the time exponent was almost constant, irrespectively of temperature and alloying elements, and activation energy increased with the addition of alloying elements. From quantification of the effect of alloying elements on the activation energy, an isothermal grain growth model was presented. Finally, combining with the additivity rule, the austenite grain size in the CGHAZ was predicted.

Standardization and Validity study of Korean Nomenclature of NOC (Nursing Outcomes Classification(간호결과 분류체계)의 한글 명명화에 대한 타당성 연구)

  • Park, Hyeoun Ae;Cho, In Sook;Hwang, Jee In;Keun, Hyo Keun
    • Korean Journal of Adult Nursing
    • /
    • v.12 no.2
    • /
    • pp.256-266
    • /
    • 2000
  • The purpose of this study was to develop and test the validity of the standardized Korean nomenclature of Nursing Outcomes Classification (NOC), developed by Johnson & Maas at the University of Iowa. The four phases of the study were: (1) translation of the NOC into Korean by the research team, (2) four nursing professors and eight nurses with various clinical backgrounds reviewed each nomenclature taking into consideration definitions and nursing activities. The modified Delphi method was used to determine the most appropriate nomenclature for each term; (3) Twenty four academic and clinical experts in nursing were given a questionnaire to rate each Korean nomenclature using a 5 point Likert scale ranging from very inappropriate to very appropriate; (4) the team determined the most appropriate Korean nomenclature for each class of the NOC. The mean validity score of 190 items was 4.54, but several nursing outcome had a score lower than 4.0. They included 'adherence behavior(3.3)', 'ambulation : walking(3.57)', 'transfer performance (3.57)', 'caregiving endurance potential(3.57)'.

  • PDF

Analysis on Shock Wave and Sensitivity of Explosives in Through-Bulkhead Initiator (격벽착화기 화약의 충격파와 민감도 분석)

  • Jang, Seung-gyo;Hwang, Jung-min;Baek, Sung-Hyun
    • Journal of the Korean Society of Propulsion Engineers
    • /
    • v.21 no.4
    • /
    • pp.36-43
    • /
    • 2017
  • We studied attenuation characteristics of shock waves induced by a donor charge and the sensitivity of an acceptor for optimal design of a TBI (Through-bulkhead initiator). The attenuation behavior of shock waves was studied by measuring free surface velocity using a VISAR (Velocity Interferometer System for Any Reflector), and the sensitivity of the acceptor explosives was analyzed via SSGT (Small Scale Gap Test). It was found that the acceptor sensitivity obtained by the SSGT may be inappropriate for the design of the small-scale explosive devices such as TBI due to the different shock duration time.

피에조 콘 소산시험을 이용한 압밀계수 추정시 이론해의 선택 및 현장지반의 압밀도 평가

  • 이승래;김영상
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 1998.04a
    • /
    • pp.37-46
    • /
    • 1998
  • Several researchers have developed a number of theoretical time factors to determine the coefficient of consolidation by biezocone excess pore water dissipation test in soft clay deposits. However, depending on the assumptions and analytical techniques, the estimated coefficient of consolidation could be in a considerably wide range even for a specific degree of consolidation. These solutions are obtained from an initial excess porewater pressure distribution which can be determined from. either the cavity expansion theory or the strain path method. The 야ssipation of the initial excess porelvater pressure has been usally simulated by means of linear-uncoupled consolidation analysis and then the dissipation curve is normalized by the initial excess porewater pressure for easy use. However. since there is no guidelines or rules on which method gives the best solution for obtaining the coefficient of consolidation from the dissipation curve, the final selection was only based on engineer's extrience and Judgements. Thus, such an arbitrary selection might be inappropriate for a specific site to characterize the consolidation behavior. In this paper, we reviewed various theoretical time factors and, based on this consideration, we mentioned needs for researches in selecting a specific solution that is compatible for Korean clays. Also we listed some source of errors that can be encountered in the procedure of dissipation analysis.

  • PDF

Development of Design Formulas for Pipe Loops Used in Ships Considering the Structural Characteristics of Curved Portions (곡선부의 구조 특성을 고려한 선박용 파이프 루프 설계식 개발)

  • Park, Chi-Mo;Bae, Byoung-Il
    • Journal of Ocean Engineering and Technology
    • /
    • v.26 no.5
    • /
    • pp.87-93
    • /
    • 2012
  • Many longitudinally-arranged pipes in ships are equipped with loops as a measure to reduce stresses caused by displacement loads conveyed from the hull girder bending and/or thermal loads of carried fluid of non-ambient temperature. But as the loops have some negative effects such as causing extra manufacturing cost and occupying extra space, the number and the dimensions of the loops need to be minimized. In the meanwhile, a design formula for pipe loops has been developed by modeling them as a spring element of which stresses and axial stiffness are calculated based on the beam theory. But as the beam theory turns out to be inappropriate to deal with the complex structural behavior in the curved corner portion of the loop, this paper aims at improving the previously developed design formula by adopting correction factors which can allow for the gap between the results of beam theory and a more accurate analysis. This paper adopts a finite element analysis with two-dimensional shell elements with some validation work for it. The paper ends with a sample application of the proposed formulas showing their accuracy and efficiency.

A layer-wise frequency scaling for a neural processing unit

  • Chung, Jaehoon;Kim, HyunMi;Shin, Kyoungseon;Lyuh, Chun-Gi;Cho, Yong Cheol Peter;Han, Jinho;Kwon, Youngsu;Gong, Young-Ho;Chung, Sung Woo
    • ETRI Journal
    • /
    • v.44 no.5
    • /
    • pp.849-858
    • /
    • 2022
  • Dynamic voltage frequency scaling (DVFS) has been widely adopted for runtime power management of various processing units. In the case of neural processing units (NPUs), power management of neural network applications is required to adjust the frequency and voltage every layer to consider the power behavior and performance of each layer. Unfortunately, DVFS is inappropriate for layer-wise run-time power management of NPUs due to the long latency of voltage scaling compared with each layer execution time. Because the frequency scaling is fast enough to keep up with each layer, we propose a layerwise dynamic frequency scaling (DFS) technique for an NPU. Our proposed DFS exploits the highest frequency under the power limit of an NPU for each layer. To determine the highest allowable frequency, we build a power model to predict the power consumption of an NPU based on a real measurement on the fabricated NPU. Our evaluation results show that our proposed DFS improves frame per second (FPS) by 33% and saves energy by 14% on average, compared with DVFS.

Relationships between the Attitude toward Video Games and Use of the Video Game Rating System in Global Markets

  • Cheon, Hongsik;Shin, Ho-Chul;Song, Bong-Kun
    • Asia Marketing Journal
    • /
    • v.11 no.2
    • /
    • pp.173-192
    • /
    • 2009
  • As video games gain popularity and become a normal part of home entertainment, concern about youth access to inappropriate games continues to grow. Some people have claimed that violent video games influence children's aggressive behavior and that violent video games have some responsibility for violence in the school. In response to people's concerns, the video game industry created a video game rating system in 1995 to help parents decide which video games are appropriate for their children. This study investigated whether parents were aware of the video game rating system and how often they have used it when selecting video games for their children. This study attempted to find relationships among parents' attitudes toward video games, their guidance styles for their children's video game play, and their use of the video game rating system. This study found that most parents have used the video game ratings very frequently when they select video games for their children. But many parents still don't understand the video game rating system. This study showed that parents who had more negative attitudes or less positive attitudes toward video games were more likely to impose restrictions on their children's video game play and to use the video game rating system as a means to restrict their children's access to violent video games.

  • PDF

A Study on the Judicial Judgment of Flight Regulations under the Aviation Safety Act (항공안전법상 운항규정의 사법적 판단에 관한 고찰 )

  • Sung-mi Kim;Hee-bok Ahn;Un-jin Yeo;Ho-won Hwang
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.31 no.3
    • /
    • pp.161-171
    • /
    • 2023
  • The traditional safety management method starts with the misconception that similar accidents will recur if the inappropriate behavior of the person who caused the accident is investigated and punishment is not judged. However, in modern safety management, incidents or situations occur when negative conditions latent in the system are mutually influenced and triggered. The precedent for revoking the disposition of suspension of first officer A of Eastar Jet, which won a legal lawsuit against the administrative regulatory authority, is a representative example that will serve as an opportunity for the administrative regulatory authority to break away from the punishment-oriented safety management method of the past. On the other hand, airmans and air carriers also need to have a clear understanding of flight regulations, and when judicial judgment is required, predictable and effective legal effects can be obtained by preparing clear standards for flight regulations. In addition, administrative regulatory authorities expect a change from the punishment-oriented safety management policy of the past to a systematic safety management policy.

Building On/off Attacks Detector for Effective Trust Evaluation in Cloud Services Environment

  • SALAH T. ALSHAMMARI;AIIAD ALBESHRI;KHALID ALSUBHI
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.101-107
    • /
    • 2024
  • Cloud computing is a widely used technology that has changed the way people and organizations store and access information. This technology is quite versatile, which is why extensive amounts of data can be stored in the cloud. Furthermore, businesses can access various services over the cloud without having to install applications. However, the cloud computing services are provided over a public domain, which means that both trusted and non-trusted users can access the services. Though there are several advantages of cloud computing services, especially to business owners, various challenges are also posed in terms of the privacy and security of information and online services. A kind of threat that is widely faced in the cloud environment is the on/off attack. In this kind of attack, a few entities exhibit proper behavior for a given time period to develop a highly a positive reputation and gather trust, after which they exhibit deception. A viable solution is provided by the given trust model for preventing the attacks. This method works by providing effective security to the cloud services by identifying malicious and inappropriate behaviors through the application of trust algorithms that can identify on-off attacks.