• 제목/요약/키워드: non-user

검색결과 1,492건 처리시간 0.031초

A Study on the Zoning of Wards and Intensive Care Units (ICUs) in the Infectious Disease Hospital (감염병전문병원의 병동부 및 중환자부 영역 구성에 관한 연구)

  • Lee, Joorang;Chai, Choul Gyun
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • 제29권3호
    • /
    • pp.17-28
    • /
    • 2023
  • Purpose: This study aims to provide basic data for the future construction plans of the Infectious Disease Hospitals by analyzing the area composition and required room ratios in the wards and ICU of currently under-construction infectious disease hospitals. Methods: 3 Methods have been used in this paper. 1) This study conducted a literature review on major considerations and related guidelines for hospitals specializing in infectious diseases using existing data. 2) Based on the objects and activities of the hospital space, zones and areas were set for each department according to infection control. 3) Based on the established zones and areas, basic plan drawings of three hospitals specializing in infectious diseases currently under construction were collected and architectural drawing analysis was performed. Results: 1) Infectious Diseases Hospital must have a spatial organization that can accommodate patient isolation, infection control, efficiency of medical service, and changes. 2) Zones for infection control are divided into negative pressure and non-negative pressure zones based on airborne precaution isolation. It is divided into clean and contaminated zone according to class of cleanliness by Aseptic technique. Areas are classified by objects (patients, healthcare workers, supplies) and activities (access, medical treatment, support), and a system for organizing space is established based on this. 3) By analyzing the area composition of each departmental area, each required room, and each required space in the wards and intensive care units, it provides basic data for the spatial organization for architectural planning of the infectious disease hospital. Implication: It can be used as basic data when planning related facilities by analyzing the characteristics of the space plan of the required room according to the relationship between activities, movement lines, and operation plans based on user behavior.

Path Planning for Search and Surveillance of Multiple Unmanned Aerial Vehicles (다중 무인 항공기 이용 감시 및 탐색 경로 계획 생성)

  • Sanha Lee;Wonmo Chung;Myunggun Kim;Sang-Pill Lee;Choong-Hee Lee;Shingu Kim;Hungsun Son
    • The Journal of Korea Robotics Society
    • /
    • 제18권1호
    • /
    • pp.1-9
    • /
    • 2023
  • This paper presents an optimal path planning strategy for aerial searching and surveying of a user-designated area using multiple Unmanned Aerial Vehicles (UAVs). The method is designed to deal with a single unseparated polygonal area, regardless of polygonal convexity. By defining the search area into a set of grids, the algorithm enables UAVs to completely search without leaving unsearched space. The presented strategy consists of two main algorithmic steps: cellular decomposition and path planning stages. The cellular decomposition method divides the area to designate a conflict-free subsearch-space to an individual UAV, while accounting the assigned flight velocity, take-off and landing positions. Then, the path planning strategy forms paths based on every point located in end of each grid row. The first waypoint is chosen as the closest point from the vehicle-starting position, and it recursively updates the nearest endpoint set to generate the shortest path. The path planning policy produces four path candidates by alternating the starting point (left or right edge), and the travel direction (vertical or horizontal). The optimal-selection policy is enforced to maximize the search efficiency, which is time dependent; the policy imposes the total path-length and turning number criteria per candidate. The results demonstrate that the proposed cellular decomposition method improves the search-time efficiency. In addition, the candidate selection enhances the algorithmic efficacy toward further mission time-duration reduction. The method shows robustness against both convex and non-convex shaped search area.

A Study on the Implementation of Serious Game Learning Multiplication Table using Back Propagation Neural Network on Divided Interconnection Weights Table (분할 가중치 테이블 역전파 신경망을 이용한 구구단 학습 기능성 게임 제작에 관한 연구)

  • Lee, Kyong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • 제14권10호
    • /
    • pp.233-240
    • /
    • 2009
  • In this paper we made the serious game learning multiplication table to be evolved. The serious game is to induce the interest of the learner. This program has an interaction form which reflects the intention of the user and using this program a learner to learn the multiplication table as teacher's location are training a program that are seen as the abata and came to be that learner is smart. A study ability to be evolved used an back propagation neural networks. But we improved a study speed using divided weight table concept. The engine is studied perfectly in 60~80 times training. The learning rate increase to various non-monotonic functional form not to do a mechanical rise. And the learning rate is similar with the study ability of the human.

A Design of Policy-Based Composite Web Services QoS Monitoring System (정책 기반의 합성된 웹 서비스 품질 모니터링 시스템의 설계)

  • Yeom, Gwy-Duk;Jeong, Choong-Kyo
    • Journal of the Korea Society of Computer and Information
    • /
    • 제14권10호
    • /
    • pp.189-197
    • /
    • 2009
  • As the web service technology matures. research is focused on the composite web services that combine individual web services within an enterprise or between enterprises. Quality of service is the critical competitiveness factor in this mature technology stage where there are many services with similar functionalities differing only in some non-functional properties. Monitoring is the key component for the service quality management of a web service. A service quality monitoring system design using a broker is presented in this paper. OWL-S is used to specify the composite service process and a service policy (inputs and outputs of each service, quality attributes and values, etc.) built by WS-Policy is applied to the composite service process. If there is any discrepancy between the service policy and the monitored data, the service provider and the user are notified of it so as to take necessary measures. We have implemented a travel reservation system as an example of the presented design and the experimental results are shown. Average response time was monitored and the timeout policy was applied in the experiment.

The Comparative Study of Software Optimal Release Time for the Distribution Based on Shape parameter (형상모수에 근거한 소프트웨어 최적방출시기에 관한 비교 연구)

  • Shin, Hyun-Cheul;Kim, Hee-Cheul
    • Journal of the Korea Society of Computer and Information
    • /
    • 제14권8호
    • /
    • pp.1-9
    • /
    • 2009
  • In this paper, make a study decision problem called an optimal release policies after testing a software system in development phase and transfer it to the user. When correcting or modifying the software, because of the possibility of introducing new faults when correcting or modifying the software, infinite failure non-homogeneous Poisson process models presented and propose an optimal release policies of the life distribution applied fixed shape parameter distribution which can capture the increasing/decreasing nature of the failure occurrence rate per fault. In this paper, discuss optimal software release policies which minimize a total average software cost of development and maintenance under the constraint of satisfying a software reliability requirement. In a numerical example, after trend test applied and estimated the parameters using maximum likelihood estimation of inter-failure time data, make out estimating software optimal release time

Diverse modeling techniques, parameters, and assumptions for nonlinear dynamic analysis of typical concrete bridges with different pier-to-deck connections: which to use and why

  • Morkos, B.N.;Farag, M.M.N.;Salem, S.;Mehanny, S.S.F.;Bakhoum, M.M.
    • Earthquakes and Structures
    • /
    • 제22권3호
    • /
    • pp.245-261
    • /
    • 2022
  • Key questions to researchers interested in nonlinear analysis of skeletal structures are whether the distributed plasticity approach - albeit computationally demanding - is more reliable than the concentrated plasticity to adequately capture the extent and severity of the inelastic response, and whether force-based formulation is more efficient than displacement-based formulation without compromising accuracy. The present research focusing on performance-based seismic response of mid-span concrete bridges provides a pilot holistic investigation opting for some hands-on answers. OpenSees software is considered adopting different modeling techniques, viz. distributed plasticity (through either displacement-based or force-based elements) and concentrated plasticity via beam-with-hinges elements. The pros and cons of each are discussed based on nonlinear pushover analysis results, and fragility curves generated for various performance levels relying on incremental dynamic analyses under real earthquake records. Among prime conclusions, distributed plasticity modeling albeit inherently not relying on prior knowledge of plastic hinge length still somewhat depends on such information to ensure accurate results. For instance, displacement-based and force-based approaches secure optimal accuracy when dividing, for the former, the member into sub-elements, and satisfying, for the latter, a distance between any two consecutive integration points, close to the expected plastic hinge length. On the other hand, using beam-with-hinges elements is computationally more efficient relative to the distributed plasticity, yet with acceptable accuracy provided the user has prior reasonable estimate of the anticipated plastic hinge length. Furthermore, when intrusive performance levels (viz. life safety or collapse) are of concern, concentrated plasticity via beam-with-hinges ensures conservative predicted capacity of investigated bridge systems.

The development of training platform for CiADS using cave automatic virtual environment

  • Jin-Yang Li ;Jun-Liang Du ;Long Gu ;You-Peng Zhang;Xin Sheng ;Cong Lin ;Yongquan Wang
    • Nuclear Engineering and Technology
    • /
    • 제55권7호
    • /
    • pp.2656-2661
    • /
    • 2023
  • The project of China initiative Accelerator Driven Subcritical (CiADS) system has been started to construct in southeast China's Guangdong province since 2019, which is expected to be checked and accepted in the year 2025. In order to make the students in University of Chinese Academy of Sciences (UCAS) better understand the main characteristic and the operation condition in the subcritical nuclear facility, the training platform for CiADS has been developed based on the Cave Automatic Virtual Environment (CAVE) in the Institute of Modern Physics Chinese Academy of Sciences (IMPCAS). The CAVE platform is a kind of non-head mounted virtual reality display system, which can provide the immersive experience and the alternative training platform to substitute the dangerous operation experiments with strong radioactivity. In this paper, the CAVE platform for the training scenarios in CiADS system has been presented with real-time simulation feature, where the required devices to generate the auditory and visual senses with the interactive mode have been detailed. Moreover, the three dimensional modeling database has been created for the different operation conditions, which can bring more freedom for the teachers to generate the appropriate training courses for the students. All the user-friendly features will offer a deep realistic impression to the students for the purpose of getting the required knowledge and experience without the large costs in the traditional experimental nuclear reactor.

Metaverse Artifact Analysis through the Roblox Platform Forensics (메타버스 플랫폼 Roblox 포렌식을 통한 아티팩트 분석)

  • Yiseul Choi;Jeongeun Cho;Eunbeen Lee;Hakkyong Kim;Seongmin Kim
    • Convergence Security Journal
    • /
    • 제23권3호
    • /
    • pp.37-47
    • /
    • 2023
  • The growth of the metaverse has been accelerated by the increased demand for non-face-to-face interactions due to COVID-19 and advancements in technologies such as blockchain and NFTs. However, with the emergence of various metaverse platforms and the corresponding rise in users, criminal cases such as ransomware attacks, copyright infringements, and sexual offenses have occurred within the metaverse. Consequently, the need for artifacts that can be utilized as digital evidence within metaverse systems has increased. However, there is a lack of information about artifacts that can be used as digital evidence. Furthermore, metaverse security evaluation and forensic analysis are also insufficient, and the absence of attack scenarios and related guidelines makes forensics challenging. To address these issues, this paper presents artifacts that can be used for user behavior analysis and timeline analysis through dynamic analysis of Roblox, a representative metaverse gaming solution. Based on analyzing interrelationship between identified artifacts through memory forensics and log file analysis, this paper suggests the potential usability of artifacts in metaverse crime scenarios. Moreover, it proposes improvements by analyzing the current legal and regulatory aspects to address institutional deficiencies.

Analysis of OpinionMining on Consumer Satisfaction of InternetBanks: Focusing on the app review (인터넷전문은행의 소비자 만족에 관한 오피니언 마이닝 분석: 앱 사용 후기 중심으로)

  • Lee, Jong Hwa;Lee, Hyun Kyu
    • The Journal of Information Systems
    • /
    • 제32권3호
    • /
    • pp.151-164
    • /
    • 2023
  • Purpose This study aims to analyze the current status of consumer awareness on Internet banks by conducting a full investigation and collecting user opinions presented on Google Play. After cateogorizing the current dissatisfaction, we would like to present not only the direction of the Internet bank service of but also the improvements of the platform. Design/methodology/approach Using opinion mining, subjectivity analysis, polarity analysis, and polarity information analysis of comments were conducted step by step to extract negative and positive keywords. The extracted keywords analyzed the weights of the frequently appearing positive and negative keywords using the TF-IDF model. Based on previous studies that negative information is more sensitive to positive information, we tried to confirm the connection, proximity, and mediation of negative keywords. Semantic Network Analysis (SNA) was used to visualize the connection relationship between the negative comment keywords of the three Internet banks. Findings Domestic Internet banks such as Kakao Bank, K-Bank, and Toss Bank have attracted a lot of attention even before they were established, and after establishment, they have secured a wide range of users through platforms that are completely different from existing banks. This study found out that the convenience of the app affects the opening and transaction of non-face-to-face accounts, which are characteristics of domestic Internet banks, which also affects the bank's business strategy. In addition, this study shows that the business characteristics of the company can be identified.

Applying Theory of Planned Behavior to Examine Users' Intention to Adopt Broadband Internet in Lower-Middle Income Countries' Rural Areas: A Case of Tanzania

  • Sadiki Ramadhani Kalula;Mussa Ally Dida;Zaipuna Obeid Yonah
    • Journal of Information Science Theory and Practice
    • /
    • 제12권1호
    • /
    • pp.60-76
    • /
    • 2024
  • Broadband Internet has proven to be vital for economic growth in developed countries. Developing countries have implemented several initiatives to increase their broadband access. However, its full potential can only be realized through adoption and use. With lower-middle-income countries accounting for the majority of the world's unconnected population, this study employs the theory of planned behavior (TPB) to investigate users' intentions to adopt broadband. Rural Tanzania was chosen as a case study. A cross-sectional study was conducted over three weeks, using 155 people from seven villages with the lowest broadband adoption rates. Non-probability voluntary response sampling was used to recruit the participants. Using the TPB constructs: attitude toward behavior (ATB), subjective norms (SN), and perceived behavioral control (PBC), ordinal regression analysis was employed to predict intention. Descriptive statistical analysis yielded mean scores (standard deviation) as 3.59 (0.46) for ATB, 3.34 (0.40) for SN, 3.75 (0.29) for PBC, and 4.12 (0.66) for intention. The model adequately described the data based on a comparison of the model with predictors and the null model, which revealed a substantial improvement in fit (p<0.05). Moreover, the predictors accounted for 50.3% of the variation in the intention to use broadband Internet, demonstrating the predictive power of the TPB constructs. Furthermore, the TPB constructs were all significant positive predictors of intention: ATB (β=1.938, p<0.05), SN (β=2.144, p<0.05), and PBC (β=1.437, p=0.013). The findings of this study provide insight into how behavioral factors influence the likelihood of individuals adopting broadband Internet and could guide interventions through policies meant to promote broadband adoption.