• Title/Summary/Keyword: supplementary information

Search Result 347, Processing Time 0.029 seconds

A Study on Weaning Practice of Infants in Kangnung Area (강릉지역 영유아의 이유 실태에 관한 조사연구)

  • Kim, Eun-Kyung;Lee, Sun-Hee;Park, Kye-Wol;Chi, Kyung-A
    • Journal of the Korean Society of Food Culture
    • /
    • v.14 no.5
    • /
    • pp.555-563
    • /
    • 1999
  • This study was executed for 300 mothers bringing up a child below 3 years in the area of Kangnung to assess the current weaning practice of infants. 24.6% of mother surveyed were breast-fed, 57.8% were formula-fed and 17.5% were mixed-fed. The rate of breast feeding was lower and the rate of bottle feeding was higher in infants whose mothers had more income or higher educational period or full-time job. Most of the respondents knew the significance of supplementary food. 41.4% of the subjects started weaning of their infants at 3-4 months, and 84.1% of them set on weaning in less than 7 months after babies were born. And 39.4% of the subjects finished weaning of their infants in less than one year. The infants of this study preferred the fruits and fishes to meats, vegetables and beans that served to them as supplementary food. Mothers showed deep interest in recipe of weaning food(48.5%), adequate quantity of weaning food(36.3%), information on commercial food for infants(32.2%), and sequence in which semi-solid food are introduced(31.9%). From these results, it is suggested that education program in primary health center for improvement of weaning practice of infants should be implemented reflecting needs of mothers.

  • PDF

The Relationship between the Technology-Based Self-Service Convenience Orientation Factor and Convenience in Retail Stores

  • Yang, Hee-Jin;Lee, Soo-Hyung;Shim, Kyu-Yeol;Youn, Myoung-Kil
    • Journal of Distribution Science
    • /
    • v.12 no.10
    • /
    • pp.11-17
    • /
    • 2014
  • Purpose - The purpose of this study is to investigate the relationship that is found to exist between the technology-based self-service convenience orientation factor and the factors of convenience and quality. Research design, data, and methodology - The questionnaire was developed by using the modified and supplementary questions that were examined in previous studies. We used the SPSS/PC 18.0 and lisrel 8.3 statistical packages to analyze the results of the research. For validating the research hypothesis and structural relationship of the research model, path analysis was used in this study. Results - The ease of use exerted a significant influence on the four dimensions. Information had a significant influence on transaction, benefit, and post-benefit convenience. Control had a significant influence on five dimensions. Conclusions - This study suggests that technology-based self-service convenience is classified into five multi-dimensional levels. Further, the study reveals that control, ease of use, and information are important variables in order to increase convenience. Therefore, for improving technology-based self-service convenience, it is important to improve the control, ease of use, and information variables.

The Information Leisure Activity of the Aging Generation and the Analysis of Meaning (노년기 소비자의 정보화 여가활동 연구와 의미 분석)

  • Kim, Yeon-Jeong
    • Journal of Family Resource Management and Policy Review
    • /
    • v.14 no.4
    • /
    • pp.323-340
    • /
    • 2010
  • Many social and environmental changes have emerged due to the increasing size of the aging generation. This study explored the current status of the information leisure activity of the aging generation (computer use activity, internet service participation, social community participation and blogging, UCC, etc.) and the need for serious games among elderly consumers. It analyzed the current status of serious game and information leisure span as determined by experts on elderly care at the aging welfare institute. The research methods involved applying content analysis and focus group interviews. The results were as follows: The elderly are willing to enjoy the internet and economics networks. In particular, economic investment, economic news, health, meetings, and communication are the main internet search categories. The results for serious games are less interesting than those for IT participation. The components of usefulness in terms of serious games, as identified by care experts, are simplicity, a user-friendly interface, efficacy, and certainty in using the game device. Care experts recognize that serious games represent a supplementary device to traditional physical and emotional therapy.

  • PDF

Adaptive Convergence Security Policy and Management Technology of Home Network (홈 네트워크에서의 적응적 통합 보안 정책 및 관리 기술)

  • Lee, Sang-Joon;Kim, Yi-Kang;Ryu, Seung-Wan;Park, You-Jin;Cho, Choong-Ho
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.34 no.4
    • /
    • pp.72-81
    • /
    • 2011
  • In this paper, we propose adaptive convergence security policies and management technologies to improve security assurance in the home networking environment. Many security issues may arise in the home networking environment. Examples of such security issues include the user privacy, the service security, the integrated networking security, the middleware security and the device failure. All these security issues, however, should be fulfilled in phase due to many difficulties including deployment cost and technical complexity. For instance, fundamental security requirements such as authentication, access control and prevention of crime and disaster should be addressed first. Then, supplementary security policies and diverse security management technologies should be fulfilled. In this paper, we classify these requirements into three categories, a service authentication, a user authentication and a device authentication, and propose security policies and management technologies for each requirement. Since the home gateway is responsible for interconnection of many home devices and external network access, a variety of context information could be collected from such devices.

A Study on the Development of a Basic Electronic Virtual Lab System Using JAVA (자바를 이용한 가상 전자 회로 실험 구축에 관한 연구)

  • Park, Jun-Young;Cha, Jeong-Hun;Kim, Dong-Sik;Ho, Won
    • Proceedings of the KIEE Conference
    • /
    • 1999.07g
    • /
    • pp.3242-3245
    • /
    • 1999
  • The current educational software usually has limitations of accessing and mutual communication. Networking Technology can overcome these limitations. Using Internet, students can access the educational resources easily and learning process can be monitored. In this study a virtual experiment program is developed for students to practice the basic electronic experiment, which is a fundamental subject in electronic department curriculum. Students can understand the basic theory and rules easily by simulated experimental process. Almost the same result is obtained as in real experiment because this program is made to simulate the real experiment. The virtual experiment site can be accessed easily by Internet and an experiment is performed based on individual basis without restriction of location and time. This program can be used as fully the real experiment substitution or supplementary educational materials. In both case, it provides many benefits in education.

  • PDF

A Study on the Criminal Threat and Privacy Protection with a Proxy Service (프록시 서비스를 통한 범죄 위협과 프라이버시 보호에 관한 연구)

  • Kang, Shin-Beom;Lee, Sang-Jin;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.317-326
    • /
    • 2012
  • Internet service provider is able to collect personal information to prevent the violations of the rights of service providers and customers using internet. But there are still many debates going on between a personal privacy and a regulation. Proxy servers are used in various technical purposes include bypass access. Although the proxy server users are increasing but there are not any proper institutional mechanisms and regulations to protect users. In this study, we discuss the two sides of a proxy service includes its privacy protection function and the cyber-crime threat and propose supplementary measures to mediate between the interests of public and private.

Space Management on Campus of a Mobile BIM-based Augmented Reality System

  • Ji, Seung-Yeul;Kim, Mi-Kyoung;Jun, Han-Jong
    • Architectural research
    • /
    • v.19 no.1
    • /
    • pp.1-6
    • /
    • 2017
  • Over the past decade, building information modeling (BIM) has gained a foothold in the construction sector. However, as digital data generated in the virtual space of a computer environment, BIM-based data have an inherent limitation in their application efficacy under field conditions. To overcome this, the present study employs augmented reality (AR) to reduce the discrepancy between the digital data generated in virtual spaces and real-world conditions. We assessed the potential applicability of an AR-based interface by analyzing existing examples of Apple, Google, and Facebook, which reflect the recent developments of technologies focusing on user experience. We then proceeded with an AR study, restricting the scope of application to a mobile environment in which an efficient information transmission between a digital model and real life can take place. Object-oriented software engineering was employed to ensure an efficient implementation of a BIM-based AR system for campus space management (CSM) in a mobile environment. Finally, we conducted a module test to check the reliability of the CSM method by using an AR-based mobile system with a prototype of the model used in university campuses, and extracted and itemized the supplementary requirements for CSM by using BIM tools for running AR applications.

The reinforcement of existing fingerprint recognition system by the supplementary information (추가 정보를 이용한 개선된 지문인식 시스템)

  • Lee, Jin-Young;Kim, Bo-Nam;Kim, Ga-Won;Shim, Hoon;Kim, Heung-Jun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.639-642
    • /
    • 2007
  • 오늘날 네트워크의 급속한 발전에 더불어 정보화의 가속화는 보안 문제가 크게 부각하고 있다. 이에 마그네틱 카드, IC 카드 등을 이용하여 개인을 식별하는 다양한 보안 시스템들이 개발되고 있으나 분실, 복사, 고의적 양도에 의한 부정사용 등의 문제로 인해 그 해결책이 되지 않고 있으며 이에 대한 해결책으로 생체인식(Biometrics)을 이용한 개인식별 시스템[1]이 제안되어 연구가 진행되고 있다. 본 논문은 기존의 생체인식 시스템 중 가장 활발하게 활용되고 있는 지문인식 시스템이 가지고 있는 환경적인 요소나 물리적 요소에 의한 인식률 저하를 보안할 수 있는 시스템을 새롭게 제안한다. 지문인식은 사용의 편리함과 저가의 초기 투자비용, 그리고 소형화의 가능으로 생체인식 중에서 실생활에 사용되기 가장 적합한 기법으로 여겨져 다양한 응용 범위에 널려 사용되고 있다. 따라서, 제안 시스템은 기존의 지문인식 시스템을 기반으로 하여 손가락에서 추가적인 생체정보를 이용함으로써 지문인식 시스템이 갖은 단점을 보안하면서 인식률 향상과 효율적인 활용이 가능한 시스템을 제안한다.

  • PDF

Extraction of Spatial Information of Facility Using Terrestrial and Aerial Photogrammetric Analysis (지상사진과 항공사진 해석에 의한 시설물 공간정보 추출)

  • Sohn, Duk-Jae;Lee, Seung-Hwan
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.11 no.1 s.24
    • /
    • pp.51-59
    • /
    • 2003
  • This study intended to extract the spatial data and attribute data from the images of terrestrial and aerial photographs and to compile the digital map from the images using various kinds of photogrammetric analysis. The Three Dimensional Frame Model (3DFM) was produced from multiple images of terrestial photographs, and the Three Dimensional Photo Image Model (3DPIM) was made using 3DFM and image patches of terrestrial photo, which is useful for identifying the feature and characteristics of the object. In addition, the spatial data base for the buildings, roads and supplementary facilities in the objective area was updated by the vectorizing procedures with small scale areal photos.

  • PDF

Determinants of Mobile Application Use: A Study Focused on the Correlation between Application Categories (모바일 앱 사용에 영향을 미치는 요인에 관한 연구: 앱 카테고리 간 상관관계를 중심으로)

  • Park, Sangkyu;Lee, Dongwon
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.4
    • /
    • pp.157-176
    • /
    • 2016
  • For a long time, mobile phone had a sole function of communication. Recently however, abrupt innovations in technology allowed extension of the sphere in mobile phone activities. Development of technology enabled realization of almost computer-like environment even on a very small device. Such advancement yielded several forms of new high-tech devices such as smartphone and tablet PC, which quickly proliferated. Simultaneously with the diffusion of the mobile devices, mobile applications for those devices also prospered and soon became deeply penetrated in consumers' daily lives. Numerous mobile applications have been released in app stores yielding trillions of cumulative downloads. However, a big majority of the applications are disregarded from consumers. Even after the applications are purchased, they do not survive long in consumers' mobile devices and are soon abandoned. Nevertheless, it is imperative for both app developers and app-store operators to understand consumer behaviors and to develop marketing strategies aiming to make sustainable business by first increasing sales of mobile applications and by also designing surviving strategy for applications. Therefore, this research analyzes consumers' mobile application usage behavior in a frame of substitution/supplementary of application categories and several explanatory variables. Considering that consumers of mobile devices use multiple apps simultaneously, this research adopts multivariate probit models to explain mobile application usage behavior and to derive correlation between categories of applications for observing substitution/supplementary of application use. The research adopts several explanatory variables including sociodemographic data, user experiences of purchased applications that reflect future purchasing behavior of paid applications as well as consumer attitudes toward marketing efforts, variables representing consumer attitudes toward rating of the app and those representing consumer attitudes toward app-store promotion efforts (i.e., top developer badge and editor's choice badge). Results of this study can be explained in hedonic and utilitarian framework. Consumers who use hedonic applications, such as those of game and entertainment-related, are of young age with low education level. However, consumers who are old and have received higher education level prefer utilitarian application category such as life, information etc. There are disputable arguments over whether the users of SNS are hedonic or utilitarian. In our results, consumers who are younger and those with higher education level prefer using SNS category applications, which is in a middle of utilitarian and hedonic results. Also, applications that are directly related to tangible assets, such as banking, stock and mobile shopping, are only negatively related to experience of purchasing of paid app, meaning that consumers who put weights on tangible assets do not prefer buying paid application. Regarding categories, most correlations among categories are significantly positive. This is because someone who spend more time on mobile devices tends to use more applications. Game and entertainment category shows significant and positive correlation; however, there exists significantly negative correlation between game and information, as well as game and e-commerce categories of applications. Meanwhile, categories of game and SNS as well as game and finance have shown no significant correlations. This result clearly shows that mobile application usage behavior is quite clearly distinguishable - that the purpose of using mobile devices are polarized into utilitarian and hedonic purpose. This research proves several arguments that can only be explained by second-hand real data, not by survey data, and offers behavioral explanations of mobile application usage in consumers' perspectives. This research also shows substitution/supplementary patterns of consumer application usage, which then explain consumers' mobile application usage behaviors. However, this research has limitations in some points. Classification of categories itself is disputable, for classification is diverged among several studies. Therefore, there is a possibility of change in results depending on the classification. Lastly, although the data are collected in an individual application level, we reduce its observation into an individual level. Further research will be done to resolve these limitations.