• Title/Summary/Keyword: 도청

Search Result 467, Processing Time 0.031 seconds

Efficient Patient Information Transmission and Receiving Scheme Using Cloud Hospital IoT System (클라우드 병원 IoT 시스템을 활용한 효율적인 환자 정보 송·수신 기법)

  • Jeong, Yoon-Su
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.4
    • /
    • pp.1-7
    • /
    • 2019
  • The medical environment, combined with IT technology, is changing the paradigm for medical services from treatment to prevention. In particular, as ICT convergence digital healthcare technology is applied to hospital medical systems, infrastructure technologies such as big data, Internet of Things, and artificial intelligence are being used in conjunction with the cloud. In particular, as medical services are used with IT devices, the quality of medical services is increasingly improving to make them easier for users to access. Medical institutions seeking to incorporate IoT services into cloud health care environment services are trying to reduce hospital operating costs and improve service quality, but have not yet been fully supported. In this paper, a patient information collection model from hospital IoT system, which has established a cloud environment, is proposed. The proposed model prevents third parties from illegally eavesdropping and interfering with patients' biometric information through IoT devices attached to the patient's body at hospitals in cloud environments that have established hospital IoT systems. The proposed model allows clinicians to analyze patients' disease information so that they can collect and treat diseases associated with their eating habits through IoT devices. The analyzed disease information minimizes hospital work to facilitate the handling of prescriptions and care according to the patient's degree of illness.

Study on the Wintering of Aegypius monachus, No. 243-1 Natural Monument Bird (천연기념물 제 243-1호 독수리(Aegypius monachus)의 월동실태에 관한 연구)

  • Jin, Seon Deok;Yu, Jae Pyoung;Paik, In Hwan;Han, Sung Woo;Kim, Seong Man;Han, Kab Soo;Kang, Tae Han;Kim, In Kyu;Yoo, Seung Hwa;Lee, Ki Sup;Kim, Soo Ho;Kim, Tae Jwa;Kim, Sung Hyun;Choi, Jong Soo;Hong, Kil Pyo;Cho, Hae Jin;Ping, Ki Chang;Kang, Jung Hoon;Park, Chi Young;Kim, Woo Yeol;Oh, Hong Shik;Paek, Woon Kee
    • Korean Journal of Heritage: History & Science
    • /
    • v.42 no.1
    • /
    • pp.62-70
    • /
    • 2009
  • The study was conducted from Jan. 11 to Jan. 12 2008 on 17 areas which were the wintering area of Aegypius monachus and where the birds were observed. In the study, a total of 1,912 individuals were observed to winter in the areas, which was larger than any previous observation. The study found that 1,500 individuals wintered in the central region of Korea including Gyeonggido and Kangwondo, which accounted for 78.45%, and 412 individuals (21.55%) in the southern region such as Gyeongbuk, Gyeongnam, Jeannam and Jejudo (Island). Given the number of individuals wintering by region, Jangdan Peninsula (777 individuals), Cheorwon (488 individuals) and Sancheonggun(193 individuals) were mostly found. In comparison with the previous studies, 20-30% of the individuals have moved south since 2006. This movement might be attributed to the suspension of feeding campaigns, but the birds still crowded some specific areas.

The Cultural History of Mureung Valley, the Scenic Site designated as National Cultural Property (동해 무릉계(武陵溪) 명승 탄생의 문화사적(文化史的) 배경)

  • Lee, Sangkyun
    • Korean Journal of Heritage: History & Science
    • /
    • v.52 no.1
    • /
    • pp.22-43
    • /
    • 2019
  • Mureung Valley was designed as a place of scenic beauty. It was called a utopia because of its unexplored regions. Many people traveled to this place and wrote poetry and prose describing it. It represented a culturally historic site and an example of the changing of cultural spaces. Mureung Valley was one of the nameless valleys in Duta Mountain, but "Mureunggye" was named by Kim Hyon Won, who was a governor of Samcheok.. The valley acquired a reputation for many people's visiting. It was a famous space because local residents liked the place, and famous people also loved the place. This place was adapted into a cultural place with a link to the immortal world and an educational place by people's travel stories. The place maintained a reputation until now and took center stage as a famous travel space. One of the reasons it became a place of famous scenic beauty is travel. People who travel to Mureung Valley created poetry and prose containing their excitement and travel stories. As the poetry and prose had esthetic images of Mureung Valley, people understood the place. The poetry and prose showed the meaning of the place and the changing process. These codified the reputation in the place. Mureung Valley was pointed out in one of the Cheokju-Palkyoungs. However, Mugye-Palkyoung (only for Mureung Valley) was made. It was understood as the most beautiful scenery in the place and it had the meaning of the ethics place which embodied Neo Confucianism. Mureung Valley has a great natural landscape and cultural history background. That is how this place of scenic beauty was created.

The Study of Fermented Chestnut Meal and Its Rumen Fermentation Characteristics (밤의 부위별 발효사료 제조 및 이들의 반추위 내 발효특성에 관한 연구)

  • Joo, Young-Ho;Kim, Dong-Hyeon;Lee, Hyuk-Jun;Lee, Seong-Shin;Paradhipta, Dimas H.V.;Ha, Chang-Ju;Kim, Sam-Churl
    • Journal of Environmental Science International
    • /
    • v.28 no.6
    • /
    • pp.527-533
    • /
    • 2019
  • The aim of present study was to investigate the effect of three types of Chestnut Meals (CM) on chemical composition and rumen fermentation characteristics of the fermented diet. The inoculants consisted of Lactobacillus acidophilus, Bacillus subtilis, and Sacaromyces cerevisiae and were applied to three different types of CM; Whole Chestnut (WC), endodermis (EN), and kernel (KE). All types of CMs were ensiled at $39^{\circ}C$ for 0, 1, 2, 4, or 6 days. After ensiling, the fermented CMs were sub-sampled for laboratory assays. On day six of fermentation, counts of the lactic acid-producing Bacillus subtilis, and yeast were higher (P<0.05) in WC than in the other CM types. On day four, KE had higher (P<0.05) crude protein content but lower (P<0.05) neutral detergent fiber and acid detergent fiber contents than the other treatments. In terms of rumen digestibility, KE had the highest (P<0.05) in vitro digestibility of dry matter (IVDMD), neutral detergent fiber digestibility (IVNDFD), total volatile fatty acid (VFA), propionate, butyrate concentrations, and total gas volume, as well as the lowest (P<0.05) acetate concentration. On the other hand, EN had the highest (P<0.05) pH and ammonia-N concentration in the rumen. In the rumen, even though WC application produced the highest microbial count and fermentation characteristics, it did not have a beneficial effect on rumen digestibility. Therefore, this study concluded that application of KE could be recommended due to the observed improvements in IVDMD and IVNDFD.

Determination of the Contents of Apigenin and Luteolin in Vegetables (유통 채소류의 아피제닌 및 루테올린 함량 조사)

  • Kang, Kyung-Ja;Kim, Beom-Ho;Kim, Dae-hwan;Yun, Hee-Jeong;Cho, Young-Sun;Han, Na-Eun;Choi, Jong-Chul;Lee, Sung-nam;Choi, Ok-Kyung
    • The Korean Journal of Food And Nutrition
    • /
    • v.34 no.2
    • /
    • pp.233-241
    • /
    • 2021
  • The purpose of this study was to investigate the contents of apigenin and luteolin in vegetables mainly distributed and consumed in Korea. In this study, the contents of apigenin, apigenin-7-O-glucoside, luteolin, and luteolin-7-O-glucoside in vegetables were surveyed by using liquid chromatography coupled to mass spectrometry (LC-MS/MS). According to the analysis of 27 items (91 samples) in vegetables, the content of total apigenin (the sum of apigenin and apigenin-7-O-glucoside) was quantified in 8 out of the 27 items in vegetables, followed by pepper leaves, parsley, celery, chamnamul, foremost mugwort, and perilla leaves. The content of total luteolin (the sum of luteolin and luteolin-7-O-glucoside) was found in 11 of the 27 items in vegetables, followed by pepper leaves, dandelion, celery, red lettuce, foremost mugwort, and perilla leaves. Celery was divided into stalks and leaves for comparing the contents of apigenin and luteolin. Celery showed higher contents of apigenin and luteolin in leaves than in stalks.

Implementation of a Credit Authentication System (전자상거래에서 상점에 대한 신용 보증 시스템 구현)

  • 백기영
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.2
    • /
    • pp.37-48
    • /
    • 1999
  • The Internet has been used as the academic researching purposes. Nowadays accordance with improving and being familiar with the World-Wide Web Many people are giving it a try to use the Internet as commerce markets. The noticeable example of internet-based use of the commerce is the Internet shopping mall. Using the WWW companies exhibit their products and users select the ones and take the payment for ones in the on-line Increasing the the Internet shopping mall there needs to be the countermeasure that companies and clients must verify each other. In this paper there are explained the development credit authentication system of the Internet shopping mall and the construction of the trusted environment clients can use Internet shopping mall. That is to develop the credit authentication system the credit-rating of Internet shopping mall can be sent securely and easily to clients and the information of credit-ranting cannot be eavesdropped.

RFID Tag Search Protocol Preserving Privacy of Reader Holders (이동형 리더 소지자의 프라이버시를 보호하는 RFID 태그 검색 프로토콜)

  • Chun, Ji-Young;Hwang, Jung-Yeon;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.59-69
    • /
    • 2009
  • RFID tag search system which is used to find a specific tag has an application such as asset management, supply chain, and this search scheme has been given much attention so far. In RFID tag search system, especially, mobility of the reader is important in order to search tags. Therefore, even though the handheld reader cannot connect with the central database because of unreliable wireless connection or remote location, handheld reader should search the specific tag without help of the central database. In addition, in RFID tag search system, users hold not the tag but the reader, the privacy of users should be considered. Since the signal strength of the reader is stronger than that of the tag, the privacy of the reader holder is very important. Recently, in order to solve these problems, a number of RFID tag search schemes have been proposed. However, since these schemes did not consider the privacy of reader holders, there are serious privacy breaches of reader holders. In this paper, we propose efficient RFID tag search protocol for passive tags. Our proposed scheme preserves the privacy of reader holders.

Hash-based Authentication Protocol for RFID Applicable to Desynchronization between the Server and Tag with efficient searching method (서버와 태그 비동기시에도 효율적으로 검색이 가능한 해시기반 RFID 인증 프로토콜)

  • Kwon, Hye-Jin;Kim, Hae-Mun;Jeong, Seon-Yeong;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.71-82
    • /
    • 2011
  • The RFID system provides undeniable advantages so that it is used for various application. However recent RFID system is vulnerable to some attacks as eavesdropping, replay attack, message hijacking, and tag tampering, because the messages are transmitted through the wireless channel and the tags are cheap. Above attacks cause the tag and reader impersonation, denial of service by invalidating tag, and the location tracking concerning bearer of tags, A lot of RFID authentication protocol bas been proposed to solve the vulnerability. Since Weis, Sanna, Rivest, and Engel, proposed the bash-based RFID authentication protocol, many researchers have improved hash-based authentication protocol and recent bash-based authentication protocols provide security and desirable privacy. However, it remains open problem to reduce the tag identification time as long as privacy and security are still guaranteed. Here we propose a new protocol in which the tags generate the message depending on the state of previous communitions between tag and reader. In consequence, our protocol allows a server to identify a tag in a reasonable amount of time while ensuring security and privacy, To be specific, we reduced the time for the server to identify a tag when the last session finished abnormally by at least 50% compared with other bash-based schemes that ensure levels of security and privacy similar to ours.

Secure Mutual Authentication Protocol for RFID System without Online Back-End-Database (온라인 백-엔드-데이터베이스가 없는 안전한 RFID 상호 인증 프로토콜)

  • Won, Tae-Youn;Yu, Young-Jun;Chun, Ji-Young;Byun, Jin-Wook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.63-72
    • /
    • 2010
  • RFID is one of useful identification technology in ubiquitous environments which can be a replacement of bar code. RFID is basically consisted of tag, reader, which is for perception of the tag, and back-end-database for saving the information of tags. Although the usage of mobile readers in cellular phone or PDA increases, related studies are not enough to be secure for practical environments. There are many factors for using mobile leaders, instead of static leaders. In mobile reader environments, before constructing the secure protocol, we must consider these problems: 1) easy to lose the mobile reader 2) hard to keep the connection with back-end-database because of communication obstacle, the limitation of communication range, and so on. To find the solution against those problems, Han et al. suggest RFID mutual authentication protocol without back-end-database environment. However Han et al.'s protocol is able to be traced tag location by using eavesdropping, spoofing, and replay attack. Passive tag based on low cost is required lots of communication unsuitably. Hence, we analyze some vulnerabilities of Han et al.'s protocol and suggest RFID mutual authentication protocol without online back-end-database in aspect of efficiency and security.

Effects of nutrition and hygiene education program on healthy eating habits and behavior of the elderly in Chungbuk (영양·위생교육 프로그램 수행이 충북지역 노인의 건강한 식습관 및 식행동에 미치는 영향)

  • Yeon, Je-ok;Song, Byung-chun;Yeum, Kyung-Jin;Kim, Myoung-sook;Lee, Mi-young
    • Journal of Nutrition and Health
    • /
    • v.55 no.3
    • /
    • pp.390-405
    • /
    • 2022
  • Purpose: This study was conducted to effectively apply the nutrition and hygiene education program for improving the nutritional status of the elderly aged 65 years and above. Methods: The first study was conducted by enrolling 121 willing elderly subjects from welfare centers in four regions of Chungbuk. The second study included 347 people from 10 regions of Chungbuk. Data were analyzed using the SPSS (version 12.0) and SAS (version 9.2) programs. Results: Most participants in both studies were women, ranging from 70-79 years of age. In the first study, the performance rates of subjects, after imparting the education on hygiene, eating habits, and nutritional knowledge, were significantly increased for all factors. Goesan and Boeun areas were highly effective in hygiene practice and eating habits after education. In the second study, Chungju had the most educational effect on hygiene education, with a score of 6.41 points before education and 7.68 points after education. The greatest impact of education on eating habits was obtained at Goesan, with 9.23 points and 11.26 points before and after education, respectively. Large regional differences were determined for the effect of the education program. For nutritional knowledge, the combined average score of Boeun and Goesan showed a maximum increase after education. When considering satisfaction, the scores of Cheongju and Jeungpyeong increased the most after education, whereas Goesan showed that the average scores before and after education were close to perfect. Surprisingly, the Okcheon area, where there was no significant difference in the educational effect after the education program in the first study, showed significant improvement for all factors after the second education program. The current study indicates that continuous education programs are essential for improving the nutritional status of the elderly. Conclusion: Therefore, continuous nutrition and hygiene education programs are recommended to improve the nutritional status of the elderly.