• Title/Summary/Keyword: 민감개인정보

Search Result 300, Processing Time 0.022 seconds

Design of 3-Sectored Oxygen Chamber with Automatic Control Function based on Embedded System (임베디드시스템 기반 자동제어 기능의 삼단분리형 산소챔버 설계)

  • Cho, Myeon-gyun
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.3
    • /
    • pp.71-77
    • /
    • 2018
  • In this paper, considering the oxygen sensitivity and preference pattern of the patient, the profile of the oxygen therapy of the individual is specified. And, we design a three-compartment, single compartment oxygen chamber that automatically adjusts the oxygen pressure according to the specified profile. Hyperbaric oxygen therapy is a method of providing patients with 100% oxygen higher than atmospheric pressure for therapeutic purposes. However, there is a disadvantage that the ear pain is caused by the pressure difference depending on the individual. Based on the embedded system, the proposed system creates a patient-tailored oxygen therapy profile by DB of patient's preference patterns and treatment records of oxygen therapy. If only the patient's name is entered, the oxygen chamber system can adjust the oxygen pressure automatically according to the profile pattern to maximize the oxygen treatment effect.

Privacy Preserving Techniques for Deep Learning in Multi-Party System (멀티 파티 시스템에서 딥러닝을 위한 프라이버시 보존 기술)

  • Hye-Kyeong Ko
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.647-654
    • /
    • 2023
  • Deep Learning is a useful method for classifying and recognizing complex data such as images and text, and the accuracy of the deep learning method is the basis for making artificial intelligence-based services on the Internet useful. However, the vast amount of user da vita used for training in deep learning has led to privacy violation problems, and it is worried that companies that have collected personal and sensitive data of users, such as photographs and voices, own the data indefinitely. Users cannot delete their data and cannot limit the purpose of use. For example, data owners such as medical institutions that want to apply deep learning technology to patients' medical records cannot share patient data because of privacy and confidentiality issues, making it difficult to benefit from deep learning technology. In this paper, we have designed a privacy preservation technique-applied deep learning technique that allows multiple workers to use a neural network model jointly, without sharing input datasets, in multi-party system. We proposed a method that can selectively share small subsets using an optimization algorithm based on modified stochastic gradient descent, confirming that it could facilitate training with increased learning accuracy while protecting private information.

A Study on the Effect of Consumer Characteristics on Intention to Use in Mobile Location-Based Advertising (모바일 위치기반 광고에서 소비자 특성이 이용의도에 미치는 영향에 관한 연구)

  • Cho, Won-Sang;Han, Dong-Gyun;Whang, Jae-Hoon
    • Informatization Policy
    • /
    • v.29 no.1
    • /
    • pp.38-59
    • /
    • 2022
  • The development of IT technology and the spread of smartphones are having a great impact on businesses and consumers. Consumers have been able to acquire more diverse and larger amounts of information than in the past due to information provided through smartphones and information search on the internet, which has a significant influence on decision-making. Companies have also become sensitive to such changes in consumer behavior patterns, reflected in their marketing. In addition, among the various characteristics of smartphones, location-based technology has become an important factor in providing targeted marketing from a company's point of view. Such technological development and social change have led to the expansion of the mobile advertising market, which promotes products or services based on the location of consumers and provides benefits such as discount coupons. In this study, we have analyzed the influence of consumer characteristics on intention to use in mobile location-based advertising, which has become an important marketing method in the mobile advertising market. The effects of variables of personalization, engagement, coupon proneness, economic efficiency, and irritation on attitude and information privacy concerns were analyzed, and the effects of attitude and information privacy concerns on intention to use were analyzed. The results of this study are deemed to be able to suggest factors to consider when providing mobile location-based advertising to consumers in the future.

Inflammatory Bowel Disease 환자에 있어서 유가공식품 섭취

  • Im, Byeong-U;Jo, Yeo-Won
    • Bulletin of Food Technology
    • /
    • v.14 no.4
    • /
    • pp.87-94
    • /
    • 2001
  • Inflammatory bowel disease (IBD)환자의 유가공품 내성에 대한 병력과 의사나 영양학자로부터 받은 지침은 IBD환자들의 관리에 있어서 중요한 주안점이 된다. 대부분의 환자들이 불편 없이 매일 우유를 마실 수 있지만 부가적인 고찰에서는 개인적 요소와 크게 관련이 있는 특정요소가 있다는 것이다. 유가공품에 민감한 IBD 환자들의 진단으로 lactose의 내성과 흡수 장애, long- chain 지방산, 우유에 대한 알러지, 유가공품에 대한 심리적인 요소와 부정적인 인식 등이 있다. 유당 흡수장애의 발생빈도는 결장이나 ulcerative colitis (UC)를 포함하는 Crohndisease (CD)환자에서보다 소장의CD환자에서 더 높다. 유당 흡수장애의 후천적인 발생빈도는 유전적 요소에 기인하는 인종적 요인에 의해 주로 결정된다. 게다가 소장의 CD에서 유당 흡수장애는 lactase 효소보다도 세균성 이상증식이나 소장에서 통과하는 시간(small bowel transit time) 과 같은 요소에 의해 결정된다. 의사들이 IBD환자에게 내리는 지침에 있어서의 의견은 매우 다양하며, 진단이 내려지면 유가공품을 회피하라는 극단적인 충고가 있는 반면에IBD의 조절에 있어서 유가공품의 섭취를 줄이라는 제안을 내리는 경우도 있다. IBD환자들은 대중적인 식이요법 책의 저자들이나 의사들로부터 임의적인 제안과 환자들의 부정적 인식 때문에 우유 불내증이나 유당 흡수장애의 발병율의 근거가 거의 없는데도 필요이상으로 유가공품을 피한다. 따라서, 충분한 과학적.임상적 정보의 축적은 IBD환자들에게 유가공품의 섭취에 대한 지침을 설정하는 데에 유용하다.

  • PDF

Extended 3-Party Mutual Authentication Protocols for the Virtual Home Environment in Next Generation Mobile Networks (차세대 이동통신 네트워크의 Virtual Home Environment 구조에 적용 가능한 3자간 상호 인증 프로토콜)

  • Jeong, Jong-Min;Lee, Goo-Yeon;Lee, Yong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.4
    • /
    • pp.22-29
    • /
    • 2003
  • In the virtual home environment (VHE), which was proposed to offer global roaming and personal service environment portability, user's profiles and service logics are conveyed from home network to visited network to provide services at the visited network. Because user's profiles and service logics may contain confidential information, some procedures for mutual authentication among entities for offering confidence are needed. For these issues, we propose and analyze three 3-Party mutual authentication Protocols adaptable to the VHE in 3G ; password based mutual authentication protocol, mutual authentication protocol with CHAP and key exchange and mutual authentication protocol with trusted third party.

The User Identification System using the ubiFloor (유비플로어를 이용한 사용자 인증 시스템)

  • Lee Seunghun;Yun Jaeseok;Ryu Jeha;Woo Woontack
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.4
    • /
    • pp.258-267
    • /
    • 2005
  • We propose the ubiFloor system to track and recognize users in ubiquitous computing environments such as ubiHome. Conventional user identification systems require users to carry tag sensors or use camera-based sensors to be very susceptible to environmental noise. Though floor-type systems may relieve these problems, high cost of load cell and DAQ boards makes the systems expensive. We propose the transparent user identification system, ubiFloor, exploiting user's walking pattern to recognize the user with a set of simple ON/OFF switch sensors. The experimental results show that the proposed system can recognize the 10 enrolled users at the correct recognition rate of $90\%$ without users' awareness of the system.

Design of a User authentication Protocol Using Face Information (얼굴정보를 이용한 사용자 인증 프로토콜 설계)

  • 지은미
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.1
    • /
    • pp.157-166
    • /
    • 2004
  • Consequently substantial research has been done on the development of the bio-metric recognition method as well as technical research in the field of authentication. As a method of bio-metric recognition, personal and unique information such as fingerprints, voice, face, Iris, hand-geometry and vein-pattern are used. The face image system in bio-metric recognition and information authentication reduces the denial response from the users because it is a non-contact system the face image system operates through a PC camera attached to a computer base this makes the system economically viable as well as user friendly. Conversely, the face image system is very sensitive to illumination, hair style and appearance and consequently creates recognition errors easily, therefore we must build a stable authentication system which is not too sensitive to changes in appearance and light. In this study, I proposed user authentication protocol to serve a confidentiality and integrity and to obtain a least Equal Error Rate to minimize the wrong authentication rate when it authenticates the user.

  • PDF

Tracking Data through Tracking Data Server in Edge Computing (엣지 컴퓨팅 환경에서 추적 데이터 서버를 통한 데이터 추적)

  • Lim, Han-wool;Byoun, Won-jun;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.443-452
    • /
    • 2021
  • One of the key technologies in edge computing is that it always provides services close to the user by moving data between edge servers according to the user's movements. As such, the movement of data between edge servers is frequent. As IoT technology advances and usage areas expand, the data generated also increases, requiring technology to accurately track and process each data to properly manage the data present in the edge computing environment. Currently, cloud systems do not have data disposal technology based on tracking technology for data movement and distribution in their environment, so users cannot see where it is now, whether it is properly removed or not left in the cloud system if users request it to be deleted. In this paper, we propose a tracking data server to create and manage the movement and distribution of data for each edge server and data stored in the central cloud in an edge computing environment.

Threat analysis and response plan suggested through analysis of Notion program artifacts (노션프로그램 아티팩트 분석을 통한 위협 분석 및 대응방안 제시)

  • Juhyeon Han;Taeshik Shon
    • Journal of Platform Technology
    • /
    • v.12 no.3
    • /
    • pp.27-40
    • /
    • 2024
  • Collaborative programs are tools designed to support multiple people working together, enhancing collaboration and communication efficiency, improving productivity, and overcoming the constraints of time and place. In the endemic era, many companies and individuals prefer using collaborative programs. These programs often handle sensitive information, such as work content, documents, and user data, which can cause significant damage if leaked. Exploiting this, various attack scenarios have emerged, including malware attacks disguised as collaborative programs, exploiting vulnerabilities within these programs, and stealing internal tokens. To prevent such attacks, it is essential to analyze and respond to potential threats proactively. This paper focuses on Notion, a widely used collaborative program, to collect and analyze artifacts related to user information and activities in both PC and Android environments. Based on the collected data, we categorize critical information, discuss potential threats, and propose countermeasures.

  • PDF

Temporal and Spatial Variability of the Middle and Lower Tropospheric Temperatures from MSU and ECMWF (MSU와 ECMWF에서 유도된 중간 및 하부 대류권 온도의 시 ${\cdot}$ 공간 변동)

  • Yoo, Jung-Moon;Lee, Eun-Joo
    • Journal of the Korean earth science society
    • /
    • v.21 no.5
    • /
    • pp.503-524
    • /
    • 2000
  • Intercomparisons between four kinds of data have been done to estimate the accuracy of satellite observations and model reanalysis for middle and lower tropospheric thermal state over regional oceans. The data include the Microwave Sounding Units (MSU) Channel 2 (Ch2) brightness temperatures of NOAA satellites and the vertically weighted corresponding temperature of ECMWF GCM (1980-93). The satellite data for midtropospheric temperatures are MSU2 (1980-98) in nadir direction and SC2 (1980-97) in multiple scans, and for lower tropospheric temperature SC2R (1980-97). MSU2 was derived in this study while SC2 and SC2R were described in Spencer and Christy (1992a, 1992b). Temporal correlations between the above data were high (r${\ge}$0.90) in the middle and high latitudes, but low(r${\sim}$0.65) over the low latitude and more convective regions. Their values with SC2R which included the noises due to hydrometeors and surface emission were conspicuously low. The reanalysis shows higher correlation with SC2 than with MSU2 partially because of the hydrometeors screening. SC2R in monthly climatological anomalies was more sensitive to surface thermal condition in northern hemisphere than MSU2 or SC2. The first EOF mode for the monthly mean data of MSU and ECMWF shows annual cycle over most regions except the tropics. The mode in MSU2 over the Pacific suggests the east-west dipole due to the Walker circulation, but this tendency is not clear in other data. In the first and second modes for the Ch2 anomalies over most regions, the MSU and ECMWF data commonly indicate interannual variability due to El Ni${\tilde{n}$o and La Ni${\tilde{n}$a. The substantial disagreement between observations and model reanalysis occurs over the equatorial upwelling region of the western Pacific, suggesting uncertainties in the model parameterization of atmosphere-ocean interaction.

  • PDF