• Title/Summary/Keyword: Digital Control Model

Search Result 975, Processing Time 0.027 seconds

A Study on the Information Protection Intention of Digital Healthcare Service Providers (디지털 헬스케어 서비스 제공자의 정보보호의도에 관한 연구)

  • Yang, Chang-Gyu
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.17 no.4
    • /
    • pp.163-172
    • /
    • 2022
  • This study investigates the IPI (Information Protection Intention) of DHS (Digital Healthcare Service) providers by introducing PMT (Protection Motivation Theory). This study examines the effects of protection motivation, such as threat appraisal and coping appraisal, on IPI, such as ICI(Induction Control Intention) and SDI(Self Defense Intention). The research model, based on the PMT, adopted severity, vulnerability, reaction efficacy and self-efficacy as independent variables. The research model was validated through quantitative research, a survey of 222 DHS providers in South Korea, using structural equation modeling. The results show that (1) a clear awareness of the consequences of security threats increases the understanding of DHS providers on the severity of closure of healthcare information, and thus may decreases abuse of DHS by providers; (2) user confidence and satisfaction on the security system may make them be confident that they can handle the closure of healthcare information by themselves; and (3) although DHS providers are realizing the consequences of closure of healthcare information, they think that they are unlikely to encounter such situations. As a result of this study, venture companies that provide DHS need to provide contents that can continuously increase providers' security level in order to increase providers' information protection intention. It suggests that IPI is important through trust of healthcare service providers.

IoT Open-Source and AI based Automatic Door Lock Access Control Solution

  • Yoon, Sung Hoon;Lee, Kil Soo;Cha, Jae Sang;Mariappan, Vinayagam;Young, Ko Eun;Woo, Deok Gun;Kim, Jeong Uk
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.8-14
    • /
    • 2020
  • Recently, there was an increasing demand for an integrated access control system which is capable of user recognition, door control, and facility operations control for smart buildings automation. The market available door lock access control solutions need to be improved from the current level security of door locks operations where security is compromised when a password or digital keys are exposed to the strangers. At present, the access control system solution providers focusing on developing an automatic access control system using (RF) based technologies like bluetooth, WiFi, etc. All the existing automatic door access control technologies required an additional hardware interface and always vulnerable security threads. This paper proposes the user identification and authentication solution for automatic door lock control operations using camera based visible light communication (VLC) technology. This proposed approach use the cameras installed in building facility, user smart devices and IoT open source controller based LED light sensors installed in buildings infrastructure. The building facility installed IoT LED light sensors transmit the authorized user and facility information color grid code and the smart device camera decode the user informations and verify with stored user information then indicate the authentication status to the user and send authentication acknowledgement to facility door lock integrated camera to control the door lock operations. The camera based VLC receiver uses the artificial intelligence (AI) methods to decode VLC data to improve the VLC performance. This paper implements the testbed model using IoT open-source based LED light sensor with CCTV camera and user smartphone devices. The experiment results are verified with custom made convolutional neural network (CNN) based AI techniques for VLC deciding method on smart devices and PC based CCTV monitoring solutions. The archived experiment results confirm that proposed door access control solution is effective and robust for automatic door access control.

Performance Analysis of Opportunistic Spectrum Access Protocol for Multi-Channel Cognitive Radio Networks

  • Kim, Kyung Jae;Kwak, Kyung Sup;Choi, Bong Dae
    • Journal of Communications and Networks
    • /
    • v.15 no.1
    • /
    • pp.77-86
    • /
    • 2013
  • Cognitive radio (CR) has emerged as one of effective methods to enhance the utilization of existing radio spectrum. Main principle of CR is that secondary users (SUs) are allowed to use the spectrum unused by primary users (PUs) without interfering PU's transmissions. In this paper, PUs operate on a slot-by-slot basis and SUs try to exploit the slots unused by PUs. We propose OSA protocols in the single channel and we propose an opportunistic spectrum access (OSA) protocols in the multi-channel cognitive radio networks with one control channel and several licensed channels where a slot is divided into contention phase and transmission phase. A slot is divided into reporting phase, contention phase and transmission phase. The reporting phase plays a role of finding idle channels unused by PUs and the contention phase plays a role of selecting a SU who will send packets in the data transmission phase. One SU is selected by carrier sense multiple access / collision avoidance (CSMA/CA) with request to send / clear to send (RTS/CTS) mechanism on control channel and the SU is allowed to occupy all remaining part of all idle channels during the current slot. For mathematical analysis, first we deal with the single-channel case and we model the proposed OSA media access control (MAC) protocol by three-dimensional discrete time Markov chain (DTMC) whose one-step transition probability matrix has a special structure so as to apply the censored Markov chain method to obtain the steady state distribution.We obtain the throughput and the distribution of access delay. Next we deal with the multi-channel case and obtain the throughput and the distribution of access delay by using results of single-channel case. In numerical results, our mathematical analysis is verified by simulations and we give numerical results on throughput and access delay of the proposed MAC protocol. Finally, we find the maximum allowable number of SUs satisfying the requirements on throughput and access delay.

Development of a Flood Runoff and Inundation Analysis System Associated With 2-D Rainfall Data Generated Using Radar I. Quality Control and CAPPI Composite Calculation (레이더 정량강우와 연계한 홍수유출 및 범람해석 시스템 확립 I. 품질검사와 합성 CAPPI 산출)

  • Choi, Kyu-Hyun;Han, Kun-Yeun;Kim, Kyung-Eak;Lee, Chang-Hee
    • Journal of Korea Water Resources Association
    • /
    • v.39 no.4 s.165
    • /
    • pp.321-334
    • /
    • 2006
  • The need for economical and accurate presentations of equivalent radar reflectivity( $Z_e$) data in an orthogonal coordinate system has existed for some time. So, in this study, a fast and efficient procedure has been developed which allows the systematic interpolation of digital reflectivity data from radar space into Cartesian space. At first, QC(Quality Control) of radar data has been executed for extracting uncontaminated Constant Altitude Plan Position Indicator(CAPPI) data. The algorithm is designed so that only one ordered pass through the original Plan Position Indicator(PPI) scan data is necessary to complete the interpolation process. The model can calculate various resolution and altitude reflectivity data for many kinds of hydrological usage.

A Study on Designing Method of VoIP QoS Management Framework Model under NGN Infrastructure Environment (NGN 기반환경 에서의 VoIP QoS 관리체계 모델 설계)

  • Noh, Si-Choon;Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.12 no.1
    • /
    • pp.85-94
    • /
    • 2011
  • QoS(Quality of Service) is defined as "The collective effect of service performance which determines the degree of satisfaction of a user of the service" by ITU-T Rec. E.800. While the use of VoIP(Voice Over Internet Protocol) has been widely implemented, persistent problems with QoS are a very important sue which needs to be solved. This research is finding the assignment of VoIP QoS to deduct how to manage the control system and presenting the QoS control process and framework under NGN(Next Generation Network) environment. The trial framework is the modeling of the QoS measurement metrics, instrument, equipment, method of measurement, the series of cycle & the methodology about analysis of the result of measurement. This research underlines that the vulnerability of the VoIP protocol in relation to its QoS can be guaranteed when the product quality and management are controlled and measured systematically. Especially it's very important time to maintain the research about VoIP QoS measurement and control because the big conversion of new network technology paradigm is now spreading. In addition, when the proposed method is applied, it can reduce an overall delay and can contribute to improved service quality, in relation to signal, voice processing, filtering more effectively.

An Analysis of Decision Making Factor by Delphi and DEMATEL Model for Decision Support Information System development -Wartime Operational Control Transition approach- (의사결정 지원 정보시스템 개발을 위한 Delphi-DEMATEL모델에 의한 의사결정 요인분석 -전작권 전환 사례를 중심으로-)

  • Park, Sangjung;Koh, Chan
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.47-58
    • /
    • 2012
  • This study selects political and military decision factors of Participatory Government's Wartime Operational Control(OPCON) Transition and analyzes, both quantitatively and qualitatively, the effects and relations between those factors. Previous research utilizing the Analytic Hierarchy Process(AHP) selected their decision factors based on academic data and field experience, requiring more objective analysis of the factors. For this study, we conducted a survey among security subject matter experts(SME) both online and offline. The results show that OPCON transition's decision factors were to 'recover military sovereignty', 'set the conditions for peaceful reunification' and 'improve ROK image through enhancing national power' which differs little from the previous AHP method studies. It also showed that 'recover military sovereignty' and 'set the conditions for peaceful reunification' had no relationship to each other and that the key factor that decided the OPCON Transition was actually 'recover military sovereignty' which represents the interest of the liberal party in ROK. This study finds its meaning by analyzing the decision factors of Participartory Government's OPCON Transition thorugh Delphi and DEMATEL method.

A Study on the Influence of Entrepreneurship Education on the Entrepreneurship Intention of Chinese University Students (창업교육이 중국대학생의 창업의도에 미치는 영향에 관한 연구)

  • Hao, Yue;Kim, Hyung-Ho;Sim, Jae-yeon
    • Journal of Digital Convergence
    • /
    • v.18 no.8
    • /
    • pp.11-19
    • /
    • 2020
  • In recent years, college students have emerged as the main players in Chinese innovation and start-ups. Based on the TPB theory, this paper introduced the start-up education variables and established the influence model of start-up education for university students in China on the motivation of start-up. In this paper, a questionnaire containing five variables, including behavior attitude, subjective norms, perceived behavior control, entrepreneurship education and entrepreneurial intention, was investigated for students from six universities in Jilin Province, China, and statistical analysis was carried out using SPSS23.0. The study found that the entrepreneurship education of college students had the greatest impact on entrepreneurial intentions compared to the three elements of planned behavioral theory: behavioral attitudes, subjective norms and perceived behavioral control. This paper has a guiding significance in strengthening start-up education in universities. This study was conducted only for students from six universities in Jilin Province, China, and the scope of the study needs to be expanded throughout China in order to generalize the research results.

A Study about weight grant of Authentication level in USN environment

  • Choi, Bae-Young;Ahn, Byung-Ryul;Chung, Tai-Myoung
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.165-168
    • /
    • 2005
  • The objects, which can be personal digital assistants, electronic rings, doors or even clothes, offer embedded chips with computation facilities and are generally called artifacts. I later realized that this was not so the real problem is actually authentication. Recent results indicate scalability problems for flat ad hoc networks. Sensor network achieves function that handle surrounding information perception through sensor and sensed information to network that is consisted of sensor nodes of large number. Research about new access control techniques and height administration techniques need authentication information persons' certification assurance level classification in sensor network environment which become necessary different view base with authentication information at node for application of AAA technology in USN environment that must do authentication process using information that is collected from various sensor mountings. So, get base authentication information in sensor type and present weight grant model by security strength about authentication information through information who draw. In this paper collected information of sensor nodes model who give weight drawing security reinforcement as authentication information by purpose present be going to. and Must be able to can grasp special quality of each sensor appliances in various side and use this and decide authentication assurance level for value estimation as authentication information elements. Therefore, do to define item that can evaluate Authentication information elements thus and give simple authentication assurance level value accordingly because applying weight. Present model who give authentication assurance level value and weight for quotation according to security strength.

  • PDF

Performance Comparison of Call Admission Control Based on Predictive Resource Reservations in Wireless Networks (무선망의 자원예측에 의한 호 수락제어방식의 성능비교)

  • Lee, Jin-Yi
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.3
    • /
    • pp.372-377
    • /
    • 2009
  • This paper evaluates the performance of three methods for predicting resources requested by mobile's calls and a call admission algorithm based on these predicting methods respectively in wireless networks. The first method is based on Wiener prediction model and the second method is based on the MMOSPRED algorithm and the third method is based on the neural network. The proposed call admission algorithm is based on prioritized handoff call in resource allocation. The resources for future handoff calls are therefore predicted and reserved in advance, and then new calls are admitted as long as the remaining resources are sufficient. We compare their performances in terms of prediction error, new call blocking and handoff dropping probabilities by simulation. Results show that the CAC based on Wiener prediction model performs favorably due to exact resources prediction.

  • PDF

Programming Model for SODA-II: a Baseband Processor for Software Defined Radio Systems (SDR용 기저대역 프로세서를 위한 프로그래밍 모델)

  • Lee, Hyun-Seok;Yi, Joon-Hwan;Oh, Hyuk-Jun
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.47 no.7
    • /
    • pp.78-86
    • /
    • 2010
  • This paper discusses the programming model of SODA-II that is a baseband processor for software defined radio (SDR) systems. Signal processing On-Demand Architecture Ⅱ (SODA-II) is an on-chip multiprocessor architecture consisting of four processor cores and each core has both an wide SIMD datapath and a scalar datapath. This architecture is appropriate for baseband processing that is a mixture of vector computations and scalar computations. The programming model of the SODA-II is based on C library routines. Because the library routines hide the details of complex SIMD datapath control procedures, end users can easily program the SODA-II without deep understanding on its architecture. In this paper, we discuss the details of library routines and how these routines are exploited in the implementation of baseband signal processing algorithms. As application examples, we show the implementation result of W-CDMA multipath searcher and OFDM demodulator on the SODA-II.