• Title/Summary/Keyword: E-mail

Search Result 1,062, Processing Time 0.025 seconds

Effects of Self-care Program Using SMS, E-mail, or Telephone Call on Self-care Compliance and Nutritional Status in Hemodialysis Patients (혈액투석환자에서 문자메시지(SMS), 이메일 및 전화를 이용한 자가간호 프로그램이 자가간호 이행과 영양 상태에 미치는 효과)

  • An, Gyeong-Ju
    • Journal of Korean Biological Nursing Science
    • /
    • v.11 no.2
    • /
    • pp.157-166
    • /
    • 2009
  • Purpose: The purpose of this study was to determine the effects of self-care program using Short message service (SMS), e-mail, or telephone call on self-care compliance and nutritional status in maintenance of hemodialysis patient. Methods: Nonequivalent pretest-posttest control experimental design was used. Ninety-six patients were allocated to control (n=24), SMS (n=24), e-mail (n=24), or telephone (n=24) group from four hospitals. Experimental groups received self-care program about hemodialysis diet, drug administration, exercise, and fistula care by SMS, e-mail, or telephone call respectively at 3 times a week for 4 weeks. Results: Subjective self-care compliance, and objective self-care compliance including interdialytic weight of SMS and telephone groups were significantly increased than those of control groups. However, nutritional status of SMS and e-mail groups were significantly improved than those of control groups in albumin and protein level. Conclusion: Self-care program using SMS and telephone call were effective on promoting self-care compliance, while SMS and e-mail were effective on improving nutritional status. The pop-up remaining effect and easy accessible effect of SMS message in busy daily life was considered as an alarm to control fluid and diet.

  • PDF

A Study on the Security Structure of Next Generation E-mail System (차세대 이메일 보안 기술에 관한 연구)

  • Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.183-189
    • /
    • 2008
  • E-mail's role has been increased due to its merit which is sending demanded information in real-time anywhere, anytime. However, Today's E-mail security threats have being changed intelligently to attack against the specific agency. The threat is a limit to respond. Therefore precise definition and development of security technology is needed to analyze changing environment and technologies of e-mail so that remove fundamental security threat. we proposed Next Generation E-mail System Security Structure and the Next Generation fusion System using authentication As a result, in this study, we development of Next Generation E-mail System Security Structure. This system can protect E-mail user from social engineering hacking technique, spam, virus, malicious code and fabrication.

  • PDF

A Study on the Development of Web-based Full Motion Video E-mail System using MPEG-4 (웹을 기반으로 한 MPEG-4 동영상 E-mail 시스템의 개발)

  • 고재승
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.3
    • /
    • pp.283-294
    • /
    • 2002
  • Now is the time for web-based video e-mail system because of world wide use of internet. But video data is so large, then data compression is much needed for transmission by web. In this paper, my colleagues and I implement full motion video e-mail system using MPEG-4, the international standards for audio-visual data. This video e-mail system is made of web-based active-X control, so easily accessible by web, and applies real-time audio-video compression. It's possible for everyone to send video e-mail for free to everywhere in the world if this system is used. The main application areas of this system are multimedia mailing service, web-based video advertisement, remote education, remote medical service and shopping mall construction, etc.

  • PDF

Hacking Mail Profiling by Applying Case Based Reasoning (사례기반추론기법을 적용한 해킹메일 프로파일링)

  • Park, Hyong-Su;Kim, Huy-Kang;Kim, Eun-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.107-122
    • /
    • 2015
  • Many defensive mechanisms have been evolved as new attack methods are developed. However, APT attacks using e-mail are still hard to detect and prevent. Recently, many organizations in the government sector or private sector have been hacked by malicious e-mail based APT attacks. In this paper, first, we built hacking e-mail database based on the real e-mail data which were used in attacks on the Korean government organizations in recent years. Then, we extracted features from the hacking e-mails for profiling them. We design a case vector that can describe the specific characteristics of hacking e-mails well. Finally, based on case based reasoning, we made an algorithm for retrieving the most similar case from the hacking e-mail database when a new hacking e-mail is found. As a result, hacking e-mails have common characteristics in several features such as geo-location information, and these features can be used for classifying benign e-mails and malicious e-mails. Furthermore, this proposed case based reasoning algorithm can be useful for making a decision to analyze suspicious e-mails.

Performance Comparison of Naive Bayesian Learning and Centroid-Based Classification for e-Mail Classification (전자메일 분류를 위한 나이브 베이지안 학습과 중심점 기반 분류의 성능 비교)

  • Kim, Kuk-Pyo;Kwon, Young-S.
    • IE interfaces
    • /
    • v.18 no.1
    • /
    • pp.10-21
    • /
    • 2005
  • With the increasing proliferation of World Wide Web, electronic mail systems have become very widely used communication tools. Researches on e-mail classification have been very important in that e-mail classification system is a major engine for e-mail response management systems which mine unstructured e-mail messages and automatically categorize them. In this research we compare the performance of Naive Bayesian learning and Centroid-Based Classification using the different data set of an on-line shopping mall and a credit card company. We analyze which method performs better under which conditions. We compared classification accuracy of them which depends on structure and size of train set and increasing numbers of class. The experimental results indicate that Naive Bayesian learning performs better, while Centroid-Based Classification is more robust in terms of classification accuracy.

A Three-Step Preprocessing Algorithm for Enhanced Classification of E-Mail Recommendation System (이메일 추천 시스템의 분류 향상을 위한 3단계 전처리 알고리즘)

  • Jeong Ok-Ran;Cho Dong-Sub
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.54 no.4
    • /
    • pp.251-258
    • /
    • 2005
  • Automatic document classification may differ significantly according to the characteristics of documents that are subject to classification, as well as classifier's performance. This research identifies e-mail document's characteristics to apply a three-step preprocessing algorithm that can minimize e-mail document's atypical characteristics. In the first 5go, uncertain based sampling algorithm that used Mean Absolute Deviation(MAD), is used to address the question of selection learning document for the rule generation at the time of classification. In the subsequent stage, Weighted vlaue assigning method by attribute is applied to increase the discriminating capability of the terms that appear on the title on the e-mail document characteristic level. in the third and last stage, accuracy level during classification by each category is increased by using Naive Bayesian Presumptive Algorithm's Dynamic Threshold. And, we implemented an E-Mail Recommendtion System using a three-step preprocessing algorithm the enable users for direct and optimal classification with the recommendation of the applicable category when a mail arrives.

Design and Implementation of The Spam E-Mail filtering System (스팸메일 차단 시스템 설계 및 구현)

  • 김진만;장종욱
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.413-417
    • /
    • 2002
  • E-mail was very particular way of communication in the past, but it becomes one of daily communication methods now. Due to E-mail has a property which is not complete for security, sometimes it is used for purpose of commercial or badthings, therefore it becomes the latest problem to keep off a Spam-mail and commercial advertising E-mail, many ways to keep off were perposed for it. In this paper, I explained how to sort and keep off these Spam-mail and commercial advertising E-mail with three way, prevention by server level, prevention by construction of network level, prevention by client level. we designed a prevention system for Spam-mail and implemented it by Visual Basic.

  • PDF

Practical Secure E-mail Protocols Providing Perfect Forward Secrecy (완전한 전방향 안전성을 제공하는 실용적인 전자우편 프로토콜)

  • Lee, Chang-Yong;Kim, Dae-Young;Shim, Dong-Ho;Kim, Sang-Jin;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.27-38
    • /
    • 2007
  • One of the most important security issues of e-mail service is user privacy. Currently, various security protocols, like PGP(pretty Good Privacy), S/MIME(Secure/Multipurpose Internet Mail Extension), have been proposed. These protocols, however, do not provide forward secrecy. Recently, some security protocols that provide forward secrecy were proposed. But all of them require changes to the current e-mail infrastructure. Moreover, contrary to authors' intention, some of them do not actually provide perfect forward secrecy. In this paper, we propose a new practical e-mail security protocol. The proposed protocol provides perfect forward secrecy and uses a practical e-mail model that dose not require any changes to existing e-mail servers. It encrypts and authenticates messages efficiently using elliptic curve based signcryption scheme. In addition, we provide a way to send secure group e-mails.

Poll System using E-mails

  • Kim, Yon Hyong;Oh, Min Gweon
    • Communications for Statistical Applications and Methods
    • /
    • v.8 no.3
    • /
    • pp.767-775
    • /
    • 2001
  • In this paper we propose a poll system using e-mail. This system expects to increase the response ratio because of including a questionnaire inner e-mail. Especially, this system automatically provides a general paper which is a result of categorical data analysis.

  • PDF

Guidelines for Instructional Use of E-mail (전자우편의 수업적 활용 지침)

  • Kim, Won-Seob;Yoon, Gwan-Sik
    • The Journal of Korean Institute for Practical Engineering Education
    • /
    • v.2 no.2
    • /
    • pp.83-90
    • /
    • 2010
  • The purpose of this study was to investigate guidelines for instructional use of e-mail and the method in the present investigation was followed by an analysis of research literatures. This study suggests the following conclusions. First, instructors should use e-mail effectively to improve communication between an instructor and a learner or learners. Communication was essential to support a good instruction. Second, to use effectively e-mail in teaching and learning process, guidelines should followed by considering e-mail characteristics. These guidelines were as follows: (1) Spelling and grammar should be followed correctly. (2) Messages should be followed shortly and concisely. (3) Summaries should be stated in your first sentence. (4) Messages should be responded rapidly. (5) Messages should be responded kindly. (6) Sarcasm and humor should be used carefully.

  • PDF