• Title/Summary/Keyword: Identification Information

Search Result 4,763, Processing Time 0.04 seconds

A Study on the Preparation of Standardized Operation Criteria for Enhancement of Safety and Convenience of Mobile Electronic Notice Service

  • JongBae, Kim
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.547-554
    • /
    • 2022
  • Due to the expansion of non-face-to-face services, the demand for user identification for mobile devices is increasing. Recently, mobile resident registration cards, mobile driver's licenses, etc. are installed in mobile phones and used for user identification and authentication services. In order to identify a user online, unique identification information of the online user is required. In particular, in order to provide information only to online users, it is necessary to accurately deliver information to a mobile device owned by the user. To make this service possible, it was realized with the advent of mobile electronic notice service. However, the identification of online service users and information on mobile devices owned or subscribed by the relevant users require safe management as personal information, and it is also necessary to increase the convenience of online service users. In this paper, we propose an operating standard for providing a mobile electronic notice service that sends electronic notice using a mobile device owned by the user. The mobile electronic notice service is a service that provides notices expressed in electronic information to the recipient's cell phone, mobile app, e-mail, etc. Therefore, as the use of mobile electronic notification service increases and the provision and use of connecting information to identify users increases, it is necessary to expand the mobile electronic notification service while safely protecting users' personal information.

A Study of the Classification and Identification of the Disaster Protection Resources (방재 자원의 효과적 분류 및 식별에 관한 연구)

  • Lee, Changyeol;Kim, Taehwan;Park, Giljoo
    • Journal of the Society of Disaster Information
    • /
    • v.9 no.1
    • /
    • pp.65-77
    • /
    • 2013
  • There are many institutes which manage the disaster protection resources in their system. The system of the institutes is not mutually compatible, because there is no standard framework of the classification and identification for the disaster management resources. NIMS of FEMA defines the classification and identification framework for the incident resources. All incidents management system of USA including IRIS and webEOC follows the standard resources framework. The aim of the classification and identification of the resources provides the resources list for the disaster and supports to find the resources information efficiently. In this study, we defined the classification and identification of the resources considering the compatibility with the international standard and the field requirements.

Survey on the Korean MCS Systems and Development Issues (국내 MCS 시스템 현황 및 발전 방향)

  • Kim, Geon-Ung;Park, Gyei-Kark;Choi, Jo-Cheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.10
    • /
    • pp.2019-2029
    • /
    • 2009
  • There are several MCS(Monitoring, Control and Surveillance) systems for maritime safety and security in Korea; VMS (Vessel Monitoring System) that based on the AIS(Automatic Identification System), and the LRIT(Long-Range Identification and Tracking), the Vessel Free Pass System that based on the RFID(Radio Frequency IDentification), the Fisheries Information Network that provided by the National Federation of Fisheries Cooperatives. This paper surveys the fundamental technologies of MCS systems, and compares the role and function of them. It also surveys the development direction of each systems and research topics for cooperation of them.

A study on the method of measuring the usefulness of De-Identified Information using Personal Information

  • Kim, Dong-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.6
    • /
    • pp.11-21
    • /
    • 2022
  • Although interest in de-identification measures for the safe use of personal information is growing at home and abroad, cases where de-identified information is re-identified through insufficient de-identification measures and inferences are occurring. In order to compensate for these problems and discover new technologies for de-identification measures, competitions to compete on the safety and usefulness of de-identified information are being held in Korea and Japan. This paper analyzes the safety and usefulness indicators used in these competitions, and proposes and verifies new indicators that can measure usefulness more efficiently. Although it was not possible to verify through a large population due to a significant shortage of experts in the fields of mathematics and statistics in the field of de-identification processing, very positive results could be derived for the necessity and validity of new indicators. In order to safely utilize the vast amount of public data in Korea as de-identified information, research on these usefulness metrics should be continuously conducted, and it is expected that more active research will proceed starting with this thesis.

High Performance Signature Generation by Quality Evaluation of Payload Signature (페이로드 시그니쳐 품질 평가를 통한 고효율 응용 시그니쳐 탐색)

  • Lee, Sung-Ho;Kim, Jong-Hyun;Goo, Young-Hoon;Sija, Baraka D.;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.10
    • /
    • pp.1301-1308
    • /
    • 2016
  • Internet traffic identification is an essential preliminary step for stable service provision and efficient network management. The payload signature-based-classification is considered as a reliable method for Internet traffic identification. But its performance is highly dependent on the number and the structure of signatures. If the numbers and structural complexity of signatures are not proper, the performance of payload signature-based-classification easily deteriorates. Therefore, in order to improve the performance of the identification system, it is necessary to regulate the numbers of the signature. In this paper, we propose a novel signature quality evaluation method to decide which signature is highly efficient for Internet traffic identification. We newly define the signature quality evaluation criteria and find the highly efficient signature through the method. Quality evaluation is performed in three different perspectives and the weight of each signature is computed through those perspectives values. And we construct the signature map(S-MAP) to find the highly efficient signature. The proposed method achieved an approximately fourfold increased efficiency in application traffic identification.

A Study on Shipborne Automatic Identification System (AIS)

  • Liu, Renji;Liu, Chang
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2001.10a
    • /
    • pp.19-25
    • /
    • 2001
  • At present the identification of vessels is still depending on the OOW (Officer Of Wateh) in VTS (Vessel Traffic Service), which is completed by radar, and also by the combination of VHF radio and VHF direction finder. However, with the development of port transportation and economic, this conventional way of identification can't satisfy more and more request for the information that the VTS needs from the vessels. In such a case, the AIS(Automatic Identification System) precept which is based on STDMA (Self-organized Time Division Multiple Access) technique is put forward by IMO (International Maritime Organization). AIS can automatically provide the information, including own ship's identification, type, position, course, speed, and other information to the appropriately equipped coast station and other ships. At the same time it can also automatically monitor and track the nearby ships similarly fitted with AIS. On the basis of describing the whole comprising and the format of transmission information of AIS, this paper mainly studies the key communication techniques in AIS, such as STDMA protocol, net synchronization and GMSK(Gaussian Minimum Shift Keying)technique, and so on. At last this paper briefly introduces the recommendation decided by IMO on forcing the sea-going ships to fixed with AIS equipments, and it continuos with the unexploited potential of AIS if it applies in VTS.

  • PDF

Fabrication and characterization of a small-sized gas identification instrument for detecting LPG/LNG and CO gases

  • Lee Kyu-Chung;Hur Chang-Wu
    • Journal of information and communication convergence engineering
    • /
    • v.4 no.1
    • /
    • pp.18-22
    • /
    • 2006
  • A small-sized gas identification system has been fabricated and characterized using an integrated gas sensor array and artificial neural-network. The sensor array consists of four thick-film oxide semiconductor gas sensors whose sensing layers are $In_{2}O_{3}-Sb_{2}O_{5}-Pd-doped\;SnO_2$ + Pd-coated layer, $La_{2}O_{5}-PdCl_{2}-doped\;SnO_2,\;WO_{3}-doped\;SnO_{2}$ + Pt-coated layer and $ThO_{2}-V_{2}O_{5}-PdCl_{2}\;doped\;SnO_{2}$. The small-sized gas identification instrument is composed of a GMS 81504 containing an internal ROM (4k bytes), a RAM (128 bytes) and four-channel AD converter as MPU, LEDs for displaying alarm conditions for three gases (liquefied petroleum gas: LPG, liquefied natural gas: LNG and carbon monoxide: CO) and interface circuits for them. The instrument has been used to identify alarm conditions for three gases among the real circumstances and the identification has been successfully demonstrated.

Comparison of Memoryless Anti-collision Protocols for Tag Identification (태그 인식을 위한 무기억 충돌 방지 프로토콜의 비교 분석)

  • Yang, Eui-Sik;Lim, In-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.565-568
    • /
    • 2005
  • RFID system allows contactless identification of objects, where small tags are attached to objects and information of objects are transferred using radio frequency. In recent years, industries have incorporated several identification systems to its production processes, which allow collecting automatically information about goods. In order to communicate with a single tag out of a group of tags, the target tag has to be identified. Therefore the read has to attempt to obtain the unique identification code of each tag within its read range. This paper presents performance results of QT and QT-sl protocols, which are tag identification protocols incorporating memoryless property. The memoryless property is that the current response of each tag only depends on the current query of the reader but not on the past history of the reader's queries.

  • PDF

Collision Reduction Using Modified Q-Algorithm with Moving Readers in LED-ID System

  • Huynh, Vu Van;Le, Nam-Tuan;Choi, Sun-Woong;Jang, Yeong-Min
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.5A
    • /
    • pp.358-366
    • /
    • 2012
  • LED-ID (Light Emitting Diode - Identification) is one of the key technologies for identification, data transmission, and illumination simultaneously. This is the new paradigm in the identification technology environment. There are many issues are still now challenging to achieve high performance in LED-ID system. Collision issue is one of them. Actually this is the most significant issue in all identification system. LED-ID system also suffers from collision problem. In our system, collision occurs when two or more readers transmit data to tag at the same time or vice versa. There are many anti-collision protocols to resolve this problem; such as: Slotted ALOHA, Basic Frame Slotted ALOHA, Query Tree, Tree Splitting, and Q-Algorithm etc. In this paper, we propose modified Q-Algorithm to resolve collision at tag. The proposed protocol is based on Q-Algorithm and used the information of arrived readers to a tag from neighbor. The information includes transmitting slot number of readers and the number of readers that can be arrived in next slot. Our proposed protocol can reduce the numbers of collision slot and the successful time to identify all readers. In this paper our simulation and theoretical results are presented.

A Development and Application of Methods of Identifying for the Elementary Gifted Children of Information Science (초등 정보과학영재를 위한 판별 방안 연구)

  • Hwang, Kuk-Hwan;Lee, Ae-Jung;Lee, Jae-Ho
    • Journal of The Korean Association of Information Education
    • /
    • v.9 no.1
    • /
    • pp.69-76
    • /
    • 2005
  • The researcher conducts the following research to correctly identify the gifted children of science information. First, the researcher makes sufficient theoretic research on gifted children for the sake of definition and identification of the gifted children of information science, and reconstructed the identification principles, factors and procedures of the gifted children of information science on the basis of those of the gifted children of math and science the theories of a number of scholars and presented new methods of identifying new gifted children of information science. Second, the researcher set the identification procedures of the gifted children of information science and the relevant content and conducted the identification of gifted children through the observation and evaluation of sixth graders through three stages. Third, the researcher compares and analyzed the selected gifted children based on the identification procedures and ordinary groups of students excellent in math and science in terms of task achievement and looked into validity.

  • PDF