• Title/Summary/Keyword: Permission System

Search Result 277, Processing Time 0.031 seconds

Simplification of Device-Triggered Reporting Procedure on 3GPP GERAN Cellular IoT Communications (3GPP GERAN CIoT 환경에서 디바이스 Triggering 기반 Reporting 절차 간소화 방안)

  • Kim, Jun Suk;Shin, Jung Wan;Chung, Min Young
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.27 no.1
    • /
    • pp.80-83
    • /
    • 2016
  • In this paper, a simplified uplink transmission procedure is proposed for reducing energy consumption and improving lifetime of CIoT devices. In the proposed procedure, the CIoT devices register information on their service and traffic to the networks, and the networks statically allocate pre-defined amounts of radio resources when the CIoT devices have requested permission for their uplink transmissions. This paper provides details of the proposed procedure comparing with those of the current GSM procedure, and defines detailed operations of the devices and the networks for the proposed one. This shows that the proposed scheme can effectively support CIoT services on GSM networks.

Research Analysis on User's Acceptability of Digital Contents Distribution among Individuals (개인 간 저작물 유통을 위한 사용자의 수용성 조사 분석)

  • Sohn, Bang Yong;Suh, Hye Sun
    • Journal of Digital Convergence
    • /
    • v.14 no.1
    • /
    • pp.211-217
    • /
    • 2016
  • There have been gradually established paid using system on contents, such as sound source, webtoon etc, with which licences are systematically managed. However, rampant free sites still mostly relying on advertising revenue make difficulties on lots of contents developers and obstruct the protection of their resonable right. In this situation, we need systematic measures to protect copyright of authors and to maximize use of contents of users. Therefore, it is important to handle the convenience of digital contents distribution and the diversity of contents license(differentiating permission rate according to user's purpose, scope, service period etc), based on the need of contents users. This paper implies to guideline to install contents distribution platform of individuals and to apprehend the need and acceptability of users in order to activate digital contents transaction on individuals.

A Study on the Final Evaluation Criteria of Allocation Exceedance Regional in Total Maximum Daily Load (오염총량관리 할당부하량 초과지역의 최종 평가기준에 관한 연구)

  • Oh, Seung Young;Han, Mideok;Kim, Seok Gyu;Ahn, Ki Hong;Kim, Oksun;Kim, Yong Seok;Park, Ji Hyoung
    • Journal of Korean Society on Water Environment
    • /
    • v.32 no.5
    • /
    • pp.450-457
    • /
    • 2016
  • The Total Maximum Daily Load (TMDL) is a watershed management system that involves the establishment of the target water quality, the calculation of permission loading (allocation loading), and the control of total pollutants for each unit watershed. Allocation loading is assessed through the comprehensive implementation assessment of the previous year's plan. Assessment results are used for follow-up management measures such as the limit of development and updating of TMDL Management Implementation Plans for the next planning period. Although detailed assessment criteria are important, they are not currently available. Therefore, we suggested assessment criteria by comparing two methods('integration method' and 'separation method') using combination point and non-point discharge loading. We also examined the penalty criteria considering controllable load local government and updating methods of the TMDL Management Implementation Plan for the next planning period.

Improving the Slope Calculation Method for Evaluating the Feasibility of the Land Development (토지 개발 적정성 평가를 위한 경사도 계산 방법 개선)

  • Lee, Byoung Kil
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.24 no.3
    • /
    • pp.85-92
    • /
    • 2016
  • Slope is one of the most important factor in land development permission standards. In guideline of "Land Suitability Assessment" or "Forest Land Conversion Standard", average slope can be measured using digital map and GIS for target area. Inputs in slope calculation are 1/5,000 digital map of NGII(National Geographic Information Institute) or digital information of Korea Land Information System. Many confusions occur in the field, as there is no standard for slope calculation and are lots of slope calculation methods using contour lines or DEM derived from them. Avoiding these confusions, this study was intended to propose a standardized method for slope calculation and a selection method for a suitable resolution. In this study, using DEM of optimum grid size according to the complexity of topography with finite difference method is suggested as improved slope calculation method, after comparing several representative slope calculation methods.

A study to detect and leaked personal information on the smartphone. (스마트폰 상에서의 개인정보 유출 탐지 모니터링 연구)

  • Kim, Wung-Jun;Park, Sang-Hwi;Park, Sang-No;Kim, Chang-Su;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.606-608
    • /
    • 2014
  • Recent smartphone users constantly increases, an increase in malicious applications smartphones indiscretions exists within the Terminal, through the deployment of privacy disclosure, Singh and other victims also are on the rise. A typical personal way to malicious code masquerading as a normal application and install it on the handset of my text message or a personal note, such as personal information, the certificate directory, is the way that leaked. Therefore, to obtain permission to attack the root Terminal event by collecting malware infections and respond to determine whether it is necessary for the technique. In this paper, check the features of a Smartphone in real time systems, to carry out a study on the application throughout the Terminal to collect my attack event analysis, malware infection can determine whether or not the mobile security monitoring system. This prevents a user's personal information and take advantage of the top and spill are expected to be on the field.

  • PDF

Patient Information Transfer System Using OAuth 2.0 Delegation Token (OAuth 2.0 위임 Token을 이용한 환자정보 전달 시스템)

  • Park, Jungsoo;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1103-1113
    • /
    • 2020
  • Hospitals store and manage personal and health information through the electronic medical record (EMR). However, vulnerabilities and threats are increasing with the provision of various services for information sharing in hospitals. Therefore, in this paper, we propose a model to prevent personal information leakage due to the transmission of patient information in EMR. A method for granting permission to securely receive and transmit patient information from hospitals where patient medical records are stored is proposed using OAuth authorization tokens. A protocol was proposed to enable secure information delivery by applying and delivering the record access restrictions desired by the patient to the OAuth Token. OAuth Delegation Token can be delivered by writing the authority, scope, and time of destruction to view patient information.This prevents the illegal collection of patient information and prevents the leakage of personal information that may occur during the delivery process.

A Study on Radio Wave Resource Management and Industrial Technology Revitalization in The Medical and Energy Fields (의료 및 에너지 분야 전파 자원 관리 및 산업 기술 활성화 방안에 대한 연구)

  • Yoon, Sang-Ok;Seok, Gyeong-Hyu
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.4
    • /
    • pp.543-554
    • /
    • 2022
  • In this study, the government's investment, laws, regulations, and difficulties related to IoT radio technology in the energy and medical fields are mainly analyzed. Also, plans for dissemination, technology preemption, and commercialization are derived to enhance global competitiveness. Research on ways to secure and predict radio wave application technologies in energy and medical fields, and to alleviate barriers to entry for new business operators. Analyzes the efficiency of support measures using expert groups in each energy and medical field, analyzes the utilization value of accumulated data, and proposes mid- to long-term promotion systems and support measures, as well as utilization measures of data held by external agencies related to radio waves.

Ensuring the Quality of Higher Education in the United Kingdom Using Informatization

  • Andreikova, Iryna;Moiseienko, Natalia;Boichuk, Petro;Iliichuk, Liubomyra;Fedchenko, Karina;Bezliudnyi, Oleksandr;Sopivnyk, Ruslan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.324-330
    • /
    • 2022
  • The United Kingdom is known for the quality of its qualifications. There is a strict quality system with reputable bodies responsible for ensuring that high quality standards are met. In order for new qualifications to be accredited, they must meet all the requirements set out in the regulations for the quality and informatization of Education. The crucial role of the Agency for Quality Assurance of Higher Education (QAA) in the UK for creating high-quality management of higher education institutions is revealed, the influence of informatization tools on its effective mechanism as an independent entity is shown, and positive experience for the educational sector is highlighted. While the universities themselves are responsible for reviewing educational programs at the subject level, the QAA review focuses on verifying internal quality assurance, as well as systems and improvement strategies. The QAA uses a peer review process in which teams mostly consist of academic staff from other institutions to assess the quality of the institution's education. In Scotland, the team also includes an international reviewer. The student is also a member of the Scottish teams. In the UK, attention is paid to providing a cohort of experienced reviewers who can conduct high-quality monitoring and help with advice on improving education. All reviewers must complete training and have permission to participate in the review of educational programs. There are selected committees that are members of the QAA council, each of which is headed by a member of the Council or an independent person approved by the Council. Attention is drawn to the main areas of the QAA's work in the framework of environmental, social and corporate governance.

Control of metal resources and development of substitute materials for building materials by Japan after the Second Sino-Japanese War (중일전쟁 이후 일제의 금속자원 통제와 건축자재 대용품 개발)

  • Hong, Kyung-Hwa;Han, Dong-Soo
    • Journal of architectural history
    • /
    • v.31 no.4
    • /
    • pp.7-16
    • /
    • 2022
  • Since the beginning of the second Sino-Japanese war in 1937, the entire Korean Peninsula has entered a full-fledged wartime system. Japan enacted laws that strongly regulate the distribution of various resources for war, and the same was implemented in Joseon. In particular, as iron, copper, lead, tin, and aluminum were mobilized as raw materials for military supplies such as weapons, private distribution decreased significantly, which had a great impact on the construction industry. As the use of metal such as steel as building materials requires permission from the provincial governor, it has become difficult to supply and demand except for some military facilities. In addition, the Japanese Ministry of Commerce and Industry encouraged research and development and manufacturing to promote the so-called "substitute goods industry" to make up for the shortage of supplies. Products with improved performance through chemical treatment by injecting only a small amount of the same raw material than before or using alternative raw materials have been developed. It was intended to overcome the limitations of lack of raw materials through the chemical industry. In terms of building materials, various substitutes were produced due to the incorporation of petrochemicals and the use of synthetic resins. This trend continued even after the end of the war and served as one of the backgrounds for R&D and production of new materials without returning to the "substitute goods."

Design and Implementation of Mobile Phone Interface Module for DGPS Correction Message Transmission (DGPS 보정신호 전송을 위한 휴대전화 인터페이스 모듈의 설계 및 구현)

  • Yi, Jae-hoon;Kim, Chang-Soo;Jeong, Seong-Hoon;Lee, Tae-Oh;Yun, Hee-Chul;Yim, Jae-Hong
    • Journal of Navigation and Port Research
    • /
    • v.26 no.4
    • /
    • pp.419-426
    • /
    • 2002
  • The conventional RTK-GPS technique has many problems which are permission using RF wireless modem, influence of geographic obstacle using radio wave, frequency interference, finiteness of frequency resources. To solve these problems, in this paper, we designed the DGPS correction message transmission system as a method to substitute the RF wireless modem of RTK-DGPS receiver. Then the interface module was designed and implemented for linkage of GPS receiver and mobile phone. As a result worked differential surveying using receiving correction message using RS-232C and communication control, users of mobile station were worked differential surveying correction between mobile phones. Interface module system was received the same result of precision which was compared RF wireless modem system.