• Title/Summary/Keyword: Personal Communication System

Search Result 812, Processing Time 0.026 seconds

A Study on the factors of Change in the Korean Dress and Personal Adornments (우리나라 여성복식의 변화에 미친 요인 연구 - 1945~1960년을 중심으로 -)

  • 박길순
    • The Research Journal of the Costume Culture
    • /
    • v.1 no.1
    • /
    • pp.33-68
    • /
    • 1993
  • The purpose of this paper is to survey the influence of the culture change on the dress and personal adornments, and to survey the change of factors from the August 15. 1945 to 1960, in connection with the social and cultural background, applying B. Malinowski′s "Theory of Culture Change" which means an acculturation is the change′s elements of the dress and its ornaments. It is remarkable that the dress and personal adornments of Korean women after August 15, 1945 has great change from the traditional dress of the thousands years. Through the Liveration on August 15, 1945, American military government and the establishment of the Korean government, American democracy has brought many changes on Korean society. Advancement of education, an society with developed economic life, and introduction of scientific skill have influenced on the women′s way of thinking and a style of behavior and the view of value. The acculturation, the supply of mass communication, introduction of new institution and the reorganization of the old institution, the change of the economic situation, the change of the educational system, the change of the point of value, the development of scientific skill have greatly influenced on the dress and personal adornments. Modern dress and personal adornments of Korean women has the following developing procedure. The Liberation from Japan on the 15th, of August, 1945, the stationing of American Soldiers during hte Koran War, returning of the oversea′s brethern, and the mass communication have the direct and indirect contact with western civilization, and bring the occasion of development of the modern dress of Korean women. The increase of mass communication, such as radio, TV, newspaper, magazines and the frequent fashion shows showed fine design and practical western style dress to the women. This was the real beginning of the western style dress in Korea. By the increase of employment and the improvement of the economic situation, the consumption of clothing and the adornments was increased, so that a wide variety of fashions was set, and numerous kind and form of dress came in. As the increase of the number of women students, their practical and free dress life demanded western style dress. After the Liberation from Japan, the open-door policy of sex, public morals and traditional ethics became lax, and in this disordered society, indecent expose of the body was common. By the different kind of technological development, the form, fabrics, colors and patterns in clothes were much influenced and the hair style, make up, shoes and adornments were much influenced too. As shown above, the change of the dress has the same connection with that of society and culture. This shows that the dress and personal adornments represent clearly the cultural phenomenon of the society and cultural change of the society.

  • PDF

A Conceptual Study on the Development of Intelligent Detection Model for the anonymous Communication bypassing the Cyber Defense System (사이버 방어체계를 우회하는 익명통신의 지능형 탐지모델개발을 위한 개념연구)

  • Jung, Ui Seob;Kim, Jae Hyun;Jeong, Chan Ki
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.77-85
    • /
    • 2019
  • As the Internet continues to evolve, cyber attacks are becoming more precise and covert. Anonymous communication, which is used to protect personal privacy, is also being used for cyber attacks. Not only it hides the attacker's IP address but also encrypts traffic, which allows users to bypass the information protection system that most organizations and institutions are using to defend cyber attacks. For this reason, anonymous communication can be used as a means of attacking malicious code or for downloading additional malware. Therefore, this study aims to suggest a method to detect and block encrypted anonymous communication as quickly as possible through artificial intelligence. Furthermore, it will be applied to the defense to detect malicious communication and contribute to preventing the leakage of important data and cyber attacks.

An User-aware System using Visible Light Communication (가시광 통신을 이용한 사용자 인식 시스템)

  • Kim, Jong-Su;Lee, Won-Young
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.4
    • /
    • pp.715-722
    • /
    • 2019
  • This paper introduces the implementation of an user-aware system using a visible light communication and its operations. The user-aware system using a visible light communication consists of the transmitter based on the Android system and the receiver based on an open-source controller. In the transmitter, user's personal information data is encoded and converted to visible light signals by the Android camera interface. In the receiver, the photodiode module receives the incoming visible light signals and converts to electrical signals and the open-source controller, that is arduino processes the received data. The processing module finds the start bit of 0111 to determine the user information data from the packet for the burst-mode communication. According to the experimental results, the proposed system successfully transmits and receives visible light data with the manchester encoding.

Energy Efficient Wireless Data Transmission for Personal Health Devices

  • Kim, Sang-Kon;Kim, Tae-Kon;Koh, Jin-Hwan
    • Journal of Electrical Engineering and Technology
    • /
    • v.8 no.6
    • /
    • pp.1559-1570
    • /
    • 2013
  • The family of ISO/IEEE11073 standards is the basis of the e-health system and provides interoperability for personal health devices. In the early stage of e-health business, it was expected that people would use a health device individually. In this case, a measurement datum was episodically acquired and generally transmitted for one person at a time. Recently, a health device is expected to be used by multiple people, and large amounts of measurement data are gathered in a short time interval. In addition, mobile health devices have become more popular, so that energy efficient measurement data transmission is required, to prolong the use of a device. In IEEE11073 PHD standards, data transmission is classified into three different types: immediate individual transfer, small block transfer, and large block transfer. The large block transfer using PM-store concept provides efficient transmission. However, an existing PM-store has problem when a device is used by multiple people. To address the defined problem, a modified PM-segment that is in compliance with 11073 standards is proposed in this paper. In particular, the proposed PM-segment is designed to minimize the additional complexity of an agent instead of a manager and it is interoperable with the existing manager. The proposed PM-segment shows better performance than the existing PM-segment, in terms of memory requirements and expected queue time. Also, performance comparison among the three transfers is performed in regard to the delay time and communication power consumption points of view.

The Implementation of Wireless Bio-signal Monitoring System for U - healthcare (유비쿼터스 헬스케어를 위한 무선 생체신호 감시 시스템 설계)

  • Lee, Seok-Hee;Ryu, Geun-Taek
    • 전자공학회논문지 IE
    • /
    • v.49 no.2
    • /
    • pp.82-88
    • /
    • 2012
  • In this paper, using the Android-based mobile platform designed and integrated U-healthcare systems for personal health care system is proposed. Integrated Biometric systems, electrocardiogram (ECG), oxygen saturation, blood pressure, respiration, body temperature, such as measuring vital signs throughout the module and signal processing biometric information through wireless communication module based on the Android mobile platform is transmitted to the gateway. Biometric data transmitted from a mobile health monitoring system, or transmitted to the server of U-healthcare was designed. By implementing vital signs monitoring system has been measured in vivo by monitoring data to determine current health status of caregivers had the advantage of being able to guarantee mobility respectively. This system is designed as personal health management and monitoring system for emergency patients will be helpful in the development looks U-healthcare system.

A Secure Telemedicaine System in Smart Health Environment using BYOD (BYOD를 활용한 스마트헬스 환경에서 안전한 원격의료 시스템)

  • Cho, Young-bok;Woo, Sung-hee;Lee, Sang-ho;Park, Jong-bae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.10
    • /
    • pp.2473-2480
    • /
    • 2015
  • In telemedicaine, people can make their health checked at anywhere from temporal and spatial constraints and It's environment can provide continuous health information regardless of the location of customers through PCs and smart phones. In addition, personal health information collected utilizing the BYOD(bring your own device) is the most important factor data security and guaranteed personal privacy because it's directly connected to the individual's health and life. In this paper, we provide a signature of the private key encryption system and method for providing the security of personal health information data collected utilizing the BYOD. Against replay attacks and man-in-the-middle attacks on security issues that are emerging as a smart environmental health was used as the timestamp and signature methods. Proposed method provides encryption overhead, while a communication was lower compared to the pre-encrypted with a mean 1.499mJ 1.212mJ shown by simulation to respond quickly in an emergency situation to be about 59%.

NFC Payment System Model for Security Privacy and Location Information of User (사용자 개인 정보 및 위치 정보를 보호하기 위한 NFC결제 시스템 모델)

  • Kim, Kyung-Ihl;Jeon, Gwi-su;Chae, Gyoo-Soo
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.2
    • /
    • pp.21-26
    • /
    • 2015
  • Recently, NFC technology of short-range wireless communication using a smart phone to perform personal authentication with the electronic payment has been in the spotlight in various fields. However, the security associated with the personal information and the location information is vulnerable because it is easily fused with the existing mobile services and devices. In this paper, we propose a model for NFC payments help protect personal information and location information of NFC payment systems and services in various fields. Proposed model uses tag-based services in order to protect personal information and position information. The proposed model using the tag-based services is the place to check the various features available information in a simple Tag that can be easily accessed.

  • PDF

A Study on the Promotion Strategy for Internet Fashion Soho Shopping Mall (인터넷 패션 소호 쇼핑몰 활성화를 위한 촉진전략 연구)

  • Kim, Hee-Sun
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.9 no.3
    • /
    • pp.59-73
    • /
    • 2007
  • The purpose of this study is to find out the promotion methods for successful management of 'the fashion saho internet shopping mall' with a small capital. This study analyze the research reports, the news items, the documents on the internet shopping mall and data on promotion method which are offered by the hosting companies of the internet shopping mall like 'Cafe 24', 'Make shop', 'Whoismall' and the promotion consulting companies like 'Whoisad', 'Naver keyword shop'. And also analyze the data that interviewed the administrator of internet shopping mall and directly observed the famous internet shopping mall sites. Generally speaking, the promotion mix, marketing communication program can classify 'advertisement', 'publicity', 'personal selling', and 'sales promotion'. This study analyze the research materials on the basis of advertisement, publicity, personal selling, and sales promotion. The result are as follows. 1. The promotion methods at the stage of information the shopping mall site to the consumer are advertisement, and publicity. ${\bigcirc}$ The methods of advertisement are 'searching engine registration', 'advertisement of key word', 'advertisement of overture', 'advertisement of banner', 'advertisement cooperation marketing', 'advertisement of e-mail'. ${\bigcirc}$ The methods of publicity are using 'cafe', 'blog', 'Naver information site', 'community bulletin board', 'the fashion magazine or a press report' and 'cosponsorship'. 2. The main promotion methods at the stage of inducing the purchase are 'personal selling', and various 'sales promotion'. ${\bigcirc}$ 'Personal selling' at the shopping mall have an effect on the communication at bulletin board over the internet and the telephone. ${\bigcirc}$ 'Sales promotion' are attempted by 'VMD', 'deposit system', 'sale', etc.

  • PDF

An Efficient Channel Sounding Method for WPAN System (무선 PAN 시스템을 위한 효율적인 채널 사운딩 기법)

  • Cho, Ju-Phil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.3
    • /
    • pp.9-14
    • /
    • 2008
  • In this paper, we propose the channel sounding scheme which is made for ideal communication between some application as well as the short distance of high speed data transmission in MIMO-OFDM system for Wireless PAN. This method is able to perceive the duration of the impulse response through the delaying of power delay profile, modeled a power delay profile which has an attenuate characteristic, and obtained the coefficient of channel response by ML (maximum likelihood). Through the amplitudes, phases and delays associated with each multipath component which were acquired from this channel sounding scheme, we can describe the wave propagation characteristics of channels between the transmitter and receiver so that the receiver could enhance not only the reliability but also the ability of communication link.

  • PDF

Implementation of Adult Authentication System Using Smartphone and Near-Field Communication (스마트폰과 근거리 무선 통신을 이용한 성인 인증 시스템의 개발)

  • Lee, Chongho;Lee, Seongsoo
    • Journal of IKEEE
    • /
    • v.19 no.4
    • /
    • pp.617-624
    • /
    • 2015
  • In this paper, an adult authentication system based on authentication certificate was designed and implemented using smartphone and near-field communication. It has three advantages. First, it achieves easy, convenient, and fast authentication by using smartphone and near-field communication. Second, it achieves extremely high security and reliability by exploiting authentication certificate. Third, it achieves extremely low risk of personal information leakage by generating and sending only virtual identification code. Finally, it has a proper legal basis by Digital Signature Act. It consists of adult authentication module, near-field communication control module, policy server module, and database server module. A prototype of the proposed system was designed and implemented, and it was verified to have correct operation.