• Title/Summary/Keyword: Personal Data Control

Search Result 678, Processing Time 0.025 seconds

Design and Implementation of a Main-memory Storage System for Real-time Retrievals (실시간 검색을 위한 다중 사용자용 주기억장치 자료저장 시스템 개발)

  • Kwon, Oh-Su;Hong, Dong-Kweon
    • The KIPS Transactions:PartD
    • /
    • v.10D no.2
    • /
    • pp.187-194
    • /
    • 2003
  • Main Memory storage system can increase the performance of the system by assigning enough slack time to real-time transactions. Due to its high response time of main memory devices, main memory resident data management systems have been used for location management of personal mobile clients to cope with urgent location related operations. In this paper we have developed a multi-threaded main memory storage system as a core component of real-time retrieval system to handle a huge amount of readers and writers of main memory resident data. The storage system is implemented as an embedded component which is working with the help of a disk resident database system. It uses multi-threaded executions and utilizes latches for its concurrency control rather than complex locking method. It only saves most recent data on main memory and data synchronization is done only when disk resident database asks for update transactions. The system controls the number of read threads and update threads to guarantee the minimum requirements of real-time retrievals.

Man-Machine Interface Device for Dismantling Factory

  • Yi, Hwa-Cho;Park, Jung-Whan;Park, Myon Woong;Nam, Taek-Jun
    • Clean Technology
    • /
    • v.23 no.3
    • /
    • pp.248-255
    • /
    • 2017
  • In dismantling factories for recycling, it is important to input actual working data to a personal computer (PC) in order to monitor the work results and related recycling rate of the inputs. This should be performed with a keyboard, a mouse, or other devices. But when a worker is working in the factory, it could be bothersome or time consuming to go to the PC. Especially, workers who works at dismantling factories have a generally low education level are scared to use a PC, which could be used as a pretext for not using the PC. In some cases, data input is performed by a worker after the day's job. In this case, it could take additional time, the worker can make more mistakes, and the data could be unreliable. In this study, we developed a man-machine interface (MMI) device using a safety helmet. A joystick-like device, pushbuttons, and a radio frequency (RF) device for wireless communication is equipped in a safety helmet. This MMI device has functions similar to a PC mouse, and it has a long communication distance. RF is used because it consumes less battery power than Bluetooth. With this MMI device, workers need not go to a PC to input data or to control the PC, and they can control the PC from a long distance. The efficiency of PCs in a factory could be increased by using the developed MMI system, and workers at the dismantling factories could have less reluctance in using the PC.

Design and Implementation of Wireless Multicommunication Circuit Based On USN (USN 기반의 무선 멀티 커뮤니케이션 회로 설계 및 구현)

  • Sim, Gab-Sig;Jang, Jae-Hyuk
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.8
    • /
    • pp.33-42
    • /
    • 2011
  • In this paper we designed and implemented a wireless communication circuit which can control the remote devices integrating RFID and ZigBee. This system unifies transmit part and receive part. And this system recognizes RFID tag data, then the recognized information is controlled by MCU, and transmitted to a remote device through the ZigBee. This is operated on TinyOS. If this system is applied to a entrance security system, it can permit/deny one's entrance as well as control the personal computer or other electronic devices. Our experiment shows the result of the recognized data transmission is very different according to a opened playground and a closed place. The data transmission time is stable in the indoor and the data transmission distance is long in the outdoor. We anticipate that our system be applied the various office oriented domains by connecting to the Wired LAN or the WLAN of IEEE 802.11x category.

A Design and Implementation of Camera Information File Creation Tool for Efficient Recording Data Search in Surveillance System (보안 관제 시스템에서 효율적인 영상 검색을 위한 카메라 연동 정보 파일 자동 생성 도구의 설계 및 구현)

  • Hwang, Gi-Jin;Park, Jae-Pyo;Yang, Seung-Min
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.55-61
    • /
    • 2016
  • For the purpose of video security equipment is to protect personal property and life against from terrorism or recent threats. In this study, if you proceed with the recorded data search, we propose a method for increasing the user's search convenience. It has predefined data structure which is between camera's movement path and relationship. Also, design and implement a tool that automatically generates a files which has inter camera related information on the control center in a multi-camera is installed environment. Using generated file, minimize searching time and increase searching efficiency.

e-Passport Integrated Authentication Mechanisms with Improved Efficiency (효율성이 강화된 전자여권 통합 인증 메커니즘)

  • Lee, Dong-Bum;Go, Woong;Kwak, Jin
    • Journal of Internet Computing and Services
    • /
    • v.10 no.2
    • /
    • pp.53-63
    • /
    • 2009
  • e-Passport system is new type of emigration and immigration control system and it is a research to introduce the e-Passport Authentication Protocol with Improved Efficiency is lively proceeded over the entire world. The e-Passport's chip has a biometric information and personal identification information, Radio Frequency Identification(RFID) technology is used for communication with the Inspection System(IS). However, the feature of the RFID system may bring about various security threats such as eavesdropping, data forgeries, data alternation, cloning, biometric data-leakage. Therefore, in this paper, we analyse the e-Passport system's authentication protocol to protect vulnerability and proposed e-Passport system's authentication protocol reduce computation. Also, we compared their efficiency.

  • PDF

A Comparative Study on the Health Status and Life Satisfaction of Elders in Charged and Free Welfare Facilities (유료복지시설과 무료복지시설 입소 노인의 건강상태와 생활만족도 비교)

  • Kwon, Yun-Hee;Oh, Yun-Jung
    • Journal of Korean Public Health Nursing
    • /
    • v.23 no.1
    • /
    • pp.91-100
    • /
    • 2009
  • Objectives: The purpose of this study was to compare the health status and life satisfaction of elders in charged and free welfare facilities. Methods: The subjects of this study were selected among those without cognitive impairment from charged (124 persons) and free (126 persons) welfare facilities in D city. The data were analyzed using frequency analysis, $x^$ test, and t-test. Results: Subjective health status was significantly higher for the residents in the charged welfare facilities. The data collected indicated significantly higher scores for the residents at charged welfare facilities when questioned regarding the physical health status, sense, personal hygiene, excretion control and activity. The data collected indicated significantly higher scores for the residents at charged welfare facilities when questioned regarding the mental health status, recall of breakfast side dishes, awareness of dates, interests in daily matters, feelings of happiness, feelings of loneliness and depression. Life satisfaction was significantly higher for the residents at the charged welfare facilities. Conclusions: There were significant differences in health status and life satisfaction of elders in charged and free welfare facilities.

A Study on Switching Intention of Mobile Telecommunication Service User: Focused on Group Differences Based on Innovativeness (이동통신 서비스 이용자의 전환의도에 관한 연구: 개인 혁신성에 따른 집단 간의 차이를 중심으로)

  • Oh, Jong-Chul;Yoon, Sung-Joon
    • Journal of Global Scholars of Marketing Science
    • /
    • v.19 no.1
    • /
    • pp.9-21
    • /
    • 2009
  • Recently, the researches to explain Switching Behavior through Theory of Planned Behavior have been discovered. Many researches say that System factors of mobile telecommunication service(MTS) is positively associated with Switching Intention. But There is no difference of system factors between mobile telecommunication services because of IT technique Development. Thus, this study investigated whether switching cost and alternative's attractiveness influence switching intention concerning mobile telecommunication service by adopting Theory of Planned Behavior (TPB) as an underlying theoretical premise. The study also attempted to determine the moderating effects of personal innovativeness on switching intention. For these purposes the author has developed several hypotheses as follows: H-1. The switching cost of different MTS is associated with the attitude of MTS which is using. H-2. The switching cost of different MTS is associated with the subjective norm of MTS which is using. H-3. The switching cost of different MTS is associated with the perceived behavior control of MTS which is using. H-4. The alternative's attractiveness of different MTS is associated with the attitude of MTS which is using. H-5. The alternative's attractiveness of different MTS is associated with the subjective norm of MTS which is using. H-6. The alternative's attractiveness of different MTS is associated with the perceived behavior control of MTS which is using. H-7. The switching cost of different MTS is associated with the switching intention. H-8. The alternative's attractiveness of different MTS is associated with the switching intention. H-9. The attitude of MTS is associated with the switching intention. H-10. The subjective norm of MTS is associated with the switching intention. H-11. The perceived behavior control of MTS is associated with the switching intention. H-12. The personal innovativeness has been a moderating effects to switching intention. Data has been collected from 403 respondents for this study using a questionnaire method. The survey for the actual analysis of the research was done and analyzed with the customers who have an experience of using Mobile telecommunication service and the samples were selected among the middle and high school students who live in Seoul area, the university students who live in Seoul, Gyeonggi and Chungcheng Provinces, and the ordinary workers who are working in Seoul and Gyeonggi Province. The survey was done for 23 days from March 28, 2008 through April 12, 2008. The positive analysis was done with SPSS 12.0K statistics package and visual PLS program using the analysis techniques of frequency analysis, reliability analysis, correlation analysis and factor analysis. In addition, structural equation modeling was conducted using AMOS 5.0. The data was analyzed by frequency analysis using SPSS 12.0 and structural equation modeling using AMOS 5.0. The result of the overall model analysis is as follows: Chi-Square=378.306, d.f.=107, p-value=0.0, GFI=.904, AGFI= 0.863, IFI= 0.939, NFI= 0.917, RMSEA= 0.079, TLI= 0.922. The results of the overall model analysis were coherent. The following study results were revealed: First, switching cost was related positively to attitude, subjective norm and perceived behavior control, three components of TPB. Second, alternative's attractiveness was related negatively to subjective norm but positively to perceived behavior control. Third, switching cost and attitude was related negatively to switching intention, while perceived behavior control was related positively to switching intention. Finally, the study found the moderating effects of personal innovativeness on switching intention. Based on the results, the study offers marketing strategic implications for mobile telecommunication service industry.

  • PDF

A Research on the Transference of Trust from Service Provider to MyData Banking Service (서비스 제공 기업에 대한 신뢰가 금융 마이데이터 서비스에 전이되는 현상에 관한 연구)

  • Ah Ro Kum;Jung Hoon Lee;Yun A Yeo
    • Journal of Information Technology Services
    • /
    • v.23 no.1
    • /
    • pp.97-121
    • /
    • 2024
  • As data usage grows in importance, ensuring individual control over personal information becomes critical. The emergence of the 'MyData' concept addresses this, particularly in financial services. Although the institutional and technological framework for financial MyData services is in place, there's a need to establish consumer understanding and perception of its usefulness and safety for successful activation. This study focuses on investigating the impact of trust on the intention to use the new mobile banking service, financial MyData. This study has three objectives. Firstly, to analyze whether trust in financial MyData services and trust in financial MyData service providers affect the intention to use financial MyData services. Secondly, to analyze the process of forming trust in financial MyData services based on the phenomenon of transferring trust in service providers to trust in services. Thirdly, to identify the process by which trust transfer occurs between service providers and financial MyData services. Ultimately, the goal of this study is to promote the intention to use financial MyData services based on the concept of trust and to activate these services. In summary, this study emphasizes the significance of trust in financial MyData services, exploring its impact on user intention and the transfer of trust from providers to services. By promoting consumer trust, the research aims to contribute to the activation of financial MyData services.

A convergence study on dental infection management awareness and experience of dental users (치과이용자의 치과 감염관리 인식과 경험에 관한 융복합 연구)

  • Kim, Seol-Hee;Oh, Se-Li;Lee, Seul
    • Journal of Digital Convergence
    • /
    • v.18 no.11
    • /
    • pp.329-336
    • /
    • 2020
  • The study investigated the perception and experience of infection control targeting dental users. During July-August 2020, 198 adults over the age of 20 were surveyed on general characteristics, infection control awareness and experience, and improvement. Analysis was performed using PASW Statistics ver 18.0. The research results, 91% of dental users recognized that infection control was important. In the recognition of infection control were highly investigated oral treatment equipment sterilization, hand hygiene and glove replacement before and after treatment by dental staff. And dental users was relatively low the replacement of disposable gowns and safety glasses for each patient by medical staff. The dental staff are doing well in personal protection and instrument sterilization. Surface disinfection and water quality management needed improvement. It was meaningful to suggest improvement in infection control based on the perception and experience from the perspective of dental users. It is expected to be used as basic data necessary for high-quality medical services through infection control in dental medical institutions.

Digital Epidemiology: Use of Digital Data Collected for Non-epidemiological Purposes in Epidemiological Studies

  • Park, Hyeoun-Ae;Jung, Hyesil;On, Jeongah;Park, Seul Ki;Kang, Hannah
    • Healthcare Informatics Research
    • /
    • v.24 no.4
    • /
    • pp.253-262
    • /
    • 2018
  • Objectives: We reviewed digital epidemiological studies to characterize how researchers are using digital data by topic domain, study purpose, data source, and analytic method. Methods: We reviewed research articles published within the last decade that used digital data to answer epidemiological research questions. Data were abstracted from these articles using a data collection tool that we developed. Finally, we summarized the characteristics of the digital epidemiological studies. Results: We identified six main topic domains: infectious diseases (58.7%), non-communicable diseases (29.4%), mental health and substance use (8.3%), general population behavior (4.6%), environmental, dietary, and lifestyle (4.6%), and vital status (0.9%). We identified four categories for the study purpose: description (22.9%), exploration (34.9%), explanation (27.5%), and prediction and control (14.7%). We identified eight categories for the data sources: web search query (52.3%), social media posts (31.2%), web portal posts (11.9%), webpage access logs (7.3%), images (7.3%), mobile phone network data (1.8%), global positioning system data (1.8%), and others (2.8%). Of these, 50.5% used correlation analyses, 41.3% regression analyses, 25.6% machine learning, and 19.3% descriptive analyses. Conclusions: Digital data collected for non-epidemiological purposes are being used to study health phenomena in a variety of topic domains. Digital epidemiology requires access to large datasets and advanced analytics. Ensuring open access is clearly at odds with the desire to have as little personal data as possible in these large datasets to protect privacy. Establishment of data cooperatives with restricted access may be a solution to this dilemma.