• Title/Summary/Keyword: Personal Device

Search Result 775, Processing Time 0.034 seconds

Design of Two-Step Open System for Personalized Health Data Access (개인화된 건강 데이터 처리를 위한 2-Step 개방형 시스템의 설계)

  • Jeon, Young-Jun;Hwang, Hee-Joung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.177-183
    • /
    • 2015
  • The purpose of ICT Healing platform is the prevention of chronic disease. It is intended to early warning of the disease through the information such as the bio-signals and lifestyle. In this paper, we provide a 2-Step open system(TOS) for personalized health data access. TOS is connected between the personal health related data providers and service providers of individuals ICT Healing platform, a software engine for relaying personalized health data. The proposed system, to operate in isolation to 2 step in personal health document repository Inbound module and Outbound module to provide an inquiry service to external organizations. Therefore, we propose a personalized editable Manifest concept for defining data exchange between Step. This can be used as a reference model to collect the personal health information is scattered in many health related service institutions (Hospitals, Fitness Centers, Health Examination Centers, Personal Health Device, etc.) and under private-led liberalization.

Development of Standard Protocol-based Healthcare Services for Optimized Health Management (최적화된 건강관리를 위한 표준 프로토콜 기반 헬스케어 서비스 개발)

  • Park, Hyun-Sang;Kim, Hyun-Young;Kim, Hwa-Sun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.67 no.7
    • /
    • pp.969-975
    • /
    • 2018
  • The purpose of this study is to develop a healthcare service based on standard protocol and information communication technology for mother's sustainable postpartum care. The developed service was consisted of a client area where mothers measure, manage and transmit their vital signs using their own smartphone and personal health devices, and a server area that manages and shares with the received mother's vital signs and the results of examination results and personal health records. The client area collects vital signs through the IEEE 11073 Personal Health Device (PHD) using the m-health application of the previous study and Continua Health alliance certified personal health devices and transfers to Health Level Seven (HL7) V2.4, Continuity of Care Record (CCR) and Continuity of Care Document (CCD). The server area consists of a mobile web that manages and shares the HL7 Fast Healthcare Interoperability Resources (FHIR)-compliant personal health records to ensure interoperability of examination results, and a mobile web where the postpartum caregiver enters and manages the results of the mother's examination results and provides it to the mother. In this way, the healthcare service of this study securing continued exchanges between the mother and postpartum caregiver improves the quality of life of the mother not only to satisfy the needs of the mother who was discharged but also through self-management and postpartum. In the future, we will conduct a study applying mothers and postpartum caregiver after approval of a clinical trail at a university hospital to evaluate developed healthcare services.

Study on the personal Information Retrieval of Smartphone Messenger Service (스마트폰 메신저 어플리케이션에서의 개인정보보호에 관한 연구)

  • Kang, Sunghoon;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.97-107
    • /
    • 2013
  • The recent increase in smartphone usage has ignited the development of new applications which have changed the way of living in this internet era in the world. Almost all users which have smartphone have used many kinds of applications for lots of part. Especially, Social Network Service is the most popular part for smartphone users. The greater part of smartphone users take messenger service for smartphone. This kinds of applications provide to manage as deactivation of user or change of device. When users take to manage their information, their information would be deleted securely. If secure deletion didn't work correctly and released, their personal information can be easily abused to by others through various means such as internet phishing. In this paper, we analysis that the messenger application's management function keeps on the Personal Information Protection Act and suggest to prevent legally and technically for user's personal information and privacy.

The Exploratory Study on the Impact of User's Characteristics and Use Behaviors on Personal Cloud Service Use (이용자 특성과 이용행태가 개인형 클라우드 서비스 이용에 미치는 영향에 관한 탐색적 연구)

  • Kim, Dong-Woo;Pyo, Si-Young;Joung, Won-Jo
    • Journal of Broadcast Engineering
    • /
    • v.19 no.1
    • /
    • pp.3-13
    • /
    • 2014
  • This study as an exploratory study, investigates personal cloud service use which has been developed and distributed rapidly. Focusing on the user's characteristics and use behaviors, the influences of connected uses of platform and contents are empirically figured out. The results show that the contents which need small-data capacity like pictures and musics have been used very frequently in a cloud service. Second, 'platform-connected use' has been found out as the most influential factor in cloud service. SNS, e-mail, and personal innovativeness are also proved as significant factors. As a leading study analyzing theoretically the personal cloud service, it implies that it is necessary to consider the user's characteristics and use behaviors in developing cloud service in the market and making policy for promoting relevant industry.

A Study on Data Governance Maturity Model and Total Process for the Personal Data Use and Protection (개인정보의 활용과 보호를 위한 데이터 거버넌스 성숙도 모형과 종합이행절차에 관한 연구)

  • Lee, Youngsang;Park, Wonhwan;Shin, Dongsun;Won, Yoojae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1117-1132
    • /
    • 2019
  • Recently, IT technology such as internet, mobile, and IOT has rapidly developed, making it easy to collect data necessary for business, and the collected data is analyzed as a new method of big data analysis and used appropriately for business. In this way, data collection and analysis becomes easy. In such data, personal information including an identifier such as a sensor id, a device number, IP address, or the like may be collected. However, if systematic management is not accompanied by collecting and disposing of large-scale data, violation of relevant laws such as "Personal Data Protection Act". Furthermore, data quality problems can also occur and make incorrect decisions. In this paper, we propose a new data governance maturity model(DGMM) that can identify the personal data contained in the data collected by companies, use it appropriately for the business, protect it, and secure quality. And we also propose a over all implementation process for DG Program.

Personal Mobility Safety Helmet Device using Multi-Sensor and Arduino (다중센서 및 아두이노를 활용한 Personal Mobility 스마트헬멧)

  • Dae-Hyun Kim;Won-Young Yang;Dong-Wook Han;Ju-Min Ham;Boong-Joo Lee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.4
    • /
    • pp.723-730
    • /
    • 2023
  • Due to the recent development of battery technology, various types of means of transportation such as electric kickboards, Segways, and electric bicycles have emerged, which can be defined as Personal Mobility. In this paper, as the incidence of safety accidents increases due to the increase in the number of users of Personal Mobility, safety helmet devices that strengthen safety capabilities and peripheral recognition functions were studied. In order for the helmet to send a safety signal, Arduino was used as a base to set the value of the sensor according to changes in distance and angle using the ultrasonic sensor to minimize errors and ensure smooth recognition. In addition, a gyro sensor was used to turn on the direction indicator according to each slope. Using a CDS sensor, the LED is designed to turn on when it goes below 150 lux at night. Finally, it is possible to check whether a helmet is worn within 5cm, and when driving at an average speed, the direction indicator light is turned on at 10 degrees, and the LED is turned on at less than 150 lux.

The Research of Security Vulnerabilities of Smartphone (스마트폰 보안 취약 요소에 따른 분석 연구)

  • Choi, Hee Sik;Cho, Yang Hyun;Joo, Heon Sik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.3
    • /
    • pp.119-127
    • /
    • 2013
  • The merits of Smartphone are portability, convenience and especially a lot of information can be stored in the device. Especially in Smartphone, users can install programs that cannot install to normal cell phone and users can use many different services through these Smartphone programs. Also Smartphone can connect to Internet through network, so it can access information anytime, anywhere easily. Security of personal information and variety of information which stored in Smartphone are in risk. In Chapter 2 of thesis, it will discuss the definition and features of the Smartphone and market trends. In Chapter 3 of thesis, it will discuss security vulnerabilities of Smartphone and it will analyze and research security vulnerabilities of Smartphone in Chapter 4. In conclusion, it will check users' identification twice in useful application especially application that relate to finance and mobile payment. By checking users' identification several times, it will help to defend from security threats. Users can use Smartphone safely and convenience by know how to prevent from mobile hacking for personal and private information. the quality of APIs matching by the clustering and hierarchical relationships mechanism.

Implementation of reporting system for continuity of care document based on web service (Web Service 기반의 휴대용 건강 요약지 보고 시스템 구현)

  • Kim, Jong-Wook;Jeon, So-Hye;Lim, Chung-Mook;Park, Sun-Young;Kim, Nam-Hyun
    • Proceedings of the IEEK Conference
    • /
    • 2009.05a
    • /
    • pp.402-404
    • /
    • 2009
  • The development of health information technology enables people to access, view and acquire personal health record. But still, there have been a number of obstacles such as the absence of the standard to realize the ideal Personal Health Record(PHR) system. In this study, we proposed the service model that serves periodic Health Record Summary which is made by a medical specialist to people who are in the busy lives. Healthcare data from EMR in a hospital including people generate themselves at home is sent to a physician to make a medical opinion, and then it is changed into Health Level 7 Continuity of Care Document(CCD) format for interoperability. After a physician writes his opinion about patient's health condition, it will send to people by email. People who receive the health record summary data by email can save them into a USB device to view own PHR and medical comments of a physician through a computer. It will help people managing their own health condition with an opinion of a medical specialist.

  • PDF

A Study on the Flow Characteristics of Desktop Personal Computer by In-Out Fan (흡.배기 팬에 의한 Desktop Personal Computer 내부의 유동특성에 관한 연구)

  • Lee, Haeng-Nam;Park, Gil-Moon;Jung, Han-Byul
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.31 no.6
    • /
    • pp.665-671
    • /
    • 2007
  • The purpose of this study is to find out a flow characteristics required by the design of a computer case and to provide information about the preliminary data of cooling efficiency of CPU and a flow inside of a case. We examined a flow characteristic-suction a tracing particle occurred from a surge tand installed at an inlet into a computer case and moving it to a exit duct-experimentally by using PIV. The experimental device was consists of a fan inflowing and discharging the air into the computer case and a slot installed with a CPU cooling ran add-on, and analyzed the data of Re-stress distribution, velocity distribution, and kinetic energy distribution. This research will make a great contribution to improvement of the efficiency and performance of notebook, workstation, server, and all the design of electronic devices using large scale integrated(LSI) as well as usual computers.

Structure and Technology of Personal Protection Helmets (인체보호용 헬멧의 구조 및 기술)

  • Hwang, Jae Hyung;Jeong, Won Young
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.41 no.4
    • /
    • pp.771-781
    • /
    • 2017
  • The helmet is an imperative personal protective equipment. This protective device must be able to guard the human head against potential risks. Helmets are classified according into the purpose of use; therefore, the required performance and specifications depend on the type of products. Military helmets are intended to protect the wearer's head from bullets and shrapnel. Generally, lightweight super fibers and fiber reinforced composite materials are used as helmet shell materials, and NIJ STD of U.S. Department of Justice is most widely used as international standard related to bulletproof helmets. Safety helmets are widely used for industrial application and sports leisure. In general, the performance of shock absorption must be ensured, and various lining systems are applied in material, design, and combination methods. Evaluation standards have also been classified and strictly controlled for each purpose; therefore, it is difficult to certify with the existing standards such as the recently developed convergence helmets. However, it is possible to launch the product through a separate national integrated certification procedure.