• Title/Summary/Keyword: Personal communication network

Search Result 486, Processing Time 0.027 seconds

802.15.4a DBO-CSS의 Coexistence향상을 위한 새로운 Sinusoidal Interference Cancellation 알고리즘

  • Oh, Dae-Gun;Chong, Jong-Wha
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.129-130
    • /
    • 2006
  • As the research of wireless personal area network (WPAN) is more activated, various communication systems operating on 2.4Ghz are being developed. Systems such as Bluetooth, 802.11b, Zigbee and DBO-CSS are operating on 2.4Ghz. In addition to these communication systems, microwave oven resides in 2.4Ghz, so co-existance between each of these communication systems and microwave Oven is considered important factor of system performance. The effect of microwave oven on these communication systems is so critical that these systems are recommended to avoid the impact of microwave oven by allocation of different channel. In this paper, based on the DBO-CSS operating on 2.4Ghz, we propose a new algorithm of reducing the effect of microwave oven to develop robust communication system against microwave oven.

  • PDF

Proposed measure for Smart Grid's Personal Information Security Issue (스마트 그리드 개인정보 보안이슈 방안 제시)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.4
    • /
    • pp.41-49
    • /
    • 2016
  • Smart Grid is a next generation of new power growth electrical grid which provide high quality of electrical service by using Information Technologies to increase intelligence and performance. By using Smart Grid system, it can support energy management such as increase quality of electrical power, decrease energy and decrease emissions. However, Smart Grid uses information of energy consumption and when Smart Grid collects information, it will create private information. In this thesis, it will address issues of security private information which caused by Smart Grid for administrative measure and efficiency of Smart Grid in domestic. Also, cryptographic module algorithm, latest security solutions and strong wireless security policy for network environment such as wireless communication Iinternet are require for Smart Grid perform successfully and protect national power network equipment from cyber-attack and can stop leakage of user's personal information. Finally, it is urgent to prepare protection measures of National industrial facilities and power grid which can prepare for a cyber terrorism and penetration attacks and build emergency countermeasure management team for Smart Grid are require for safe Smart Grid environment.

Design of Collective system of Automobile information in Korea (대한민국 표준 개인용 자동차 운행정보 수집 시스템 설계에 대한 연구)

  • Kim, Min-Young;Jang, Jong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.9
    • /
    • pp.1923-1930
    • /
    • 2012
  • 'No-Automobile driving Day' is one of Special option of Automobile Insurance in Republic of Korea. It option is used a system for collect to automobile driving information. However, Its system gives discomfort to users of this system. A Discomfort of this system to users is the OBD device's(Personal Car Driving Check Device) installation. A frequent installation of this device provides this OBD device's breakage to the users of this system. In this paper, for a solve this problem, studied new system design to supplement the existing system using Smartphone and WPAN(Wireless Personal Area Network).

Personal Information Leakage Prevention Scheme of Smartphone Users in the Mobile Office Environment (모바일 오피스 환경에서 스마트폰 사용자의 개인정보 유출 방지 기법)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.205-211
    • /
    • 2015
  • Recently, a mobile communication network and the wireless terminal is suddenly develop, mobile office service is more and more the sportlight. However, the user may receive an attack from a malicious third party if the up/download the data in the remote to perform the work in a mobile office environment. In this paper, we propose scheme to manage the information lost due to theft smartphone that contain spill prevention personal information and company information from the mobile office environment (call history, incoming messages, phonebook, calendar, location information, banking information, documents, etc.). The proposed scheme using the number of triangular fuzzy information about the state of the personal information and business intelligence to implement a pair-wise comparison matrix. In particular, the proposed scheme is to prevent the value obtained by constructing a pair-wise comparison matrix for personal information and business intelligence and pair your smartphone is lost when a third party not allow access to personal information and corporate information is leaked to the outside.

Rights to Control Information and Related Security Technologies on the CyberSpace (사이버공간에서 자기 결정권과 보안 기술)

  • Min, Kyung-Bae;Kang, Jang-Mook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.135-141
    • /
    • 2010
  • This research examines technologies and systems regarding right to control information in the network era. For this purpose, It attempts an integrated analysis of technologies and systems on the basis of the tree components of cyberspace. And it examines the prior researches and cases on privacy, personal information, and right to control information with emphasis on technologies and systems of the cyberspace. To protect privacy information, it analyses vulnerability of element technology, platform service technology, and individual technology. In particular, it describes, from the perspective of right to control information, the risk and security measures for personal information to be used as relation-context in the Web 2.0 environment. The research result will assist the methodology of future researches for grand theory on privacy information and help understanding the interaction between technology and society.

SNS disclosure of personal information in M2M environment threats and countermeasures (M2M 환경에서의 SNS 개인정보 유출 위협 및 대응방안)

  • Go, Jun-Young;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.1
    • /
    • pp.29-34
    • /
    • 2014
  • It appeared with the development of IT skills to help the social network SNS(Social Network Service) on the online form. Many people around the world and in the business environment changes is the emergence of social networks are bringing. And the rapid development of the idea, but are insignificant for the security threats that are used by many people in many companies, and social network services. In addition, although it is true that this connection is increased from the number of mobile machines to the development of M2M, that is not recognized for that vulnerability. To evaluate and identify vulnerabilities against security threats and countermeasures for the SNS access the social network on the M2M After looking for privacy and in the present.

Design and Implementation of Dynamic Binding System among the Devices Located in Inside and Outside of Home Networks (홈 네트워크에서의 댁내외 기기들의 동적 바인딩 시스템 설계 및 구현)

  • Lee, Jae-Hyun;Kwon, Kyung-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.12
    • /
    • pp.169-176
    • /
    • 2006
  • Since home network system is usually set up based on the built-in system inside home at the time of construction, it has a difficulty in being compatible with new devices after construction. In this paper, we propose DBS(Dynamic Binding System) that can make links effectively among the devices located in inside and outside of home networks. Implementation of the DBS is based on the ZigBee's binding in WPAN(Wireless Personal Area Network). For this research, we constructed the system consisting of home server that contains proxy server and location server, devices inside home in which tinyOS is embedded, and mobile device that is an emulator. The communication inside home is done by IEEE 802.15.4 protocol and the communication between servers and mobile devices outside home is done by TCP/IP protocol. Regardless of device's address format, the DBS facilitates a link among the devices located inside and outside of home networks. And, introducing a new device into home network can be recognized easily by exchanging messages between devices.

  • PDF

Computerized Order Communication System for Out-patient's Clinic Using Personal Computer and Local Area Network (PC 및 LAN을 이용한 외래처방 전달 시스템)

  • 김남현;김원기
    • Journal of Biomedical Engineering Research
    • /
    • v.14 no.4
    • /
    • pp.321-326
    • /
    • 1993
  • Recently, microcomputer technology has been developed rapidly and it provides not only graphic user interface that can be fraendly accessable but also large storage capacity to han- dle much hospital information. Almost all the order communication system for hospital has been developed under the concept of host and terminal environment since last 20 years. However, host-terminal system has not been successful in korea simply because most of physicians prescibe for rrlany patients a day(sometimes more than 150 patients a day). Also, under the host-terminal environment, programs are not friendly implemented for users. Since March 1991, we had developed order communication system for out-patients(named YONSEI-PC) using personal computer(PC) and local area network(LAN) . Since September 1992, we has applied succesfully in the Yonsei Cardiovascular Center, Sevrance Hospital, Yonsei University College of Medicine. This system consisted with Server and Clients which is communicated through LAN(Ethernet). The system also use the Host computer(IBM 9221 170) as a data bank and communicates to the Server with emulation card(3270 emulator, Interlink Inc., Korea) . After introducing this system, it enables patients to receive drugs witllin 20 minutes after prescription of 300-400 patients per day and it seemed to be effective system not to reduce waiting time for the patients but also to remove charge-troubling(due to His-entry of prescription) . This system also seems to be effective in terms of office automatism for hospital management. However users, usually physitions, required more friendly and easy system to operate and we thought that the most important one to successfully introduce order communication computer system in the hospital is user interface.

  • PDF

An Effective Pre-refresh Mechanism for Embedded Web Browser of Mobile Handheld Devices

  • Li Huaqiang;Kim Young-Hak;Kim Tae-Hyung
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.12
    • /
    • pp.1754-1764
    • /
    • 2004
  • Lately mobile handheld devices such as Personal Digital Assistant (PDA) and cellular phones are getting more popular for personal web surfing. However, today most mobile handheld devices have relatively poor web browsing capability due to their low performance so their users have to suffer longer communication latency than those of desktop Personal Computers (PCs). In this paper, we propose an effective pre-refresh mechanism for embedded web browser of mobile handheld devices to reduce this problem. The proposed mechanism uses the idle time to pre-refresh the expired web objects in an embedded web browser's cache memory. It increases the utilization of Central Processing Unit (CPU) power and network bandwidth during the idle time and consequently reduces the client's latency and web browsing cost. An experiment was done using a simulator designed by us to evaluate the efficacy of the proposed mechanism. The experiment result demonstrates that it has a good performance to make web surfing faster.

  • PDF

Study on Personal Information Protection Behavior in Social Network Service Using Health Belief Model (건강신념모델을 이용한 소셜네트워크서비스에서의 개인정보보호행위에 관한 연구)

  • Shin, Se-mi;Kim, Seong-jun;Kwon, Do-soon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1619-1637
    • /
    • 2016
  • With wide distribution of smart phones and development of mobile network, social network service (SNS) is displaying remarkable growth rates. Users build new social relations by sharing their interests, which brings surging growth to the SNS based on the combination between the strength of expanding the place for communication and distribution of smart phones featured with easy portability. This study is designed to understand impact factors of SNS on users in Korea and to conduct empirical research on casual relationship between the factors above and the factors affecting personal information behavior through the privacy protection and self-efficacy. In order to accomplish the objective above, the study presented a research model applied with key variables of the Health Belief Model (HBM) predicting behaviors capable of recognizing and preventing individual diseases in the field of health communication. To perform empirical verification on the research model of this study, a survey was conducted upon college students at N university located in Chungcheongnam-do and K university in rural area, who have experiences using the SNS. Through this survey, a total of 186 samples were collected, and path analysis was performed in order to analyze the relationship between the factors. Based on the findings from the survey, first, variables Perceived probability, Perceived severity, Perceived impairment of the HBM, key factors of personal information protection behavior on the SNS, were found to exhibit negative relationship with self-efficacy, and Perceived probability, Perceived benefit, Perceived impairment were found to exhibit negative relationship with privacy protection. But the above, Perceived severity showed positive relationship with privacy protection, and Perceived benefit and self-efficacy also displayed positive relationship. Second, although self-efficacy, a parameter, showed positive relationship with privacy protection, it demonstrated negative relationship with personal information protection behavior. Lastly, privacy protection exhibited positive relationship with personal information protection behavior. By presenting theoretical model reflected with characteristics of prevention based on these findings above unlike previous studies on personal information protection using technologies threatening personal information, this study is to provide theoretical and operational foundation capable of offering explanations how to predict personal information protection behavior on the SNS in the future.