• Title/Summary/Keyword: Phone Number

Search Result 517, Processing Time 0.027 seconds

Relation of Handwashing and Isolate of Bacteria from Mobile Phones of Healthcare Workers in a University Hospital

  • Choi, Min-Gyu;Kim, Sang-Ha;Park, Kyu-Ri;Kim, Young-Kwon;Kim, Jungho;Yu, Young-Bin
    • Biomedical Science Letters
    • /
    • v.27 no.4
    • /
    • pp.310-316
    • /
    • 2021
  • Mobile phones used by healthcare workers are not only an indicator of the contamination of healthcare associated bacteria, but can also be another source of infection. The number and time of handwashing, mobile phone operation time and disinfection were highly relation with the bacterial contamination on the surface of mobile phone. Healthcare associated bacteria isolated from the mobile phone surface were 28 MRCoNS (48.3%), 14 S. aureus (24.2%), 3 MRSA (5.2%), 5 A. baumannii (8.6%), 3 MRAB (5.2%), 3 Entrococcus spp. (5.1%), 2 Pantoea spp. (3.4%), 2 A. lowffii (3.4%), 1 E. cloacae (1.7%), 1 P. stutzeri (1.7%), and P. mirabillis (1.7%). For isolation according to department, 2 MRAB from the emergency room and 1 MRSA from intensive unit, the radiology team and the rehabilitation medical team, respectively were isolated. As a result of the relation of isolates from the department of patient contact (ER, RT, GW, CP, ICU, RMT), the bacterial isolation rate was 75% and the department of patient non-contact (MRT) was 10%.

A Reliability Enhancement Technique of Mobile Payment (모바일 결제의 신뢰성 향상 방안)

  • Kim, Chul-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.7
    • /
    • pp.319-325
    • /
    • 2016
  • A variety of services for mobile payments by the activation of FinTech have been developed. Various payment methods were developed, and an authentication method was developed to improve the reliability of the payment. On the other hand, when mobile easy payment services are used, they have weak security because the authentication by phone number. Therefore, this paper proposes a technique for increasing the reliability of the authentication process using the unique device ID of the mobile device to improve the authentication process based on the telephone number. The core research contents are the architecture and process for the authentication of mobile payments based on the mobile device ID. The mobile payment architecture consists of a mobile device, authentication service, and mobile payment application. The mobile device consists of mobile device ID and phone number, and the authentication server consists of authentication module and encryption module. The mobile payment service consists of a pre-authentication module and decryption module. The process of mobile payment service is processed by the encrypted authentication information (device ID, phone number, and authentication number) among mobile devices, authentication server, and mobile payment application. The mobile device sends the telephone number and the device ID to the authentication server and the authentication server authenticates the user through an authentication process and encryption process. The mobile payment application performs the pre-authentication process by decrypting the received authentication number. This paper reports a difference that can prevent the risk of leakage of the authentication number in existing payment services through the authentication process of the authentication server and the pre-authentication process of the mobile payment service of this paper.

A Comparative Study For Mobile Cloud Computing Environment (모바일 클라우드 컴퓨팅 환경의 비교 연구)

  • Jang, Rae-Young;Jung, Sung-Jae;Bae, Yu-Mi;Sung, Kyung;Soh, Woo-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.277-280
    • /
    • 2011
  • After the concept of Cloud Computing was first introduced, IT industry had focused on it. The Cloud Computing market is increasing as many major coporations have been participating in it. Now, the possibility of Mobile Cloud Computing has rising. Needless to say, the growth of Mobile Cloud Computing is explosive. Mobile industry changes its operational system from FeaturePhone to SmartPhone which are based on iPhone or Android. The number of Smart phone users in Korea exceeds 10 millions. Through this study, we will examine sorts and acctual situations of available domestic and international Mobile Cloud Computing Services in SmartPhone. Also, we will investigate the problems of current Mobile Cloud Computing and present the solutions.

  • PDF

Trip Generation Analysis Using Mobile Phone Data (무선통신 자료를 활용한 통행발생량 분석)

  • Kim, Kyoungtae;Lee, Inmook;Min, Jae Hong;Kwak, Ho-Chan
    • Journal of the Korean Society for Railway
    • /
    • v.18 no.5
    • /
    • pp.481-488
    • /
    • 2015
  • The recent trend in transportation planning information is to reduce traffic survey costs and enhance accuracy by using and converging various sources of external data. In Korea, mobile phone data can help generate useful transportation planning information, thanks to the universal use of mobile phones, which are present in a number greater than that of the population. This paper addresses measures to derive trip generation information from mobile phone data and verifies the value of the system for practical use by correlation analysis with KTDB trip generation data. The results show that trip generation information produced by mobile phone data correlates with existing (KTDB) trip generation data.

Performance of Korean spontaneous speech recognizers based on an extended phone set derived from acoustic data (음향 데이터로부터 얻은 확장된 음소 단위를 이용한 한국어 자유발화 음성인식기의 성능)

  • Bang, Jeong-Uk;Kim, Sang-Hun;Kwon, Oh-Wook
    • Phonetics and Speech Sciences
    • /
    • v.11 no.3
    • /
    • pp.39-47
    • /
    • 2019
  • We propose a method to improve the performance of spontaneous speech recognizers by extending their phone set using speech data. In the proposed method, we first extract variable-length phoneme-level segments from broadcast speech signals, and convert them to fixed-length latent vectors using an long short-term memory (LSTM) classifier. We then cluster acoustically similar latent vectors and build a new phone set by choosing the number of clusters with the lowest Davies-Bouldin index. We also update the lexicon of the speech recognizer by choosing the pronunciation sequence of each word with the highest conditional probability. In order to analyze the acoustic characteristics of the new phone set, we visualize its spectral patterns and segment duration. Through speech recognition experiments using a larger training data set than our own previous work, we confirm that the new phone set yields better performance than the conventional phoneme-based and grapheme-based units in both spontaneous speech recognition and read speech recognition.

Importances of Smart Phone Attributes by Pursuit Benefits (추구편익에 따른 스마트폰 속성 중요도)

  • Kim, Mi-Ae;Joo, Young-Jin
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.1
    • /
    • pp.99-115
    • /
    • 2015
  • This study aims to classify the pursuit benefits of smart-phone users, to find smart-phone market segments by pursuit benefits, and to analyze the relative importances of smart-phone attributes according to the smart-phone market segments. As a result, we found that smart-phone users are pursuing the network benefit as well as the two traditional benefits (the utilitarian benefit and the hedonic benefit). According to the levels of these three pursuit benefits, smart-phone users can be classified into four segments : All Benefits Cluster, Utilitarian-Network Benefits Cluster, Hedonic-Network Benefits Cluster, and Non-Network Benefits Cluster. We also verified that, according to the four smart-phone user segments by the pursuit benefits, there exist significant differences in relative importances of the seven smart-phone attributes : hand-set price, hand-set brand, hand-set speed, applications, tariff, mobile internet quality, and number of same service users.

A Study on the Distribution Environment and Consumer Behavior of Smartphone (스마트폰 유통환경과 소비자 행동에 관한 연구)

  • Kim, Min-Soo
    • Journal of Distribution Science
    • /
    • v.16 no.4
    • /
    • pp.67-74
    • /
    • 2018
  • Purpose - Most of the amendments to the law on the improvement of the distribution structure of mobile communication terminal equipment, the fully self-sufficient system of terminals, and the separated disclosure system on the terminals are aimed at securing transparency of the distribution structure by eliminating or reducing handset subsidies. This study investigates what items are important for the purchase of mobile phones in various and rapidly changing mobile phone markets from the consumer's point of view and tries to make a strategic suggestion for future mobile distribution strategies. Research design, data, and methodology - The procedure of this study takes place in four steps. In step 1, only the SF type respondents selected for this study were extracted through MBTI analysis. In step 2, they were divided into three hierarchies for the AHP analysis and each element was arranged. In step 3, the AHP analysis was converted to a Fuzzy-AHP number using the trigonometric centroid method. This was to eliminate the ambiguity of the response by converting into a fuzzy number even if data consistency was maintained with CI value below 0.1. In step 4, the number of converted 2-layer and 3-layer was combined to derive the priority when the final handset is selected. Results - First, the highest importance among the four items in the second tier was the terminal function item, followed by brand, price, and design item. Second, in the third tier, the highest importance was level of after-sales service, followed by device price, processing speed, ease of use, usefulness, and rate system. Third, the arithmetic average of the determinant of the fuzzy function showed that processing speed, ease of use and usefulness in the function item, level of after-sales service in the brand item, and device price in the price item were the five most important factors among 16 choice factors. Conclusions - First, there will be a change in the consumption patterns of consumers who have compared distributors and dealers to purchase handsets with more subsidies. Second, it is highly likely that people will purchase new handsets only when they need to change their devices because they can not receive subsidies by switching phone brands any more.

A Mobile Payment System Based-on an Automatic Random-Number Generation in the Virtual Machine (VM의 자동 변수 생성 방식 기반 모바일 지급결제 시스템)

  • Kang, Kyoung-Suk;Min, Sang-Won;Shim, Sang-Beom
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.12 no.6
    • /
    • pp.367-378
    • /
    • 2006
  • A mobile phone has became as a payment tool in e-commerce and on-line banking areas. This trend of a payment system using various types of mobile devices is rapidly growing, especially in the Internet transaction and small-money payment. Hence, there will be a need to define its standard for secure and safe payment technology. In this thesis, we consider the service types of the current mobile payments and the authentication method, investigate the disadvantages, problems and their solutions for smart and secure payment. Also, we propose a novel authentication method which is easily adopted without modification and addition of the existed mobile hardware platform. Also, we present a simple implementation as a demonstration version. Based on virtual machine (VM) approach, the proposed model is to use a pseudo-random number which is confirmed by the VM in a user's mobile phone and then is sent to the authentication site. This is more secure and safe rather than use of a random number received by the previous SMS. For this payment operation, a user should register the serial number at the first step after downloading the VM software, by which can prevent the illegal payment use by a mobile copy-phone. Compared with the previous SMS approach, the proposed method can reduce the amount of packet size to 30% as well as the time. Therefore, the VM-based method is superior to the previous approaches in the viewpoint of security, packet size and transaction time.

For the development of software industry, extensive software certification scheme (소프트웨어 산업의 발전을 위한 확장된 소프트웨어 인증체계)

  • Seo, Hee Suk;Kim, Sang Ho;Lee, Seung Jae
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.3
    • /
    • pp.121-129
    • /
    • 2010
  • For the development of software industry, offers an expanded software authentication scheme caused by the unauthorized copying of software is to reduce the damage to software developers, retail sales and to promote the development of the software industry was studied. Serial Number of the current software registration is conducted in such a simple verification procedure if the Serial Number only illegal and can be installed on multiple computers, such as program code to allow third parties to enter the Serial Number, or the extract can be used without is a reality. The proposed extension to the software authentication system when you install the software, my phone authentication and MAC Address Authentication Service introduced to distinguish normal user, the user of the MAC Address of the server and software development company that was sent to the registered MAC Address of the computer to be run only by the use of genuine software and to make unauthorized copies of software generated by the software developer can reduce the damage of the proposed plan.

Improvement Method of ELIS Local Laws and Regulations Format for Personal Information Protection (개인정보보호를 위한 ELIS의 자치법규서식 개선방안)

  • Choi, Chul-Jae;Lee, Young-Sik;Lee, Tae-Hee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.11
    • /
    • pp.1017-1024
    • /
    • 2016
  • In this paper, we have figured out status and demand about personal information in local laws and regulations of the four major city out of the municipality 18 institutions of Gangwon Province. To take advantage of the autonomous regulations Information System(ELIS), and research and analysis in the autonomy regulations of local governments to object to the attachment format. To object to the Attachment to the request of the resident registration number notation is a super key. There is a disclosure resistance sense of personal information, and research analysis of the smart phone number and home phone number. We have proposed the urgent development of automatic search engine of PIMS compliance with personal information.