• Title/Summary/Keyword: Share Rate

Search Result 553, Processing Time 0.031 seconds

Knowing the Level of Information Security Awareness in the Usage of Social Media Among Female Secondary School Students in Eastern Makkah Al-Mukarramah- Saudi Arabia

  • Gharieb, Magdah Ezat
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.360-368
    • /
    • 2021
  • This study aims at knowing both the level of information security awareness in the use of social media among female secondary school students in Makkah Al-Mukarramah, and the procedures that students follow when exposed to hacking or other security problems. The study relied on the descriptive survey approach. The results showed a high percentage of social media use among the study sample, and the most used applications by the students are snapchat and Instagram applications successively. In fact, 48% of the study sample have awareness of information security, the majority of the students memorize the password in the devices, most of them do not change them, and they have knowledge of fake gates and social engineering. However, their knowledge of electronic hacking is weak, and students do not share passwords with anyone at a rate of 67%. At the same time, they do not update passwords. Moreover, most of the procedures followed by students when exposed to theft and hacking is to change the e-mail data and the password, and the results varied apart from that, which reflects the weak awareness of the students and the weakness of procedures related to information security. The study recommends the necessity to raise awareness and education of the importance of information security and safety, especially in light of what the world faces from data electronic attacks and hackings of electronic applications.

Is the SAM phantom conservative for SAR evaluation of all phone designs?

  • Lee, Ae-Kyoung;Hong, Seon-Eui;Choi, Hyung-Do
    • ETRI Journal
    • /
    • v.41 no.3
    • /
    • pp.337-347
    • /
    • 2019
  • The specific anthropomorphic mannequin (SAM) phantom was designed to provide a conservative estimation of the actual peak spatial specific absorption rate (SAR) of the electromagnetic field radiated from mobile phones. However, most researches on the SAM phantom have been based on early phone models. Therefore, we numerically analyze the SAM phantom to determine whether it is sufficiently conservative for various types of mobile phone models. The peak spatial 1- and 10-g averaged SAR values of the SAM phantom are numerically compared with those of four anatomical head models at different ages for 12 different mobile phone models (a total of 240 different configurations of mobile phones, head models, frequencies, positions, and sides of the head). The results demonstrate that the SAM phantom provides a conservative estimation of the SAR for only mobile phones with an antenna on top of the phone body and does not ensure such estimation for other types of phones, including those equipped with integrated antennas in the microphone position, which currently occupy the largest market share.

Fast Channel Allocation for Ultra-dense D2D-enabled Cellular Network with Interference Constraint in Underlaying Mode

  • Dun, Hui;Ye, Fang;Jiao, Shuhong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.6
    • /
    • pp.2240-2254
    • /
    • 2021
  • We investigate the channel allocation problem in an ultra-dense device-to-device (D2D) enabled cellular network in underlaying mode where multiple D2D users are forced to share the same channel. Two kinds of low complexity solutions, which just require partial channel state information (CSI) exchange, are devised to resolve the combinatorial optimization problem with the quality of service (QoS) guaranteeing. We begin by sorting the cellular users equipment (CUEs) links in sequence in a matric of interference tolerance for ensuring the SINR requirement. Moreover, the interference quota of CUEs is regarded as one kind of communication resource. Multiple D2D candidates compete for the interference quota to establish spectrum sharing links. Then base station calculates the occupation of interference quota by D2D users with partial CSI such as the interference channel gain of D2D users and the channel gain of D2D themselves, and carries out the channel allocation by setting different access priorities distribution. In this paper, we proposed two novel fast matching algorithms utilize partial information rather than global CSI exchanging, which reduce the computation complexity. Numerical results reveal that, our proposed algorithms achieve outstanding performance than the contrast algorithms including Hungarian algorithm in terms of throughput, fairness and access rate. Specifically, the performance of our proposed channel allocation algorithm is more superior in ultra-dense D2D scenarios.

FTA Effects of Secondary Auto-Part Venders in the Daegu Kyungpook Area (대구·경북지역 자동차 2차 부품기업의 FTA활용효과)

  • Kim, Heeho;Cho, Joo-Eun
    • Korea Trade Review
    • /
    • v.44 no.3
    • /
    • pp.253-269
    • /
    • 2019
  • This study examines the utilization effect of FTA on the sales and profit of the secondary auto-part suppliers in two aspects: 1) firm-level survey on the utilization of FTA and 2) statistical inference on the FTA effects on their sales and profit. We use the GLS statistical technique, panel and survey data of 130 secondary auto-part suppliers in the Daegu and Kyungpook area in 2007-2016. The evidence shows that the secondary auto-part suppliers struggle to prepare documents for the FTA certificates of origin due to their small firm size, although they utilize the FTA at the relatively high rate of 92 percent. Statistical evidence shows that an increase in the export of the first vender significantly affects the sale of the secondary auto-part vendors, but not their profit. The low profit and high managing cost of utilizing the FTA deteriorate the utilization effect of the FTA of the secondary auto-part vendors, which is a key factor in a global supply chain and for the competitiveness of the automobile industry. Government policies are required for the secondary auto-part suppliers to utilize the FTA more effectively and share the benefits of tariff reduction with first auto-part vendors under FTA transaction.

Development of a Critical Pathway for a Korean Medicine Hospital Inpatient with Stroke (중풍 입원 환자 관리를 위한 임상경로 개발)

  • Kim, Mikyung;Han, Chang-ho
    • The Journal of Korean Medicine
    • /
    • v.42 no.2
    • /
    • pp.62-71
    • /
    • 2021
  • Objectives: This study was aimed to share the development process of the critical pathway (CP) for the treatment and management of stroke patients admitted to a Korean medicine hospital. Methods: A draft CP was prepared based on a review of relevant literature and medical records in the hospital, and its validity was reviewed by the in-hospital CP review committee. Each member evaluated all items in the CP on a 5-point Likert scale. Items with an average score of 3.5 or higher or an agreement rate of more than 80% were considered valid. In addition, free described opinions to improve the CP were also received from the review committee. Results: The horizontal axis of the CP was composed of a time domain, including 7 time points from hospitalization to discharge. The vertical axis was composed of 9 domains of medical practice. All items in the CP satisfied the validity criteria. The CP was revised, supplemented, and completed by reflecting the opinions of the committee. Conclusions: This CP will be taught to in-hospital users and will continue to be used with regular monitoring and a feedback plan. This study is expected to serve as a useful reference for standardizing the treatment process and delivering measures to improve the adequacy of Korean medicine treatment for stroke patients.

An Efficient Hardware Implementation of AES Rijndael Block Cipher Algorithm (AES Rijndael 블록 암호 알고리듬의 효율적인 하드웨어 구현)

  • 안하기;신경욱
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.53-64
    • /
    • 2002
  • This paper describes a design of cryptographic processor that implements the AES (Advanced Encryption Standard) block cipher algorithm, "Rijndael". An iterative looping architecture using a single round block is adopted to minimize the hardware required. To achieve high throughput rate, a sub-pipeline stage is added by dividing the round function into two blocks, resulting that the second half of current round function and the first half of next round function are being simultaneously operated. The round block is implemented using 32-bit data path, so each sub-pipeline stage is executed for four clock cycles. The S-box, which is the dominant element of the round block in terms of required hardware resources, is designed using arithmetic circuit computing multiplicative inverse in GF($2^8$) rather than look-up table method, so that encryption and decryption can share the S-boxes. The round keys are generated by on-the-fly key scheduler. The crypto-processor designed in Verilog-HDL and synthesized using 0.25-$\mu\textrm{m}$ CMOS cell library consists of about 23,000 gates. Simulation results show that the critical path delay is about 8-ns and it can operate up to 120-MHz clock Sequency at 2.5-V supply. The designed core was verified using Xilinx FPGA board and test system.

Interference Aware Channel Assignment Algorithm for D2D Multicast Underlying Cellular Networks

  • Zhao, Liqun;Ren, Lingmei;Li, Li
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.8
    • /
    • pp.2648-2665
    • /
    • 2022
  • Device-to-device (D2D) multicast has become a promising technology to provide specific services within a small geographical region with a high data rate, low delay and low energy consumption. However, D2D multicast communications are allowed to reuse the same channels with cellular uplinks and result in mutual interference in a cell. In this paper, an intelligent channel assignment algorithm is designed in D2D underlaid cellular networks with the target of maximizing network throughput. We first model the channel assignment problem to be a throughput maximizing problem which is NP-hard. To solve the problem in a feasible way, a novel channel assignment algorithm is proposed. The key idea is to find the appropriate cellular communications and D2D multicast groups to share a channel without causing critical interference, i.e., finding a channel for a D2D multicast group which generates the least interference to network based on current channel assignment status. In order to show the efficacy and effectiveness of our proposed algorithm, a novel search algorithm is proposed to find the near-optimal solution as the baseline for comparisons. Simulation results show that the proposed algorithm improves the network throughput.

Implementation of Temperature and Humidity Sensor Module Based on Z-wave (Z-Wave 기반의 온습도 센서 모듈 구현)

  • Weon, La kyoung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.4
    • /
    • pp.157-166
    • /
    • 2022
  • The most commonly used wireless communication technologies in IoT technology include ZigBee, WiFi, Bluetooth, and Z-Wave. In particular, Z-Wave is currently one of the preferred wireless communication technologies, with a global market share of 60 % of these technologies. In this research, a temperature and humidity sensor module using a Z-wave protocol was designed and manufactured by referring to the data sheet. Subsequently, the Z-Wave protocol was analyzed during the operation of the sensor module, and the firmware of the controller module was mounted and implemented. In addition, a program for monitoring the temperature and humidity information from the sensor module was developed and validated. Finally, the performance of the sensor module was validated through master distance and low power tests on it and its reception data success rate.

A Study on Exploring the Main Factors and Methods to Improve Community Care : Focusing on the Case of GyeongSangNam-Do (커뮤니티케어 개선을 위한 주요 요인 탐색과 방안 연구 : 경상남도 사례 중심으로)

  • Jun Hoe Kim;Gun A Kim
    • Journal of agricultural medicine and community health
    • /
    • v.48 no.3
    • /
    • pp.189-204
    • /
    • 2023
  • Objectives: The goals of this study are to exploring critical factors and methods to improve Korean Community Care through the cases of GyeongsangNamdo. Methods: For this study, we performed in-depth interviews with 90 people involved in Community Care services of 6 regions, and the collected data were analyzed. The collected data were analyzed utilizing NVivo12. In the end, we reconfirmed the process through Topic Modeling analysis. Results: We conducted descriptive statistics and qualitative data analysis collected through surveys and in-depth interviews. In the case of qualitative analysis, we extracted principle codes (Need, Lack, Absence), and sorted the contents into sub-categories. The response rate of 'Need to strengthen capabilities' was the highest, 'Need to communicate and share information' was the second, and 'Need for integrated operation and a control tower' was the third. Conclusion: As a result, we find the critical factors to improve Community Care. Based on them, we should conduct follow-up researches to propose concrete methods to apply to diverse regions.

The Analysis of the present condition of the Korean CM Market (Comparing the American CM Market)

  • Byung-Sik Yoon;Jung-Ho Yoo;Chang-Duk Kim
    • International conference on construction engineering and project management
    • /
    • 2009.05a
    • /
    • pp.1534-1539
    • /
    • 2009
  • During the last ten years, there have been many studies related with settlement and reinvigoration of CM. These researches have shown that the application of CM has been not reinvigorated in Korean construction industry yet, because of some problems such as the insufficient application of the public sector, the policy matters and the CM fee estimates. But the present condition data of the Korean CM Market shown in these studies was insufficient for the standpoint of Market itself. Also, some of these studies compared the Korean CM Market with The America CM Market, to study the foreign CM markets. However, because the Korea CM Market only has the CM for Fee Market but the American CM Market has the CM for Fee and the CM at Risk, the Korea CM Market must be not only compared with the America CM Market but also compared with the America CM for Fee Market. Therefore, the purpose of this study is to determine the present condition of the Korea CM Market through the compare and contrast of the Korean CM Market, American CM Market and American CM for Fee Market, by the Market Growth rate and Market Share. This study further aims to verify whether Korean CM market was implemented.

  • PDF