Journal of Korea Society of Industrial Information Systems
/
v.15
no.5
/
pp.19-27
/
2010
In this paper, we propose a scheme for real-time data retransmission in LR-WPAN to support the required QoS even in the severe channel error environments. In IEEE 802.15.4a, as the user data rate is supported up to 850Kbps, the real-time streaming data can be transferred more easily. In this research, we study the beacon-enabled mode in IEEE 802.15.4 LR-WPAN standard. In the proposed scheme, special slots are dynamical1y assigned for retransmission of the packet that fails during a real-time data service, and in the severe channel error environments a time diversity is acquired. Analytical results show that the proposed scheme is more robust and achieves a much higher throughput than the previous protocol in LR-WPAN.
Because of accelerated urbanization public body visiting nursing project that started according as matter of health on urban class in the lower brackets of income was concentrated on Social interests has a unsatisfied points to propel project efficiently from the lack of rating materials. Therefore centering around written contents in documentary literature of citizen health by household in five years from starting year of project to now. visiting frequency by medical manpower was evaluated quantitatively and qualitatively in aspect of management hereupon. for the sake of giving a basic materials for public health project of this field. This research presents documentary literature of citizen health which become materials is that as one person's charged region of nurse in duty scale. district is Kang-Buck Gu. the object is resident in the lower brackets of income grounded livelihood protection law and who is admitted by the head of organ~chief of health care). and the number of material centering around the head of a household is 415 copy. The result of research is summarized. as follow. 1. Average visiting frequency examinated by medical manpower show difference according to valuables of supervision characteristics namely average visiting. Frequency of nurse has long term residence in case registration season is early and supervision season is the first year and is high incase a kind of house is unlicdnsed mountain town. Average visiting frequency with doctor is high incase supervision season is the first year and the medical insurance system is admitted by chief of health care. That shows that a man of discomfort behavior left alone are yet many in local society. The meaning of this result shows that the continuity of official relation about class in the lowest brackets of income of long term residence goes well between househole who is a user of visiting nursing service of the object according to midway income under management influences a given duty of nurse s and so causes quantitative decrease. 2. In case behavier and condition of health that nurse diagnoses are bad. as the type matter is a lack of health and the number of patient is large. the average visiting frequency of nurse is high. because average visiting frequency with doctor is high as the condition of health is bad and the number of patient is large. That is similar with that of nurse. CD Average visiting frequency of nurse s seen by matter of disease is very high only in apoplexy by 39.50 and is confined within limits from 7.63 to 11.36 in other disease. But average visiting frequency with doctor is double as many as that of nurse but defined in apoplexy hypertension and articulate. (1) Average visiting frequency of nurse by existence in inoculation of hepatitis is low by 6.73 in unidentified group and very high by 26.89 in group of non-inoculation and the case of the antigenic positive man of B type hepatitis or epileptic who can't be inoculated shows 13.00 and that even family nursing service is needed to them. That result shows that though one person nurse of local charge has a large scale of duty. as visting nursing service is given a class who has a large demand preferentially by respectively accurate nursing diagnosis. the number of diagnosis service is similar with it. 3. During five years. average visiting frequency of nurse is 10.84 and average visiting frequency with doctor is 76.50 seeing from the official scale of nurse. visiting by household is performed two more per year to the average. Seeing this by type of service. average visiting frequency of nurse is higher in indirectly nursing than in directly nursing and that suggests that at the time of visiting household nurse performs education of protection lively save patient but at the time of contrastedly visiting with doctor. directly nursing is more contents of service show no difference by man power and medication dressing by demand is 14.3 and 18.6 the aid of hardship term of doctor and nurse is high by 18.7 and 17.00 in the request of hospitalization when seeing by demands. 4. Action by turns exemplified 1994 is well in sequence of 2/4 turn. 3/4 turn. 1/4 turn. 4/4 turn. When seen by average visiting frequency of nurse but gradually is even. Without difference by turns. average visiting frequency of doctor is much higher in 1/4 turn than other turns. Type of service by turns is all even but directly nursing is inactive in 4/4 and indirectly nursing. Very increases in 4/4 and so. Nurse's quantity of duty is plentiful that shows that by evaluation of last turn and plan of project. Contents of service follows that medication and dressing is the highest by' 5.57 in 1/4turn. goes down gradually by turn. becomes 3.57 in 3/4 turn. and increases again by 4.83 in 4/4 turn. the rest service is higher in 2/4 turn than other turns. 5. Total visiting frequency of nurse is explained to total $37.5\%$ by six valuables of visiting frequency of doctor. nursing demand. demand of diagnosis. condition of behavior. year. Special terms and magnitude of influential power is the same as sequence of enumerated valuables. Namely. the higher the visiting frequency of doctor. the bigger nursing and demand of diagnosis is. the worse the condition of behavior is. the older the object is and the more the household of special terms is. the high total visiting frequency of nurse is.
The development of computer and information technology has been combined with the information superhighway internet infrastructure, so information widely spreads not only in special fields but also in the daily lives of people. Information ubiquity influences the traditional way of transaction, and leads a new E-commerce which distinguishes from the existing E-commerce. Not only goods as physical but also service as non-physical come into E-commerce. As the scale of E-Commerce is being enlarged as well. It keeps people from finding information they want. Recommender systems are now becoming the main tools for E-Commerce to mitigate the information overload. Recommender systems can be defined as systems for suggesting some Items(goods or service) considering customers' interests or tastes. They are being used by E-commerce web sites to suggest products to their customers who want to find something for them and to provide them with information to help them decide which to purchase. There are several approaches of recommending goods to customer in recommender system but in this study, the main subject is focused on collaborative filtering technique. This study presents a possibility of pre-evaluation for the prediction performance of customer's preference in collaborative filtering before the process of customer's preference prediction. Pre-evaluation for the prediction performance of each customer having low performance is classified by using the statistical features of ratings rated by each customer is conducted before the prediction process. In this study, MovieLens 100K dataset is used to analyze the accuracy of classification. The classification criteria are set by using the training sets divided 80% from the 100K dataset. In the process of classification, the customers are divided into two groups, classified group and non classified group. To compare the prediction performance of classified group and non classified group, the prediction process runs the 20% test set through the Neighborhood Based Collaborative Filtering Algorithm and Correspondence Mean Algorithm. The prediction errors from those prediction algorithm are allocated to each customer and compared with each user's error. Research hypothesis : Two research hypotheses are formulated in this study to test the accuracy of the classification criterion as follows. Hypothesis 1: The estimation accuracy of groups classified according to the standard deviation of each user's ratings has significant difference. To test the Hypothesis 1, the standard deviation is calculated for each user in training set which is divided 80% from MovieLens 100K dataset. Four groups are classified according to the quartile of the each user's standard deviations. It is compared to test the estimation errors of each group which results from test set are significantly different. Hypothesis 2: The estimation accuracy of groups that are classified according to the distribution of each user's ratings have significant differences. To test the Hypothesis 2, the distributions of each user's ratings are compared with the distribution of ratings of all customers in training set which is divided 80% from MovieLens 100K dataset. It assumes that the customers whose ratings' distribution are different from that of all customers would have low performance, so six types of different distributions are set to be compared. The test groups are classified into fit group or non-fit group according to the each type of different distribution assumed. The degrees in accordance with each type of distribution and each customer's distributions are tested by the test of ${\chi}^2$ goodness-of-fit and classified two groups for testing the difference of the mean of errors. Also, the degree of goodness-of-fit with the distribution of each user's ratings and the average distribution of the ratings in the training set are closely related to the prediction errors from those prediction algorithms. Through this study, the customers who have lower performance of prediction than the rest in the system are classified by those two criteria, which are set by statistical features of customers ratings in the training set, before the prediction process.
The Journal of The Korea Institute of Intelligent Transport Systems
/
v.10
no.3
/
pp.36-46
/
2011
At present, the number of local governments using the Traffic Information Center are increasing and drivers are utilizing its traffic information from VMS installed on roads in cities. However, the cases of the user's utility of VMS about urban roads with special characteristics different from expressways and urban highways haven't been evaluated so far. Because VMS is a medium installed from a budget to provide traffic information, it is necessary to evaluate and manage the efficiency of users. This study judged that the efficiency of the drivers using VMS of urban roads most influences the duty on alternative route information provision so that it established its evaluation criteria. In addition, it needs to raise its value by many drivers' observation of VMS. Therefore, in case of the same conditions, the installation location of VMS should be a road section with much traffic volume so its the evaluation criteria was established. At present, the study results can be utilized to raise the user's utility of VMS installed in the urban roads.
Journal of the Korea Academia-Industrial cooperation Society
/
v.12
no.1
/
pp.427-435
/
2011
The information management system for the national R&D reports on the level of each government department have been operated in order to have special affiliated organizations collect detailed information, construct databases for R&D reports, and operate their information system; thus, the current classification system for the R&D reports on the governmental level is insufficient. Also, each department requires to prepare a standardized electronic original text service system since mutually different electronic original text services have been provided. therefore, this paper sets up the following research goals and detailed research contents. The goals of this study are to establish methods to standardize the forms of national R&D reports and suggest the framework for XML-based national R&D reports services by analyzing the problems in the forms of previous national R&D reports services. As detailed research contents, first, Identify the current R&D electronic original reports services by each government department. Second, this paper analyzed primary overseas science technology information service systems related with national research and development reports and related database schemata. this paper proposed the XML-based national R&D reports service framework through analyzing the problems in the framework of the existing national R&D reports service system and also established and suggested the methods to provide database schema design and report portal services. Lastly, it is expected that this paper will have academic contribution to enhancing R&D investment efficiency by utilizing collaboratively the information and resources related with national R&D through establishing the general information management system for national-dimension R&D reports and also managing science technology information efficiently and developing a user-centered integrated information system.
Kim, Yong-Min;Lee, Do-Heon;Noh, Bong-Nam;Choi, Rak-Man;Ine, So-Ran
The Transactions of the Korea Information Processing Society
/
v.5
no.4
/
pp.975-983
/
1998
In these days, information communication systems are based on both open distributed computing technologies and object-oriented techniques like inheritance, encapsulation and object reuse to support various system configuration and application. As information systems are interconnected through unsecure networks, the need for the secure information exchange is more critical than before. In this paper, we have designed and implemented a transparent CORBA-basce Security infrastructure with authentication, security context association, access control and security information management to support a secure applications in distributed object environment. SESAME Ver. 4 was adopted as an external security service to manage user privilege attributes and to distribute keys for data encryption, decryption and integrity. Using filter and transformer with an interface to Object Request Broker, it provides a transparent security service to applications. The filter objects are special classes that allow additional parameters to be inserted into messages before they are sent and removed just after they are received. The transformer objects are special classes that allow direct access to the byte stream of every messages for encryption and decryption before it is sent and just after it is received. This study is to implement the access control interceptor(ACI) and the secure invocation interceptor(SII) of secure ORB defined in CORBA using filter and transformer.
KSCE Journal of Civil and Environmental Engineering Research
/
v.34
no.1
/
pp.213-221
/
2014
Since 2005, when "The Mobility Enhancement for the Mobility Impaired Act" was enacted, special transport systems(SPS) has been introduced by each responsible local entity. For its efficient operations and service enhancements, a clear understanding of travel patterns of SPS users is required. Yet we currently have a very limited understanding about them due to a lack of necessary data. This study represents an attempt to provide a better understanding of SPS user's travel patterns with the data generated by Gyeongsangnam-do SPS Call Center. The data include the number, time and day of calls, origins and destinations of callers, types of callers' impairement etc. The data thus allow one to analyze users' travel patterns, including area-wide O-D patterns. There were a number of interesting findings. For example, wheelchair users are only about 42% and the trips are made mostly on non-peak daytime periods. The results are expected to provide a helpful information not just for Center's SPS operations, but for other local entities that are interested in developing similar call centers as well. By refining the SPS system, periodic patterns of callers could be identified in the future.
Journal of the Korean Society for information Management
/
v.27
no.3
/
pp.15-34
/
2010
In this study we determine the level of awareness among academic librarians of ten technological tools as outlined in American Libraries. Towards this end, we conducted a survey targeting 156 academic librarians in 25 Korean university libraries. Questionnaires were designed to determine both the viability and level of acceptance of the ten technological proposals in question. Conclusions drawn after analyzing the responses to the survey were as follows: 1) Customer service can be improved by first drawing up a list of technological skills required for staff members. Methods to develop the cataloging service to more closely match individual user preferences and the use of SMS to send alerts proved to be the proposals, of the ten that were proposed, that not only bore the greatest necessity but also proved to be the most effective once they were implemented. 2) Proposals that proved to be the most difficult to implement were: Using technology to improve the cataloging service to make it more capable of evolving according to the individual preferences of users; the special event wiki for users; and improvements in customer service arising from identifying and drawing up a list of technological skills required for staff members.
When special voice control application services (VCS) such as voice-controlled web browsing or voice-controlled stock transactions are introduced in cellular systems, a channel quality better than that for ordinary voice communications service (OVS) is necessary in order to keep a suitable grade of VCS. To avoid ai. congestion, calls are normally admitted if there exists a channel-processing resource not occupied by other calls in the base as well as the interference level at the receiver is not higher than a predefined threshold. The threshold is usually 10㏈ noise-rise over the background noise level for voice communications service. When the base admits VCS attempts in exactly the same manner as it handles OVS calls. the same fraction of those will be not successful in taking the channel and then blocked. If the same noise-rise threshold is used as 10 ㏈, however, the admitted VCS calls might suffer from bad channel qualify and finally be dropped. From the user's point of view, the forced termination of ongoing calls is significantly undesirable than blocking new call attempts. When using a lower noise-rise threshold for VCS. on the other hand, the blocking probability of VCS gets higher than that of OVS. In this paper, a call admission policy that gives a priority to VCS is considered in order to reduce the blocking probability and keep an adequate channel quality.
The Journal of Korean Institute of Communications and Information Sciences
/
v.39B
no.4
/
pp.207-215
/
2014
Password based authentication systems are most widely used for user convenience in web services. However such authentication systems are known to be vulnerable to various attacks such as password guessing attack, dictionary attack and key logging attack. Besides, many of the web systems just provide user authentication in a one-way fashion such that web clients cannot verify the authenticity of the web server to which they set access and give passwords. Therefore, it is too difficult to protect against DNS spoofing, phishing and pharming attacks. To cope with the security threats, web system adopts several enhanced schemes utilizing one time password (OTP) or long and strong passwords including special characters. However there are still practical issues. Users are required to buy OTP devices and strong passwords are less convenient to use. Above all, one-way authentication schemes generate several vulnerabilities. To solve the problems, we propose a multi-channel, multi-factor authentication scheme by utilizing QR-Code. The proposed scheme supports both user and server authentications mutually, thereby protecting against attacks such as phishing and pharming attacks. Also, the proposed scheme makes use of a portable smart device as a OTP generator so that the system is convenient and secure against traditional password attacks.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.