• Title/Summary/Keyword: Telecommunications Services

Search Result 985, Processing Time 0.029 seconds

A Study on Ontology Based Knowledge Representation Method with the Alzheimer Disease Related Articles (알츠하이머 관련 논문을 대상으로 하는 온톨로지 기반 지식 표현 방법 연구)

  • Lee, Jaeho;Kim, Younhee;Shin, Hyunkyung;Song, Kibong
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.125-135
    • /
    • 2014
  • In the medical field, for the purpose of diagnosis and treatment of diseases, building knowledge base has received a lot of attention. The most important thing to build a knowledge base is representing the knowledge accurately. In this paper we suggest a knowledge representation method using Ontology technique with the datasets obtained from the domestic papers on Alzheimer disease that has received a lot of attention recently in the medical field. The suggested Ontology for Alzheimer disease defines all the possible classes: lexical information from journals such as 'author' and 'publisher' research subjects extracted from 'title', 'abstract', 'keywords', and 'results'. It also included various semantic relationships between classes through the Ontology properties. Inference can be supported since our Ontology adopts hierarchical tree structure for the classes and transitional characteristics of the properties. Therefore, semantic representation based query is allowed as well as simple keyword query, which enables inference based knowledge query using an Ontology query language 'SPARQL'.

A Streaming XML Hardware Parser using a Tree with Failure Transition (실패 전이를 갖는 트리를 이용한 스트리밍 XML 하드웨어 파서)

  • Lee, Kyu-Hee;Han, Sang-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.10
    • /
    • pp.2323-2329
    • /
    • 2013
  • Web-services employ an XML to represent data and an XML parser is needed to use data. The DOM(Document Object Model) is widely used to parse an XML, but it is not suitable for any systems with limited resources because it requires a preprocessing to create the DOM and additional memory space. In this paper, we propose the StreXTree(Streaming XML Tree) with failure transitions and without any preprocessing tasks in order to improve the system performance. Compared to other works, our StreXTree parser achieves 2.39x and 3.02x improvement in system performance in Search and RBStreX, respectively. In addition, our StreXTree parser supports Well-Formed checking to verify the syntax and structure of XML.

Policy Agendas for the Efficient Use of Public and Broadcast Spectrum (공공 및 방송주파수의 효율적 이용을 위한 정책 과제)

  • Yeon, Kwon-Hum;Kim, Yongkyu
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.24 no.8
    • /
    • pp.849-859
    • /
    • 2013
  • This paper explores the policy alternatives to promote efficient use of spectrums for public use and terrestrial broadcasting, which are essential to provide spectrum for mobile broadband services. To this end, recent overseas spectrum management policies are introduced and utilized to provide domestic policy alternatives. For the efficient use of spectrum for public use, policy alternatives such as detailed survey of current usage of spectrum for public use, levying the opportunity cost, installment of spectrum efficiency fund, providing incentives for the efficient use of spectrum for military use, and introduction of shared use are proposed. For the efficient use of spectrum for terrestrial broadcasting, short-term policy alternative such as change of contribution rate base of the broadcasting - telecommunications development fund is proposed. For long-term policy alternatives, change of spectrum provision from designation to allocation for the spectrum for commercial terrestrial broadcasting and introduction of administered incentive pricing to public terrestrial broadcasting are proposed.

An Area-Efficient Design of Merged TEA Block Cipher for Mobile Security (모바일 보안용 병합 TEA 블록 암호의 면적 효율적인 설계)

  • Sonh, Seungil;Kang, Min-Goo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.3
    • /
    • pp.11-19
    • /
    • 2020
  • In this paper, a merged TEA block cipher processor which unifies Tiny Encryption Algorithm(TEA), extended Tiny Encryption Algorithm(XTEA) and corrected block TEA(XXTEA) is designed. After TEA cipher algorithm was first designed, XTEA and XXTEA cipher algorithms were designed to correct security weakness. Three types of cipher algorithm uses a 128-bit master key. The designed cipher processor can encrypt or decrypt 64-bit message block for TEA/XTEA and variable-length message blocks up to 256-bit for XXTEA. The maximum throughput for 64-bit message blocks is 137Mbps and that of 256-bit message blocks is 369Mbps. The merged TEA block cipher designed in this paper has a 16% gain on the area side compared to a lightweight LEA cipher. The cryptographic IP of this paper is applicable in security module of the mobile areas such as smart card, internet banking, and e-commerce.

A Security Evaluation Criteria for Korean Cloud Computing Service (한국형 클라우드를 위한 정보보호 관리체계 평가 기준)

  • Kim, Kichul;Heo, Ok;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.251-265
    • /
    • 2013
  • Cloud computing provided as a service type by sharing IT resources cannot be activated unless the issue of information security is solved. The enterprise attempts to maximize the efficiency of information and communication resources by introducing cloud computing services. In comparison to the United States and Japan, however, cloud computing service in korea has not been activated because of a lack of confidence in the security. This paper suggests core evaluation criteria and added evaluation criteria which is removed the redundancy of the security controls from existing ISMS for Korean cloud computing through a comparative analysis between domestic and foreign security controls of cloud certification scheme and guidelines and information security management system. A cloud service provider certified ISMS can minimize redundant and unnecessary certification assessment work by considering added evaluation criteria.

Electronic Risk Assessment System as an Appropriate Tool for the Prevention of Cancer: a Qualitative Study

  • Amoli, Amir hossein Javan;Maserat, Elham;Safdari, Reza;Zali, Mohammad Reza
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.18
    • /
    • pp.8595-8598
    • /
    • 2016
  • Background: Decision making modalities for screening for many cancer conditions and different stages have become increasingly complex. Computer-based risk assessment systems facilitate scheduling and decision making and support the delivery of cancer screening services. The aim of this article was to survey electronic risk assessment system as an appropriate tool for the prevention of cancer. Materials and Methods: A qualitative design was used involving 21 face-to-face interviews. Interviewing involved asking questions and getting answers from exclusive managers of cancer screening. Of the participants 6 were female and 15 were male, and ages ranged from 32 to 78 years. The study was based on a grounded theory approach and the tool was a semi-structured interview. Results: Researchers studied 5 dimensions, comprising electronic guideline standards of colorectal cancer screening, work flow of clinical and genetic activities, pathways of colorectal cancer screening and functionality of computer based guidelines and barriers. Electronic guideline standards of colorectal cancer screening were described in the s3 categories of content standard, telecommunications and technical standards and nomenclature and classification standards. According to the participations' views, workflow and genetic pathways of colorectal cancer screening were identified. Conclusions: The study demonstrated an effective role of computer-guided consultation for screening management. Electronic based systems facilitate real-time decision making during a clinical interaction. Electronic pathways have been applied for clinical and genetic decision support, workflow management, update recommendation and resource estimates. A suitable technical and clinical infrastructure is an integral part of clinical practice guidline of screening. As a conclusion, it is recommended to consider the necessity of architecture assessment and also integration standards.

A Study on Slow Driving of Metropolitan Train for Disorder Condition of Platform Safety Gate using LTE-R and Beacon (LTE-R과 비콘을 활용한 승강장안전문 장애발생 시 열차 서행운전에 관한 연구)

  • Joh, Eungyoung;Noh, Jowon;Kim, Jin-Tea;Lee, Sunghwa
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.3
    • /
    • pp.31-36
    • /
    • 2020
  • The LTE-R system is a system consisting of a packet network that provides all IP-based services. Continuous failures related to the platform safety gate and subsequent safety accidents related to passengers and safety gate workers continue. The secondary damage caused by the failure of the platform safety door and the related human life damage have emerged as a major social issue.. By linking the beacon system to the Long Term Evoluton-Railway (LTE-R) network, an LTE-based railway wireless network currently in operation or being installed, it precisely locates trains and provides standardized fault alerts to train crews. When entering into the station, ultimately we will decelerate the train and reduce the accidents of metropolitabn railroad traffic by securing safe driving.

Conflict Structure and Conflict Resolution in IPTV Policy, Korea (방송통신융합서비스 정책 과정에서 나타나는 갈등유형과 갈등관리: IPTV 사례를 중심으로)

  • Jung, Sang-Yune;Jung, In-Sook
    • Korean journal of communication and information
    • /
    • v.31
    • /
    • pp.295-325
    • /
    • 2005
  • This study explored the conflict structure and resolution about IPTV, the typical convergence services. Which kinds of conflicts is taking plate in IPTV? How has it been managing by regulators? Researchers argues that IPTV dispute shows some different policy process comparing the past. It has double sided conflict structure- one is done by broadcasters and the others by regulators. When it was one sided conflict structure, it was easy to control the conflict issues. But now regulators become the subject to the conflict ground, it is not easy to control the conflict between business part. Rather the regulators show the strategy of avoiding conflict resolution - they do not really effort to resolve the conflict problems. but deepening and widening the conflict. In IPTV case, researchers found the avoiding conflict resolution strategy. And so-called 'iron coalition' between regulators and business part to preserve their areas and lights is likely to be loosen in IPTV policy environment.

  • PDF

An Empirical Study on the Effects of Business Performance by Information Security Management System(ISMS) (정보보호 관리체계(ISMS)가 기업성과에 미치는 영향에 관한 실증적 연구)

  • Jang, Sang Soo;Kim, Sang Choon
    • Convergence Security Journal
    • /
    • v.15 no.3_1
    • /
    • pp.107-114
    • /
    • 2015
  • Since 2002, information security management system has been implemented (ISMS) certification scheme whilst providing telecommunications services to enhance the level of enterprise information security was ongoing and Prevent accidents and avoid spread of infringement, such as rapid response and there is a lot of it came true. However, this system is the protection of the country or the investment company, as part of the actual information on how management affects the performance came from or how measures are still lacking for. In this study, the companies have their own privacy ISMS certification measures the level of activity continued to improve information security performance measures and methodology are presented. The government is also based on the validity of the certification system to ensure the overall implementation of the ISMS itself is this a step increase effective information security system is to be certified in advance to prevent security incidents and to improve business performance to help.

A Performance Simulation for Call Capacity of Base Station in CDMA Mobile System (CDMA Mobile System의 Base Station호 처리 용량 성능 시뮬레이션)

  • Lee, Dong-Myeong;Jeon, Mun-Seok;Lee, Cheol-Hui
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.5
    • /
    • pp.1253-1261
    • /
    • 1996
  • The base station (BS) of CDMA mobile system (CMS) provides mobile call services by controlling call processing functions. The call Processing part of the BS is divided into two components; the base station transceiver subsystem (BTS) and the base station controller (BSC). In this paper, we present the call capacity estimation of the BS about control signals and traffic data of calls by the simulation, and find the bottleneck points and problems which may occur in the BS. In order to estimate the call capacity, first we extract the major parameters for the modeling the BS. Second, we suggest the simulation model for the BS. Third, we estimate the simulation results by finding major objective factors such that the call blocking probability, the utilization ratio and the delay time in the traffic channel elements (TCEs), the BTS interconnection network (BIN)-COMA interconnection network (CIN) trunks, the transcoding channels and the CIN packet router.

  • PDF