• Title/Summary/Keyword: contents access

Search Result 1,142, Processing Time 0.028 seconds

A Determination Model of the Data Transmission-Interval for Collecting Vehicular Information at WAVE-technology driven Highway by Simulation Method (모의실험을 이용한 WAVE기반 고속도로 차량정보 전송간격 결정 모델 연구)

  • Jang, Jeong-Ah;Cho, Han-Byeog;Kim, Hyon-Suk
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.4
    • /
    • pp.1-12
    • /
    • 2010
  • This paper deals with the transmission interval of vehicle data in smart highway where WAVE (Wireless Access for Vehicular Environments) systems have been installed for advanced road infrastructure. The vehicle data could be collected at every second, which is containing location information of the vehicle as well the vehicle speed, RPM, fuel consuming and safety data. The safety data such as DTC code, can be collected through OBD-II. These vehicle data can be used for valuable contents for processing and providing traffic information. In this paper, we propose a model to decide the collection interval of vehicle information in real time environment. This model can change the transmission interval along with special and time-variant traffic condition based on the 32 scenarios using microscopic traffic simulator, VISSIM. We have reviewed the transmission interval, communication transmission quantity and communication interval, tried to confirm about communication possibility and BPS, etc for each scenario. As results, in 2-lane from 1km highway segment, most appropriate transmission interval is 2 times over spatial basic segment considering to communication specification. In the future, if a variety of wireless technologies on the road is introduced, this paper considering not only traffic condition but also wireless network specification will be utilized the high value.

A Scheme of Supporting a Soft Handoff for IEEE 802.16e (IEEE 802.16e에서 소프트 핸드오프 지원 방안)

  • Han Jong soo;Park Ju hee;Lee Joon hyuk;Yun Chan young;Oh Young hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.12A
    • /
    • pp.1309-1318
    • /
    • 2004
  • The rapid growth of the mobile Internet has enabled its application area to expand, and its users want services that require more bandwidth for multimedia services. There are limits to support the various multimedia service to mobile station provided by existing mobile communications. The wireless MAN called the IEEE 802.16 Broadband Wireless Access systems which the IEEE 802.11 wireless LAN is similar to wireline Internet service being able to supper a various contents is used and is designed to consider a handoff is studying. Especially, TG(Task Group)e of IEEE 802.16 is in progress discussion to support a handoff to higher layer using BS(Base Station) or unit of sector, to UC. Yet a scheme is not detail. This thesis proposes the network model for IEEE 802.16e to support a soft handoff between BSs to use a mobile communication network called cdma2000 Ix EV-DO network. The proposed network model supports soft handoff to add a management skill in MA of each BS for MC(Mobility Controller). The proposed network model has merits that is able to apply existing systems as it is and that is able to use a various multimedia service, when using a wireless Internet.

The core information protection mechanism in the BcN(Broadband Convergence Network) (BcN(Broadband Convergence Network) 환경에서의 중요정보에 대한 도청방지 메카니즘)

  • Oh, Sek-Hoan;Lee, Jae-Yong;Kim, Byung-Chul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.1
    • /
    • pp.14-26
    • /
    • 2008
  • IP over Ethernet technology widely used as Internet access uses the ARP(Address Resolution Protocol) that translates an ip address to the corresponding MAC address. recently, there are ARP security attacks that intentionally modify the IP address and its corresponding MAC address, utilizing various tools like "snoopspy". Since ARP attacks can redirect packets to different MAC address other than destination, attackers can eavesdrop packets, change their contents, or hijack the connection. Because the ARP attack is performed at data link layer, it can not be protected by security mechanisms such as Secure Shell(SSH) or Secure Sockets Layer(SSL). Thus, in this paper, we classify the ARP attack into downstream ARP spoofing attack and upstream ARP redirection attack, and propose a new security mechanism using DHCP information for acquisition of IP address. We propose a "DHCP snoop mechanism" or "DHCP sniffing/inspection mechanism" for ARP spoofing attack, and a "static binding mechanism" for ARP redirection attack. The proposed security mechanisms for ARP attacks can be widely used to reinforce the security of the next generation internet access networks including BcN.

A Study on Marketing Strategies based on SNS Usage Characteristics by Performing Genre (공연장르별 SNS 이용특성에 따른 마케팅전략 연구)

  • Koo, Eun-Ja;Im, Jae-Hee;Kim, Choon-Keun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.1
    • /
    • pp.281-290
    • /
    • 2017
  • This study aims to determine how demographic characteristics and SNS use traits of audiences are different depending on preferred performance types such as pop music concert, musical; play, dancing and ballet. SNS use traits are as follows: duration of SNS use, average number of access to SNS account, average time of SNS use, SNS activity type, motivation for SNS use, preferable type of SNS, annual total number of performance watched, and method to gain performance information. Also, the study was conducted to get significant insights in designing marketing strategy using social network services. The results are as follows. First, the result of examining audience's demographic factors depending on preferred performance type showed meaningful differences in sex, age, marital status, form of family, academic level, job and monthly income of the audiences. Second, SNS use traits of the audiences according to preferred performance genres vary in duration of SNS use, average number of access to SNS account, average time of SNS use, SNS activity type, motivation for SNS use, method to gain performance information. These findings showed that demographic characteristics and SNS use traits needed to be classified more specifically based on genres. Additionally, marketing strategy using performance information, traits of contents and customers' patterns through SNS should be specifically developed based on specified target.

Qualitative Study for Medication Use among Visually Impaired in Korea (국내 시각장애인의 의약품 안전사용 실태에 대한 심층면접조사)

  • Koo, Heejo;Jang, Sunmee;Oh, Jung Mi;Han, Nayoung;Han, Euna
    • Korean Journal of Clinical Pharmacy
    • /
    • v.26 no.1
    • /
    • pp.24-32
    • /
    • 2016
  • Objective: The visually impaired have limited access to health care services and related information, and thus, they can have serious hurdles against properly taking medications. Despite that it is important to improve self-care ability of the visually impaired for correct medication use, there have been few studies investigating their needs for health care services in Korea, particularly focusing on proper medication usage. This study is to explore safety-related issues regarding mediation usage among the visually impaired based on in-depth interview. We particularly focus on any obstacles for safe use of medicines including experience on medication-related adverse effects in order to provide preliminary evidence for policy measures to improve proper medication use among the visually impaired. Methods: Study sample was visually impaired individuals who resided in Seoul area and were registered in the National Association of Visually Impaired. The association helped the process of recruiting the study participants. In-depth interview for each study participants was conducted. Each interview was recorded and later converted into a written script to extract core contents for the analysis. Results: The study participants comprised of three women (42.9%) and four men (57.1%). One was in his 20's, and there were four participants in 30's and two in 40's. Fully impaired participants were majority (5 out of 7). Limitation to physical access to health care providers and health information were the key factors to hamper safe medication utilization among the study participants. Difficulty reading medication information and may take the wrong medication or incorrect doses of medication, resulting in serious consequences, including overdose or inadequate treatment of health problems. Visually impaired patients report increased anxiety related to medication management and must rely on others to obtain necessary drug information. Pharmacists have a unique opportunity to pursue accurate medication adherence in this special population. This article reviews literature illustrating how severe medication mismanagement can occur in the visually impaired elderly and presents resources and solutions for pharmacists to take a larger role in adherence management in this population. Conclusion: The visually impaired had difficulties reading medication information and identifying medicines, and took incorrect doses of medications. Public support for safe medication use and medication management among the visually impaired is necessary.

Secure Query Processing against Encrypted XML Data Using Query-Aware Decryption (질의-인식 복호화를 사용한 암호화된 XML데이타에 대한 안전한 질의 처리)

  • Lee Jae-Gil;Whang Kyu-Young
    • Journal of KIISE:Databases
    • /
    • v.32 no.3
    • /
    • pp.243-253
    • /
    • 2005
  • Dissemination of XML data on the internet could breach the privacy of data providers unless access to the disseminated XML data is carefully controlled. Recently, the methods using encryption have been proposed for such access control. However, in these methods, the performance of processing queries has not been addressed. A query processor cannot identify the contents of encrypted XML data unless the data are decrypted. This limitation incurs overhead of decrypting the parts of the XML data that would not contribute to the query result. In this paper, we propose the notion of query-aware decryption for efficient processing of queries against encrypted XML data. Query-aware decryption allows us to decrypt only those parts that would contribute to the query result. For this purpose, we disseminate an encrypted XML index along with the encrypted XML data. This index, when decrypted, informs us where the query results are located in the encrypted XML data, thus preventing unnecessary decryption for other parts of the data. Since the size of this index is much smaller than that of the encrypted XML data, the cost of decrypting this index is negligible compared with that for unnecessary decryption of the data itself. The experimental results show that our method improves the performance of query processing by up to 6 times compared with those of existing methods. Finally, we formally prove that dissemination of the encrypted XML index does not compromise security.

A Security Model Analysis Adopt to Authentication State Information in IPTV Environment (IPTV 환경에서 가입자의 인증 상태정보를 이용한 인증보안 모델 설계)

  • Jeong, Yoon-Su;Jung, Yoon-Sung;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.421-430
    • /
    • 2010
  • Now a days, as a communications network is being broadband, IPTV(Internet Protocol Television) service which provides various two-way TV service is increasing. But as the data which is transmitted between IPTV set-top box and smart card is almost transmitted to set-top box, the illegal user who gets legal authority by approaching to the context of contents illegally using McComac Hack Attack is not prevented perfectly. In this paper, set-top box access security model is proposed which is for the protection from McComac Hack Attack that tries to get permission for access of IPTV service illegally making data line which is connected from smart card to set-top box by using same kind of other set-top box which illegal user uses. The proposed model reports the result of test which tests the user who wants to get permission illegally by registration the information of a condition of smart card which is usable in set-top box in certification server so that it prevents illegal user. Specially, the proposed model strengthen the security about set-top box by adapting public key which is used for establishing neighbor link and inter-certification process though secret value and random number which is created by Pseudo random function.

Development of a Model of a Day Care Center for Rural Elderly People (농촌형 노인 주간보호시설 모형개발)

  • Kang, Kyung-Sook
    • Research in Community and Public Health Nursing
    • /
    • v.15 no.4
    • /
    • pp.551-565
    • /
    • 2004
  • Purpose: The purpose of this study is to develop a day care center model focused on public health institutions for the elderly residing in their homes. Method: Research design for this study was a mult-level research, which consisted of a related literature review, an Internet search for knowledge of the current situation at home and abroad, on-site interviews, questionnaires collected from a sample of residents in a rural area, and a key-informants approach. Results: 1) The subjects of service - Generalized service should be provided to the elderly, 65 years and older, regardless of their assets. 2) The contents of service - Providing pre-health oriented and post-social welfare service that can integrate and satisfy a wide variety of public health and welfare needs of the elderly would strengthen the health care service of a day care center for the elderly. 3) Delivery system - Basic-level local self-governments should become a central operating body, and establishing a properly adjusted delivery system to a rural area after considering the efficiency and the access of vulnerable rural areas is needed based on modification of 'a Special Law for Agricultural and Fishery Areas' (rural public health center>rural health sub-center ${\rightarrow}$ unified health sub-center ${\rightarrow}$ public health hospital (public health center) ${\rightarrow}$ public welfare office). 4) Facility - Public health facilities such as public health centers and sub-centers should be located in areas that can easily access the facilities. 5) Funding - For day care center for the elderly in local self-government, the central government should modify a relevant implementation of subsidy in and provide some facilities and service regardless of the degree of self reliance of local self-government. 6) Human resources - It is needed to guarantee the period of workers of a day care center for the elderly, at least 3 to 5 years, with considering their specialty on aged care and avoiding circulation based positions. Furthermore, appropriate specially trained personnel such as medical workers and social workers should be placed to take care of both health service and welfare through strengthening of 'rules of law of elderly welfare,' Conclusion: future research is needed to test the model through a demonstration study using a model which may be developed in the future and to standardize the appraisal criteria of people hoping to enter a day care center for the elderly.

  • PDF

A Study on the Improvements of eBook Services for Children in the Public Library (공공도서관 어린이 전자책 서비스 개선방안에 관한 연구)

  • Baek, Ji-Won
    • Journal of Information Management
    • /
    • v.43 no.1
    • /
    • pp.63-87
    • /
    • 2012
  • This study aims to analyse the actual condition of the ebook services and propose the improvements of ebook services for children in the Korean public library. For this purpose, the current condition of the ebook services in the public libraries were analyzed and categorized by three criteria. Secondly, the ebook use analysis was conducted using PCs and mobile devices in terms of access to ebook library site, searching method, contents type and viewer, lending process, and user help. As a result of the analysis, several issues such as the difficulty in access to ebook site, the complexity of setting and usage depending on the file format, the insufficient user guide, the relatively lower quality service than the commercial's, and the lack of retrieval functions specialized for the ebook were presented. The improvement plan for the ebook services, especially for children in the public library was suggested.

Personalized EPG Application using Automatic User Preference Learning Method (사용자 선호도 자동 학습 방법을 이용한 개인용 전자 프로그램 가이드 어플리케이션 개발)

  • Lim Jeongyeon;Jeong Hyun;Kim Munchurl;Kang Sanggil;Kang Kyeongok
    • Journal of Broadcast Engineering
    • /
    • v.9 no.4 s.25
    • /
    • pp.305-321
    • /
    • 2004
  • With the advent of the digital broadcasting, the audiences can access a large number of TV programs and their information through the multiple channels on various media devices. The access to a large number of TV programs can support a user for many chances with which he/she can sort and select the best one of them. However, the information overload on the user inevitably requires much effort with a lot of patience for finding his/her favorite programs. Therefore, it is useful to provide the persona1ized broadcasting service which assists the user to automatically find his/her favorite programs. As the growing requirements of the TV personalization, we introduce our automatic user preference learning algorithm which 1) analyzes a user's usage history on TV program contents: 2) extracts the user's watching pattern depending on a specific time and day and shows our automatic TV program recommendation system using MPEG-7 MDS (Multimedia Description Scheme: ISO/IEC 15938-5) and 3) automatically calculates the user's preference. For our experimental results, we have used TV audiences' watching history with the ages, genders and viewing times obtained from AC Nielson Korea. From our experimental results, we observed that our proposed algorithm of the automatic user preference learning algorithm based on the Bayesian network can effectively learn the user's preferences accordingly during the course of TV watching periods.