• Title/Summary/Keyword: existing network

Search Result 5,650, Processing Time 0.036 seconds

An Analysis on the Contents Related to Health in the Three Major Monthly Women's Magazine (3개 주요 월간 여성잡지에 나타난 건강관련 기사 내용분석 (1997년 3월-1998년 2월 중심으로))

  • Yoo, Eun-Kwang;Lee, Seong-Eun;Kim, Myoung-Hee
    • Women's Health Nursing
    • /
    • v.4 no.3
    • /
    • pp.309-321
    • /
    • 1998
  • The purpose of this study was to analyze the contents related to health in the three major monthly women's magazine that was printed from March, 1997 to February, 1998. The unit of analysis was the section of health, living life, and reaing child. The total number of related story of health was 317. The analysis was done according to the target, health management, topics and the informer by using frequency and number. The findings are as follows : 1. The contents were categorized by target people. The number of items for women was 113(35.6%), child(17.4%), family(15.5), husband(4.7%) and others(26.8%). Others were the contents that are impossible to classify. 2. The number of items of contents by health management was the related to health maintenance and promotion 120(47.8%), health care when they were deviated from health 26(10.3%), and those of both attributes 105(41.8%). 3. The number of items of contents by topics was the related to the occurrence, prevention and treatment of various kinds of disease 41(12..9%), diet 37(11.7%), academic information 11.3%, women's disease 10.4%, the effect of foods 6.0%, child's growth & development and child care 5.75, various kinds of therapy for health care 5.7%, sexual life 5.4% and exercise 4.7%. 4. The number of items of contents by informer was medical doctor 215(49%), lay person's case report or report of a struggle against a disease 12.3%, relevant organization of a related story(eg. family therapy research institute, physical therapist's or teacher's) 11.2%, and the contents of existing books or lecture 8.9%. Among those contents, only the one case from nurse or Korean nurses association as informer was founded, which is related to "skinship child care." In conclusion, this finding showed that women's magazine took a role as a important resource providing informations of health to women. it provides a challenge to the health professionals to have concerns on women's needs, and the content, source, and accuracy of the health related information and take part in the process producing information through such as screening and examining so as to give accurate information to women. Then women's magazine can take a role as a major resource for maintaining and promoting women's health. Finally, nurses's, who are professional health care providers, important and active role as informers toward the lay persons, especially for the women who are non-professional care givers at the family unit should be stressed. More active and continual monitoring and analyzing the contents related health in the mass media including magazine and Internet network in detail, and participating in establishing the system of adequate and precise information for women and lay persons from the nursing profession are required absolutely.

  • PDF

Design and Implementation of the Digital Photo Frame based on Ubiquitous (유비쿼터스 기반 전자액자의 설계 및 구현)

  • Lee, Joa-Hyoung;Park, Chong-Myung;Heo, Nan-Sook;Jo, Young-Tae;Kwon, Young-Wan;Han, Woo-Ram;Seon, Ju-Ho;Kim, Jong-Wook;Yoo, Jae-Wook;Lee, Kang-Hee;Jung, In-Bum
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.9
    • /
    • pp.1703-1710
    • /
    • 2008
  • As the performance of digital camera keeps going on, the digital camera becomes into wide use recently so that the number of digital images taken by digital camera is increased rapidly. Given the augmentation of digital images, the digital photo frame has appeared for storing and enjoying the digital image and receives attention as the price of digital frame becomes down. However, users with the existing digital frame only could display the digital images and stream media stored in local disk. In the paper, we design and implement a new digital photo frame baled on ubiquitous which could provide a more variety of service to the user. With the proposed digital photo frame, the user could obtain the environment information and the digital image from multimedia sensor network. The users also could enjoy the various stream media stored in the remote streaming server seamlessly. In addition, the user could update the digital image through the web site at anywhere.

Development of Korea Ocean Satellite Center (KOSC): System Design on Reception, Processing and Distribution of Geostationary Ocean Color Imager (GOCI) Data (해양위성센터 구축: 통신해양기상위성 해색센서(GOCI) 자료의 수신, 처리, 배포 시스템 설계)

  • Yang, Chan-Su;Cho, Seong-Ick;Han, Hee-Jeong;Yoon, Sok;Kwak, Ki-Yong;Yhn, Yu-Whan
    • Korean Journal of Remote Sensing
    • /
    • v.23 no.2
    • /
    • pp.137-144
    • /
    • 2007
  • In KORDI (Korea Ocean Research and Development Institute), the KOSC (Korea Ocean Satellite Center) construction project is being prepared for acquisition, processing and distribution of sensor data via L-band from GOCI (Geostationary Ocean Color Imager) instrument which is loaded on COMS (Communication, Ocean and Meteorological Satellite); it will be launched in 2008. Ansan (the headquarter of KORDI) has been selected for the location of KOSC between 5 proposed sites, because it has the best condition to receive radio wave. The data acquisition system is classified into antenna and RF. Antenna is designed to be $\phi$ 9m cassegrain antenna which has 19.35 G/T$(dB/^{\circ}K)$ at 1.67GHz. RF module is divided into LNA (low noise amplifier) and down converter, those are designed to send only horizontal polarization to modem. The existing building is re-designed and arranged for the KOSC operation concept; computing room, board of electricity, data processing room, operation room. Hardware and network facilities have been designed to adapt for efficiency of each functions. The distribution system which is one of the most important systems will be constructed mainly on the internet. and it is also being considered constructing outer data distribution system as a web hosting service for offering received data to user less than an hour.

A Study on Labor Market Precariousness of the Working High School Graduate Youths (고졸 청년 노동자의 노동시장 불안정 연구)

  • Nahm, Jae wook;Kim, Young min;Han, Ki myung
    • Korean Journal of Social Welfare Studies
    • /
    • v.49 no.1
    • /
    • pp.221-262
    • /
    • 2018
  • This study aims to explore life experiences associated with poverty and discrimination in processes of growth, career exploration, entry into the labor market, and career accumulation of the working high school graduate youths. With this exploration, we also intent to grasp their difficulties and needs, thus look for policy tasks for them. The analysis is based on qualitative case study. The results are following. Typical working high school graduate youths choose not to go on to university under the influence of unfavorable economic situation of the original families. They enter the labor market without enough career exploration and try to continue working mainly in low-income and unskilled jobs. They usually work long hours to increase incomes, thus, do not have enough time to invest on their own human resources. They locate in a vicious circle of income poverty, time poverty, and skill poverty, but rarely protected by existing employment and income support programs. It is necessary to improve or introduces policy packages including labor market transition support for the high school graduate, education, training, and career exploration support, income support for the working poor, social network support, and support for reducing the dead zone of social insurances.

ROUTE/DASH-SRD based Point Cloud Content Region Division Transfer and Density Scalability Supporting Method (포인트 클라우드 콘텐츠의 밀도 스케일러빌리티를 지원하는 ROUTE/DASH-SRD 기반 영역 분할 전송 방법)

  • Kim, Doohwan;Park, Seonghwan;Kim, Kyuheon
    • Journal of Broadcast Engineering
    • /
    • v.24 no.5
    • /
    • pp.849-858
    • /
    • 2019
  • Recent developments in computer graphics technology and image processing technology have increased interest in point cloud technology for inputting real space and object information as three-dimensional data. In particular, point cloud technology can accurately provide spatial information, and has attracted a great deal of interest in the field of autonomous vehicles and AR (Augmented Reality)/VR (Virtual Reality). However, in order to provide users with 3D point cloud contents that require more data than conventional 2D images, various technology developments are required. In order to solve these problems, an international standardization organization, MPEG(Moving Picture Experts Group), is in the process of discussing efficient compression and transmission schemes. In this paper, we provide a region division transfer method of 3D point cloud content through extension of existing MPEG-DASH (Dynamic Adaptive Streaming over HTTP)-SRD (Spatial Relationship Description) technology, quality parameters are further defined in the signaling message so that the quality parameters can be selectively determined according to the user's request. We also design a verification platform for ROUTE (Real Time Object Delivery Over Unidirectional Transport)/DASH based heterogeneous network environment and use the results to validate the proposed technology.

Lightweight Validation Mechanism for IoT Sensing Data Based on Obfuscation and Variance Analysis (난독화와 변화량 분석을 통한 IoT 센싱 데이터의 경량 유효성 검증 기법)

  • Yun, Junhyeok;Kim, Mihui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.9
    • /
    • pp.217-224
    • /
    • 2019
  • Recently, sensor networks are built and used on many kinds of fields such as home, traffic, medical treatment and power grid. Sensing data manipulation on these fields could be a serious threat on property and safety. Thus, a proper way to block sensing data manipulation is necessary. In this paper, we propose IoT(Internet of Things) sensing data validation mechanism based on data obfuscation and variance analysis to remove manipulated sensing data effectively. IoT sensor device modulates sensing data with obfuscation function and sends it to a user. The user demodulates received data to use it. Fake data which are not modulated with proper obfuscation function show different variance aspect with valid data. Our proposed mechanism thus can detect fake data by analyzing data variance. Finally, we measured data validation time for performance analysis. As a result, block rate for false data was improved by up to 1.45 times compared with the existing technique and false alarm rate was 0.1~2.0%. In addition, the validation time on the low-power, low-performance IoT sensor device was measured. Compared to the RSA encryption method, which increased to 2.5969 seconds according to the increase of the data amount, the proposed method showed high validation efficiency as 0.0003 seconds.

Management Automation Technique for Maintaining Performance of Machine Learning-Based Power Grid Condition Prediction Model (기계학습 기반 전력망 상태예측 모델 성능 유지관리 자동화 기법)

  • Lee, Haesung;Lee, Byunsung;Moon, Sangun;Kim, Junhyuk;Lee, Heysun
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.6 no.4
    • /
    • pp.413-418
    • /
    • 2020
  • It is necessary to manage the prediction accuracy of the machine learning model to prevent the decrease in the performance of the grid network condition prediction model due to overfitting of the initial training data and to continuously utilize the prediction model in the field by maintaining the prediction accuracy. In this paper, we propose an automation technique for maintaining the performance of the model, which increases the accuracy and reliability of the prediction model by considering the characteristics of the power grid state data that constantly changes due to various factors, and enables quality maintenance at a level applicable to the field. The proposed technique modeled a series of tasks for maintaining the performance of the power grid condition prediction model through the application of the workflow management technology in the form of a workflow, and then automated it to make the work more efficient. In addition, the reliability of the performance result is secured by evaluating the performance of the prediction model taking into account both the degree of change in the statistical characteristics of the data and the level of generalization of the prediction, which has not been attempted in the existing technology. Through this, the accuracy of the prediction model is maintained at a certain level, and further new development of predictive models with excellent performance is possible. As a result, the proposed technique not only solves the problem of performance degradation of the predictive model, but also improves the field utilization of the condition prediction model in a complex power grid system.

Token-Based IoT Access Control Using Distributed Ledger (분산 원장을 이용한 토큰 기반 사물 인터넷 접근 제어 기술)

  • Park, Hwan;Kim, Mi-sun;Seo, Jae-hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.377-391
    • /
    • 2019
  • Recently, system studies using tokens and block chains for authentication, access control, etc in IoT environment have been going on at home and abroad. However, existing token-based systems are not suitable for IoT environments in terms of security, reliability, and scalability because they have centralized characteristics. In addition, the system using the block chain has to overload the IoT device because it has to repeatedly perform the calculation of the hash et to hold the block chain and store all the blocks. In this paper, we intend to manage the access rights through tokens for proper access control in the IoT. In addition, we apply the Tangle to configure the P2P distributed ledger network environment to solve the problem of the centralized structure and to manage the token. The authentication process and the access right grant process are performed to issue a token and share a transaction for issuing the token so that all the nodes can verify the validity of the token. And we intent to reduce the access control process by reducing the repeated authentication process and the access authorization process by reusing the already issued token.

An Origin-Centric Communication Scheme to Support Sink Mobility for Continuous Object Detection in IWSNs (산업용 무선 센서망을 이용한 연속개체 탐지에서 이동 싱크 지원을 위한 발원점 중심의 통신방안)

  • Kim, Myung-Eun;Kim, Cheonyong;Yim, Yongbin;Kim, Sang-Ha;Son, Young-Sung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.12
    • /
    • pp.301-312
    • /
    • 2018
  • In industrial wireless sensor networks, the continuous object detection such as fire or toxic gas detection is one of major applications. A continuous object occurs at a specific point and then diffuses over a wide area. Therefore, many studies have focused on accurately detecting a continuous object and delivering data to a static sink with an energy-efficient way. Recently, some applications such as fire suppression require mobile sinks to provide real-time response. However, the sink mobility support in continuous object detection brings challenging issues. The existing approaches supporting sink mobility are designed for individual object detection, so they establish one-to-one communication between a source and a mobile sink for location update. But these approaches are not appropriate for a continuous object detection since a mobile sink should establish one-to-many communication with all sources. The one-to-many communication increases energy consumption and thus shortens the network lifetime. In this paper, we propose the origin-centric communication scheme to support sink mobility in a continuous object detection. Simulation results verify that the proposed scheme surpasses all the other work in terms of energy consumption.

Cybersecurity Architecture for Reliable Smart Factory (신뢰성 있는 스마트팩토리를 위한 사이버보안 아키텍처)

  • Kim, HyunJin;Kim, SungJin;Kim, Yesol;Kim, Sinkyu;Shon, TaeShik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.629-643
    • /
    • 2019
  • In the era of the 4th industrial revolution, countries around the world are conducting projects to rapidly expand smart factory to secure competitiveness in manufacturing industries. However, unlike existing factories where the network environment was closed, smart factories can be vulnerable because internal and external objects are interconnected and various ICT technologies are used. And smart factories are likely to be the subject of cyber-attacks that are designed to cause monetary damage to certain targets because economic damage is so serious when an accident occurs. Therefore, it is necessary to study and apply security for smart factories, but there is no specific smart factory system architecture, so there is no establish for smart factory security requirements. In order to solve these problems, this paper derives the smart factory architecture that can extract and reflect the main characteristics of a smart factory based on the domestic and foreign reference model of smart factories. And this paper identifies the security threats based on the derived smart factory architecture and present the security requirements to cope with them for contributing to the improvement of the security of the smart factory.