• Title/Summary/Keyword: personal communication services

Search Result 353, Processing Time 0.027 seconds

Optimum Design of Multi-beam Large Reflector Antenna for Satellite Payload (위성 탑재용 다중빔 대형 반사판 안테나의 최적 설계)

  • Yun, So-Hyeun;Uhm, Man-Seok;Yom, In-Bok
    • Journal of Satellite, Information and Communications
    • /
    • v.5 no.2
    • /
    • pp.45-49
    • /
    • 2010
  • This paper presents the study on multi-beam large aperture antenna systems for a satellite payload. Multi-beam large antenna provides the universal communication and broadcasting services to personal portable terminals. The hybrid antenna composed of a large reflector and a feed array forms multi-beams. The feed cluster consists of a group of feed elements and each element should be optimized for the appropriate amplitude and phase. The optimization progress for amplitude and phase was performed by GO (Geometrical Optics) and PO (Physical Optics) method. The number of feed elements as well as the power level per element were also optimized to meet the required EIRP (Effective Isotropically Radiated Power). In conclusion, 30m-class reflector and twenty five elements for fifteen beams over Korean Peninsula were designed through the optimization process.

Evaluation Criteria for Suitable Authentication Method for IoT Service Provider in Industry 4.0 Environment (4차 산업혁명 시대의 IoT 서비스 참여 주체에 대한 적합한 인증수단 선택을 위한 평가기준)

  • Jeong, Kwang Seob;Bae, Sukjoo;Kim, Hyoungtae
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.40 no.3
    • /
    • pp.116-122
    • /
    • 2017
  • Advances in information technology, communication and network technology are radically facilitating digital convergences as the integration of human, equipment, and space in the current industry 4.0 era. In industry 4.0 environment, the vast amount of information with networked computing technology can be simultaneously accessible even in limited physical space. Two main benefit points out of these information are the convenience and efficiency in their online transactions either buying things online or selling online. Even though there exist so many benefits that information technology can create for the people doing business over the internet there is a critical problem to be answered. In spite of many such advantages, however, online transactions have many dysfunctions such as personal information leakage, account hacking, and cybercrime. Without preparing the appropriate protection methods or schema people reluctantly use the transaction or would find some other partners with enhanced information security environment. In this paper we suggested a novel selection criteria that can be used to evaluate the reliable means of authentication against the expected risks under on-going IoT based environment. Our selection criteria consists of 4 steps. The first step is services and risk identification step. The second step is evaluation of risk occurrence step. The third step includes the evaluation of the extent of damage. And the final step is the assessment of the level of risk. With the help of the above 4 step-approach people can systematically identify potential risks hiding in the online transactions and effectively avoid by taking appropriate counter actions.

A Study on the Development of Intelligent Contents and Interactive Storytelling System (지능형콘텐츠 개발과 인터렉티브 스토리텔링 시스템 연구)

  • Lee, Eun Ryoung;Kim, Kio Chung
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.423-430
    • /
    • 2013
  • The development of information technology introduced digital contents and Social Network Services(SNS), and allowed the virtual transaction and communication between users called "the experience knowledge" advanced from "the objective knowledge." This paper will analyze interactive storytelling system creating different types of stories on narrative genre about family history, personal history and so on. Through analysis on narrative interviews, direct observations, documentations and visual records, contents about CEO story, corporate story, family story and especially family history will be categorized into sampleDB and informationDB. Accumulated contents will allow the user to increase the value and usage of the contents through interactive storytelling system by restructuring the contents on family history. This research has developed writing tool data model using different digital contents such as texts, images and pictures to encourage open communications between first generations and third generations in Korea. Furthermore, researched about connected system on interactive storytelling creation device using various genre of family story that has been data based.

EBG Resonator Antenna with a Stripline Type FSS Superstrate for PCS-band Base Station Antennas (스트립라인 형태의 주파수 선택적 표면 덮개층을 이용한 PCS대역 기지국용 EBG 공진기 안테나)

  • Yeo, Jun-Ho;Kim, Dong-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.8
    • /
    • pp.15-27
    • /
    • 2008
  • In this paper, an EBG(Electromagnetic BandGap) resonator antenna with a stripline type FSS(Frequency Selective Surface) superstrate for PCS-band base station antennas is proposed. The characteristics of resonant frequency and -3dB bandwidth of a unit cell of a superstrate are first analyzed by varing several design parameters such as a strip width and a unit cell width in order to design an EBG resonator antenna satisfying the required antenna gain and bandwidth for PCS-band base station antennas. Among various unit cell shapes, strip dipole and stripline are considered and their characteristics are compared. It was found that a resonant length of the EBG resonator antenna becomes smaller when the stripline shape is used and the control of the bandwidth is also much easier. By using the unit cell simulation results, planar and cylindrical EBG resonator antennas at PCS-band are designed.

The Causal Relationship of Hospital Inpatient's Perceived Quality, Satisfaction, Service Value, and Intention to Revisit (병원입원환자가 인지하는 의료서비스 질, 만족도, 서비스가치, 병원 재이용 의사간의 인과관계분석)

  • Park, Jae-San
    • Korea Journal of Hospital Management
    • /
    • v.7 no.4
    • /
    • pp.123-151
    • /
    • 2002
  • The objective of this study is to analyze the causal relationship of hospital inpatient's perceived quality, overall satisfaction, service value, and future intention to revisit. To carry out this objective, first we analyzed the dimensions of inpatient care service quality using SERVQUAL scale. The SERVQUAL scale is based on the gap theory, that is, the difference of patients' expectations and the actually received medical care service in hospital. On the basis of this theory, we measured the inpatient's perceived service quality and overall patient satisfaction. Data was gathered from a self-administered questionnaire at a 980 bed university hospital in Inchon City. These questionnaire measuring the service quality were distributed to 250 inpatients. The response rate was 66.4%. A total of 166 questionnaires was finally analyzed. To categorize medical service quality, the factor analysis was performed on 42 items. The reliability and validity of these items was evaluated. Finally to test 6 hypotheses, we analyzed the causal relationship of service quality, overall satisfaction, service value, and intention to revisit through the structural equation modeling(SEM). The major results of this study are as follows. First, the dimension of inpatient service quality was categorized into 7 dimensions, that is, personal caring, communication, access, physical environment, facilities and equipment, cleanliness, appropriateness and health status. Second, the reliability and validity of inpatient service quality items was satisfied. Third, as a result of structural equation modeling, the effect of inpatient's perceived service quality on overall satisfaction, service value, and intention to revisit was statistically significant. And total effect on intention to revisit as the core endogenous variable was perceived service quality(1.100), patient satisfaction(0.006), and service value(0.605).

  • PDF

Image Restoration Algorithm using Lagrange Interpolation in Mixed Noise Environments (복합잡음 환경에서 Lagrange 보간법을 이용한 영상복원 알고리즘)

  • Kwon, Se-Ik;Kim, Nam-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.2
    • /
    • pp.455-462
    • /
    • 2015
  • Image media is used for the internet, computers and digital cameras as part of the core services of multimedia. Digital images can be easily acquired and processed, due to the development of digital home appliances and personal computers' application software. However, image degradation occurs by various external causes in the acquisition, processing and transmitting process of digital images, and its main cause is known to be noise. Therefore, this study proposed and conducted the simulation of image restoration filter algorithm that processes impulse noise and Gaussian noise by applying Lagrange interpolation and spatial weighted method according to distance, respectively. The proposed algorithm improved 8.77[dB], 8.83[dB] and 10.02[dB], respectively, compared to existing A-TMF, AWMF and MMF, as a result of processing by applying the damaged Girl images to impulse noise(P=60%) and Gaussian noise(${\sigma}=10$).

Privacy-Preserving Method to Collect Health Data from Smartband

  • Moon, Su-Mee;Kim, Jong-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.4
    • /
    • pp.113-121
    • /
    • 2020
  • With the rapid development of information and communication technology (ICT), various sensors are being embedded in wearable devices. Consequently, these devices can continuously collect data including health data from individuals. The collected health data can be used not only for healthcare services but also for analyzing an individual's lifestyle by combining with other external data. This helps in making an individual's life more convenient and healthier. However, collecting health data may lead to privacy issues since the data is personal, and can reveal sensitive insights about the individual. Thus, in this paper, we present a method to collect an individual's health data from a smart band in a privacy-preserving manner. We leverage the local differential privacy to achieve our goal. Additionally, we propose a way to find feature points from health data. This allows for an effective trade-off between the degree of privacy and accuracy. We carry out experiments to demonstrate the effectiveness of our proposed approach and the results show that, with the proposed method, the error rate can be reduced upto 77%.

A Survey on Understanding of Location Information for Providing Location Based Service-Centered on University Students (위치기반서비스 제공을 위한 위치정보에 관한 이해도 조사 -대학생들 중심으로)

  • Park, Hee-Sook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.7
    • /
    • pp.786-792
    • /
    • 2019
  • Currently, various kinds of contents using smart phone's location information are developed and provided to users. The market size of the location-based service industry utilizing location information is also increasing every year and the majority of smart phone users occupy university students and most of the university students are using their owns smart phones, and they are the biggest users of location-based services and the main target of location information collection. In this paper, we conduct to a survey how university students understand about location information. Based on the results of the survey, we will deeply examine which one is needed to improve understanding of university students' location information collection and usage and what should be considered for the development of the location-based service industry and education of location information and then we propose some helpful suggestion.

A Design of Similar Video Recommendation System using Extracted Words in Big Data Cluster (빅데이터 클러스터에서의 추출된 형태소를 이용한 유사 동영상 추천 시스템 설계)

  • Lee, Hyun-Sup;Kim, Jindeog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.2
    • /
    • pp.172-178
    • /
    • 2020
  • In order to recommend contents, the company generally uses collaborative filtering that takes into account both user preferences and video (item) similarities. Such services are primarily intended to facilitate user convenience by leveraging personal preferences such as user search keywords and viewing time. It will also be ranked around the keywords specified in the video. However, there is a limit to analyzing video similarities using limited keywords. In such cases, the problem becomes serious if the specified keyword does not properly reflect the item. In this paper, I would like to propose a system that identifies the characteristics of a video as it is by the system without human intervention, and analyzes and recommends similarities between videos. The proposed system analyzes similarities by taking into account all words (keywords) that have different meanings from training videos, and in such cases, the methods handled by big data clusters are applied because of the large scale of data and operations.

National Institution's Information Security Management on the Smart phone use environment (스마트폰 이용 환경에서 국가기관 정보보호 관리방안)

  • Kim, Ji-Sook;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.83-96
    • /
    • 2010
  • The rapid spread of smart phone in recent years changes not only personal life but also work environment of organizations. Moreover, smart phone provoke service combination between industries and transit the digital paradigm in our society because of the character that anyone can develop or use the application of smart phone. Under these circumstances, the government hastens the construction of mobile-government in order to improve national services and communication with people. However, since security threats on smart phone become more critical recently, we should hurry the counter measures against mobile threats or we will face obstacles to the activation of mobile-government. On this article, we suggest the methods of information security and the Mobile-government Information Security Management System(M-ISMS) on the smart phone use environment for building up the secure and convenient mobile system in the national institution.