• Title/Summary/Keyword: personal development

Search Result 2,895, Processing Time 0.032 seconds

Implementation of a Mobile Agent Platform for Handheld Devices to Access the SNMP MIB (SNMP MIB 액세스를 위한 휴대단말기용 이동에이전트 플랫폼)

  • 전병국;김영철
    • Journal of Internet Computing and Services
    • /
    • v.3 no.2
    • /
    • pp.87-95
    • /
    • 2002
  • Due to rapid development of high speed wire/wireless internet technologies, at the current age, it cares into being one phenomenon that the internet business is able to work on anyplace and anytime. In this environment, a technology of mobile agent provides very useful mechanism for personal handheld devices because of supporting migration as autonomously executable software object Instead of users. Therefore, this paper focuses on Implementing a mobile agent platform for personal handheld devices, which supports mobile agents in wire/wireless internet environment. To do this, we construct the system with modified JAMAS, based on Java, in our previous research. Based on our proposed system, we implement the browsing application in personal handheld devices to access the MIB(Management Information Base) on SNMP(Simple Network Management Protocol), which supervises network environment on wire/wireless internet. This proposed application system is easily to access the MIB managed by SNMP agent. then provides network map viewer and updates the MIB through the browser to network administrator. As a result, we can support application area of mobile agents such as hare network management. M-Commerce, integration of remote database systems, active message and active network with personal handheld devices.

  • PDF

Prevalence and determinants of sufficient fruit and vegetable consumption among primary school children in Nakhon Pathom, Thailand

  • Hong, Seo Ah;Piaseu, Noppawan
    • Nutrition Research and Practice
    • /
    • v.11 no.2
    • /
    • pp.130-138
    • /
    • 2017
  • BACKGROUND/OBJECTIVES: Low consumption of fruit and vegetable is frequently viewed as an important contributor to obesity risk. With increasing childhood obesity and relatively low fruit and vegetable consumption among Thai children, there is a need to identify the determinants of the intake to promote fruit and vegetable consumption effectively. SUBJECTS/METHODS: This cross-sectional study was conducted at two conveniently selected primary schools in Nakhon Pathom. A total of 609 students (grade 4-6) completed questionnaires on personal and environmental factors. Adequate fruit and vegetable intakes were defined as a minimum of three servings of fruit or vegetable daily, and adequate total intake as at least 6 serves of fruit and vegetable daily. Data were analyzed using descriptive statistics, the chi-square test, and multiple logistic regression. RESULTS: The proportion of children with a sufficient fruit and/or vegetable intakes was low. Covariates of child's personal and environmental factors showed significant associations with sufficient intakes of fruit and/or vegetable (P < 0.05). Logistic regression analyses showed that the following factors were positively related to sufficient intake of vegetable; lower grade, a positive attitude toward vegetable, and fruit availability at home; and that greater maternal education, a positive child's attitude toward vegetable, and fruit availability at home were significantly associated with sufficient consumption of fruits and total fruit and vegetable intake. CONCLUSIONS: The present study showed that personal factors like attitude toward vegetables and socio-environmental factors, such as, greater availability of fruits were significantly associated with sufficient fruit and vegetable consumption. The importance of environmental and personal factors to successful nutrition highlights the importance of involving parents and schools.

Development of Privacy Impact Assessment Tool (개인정보 영향평가 툴 개발)

  • Heo, Jin-Man;Woo, Chang-Woo;Park, Jung-Ho
    • The Journal of Korean Association of Computer Education
    • /
    • v.15 no.2
    • /
    • pp.75-81
    • /
    • 2012
  • As the number of web users is increasing, the leakage of personal information is increasing. If some personal information is leaked, the victim can suffer from material damage or mental damage at the same time. Most of the leakages are result from the people who works for the personal information by accident or design. Hence, the Ministry of Public Administration and Security proposeed the measuring index and enumerates the details. The index is used in a system to check protection of a personal information. However, because this system is used to evaluate after the leakage, it cannot be used to construct some security system or programming a security system. To solve this problem, it needs to express the diversity of items and be able to count what assessors want to count. Thus, a summary sheet which displays the result of the tool will be presented in a radial form graph. Details will be presented as a bar graph. Therefore, it will be proposed that the tool can grasp the weak point and propose the direction of security.

  • PDF

Development of Personal Training System Using Functional Game for Rehabilitation Training (재활훈련 기능성 게임 콘텐츠를 이용한 Personal Training System 개발)

  • Ryu, Wan-Seok;Kang, Han-Soo;Kim, Hyu-Jeong;Lim, Chang-Joo;Chung, Sung-Taek
    • Journal of Korea Game Society
    • /
    • v.9 no.3
    • /
    • pp.121-128
    • /
    • 2009
  • In this paper, we have developed the balance board with electronic devices to use in various fields of remedial and physical balance exercise with interesting game and the functional game. Rehabilitation training using a funny game will be effective for patient's rehabilitation training. A Personal training system uses a balance board with an acceleration sensor and the game controlled by physical balance. To evaluate the operation of the developed system, we developed rehabilitation training game. The proposed game can be applicable to rehabilitation and balance training, and suggested game interface method could use a commercial game with various function through our emulator.

  • PDF

Implementation of Smart Card Identification System Using 1 vs. 1 Fingerprint Matching (1대1 지문매칭을 이용한 스마트 카드 인증 시스템의 구현)

  • 최순우;김영길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.517-520
    • /
    • 2001
  • According to the rapid development of information and communication, various services are offered using information and communication infrastructure for example e-commerce, internet banking stork dealings, etc. This time, the most important problem is personal identification. But now secret number that is used to personal identification mostly can be misappropriated. To solve this problem, this paper proposes smart card identification system using 1 vs. 1 fingerprint matching. Information protection and security of smart card excel and use is convenient. And fingerprint becomes the focus of public attention in biometric field. Implemented system in this paper is based on PC. This system stores minutia that is fingerprint information into smart card and compare it with personal minutia. Therefore this system is sure to be on personal identification. If this system is applied to various services, safety degree of services will be enhanced.

  • PDF

Legalization of Right to be Forgotten and Freedom of Press in the Digital Media Environment (디지털 미디어 환경에서 잊혀질 권리의 법제화와 언론의 자유)

  • Kim, Hyung-Il
    • Journal of Digital Convergence
    • /
    • v.11 no.9
    • /
    • pp.21-27
    • /
    • 2013
  • With the advent of digital media environment, distribution way of information changes, legalization of the right to be forgotten is becoming increasingly necessary. However, too much emphasis on protection of personal information to hinder the development of the Internet industry and constitutional rights, including freedom of speech and right to know might be infringed. Thus, the scope of the right to be forgotten there is a need to clarify the rules. First, the rights of personal information can be divided into two. Right to be forgotten can be applied to the right to self-determination of personal information, but the right to self-determination information about social personality cannot be applied to. Second, in the digital media environment, old news article over the internet repeatedly distribution as the new damage is generating. Because old news article is a historical record, the right to be forgotten can not be applied. Thus, appropriate for digital media environment must find new ways.

Survey on Table Sewing in Korean Food Restaurants Located in Jeollanamdo and Suggestions for Improvement - Focusing on the Manner of Sewing and Arrangement - (전라남도 소재 한식 전문점 상차림 실태 조사 및 개선 방안 -서비스 방식, 배선 방법을 중심으로-)

  • Kim, Su-In
    • Journal of the East Asian Society of Dietary Life
    • /
    • v.20 no.5
    • /
    • pp.655-667
    • /
    • 2010
  • In this study, problems with table serving of Korean Jeollanamdo food were investigated, and methods for improvement were suggested. The manner of food serving and arrangement on tables, as well as the serving space in each case, were investigated in representative restaurants serving Jeollanamdo food. The results showed that most of the Jeollanamdo Korean food have a prototype of a flat serving sprea, wherein the main dish and side dishes are not clearly identified, the demarcation between shared space and personal space is insufficiently made for each serving on the table, and the table is full of side dishes, that are narrow, visually disordered and unhygienic, both in terms of the table setting and arrangement inside bowls. To provide sufficient eating space, elevate awareness of hygienic and clean serving, and identifying the main dish in the table setting, a serving method that is a compromise between the flat spread-out and time-series development was suggested, and an arrangement on the table was defined for the main dish and side dishes. The utilization of table space was also increased by reducing the number of dishes on the table at a given moment. In addition, the dish or bowl and arrangement inside the container were changed in order to distinguish the main dish and side dishes. It is suggested that some of tableware be linked with the special products of the locality so as to make a brand for them, and that a personal mat be used to arrange the tableware for each one, since there are many fermented food items (salted fish, kimchi, fermented paste and sauce, etc.) and boiled food items (stew, steamed dish, boiled dish in sauce, etc) that look dark and unfocused. In addition, it is suggested that the width and breadth of the dishes or bowls be set in an orderly manner. Considering the tables currently available at restaurants, personal space on a table and comfortable distance between eaters are suggested to be $400 mm{\times}250 mm$ and 300 mm, respectively.

Development of an Ubiquitous Healthcare System based on Health Information Exchange Standards (건강정보 교환 표준에 기반한 유비쿼터스 헬스케어 시스템 개발)

  • Lee, In-Keun;Kim, Hwa-Sun;Cho, Hune
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.22 no.3
    • /
    • pp.273-280
    • /
    • 2012
  • As changed the clinical environment, the interest on u-Healthcare service and systems has been increased. The ubiquitous healthcare(u-Healthcare) systems are constructed at the integrated environment that consists of various devices and systems basically such as personal health devices(PHDs) measuring body signals, information aggregators gathering the data transmitted from PHDs through wireless technology, and health information systems storing and managing personal health information transmitted from the information aggregators. International standards such as IEEE 11073 and HL7 have been specified for the interoperability of PHDs and health information systems, but the research on u-Healthcare systems that were developed and applied in the real clinical environment by adopting the standards was rarely conducted. Therefore, we developed an u-Healthcare system which can manage personal health information, such as blood glucose, blood pressure, and body composition, based on health information exchange standards. Moreover, we verified the stability of the developed system through clinical trial in patients with endocrine disease at the Kyungpook National University Hospital, and listed problems occurred during clinical trial and found their solutions.

Development and Validation of an Instrument to Assess Hospital Workers' Perception for Protection of Personal Health Information (의료기관 근로자의 환자 개인정보 보호 인식에 대한 평가도구 개발 및 검증)

  • Cha, Ki-Jung;Ha, Yeong-Mi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.2
    • /
    • pp.1253-1263
    • /
    • 2015
  • The purpose of this study was to develop and examine a validity and reliability of an instrument to assess hospital workers' perception for protection of personal health information. The process included construction of a conceptual framework, generation of initial items, verification of content validity, preliminary study, and extraction of final items. Content validity was verified by 3 experts from nursing and health information management areas, and the construct validity was evaluated by item analysis, exploratory factor analysis and confirmatory factor analysis. The reliability was examined by Cronbach's alpha. The participants were 279 hospital workers including nurses, administrative officers, and other medical health professionals. Using a confirmatory factor analysis, a four-factor structure was validated with construct validity. The Cronbach's alpha coefficient of a total of 13 items categorized into 4 factors was .83. Finally, the instrument is a valid and reliable to assess hospital workers' perception for protection of personal health information.

A Model for Self-Authentication Based on Decentralized Identifier (탈중앙화 신원증명에 기반한 본인 인증 모델)

  • Kim, Ho-Yoon;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.11
    • /
    • pp.66-74
    • /
    • 2021
  • With the development of the Internet, user authentication technology that proves me online is improving. Existing ID methods pose a threat of personal information leakage if the service provider manages personal information and security is weak, and the information subject is to the service provider. In this study, as online identification technology develops, we propose a DID-based self-authentication model to prevent the threat of leakage of personal information from a centralized format and strengthen sovereignty. The proposed model allows users to directly manage personal information and strengthen their sovereignty over information topics through VC issued by the issuing agency. As a research method, a self-authentication model that guarantees security and integrity is presented using a decentralized identifier method based on distributed ledger technology, and the security of the attack method is analyzed. Because it authenticates through DID Auth using public key encryption algorithms, it is safe from sniffing, man in the middle attack, and the proposed model can replace real identity card.