• Title/Summary/Keyword: public communication

Search Result 2,984, Processing Time 0.032 seconds

A Study on the Policy Possibility for Public Journalism of korea Newspaper (한국언론의 공공저너리즘의 역할에 관한 고찰)

  • Shin, Yun-Ho
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.4 no.3
    • /
    • pp.169-175
    • /
    • 2009
  • In this research, the first online journalism in South Korea on the research itself in reality only have 3, only 2 cases in the United States the study of online journalism deulyigie, in online journalism for the public to feel the necessity of research and These online agents not jeoneolriseuteuna the role of public journalism, the media can perform that role, she felt the need for the rest, in the process of the last 16 presidential election, as reported salpyeobomeu in South Korea of jourmalism online newspapers will want to research about the policy.

  • PDF

A Study on NEMO-partially DMM based E2E Seamless Data Integration Transmission Scheme in SOC Public Infrastructures

  • Ryu, Wonmo;Caytiles, Ronnie D.;Park, Byungjoo
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.4
    • /
    • pp.33-41
    • /
    • 2020
  • Nowadays, distributed mobility management (DMM) approaches have been widely adopted to address the limitations of centralized architectural methods to support seamless data transmission schemes in wireless sensor networks. This paper deals with the end-to-end (E2E) integration of Network Mobility (NEMO) basic support protocol in distributed wireless sensor network systems in structural health and environmental monitoring of social overhead capital (SOC) public infrastructures such as bridges, national highways, tunnels, and railroads. The proposed scheme takes advantage of the features of both the NEMO basic support protocol and partially distributed network-based DMM framework in providing seamless data transmission and robust mobility support. The E2E seamless data transmission scheme allows mobile users to roam from fixed-point network access locations and mobile platforms (i.e., vehicles such as cars, buses, and trains) without disconnecting its current sessions (i.e., seamless handover).

A Study on the Mobile Application Security Threats and Vulnerability Analysis Cases

  • Kim, Hee Wan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.4
    • /
    • pp.180-187
    • /
    • 2020
  • Security threats are increasing with interest due to the mass spread of smart devices, and vulnerabilities in developed applications are being exposed while mobile malicious codes are spreading. The government and companies provide various applications for the public, and for reliability and security of applications, security checks are required during application development. In this paper, among the security threats that can occur in the mobile service environment, we set up the vulnerability analysis items to respond to security threats when developing Android-based applications. Based on the set analysis items, vulnerability analysis was performed by examining three applications of public institutions and private companies currently operating as mobile applications. As a result of application security checks used by three public institutions and companies, authority management and open module stability management were well managed. However, it was confirmed that many security vulnerabilities were found in input value verification, outside transmit data management, and data management. It is believed that it will contribute to improving the safety of mobile applications through the case of vulnerability analysis for Android application security.

A Study on the Policy Possibility for Public Journalism of korea Newspaper (한국신문의 공공저너리즘의 이용에 관한 정책)

  • Shin, Yun-Ho
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.1 no.2
    • /
    • pp.110-119
    • /
    • 2006
  • In this paper, the first online journalism in South Korea on the research itself in reality only have 3, only 2 cases in the United States the study of online journalism, in online journalism for the public to feel the necessity of research. These online agents not journalist the role of public journalism, the media can perform that role, we felt the need for the rest. In the process of the last 16 presidential election, as reported in South Korea of journalism online newspapers will want to research about the policy.

  • PDF

데이터 통신을 위한 우리나라 공중교환전화망 개방과 공중교환데이타망 구성의 전망

  • 조규심
    • Journal of the Korean Professional Engineers Association
    • /
    • v.16 no.1
    • /
    • pp.4-12
    • /
    • 1983
  • Data communication has historically evolved from leased lines, to use of the public telephone network, and eventually to dedicated(exclusive) data networks. It requires an enormous amount of money for establishing a separate and independent data network at the beginning stage. No country has ever adopted this method In the Republic of Korea too the age of leased circuits is passing and it is scheduled to open the public telephone network to the data transmission and to install packet mode processor in the last half of 1983. This paper presents a survey on characteristics of the public telephone network in Seoul and a future development of the data communication of Korea.

  • PDF

Personal, Occupational, and Public Health Perspectives on Dealing with the First Case of Influenza A (H1N1) in the United Arab Emirates

  • Shah, Syed M.;Aw, Tar-Ching;Blair, Iain;Hashmey, Rayhan;Sheek-Hussein, Mahmoud
    • Safety and Health at Work
    • /
    • v.2 no.1
    • /
    • pp.83-86
    • /
    • 2011
  • New epidemics of infectious diseases often involve health care workers. In this short communication we present a case report of a health care professional who became the first case of influenza H1N1 virus to be notified in the United Arab Emirates. There are several issues related to workplace considerations and general public health, including preventive measures, the need for isolation of the patient, dealing with contacts, return to work, and communication with the workforce.

EDUCATIONAL EFFECTS OF RADIATION WORK-STUDY ACTIVITIES FOR ELEMENTARY, MIDDLE, AND HIGH SCHOOL STUDENTS

  • Han, Eun Ok;Kim, Jae Rok;Choi, Yoon Seok
    • Nuclear Engineering and Technology
    • /
    • v.46 no.3
    • /
    • pp.447-460
    • /
    • 2014
  • The results of this study, suggest public communication to promote the use of radiation as follows: first, suitable information for the recipient's perception patterns should be provided, as there is a difference in risk perception and acceptance between the experts and the public. Thus, information on the necessity of nuclear power should be provided to the public, while information based on technical risks is provided by the experts. Second, since the levels of perception, knowledge, and attitudes increased highly for sectors which use radiation after the class, classes should be provided continuously to increase students' perception, knowledge, and attitude, which are all preemptive variables which induce positive behavioral changes. Third, since the seven sectors which use radiation are highly correlated, arguments for the necessity of other sectors should be based on the necessity of the medical sector.

Key Distribution for Heterogeneous Public-Key Cryptosystems

  • Lv, Xixiang;Yi, Mu;Hui, Li
    • Journal of Communications and Networks
    • /
    • v.15 no.5
    • /
    • pp.464-468
    • /
    • 2013
  • The widespread use of cryptographic technologies is complicated by inconsistencies and duplication in the key management systems supporting their applications. The proliferation of key management systems or protocols also results in higher operational and infrastructure costs, and fails in interoperability. Thus, it is essential to realize key management interoperability between different and heterogeneous cryptosystems. This paper presents a practical and separable key management system for heterogeneous public-key cryptosystems. We achieve the interoperability between different cryptosystems via cryptography approaches rather than communication protocols. With our scheme, each client can freely use any kind of cryptosystemthat it likes. The proposed scheme has two advantages over the key management interoperability protocol introduced by the organization for the advancement of structured information standards. One is that all the related operations do not involve the communication protocol and thus no special restrictions are taken on the client devices. The other is that the proposed scheme does not suffer from single-point fault and bottleneck problems.