• Title/Summary/Keyword: speed of trust

Search Result 58, Processing Time 0.021 seconds

The Transmission of Tele-Information System using BlueTooth (블루투스를 이용한 웹으로의 원격 의료정보 전송 시스템)

  • 채희영;강형원;김영길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.130-133
    • /
    • 2002
  • As a society advances, an aging phenomenon and many diseases which did not exist in old times are happening. Especially, in case of the aged patient, because we cant know the time the condition of the patients health become worse, the study of the Tele-information system has been actively carried out by the necessity of a persistent observation. A ECG signal a kind of a vital signals has been widely used to the medical information system as an usual clinical diagnosis for the patients who possess heart diseases. BlueTooth is a close range wireless communication technology which uses a wireless frequency 2.4GHz and has a high trust and self - error correction technology according to a low power consumption quality and a high-speed frequency hopping. This makes get a high trust concerning a data transmission than an existing modem. In addition, though wireless modem is restricted by a minimal of a wireless terminal, It will be possible to coincide with the function of the portable with the low power consumption quality by using Bluetooth. And as the system on a chip of module progresses, the possibility of the small size is present According to this, Bluetooth module transmits the medical information, which is input from the outside among the operations that use the Bluetooth to the Bluetooth module that is connected the host PC. And the system that the host PC transmits the medical information from the connected Bluetooth module to the Internet has once embedded. this study let the host PC embedded in advance of the existing system and transmit the medical information by the addition of the Tcp/Ip protocol stark under all embedded environments to internet.

  • PDF

The Implementation of Remote Meter Reading System Using Bluetooth Technology & SkT3 Protocol in CDMA (블루투스와 CDMA의 SMS프로토콜을 이용한 원격 가스 검침 시스템의 구현)

  • 김종현;김영길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.443-446
    • /
    • 2003
  • This paper implement Remote Meter Reading System which is used Bluetooth and SMS in CDMA. This System propose system which tan detect a total amount of gas, electricity or water without a meterman, at home BlueTooth is a close range wireless communication technology which uses a wireless frequency 2.4GHz and has a high trust and self error correction technology according to a low power consumption quality and a high-speed frequency hopping. This makes get a high trust concerning a data transmission than an existing modem. In addition, though wireless modem is restricted by a minimal of a wireless terminal, it will be possible to coincide with the function of the portable with the low power consumption quality by using Bluetooth. And as the system on a chip of module progresses, the possibility of the small size is present. Nowadays, SMS Protocol in CDMA for have a network function based on PPP in CDMA Phone. The proposed Remote Meter Reading System to get more nobility, efficiency, and have good function. SMS Protocol in CDMA have profits which is low power, low cost, and low microwave output.

  • PDF

Integrity Guarantee Scheme of Mobile Agents through Authentication of Digital Signature with TTS (TTS기반에서 디지털 서명의 실행 인증을 통한 에이전트의 무결성 보장 기법)

  • Jung Chang-Ryul;Yoon Hong-Sang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.6C
    • /
    • pp.651-657
    • /
    • 2006
  • This paper propose the technique for the execution authentication of digital signature with TTS(traceable trust server) to guarantee the safe execution of mobile agents. That is to say, it is focused on improving the processing speed of systems and the traffic of network which are problems in the existing studies. The digital signature is used to guarantee the efficient and safe execution and the integrity of mobile agents. The certificate of it is chained with synthesis function, cryptographic algorithm based on public key, and hash function. And white hosts can be protected against the threat of being used maliciously. Then, we prove the efficiency of system overhead and the traffic of network by the analysis. In case the certificate chain of a digital signature is used, the safe execution of mobile agents can be protected against attackers that wish to insert a newly created certificate after cutting off the chain after striking space key 2 times.

A Study on the Value Evaluation of e-Trade Platform Services using IPA(Importance Performance Analysis) (IPA를 활용한 전자무역 시스템의 서비스 가치평가에 관한 연구)

  • Lee, Sang-Jin;Shin, Seung-Man
    • International Commerce and Information Review
    • /
    • v.12 no.2
    • /
    • pp.59-83
    • /
    • 2010
  • The purposes of the study is to evaluate the discrepancy between user's expectation and satisfaction degree in the service of uTradeHub. In this regard, this study infers general solutions in order to induce the intersection area using IPA technique. Then this paper will present directions to improve the service of uTradeHub. In terms of methodology, this article disclosed that IPA model approach is greatly useful to evaluate user's attribute. First, variables like the link of different works(f1), trust of system(f4), information connection(f7) are located on the first quadrant. This means that importance and satisfaction are all high variables for user. So, this is very important variables that need continuous administration in order to maintain present state. Second, variables such as the speed of information acquisition(f2), improvement of use(f3), stability of system(f5) are located on the second quadrant. This means that user's importance is high but user's satisfaction is low. Therefore, this area needs an active improvement strategy and quick maintenance for e-Trade application. Third, variables like the appropriateness of information usage fees(f8), easy subscription(f9), customer support service(f10) are located on the third quadrant. Because these variables are all low for user's importance and satisfaction, we have to arrange strong and radical remedy for e-Trade service. Finally, variables like information offer(f6) are located on the fourth quadrant. This means that user's satisfaction is high but user's importance is low. The research result suggests that e-Trade service development would be re-organised as much as user feels the importance of process innovation.

  • PDF

A Fast Authentication Method using Hash Value for Realtime Communication in Mobile IPv6 network (모바일 IPv6에서 실시간 통신을 위해 해쉬 값을 적용한 빠른 인증 기법)

  • Kang Hyung-Mo;Mun Young-Song
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.113-120
    • /
    • 2006
  • A node of mobile IPv6 moving foreign networks needs authentication process to support right services against from security threat. AAA is a trust infrastructure that authenticates, authorizes, and accounts nodes receiving a network service. And Mobile IPv6 Working Group recommends use of AAA infrastructure to authenticate mobile nodes. Event though AAA infrastructure provides strong authentication functions, it should exchange a lot of messages to authenticate mobile nodes every movement. The exchange of lots of messages causes latency and it is interfered with realization of real-time communication. This paper proposes an authentication method of improved speed using hash value of mobile node to reduce authentication latency. Directly after movement, a mobile node applying a Proposed method uses extended existing security authentication for a while and deletes the establishment latency of new security authentication. Performance evaluation of a proposed method verifies the efficiency through the analysis of cost comparison with other methods. The conclusion of performance evaluation is that the proposed method gets more 25% performance improvement than a general method when a mobile node moves another subnet.

Driving Characteristics Improvement according to the Position Feedback Control of Slotless Linear Synchronous Motor for Living Application (주거 환경 적용을 위한 Slotless 선형 동기전동기의 위치 피드백 제어에 따른 구동 특성 개선)

  • Cho, Kyoung-Pil;Kim, Yong-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.2
    • /
    • pp.285-290
    • /
    • 2013
  • The slotless linear synchronous motor(LSM) has the advantages that the structure of the mover is simple and it can control the trust force ripple by make the magnetic energy in a gap uniform by removing a slot of the primary iron core. Also, the application of the transportation system is becoming expansion because it high efficiency drive is possible and compares with the other LSM as control is more excellent. However, the application of the living field was unsatisfactory. Therefore, in this study, we examined the drive characteristics by the position feedback control for the living field application of the slotless LSM and we prove useful of the controller through load loading and the acceleration changing to get minimization of the speed vibration and stable answer characteristics.

A New Certificate Path Processing Scheme employed the Trusted CA for improving an efficiency on the Computational Aspect (연산적 측면의 효율성을 향상시키는 신뢰 CA를 이용한 새로운 인증 경로 처리 기법)

  • 최연희;전문석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.9C
    • /
    • pp.908-922
    • /
    • 2003
  • The Public Key Infrastructure (PKI) trends to delegate the certificate path processing to the Delegated Path Discovery (DPD) Server and Delegated Path Validation (DPV) server recently. The most critical factor for the selection of the delegated server is to allow the server to be equipped with a high reliability through a low cost, and simple implementation. In this paper, we propose a new certificate path processing scheme employed the trusted CA as the DPD/DPV server by adding the capability of the Validation Authority (VA) to the trusted CA. Since our proposed scheme uses the existing trusted CA as validation server, we can achieve a high trust through a simple implementation for the processing. Besides, we propose an additional scheme for reducing an overhead on the trusted CA. it is obtained by delegating digital signature verification to CAs on the path and by skipping the repeated path processing. As the result, our proposed validation scheme can be performed efficiently with high speed and low computational overhead.

Convergence of IT service providers and brick-and-mortar companies in an industrial cluster (정보기술서비스기업과 클러스터 오프라인기업의 컨버전스)

  • Yi, Jun-Sub
    • Journal of the Korean Data and Information Science Society
    • /
    • v.21 no.6
    • /
    • pp.1211-1224
    • /
    • 2010
  • The study derives various anticipated benefits resulting from locating small and medium sized IT service firms in a specific industrial cluster area. The study also derives IT service agility factors to obtain competitive advantages vital to real-time global enterprises. The anticipated benefits were then used to analyze how they improve the firms' agility. Using questionnaire data, factor analyses were used to figure out eight anticipated benefit factors including coordination, information sharing, business costs, speciality, communication, trust improvement, mutual business understanding, and reciprocity. The eight empirically derived benefit factors were then used to examine how they affect the IT service agility including flexibility, speed, responsiveness, and lean efficiency. The results of regression analyses showed that each one of the anticipated benefit factors except communication influence one or more IT service agility factors.

The Influence of Using Intention by G4C Smart Application Service Characteristics: Comparing Korea and China (G4C 스마트 앱 서비스 특성이 사용의도에 미치는 영향: 한·중 비교 분석을 중심으로)

  • Chang, Hui-Qiang;Kim, Hwa-Kyung;Lee, Jong-Ho
    • Journal of Distribution Science
    • /
    • v.12 no.11
    • /
    • pp.85-100
    • /
    • 2014
  • Purpose - Recently, the prevalence of high-speed mobile communication technology (4G) and mobile devices (smart phones, tablet PC, etc.) is leading innovative changes across all fields in society as well as business environments. Furthermore, a diversified mobile application service has spread rapidly through mobile devices such as smart phones and tablet PCs. Accordingly, the traditional E-government services paradigm has rapidly changed into mobile intelligence. To identify the influencing factors on the using intention of G4C smart app services, based on previous studies, the variables that influence using G4C smart app services are defined; these are user cognitive factors (perceived usefulness, perceived easiness), user characteristics factors (user innovativeness, self-efficiency, social influence), service quality factors (convenience, interactivity, accessibility), and system quality factors (instant connectivity, safety). Research design, data, and methodology - This is designed not only to collect data with a questionnaire survey (9/22/13~10/23/13) but also to test hypotheses with SEM by SPSS 21.0 and AMOS 21.0 in both Korea and China. All items are used with Likert 5 scales. A total of 643 questionnaires (Korea 318, China 325) are used. Results - The perceived usefulness and perceived easiness in user cognitive factors have positive influence on using intention. The user innovativeness, self-efficiency, and social factors in user characteristics factors have positive influences on using intention. The convenience, interactivity, and accessibility in service quality factors have positive influences on both reliability and using intention. Safety in system quality has positive influence on both reliability and using intention. Reliability has positive influence on using intention. The control variables (Korea and China) affect its control hypothesis. Strategies and implications are suggested to assist the public using the intention of smartphone's e-government services based on the results of the empirical analysis. The mobile application service can be considered a new emergence of the paradigm just like the government's on-line portal websites appeared in the past. Under this prevailing situation of mobile smart devices, to promote the success of e-government mobile APP services, accurate analysis and understanding of users should precede anything, to provide services to grasp and satisfy users' desire properly. Conclusions - This study proposes implications to help E-governmental officers and companies make strategies. First, this is expected to give some information on the understanding and knowledge regarding the process of G4C smart APP service based on the empirical study. Second, this helps to make future policies and ways about E-government G4C smart APP service. Third, it is proved that super speed mobile communication technology and devices including phones will be crucial to change the structure of E-government services in 2-3 years. Fourth, it is necessary to increase the trust and using intention of users. Fifth, considering what type of environment users are placed in, to present proper public information matching their inclination, is important. Finally, various ways of experiencing service to explore potential users and ceaseless public relations are required.

Case Study on Fracture Type of Wooden Crib Wall (목재 Crib wall의 파괴유형에 대한 사례연구)

  • Shin, Changgun;Paik, Moonyeol;Hong, Cheolhwa;Bae, Wooseok
    • Journal of the Korean GEO-environmental Society
    • /
    • v.14 no.7
    • /
    • pp.39-50
    • /
    • 2013
  • Crib wall is one of the segmental grid retaining walls using headers and stretchers to establish the framework of the wall. In this method, grids formed by the intersection of headers and stretchers are generally filled with the gravel to maintain the weight of the wall. Therefore, the construction can be carried out with higher speed and much economically when compared with the concrete retaining wall. Furthermore, it has high drain capacity, and environmentally friendly aspects also have been pointed out because the possibility of the planting at the front of the wall. However, in the wooden crib wall method, the relative movement between the individual headers and stretchers was generally recognized, and stress redistribution in the gravel filling was also observed when subjected to the external loading and self-weight of filling. In this study, it was analyzed fracture types and causes of wooden crib wall through detailed investigation and analysis of a large crib wall construction site. As a results, it occurred the damage in the members of 5.7% in a total of 2,315 locations and the damage of header occurred in the members of a header 80.2%. The 65.7% of the damaged header are concentrated in the lower part of crib wall. Therefore, it was analyzed the differences of fracture types and causes of wooden crib wall depending on the installation position and the kinds of members. It is considered basically the members of various forms of distortion and the grain affecting.