• Title/Summary/Keyword: u-IT Convergence

Search Result 427, Processing Time 0.035 seconds

Converged Study on the Validity and Reliability of the Communication Behavioral Scale of nurses caring for people with dementia (치매대상자를 돌보는 간호사의 의사소통행위 측정도구의 타당도 및 신뢰도 융합 연구)

  • Gang, Moon-Hee;Lee, Ji-Hye
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.5
    • /
    • pp.327-333
    • /
    • 2020
  • The aims of this study was to verify the validity using group comparison method and test/retest reliability of the Communication Behavior Scale for Nurses Caring for People with Dementia(CBS-D). The subjects were nurses who have worked at elderly care facilities in D, U and Y cities(n = 67), and nurses who have worked at general hospitals in D and U cities. The scores of the communication behaviors of nurses working in elderly care facilities were significantly higher than those of nurses working in general hospitals(t=2.49, p=.014). The Intraclass Correlation Coefficients for the test-retest reliability test was .813. Therefore, it was confirmed that CBS-D is an appropriate evaluation tool for evaluating the level of the nurse's communication behavior through various logical analyzes, and it is expected that it can be used in various ways for nursing care for people with dementia.

A Precision Positioning Method of Drone Last-mile Delivery Technology in Urban Areas (도심에서의 드론 Last-mile 배송 기술의 정밀 측위 기법)

  • Kim, Kyuseok
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.1
    • /
    • pp.60-67
    • /
    • 2021
  • Countries around the world, including the U.S. are actively researching to commercialize the logistics services using drones. In Korea, telecommunications companies as well as logistics companies are researching and developing the logistics services using drones. However, there's an environmental difference for last-mile delivery between the U.S. and Korea. In Korea, more than 77% of the population lives in apartments and the population density is the 4th highest in the world. Accordingly, in terms of the logistics services using drones, it is necessary to research it with the Korean suitable environment. In this paper, a precision positioning method of drone last-mile delivery in urban areas using short-range wireless communication and barometer is proposed. The experiment results show that the proposed method can detect a window within 2.5 meters. It is expected that the proposed method will help improve the logistics services using drones in urban areas.

RFID-based Authentication Protocol for Implantable Medical Device (체내삽입장치에 RFID 기술을 적용한 인증 프로토콜)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.10 no.2
    • /
    • pp.141-146
    • /
    • 2012
  • U-healthcare, which grafted advanced IT technology onto medical technology, is in the limelight because it can provide medical services at anytime and anywhere. U-healthcare system applied RFID technology for Implantable Medical Device (IMD), but patient's biometric information can be easily exposed to third parties. In this article, RFID-based U-healthcare authentication protocol is proposed to prevent illegal usage for personal biometric information exposed to the third patty. The proposed protocol guarantees patients' biometric information integrity as compounding random numbers between administrators and hospital/clinic managers, and uses continuous number SEQ and time stamp T to synchronize IMD/administrators and administrators/hospital managers. Also, to protect user's privacy from the third party, patients' biometric information can be safely guarded by managing patients' security identifiers by administrators.

SCTP Performance Analysis based on ROHC

  • Shinn, Byung-Cheol;Feng, Bai
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.4
    • /
    • pp.305-310
    • /
    • 2007
  • In this paper, an analysis has been done on the performance of SCTP header compression by using Robust Reader Compression (ROHC)[1] method. And it is assumed that the operating mode for ROHC is unidirectional mode (U-Mode) and the possible states are IR and SO states. The throughput of SCTP packets in wireless link and the impact of size of W-LSB encoding window on throughput are discussed.

Designed OTP Generation Method Using Health Information (건강정보를 이용한 OTP 생성 방식 설계)

  • Choo, Yeun-Su;Kang, Jung-Ho;Kim, Kyoung-Hun;Park, Jea-Pyo;Jun, Moon-Seog
    • Journal of Digital Convergence
    • /
    • v.13 no.8
    • /
    • pp.315-320
    • /
    • 2015
  • User Authentication in Online service is essential for accurate and safe service. For this user authentication, One Time Password(OTP) is frequently used. To satisfy one-time-use characteristic of OTP, Offset information to generate OTP or final OTP value get generated through OTP generator or security card which could be lost. In this study, OTP generation method that bypasses OTP generator or security card by using health information collected from u-Health care system is proposed. Suggestion is that health information collected through wearable devices get utilized to offset information that are applied in OTP generations. OTP generated using suggested methods showed similar results than current OTP generation methods in the collision resistance test which tests how often it generate same authentication numbers, this implies that new proposed method can be applied to various on-line services.

Private Security of New York State and the Current Insight (뉴욕주의 민간경비제도와 시사점)

  • Ahn, Hwang Kwon
    • Convergence Security Journal
    • /
    • v.17 no.4
    • /
    • pp.79-87
    • /
    • 2017
  • The U.S. security regulation is under the influence of each state's law; however, they are mostly similar. Among many states which has the longest history of security regulation in the U.S., state of New York has been shown security regulation for a long time. The state of New York has been emphasized the importance of security significantly because it is economically, culturally, and internationally important place at the same time. New York's state law of security business includes: 1. private investigators and bail enforcement agents and watch, guard or patrol agencies license law. 2. Security guard act of 1992~,3. Title 19 New York State's code of rules and regulation (NYCRR). The law of New York City's private security could inspire Korean private security law in many ways. First, administration of professional law and variety of licensure could be an inspiration to the Korean security services. Second, there are intimate partnership between police and private security in the U.S. New York police's private security partnership has been started since 1986 by Area Police/Private Security Liaison (APPL program) and there are about 1,300 of security companies participating. This program provides not only the simple partnership but also giving essential information for promoting public safety.

Design of Security Agent System to Provide Ubiquitous Service (유비쿼터스 서비스를 위한 보안 에이전트 시스템 설계)

  • Kim, Seok-Soo;Park, Gil-Cheol;Song, Jae-Gu
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.101-106
    • /
    • 2007
  • Recently, Ubiquitous innovation is being promoted so that they can support the uHealthcare provide management to human's health. It is thus necessary to conduct such research on the medical care environment where there is a high demand for utilization of status information. In the current situation, there is a lack of research on measures of security processing and monitoring patient status information produced from rapid growth of infra within Medical environment. This study suggests a solution of using RFID to gather patient information such as inpatient information, location of treatment room, progress of patient, humidity, temperature, and diagnostic status, after which the information are protect and processed using security level method.

  • PDF

Design of Integrated Medical Information System Based on The Cloud

  • Lee, Kwang-Cheol;Moon, Seok-Jae;Lee, Jong-Yong;Jung, KyeDong
    • International journal of advanced smart convergence
    • /
    • v.4 no.1
    • /
    • pp.88-92
    • /
    • 2015
  • Today, the medical information system has evolved in the way of integrated healthcare IT information systems. Therefore, it is trying to build advanced U-Healthcare service. Though the U-Healthcare environments is exchanged the information between systems in many cases, however since the each system is different, the integration and exchange of data is difficult. To overcome this problem, in this paper it proposes that we suggests a possible DBaaS(DataBase as a Service) for the heterogeneous integration of medical information management and data exchange. First, the proposed system builds DBaaS cloud by integrating the meta-DB Schema level and DB Schema for each hospital. And, the mapping the schema data and the existing hospital information system is possible using the International Standard HL7. By applying the proposed method to the hospital system, it comes true the efficient exchange of information between the patients, doctors, staffs through the data mapping of the one to multi-system.

QoS Guaranteed Secure Network Service Realization using Global User Management Framework (GUMF);Service Security Model for Privacy

  • Choi, Byeong-Cheol;Kim, Kwang-Sik;Seo, Dong-Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1586-1589
    • /
    • 2005
  • GUMF (Global User Management Framework) that is proposed in this research can be applied to next generation network such as BcN (Broadband convergence Network), it is QoS guaranteed security framework for user that can solve present Internet's security vulnerability. GUMF offers anonymity for user of service and use the user's real-name or ID for management of service and it is technology that can realize secure QoS. GUMF needs management framework, UMS (User Management System), VNC (Virtual Network Controller) etc. UMS consists of root UMS in country dimension and Local UMS in each site dimension. VNC is network security equipment including VPN, QoS and security functions etc., and it achieves the QoSS (Quality of Security Service) and CLS(Communication Level Switching) functions. GUMF can offer safety in bandwidth consumption attacks such as worm propagation and DoS/DDoS, IP spoofing attack, and current most attack such as abusing of private information because it can offer the different QoS guaranteed network according to user's grades. User's grades are divided by 4 levels from Level 0 to Level 3, and user's security service level is decided according to level of the private information. Level 3 users that offer bio-information can receive secure network service that privacy is guaranteed. Therefore, GUMF that is proposed in this research can offer profit model to ISP and NSP, and can be utilized by strategy for secure u-Korea realization.

  • PDF