• Title/Summary/Keyword: 개인정보 처리

Search Result 2,407, Processing Time 0.029 seconds

Blockchain-based Important Information Management Techniques for IoT Environment (IoT 환경을 위한 블록체인 기반의 중요 정보 관리 기법)

  • Yoon-Su Jeong
    • Advanced Industrial SCIence
    • /
    • v.3 no.1
    • /
    • pp.30-36
    • /
    • 2024
  • Recently, the Internet of Things (IoT), which has been applied to various industrial fields, is constantly evolving in the process of automation and digitization. However, in the network where IoT devices are built, research on IoT critical information-related data sharing, personal information protection, and data integrity among intermediate nodes is still being actively studied. In this study, we propose a blockchain-based IoT critical information management technique that is easy to implement without burdening the intermediate node in the network environment where IoT is built. The proposed technique allocates a random value of a random size to the IoT critical information arriving at the intermediate node and manages it to become a decentralized P2P blockchain. In addition, the proposed technique makes it easier to manage IoT critical data by creating licenses such as time limit and device limitation according to the weight condition of IoT critical information. Performance evaluation and proposed techniques have improved delay time and processing time by 7.6% and 10.1% on average compared to existing techniques.

The Legal Protection Scope and Limitation of Information (정보의 법적 보호범위와 한계)

  • Kim, Hyung-Man;Yang, Myung-Sub
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.691-699
    • /
    • 2012
  • "Information", which is circulated in society by information technology development represented by computer, has brought innovation not only to physical civilization, but also deep into our daily lives. This is to say that information has brought fundamental change to its form of existence, and value system through being faster regarding the circulation and the way of management being diverse. As time goes by, this kind of change would stimulate more changes to be made as the development of scientific civilization. Therefore, informatization is one of the important characteristic that defines modern society's essence, but on the other side, information has been taken advantage of that temperament and abused in a lot of different ways. "The Law Regarding Computer Network Diffusion Expansion and Usage Promotion"(1986), as a counterplan of informatization is our nation's first Act about informatization, which enacts national policy and system about this issue. Since then, many laws has been enacted down to "Private Information Protection Act"(2011), forming a comprehensive system. The basic background of these laws are based upon the premise that even if the place where the information is managed is virtual space, rules that are considered valid in the real world should be basically applied in the virtual space. Therefore, the violation of the law in the real world is also considered the violation in the virtual space. This direction of current law regarding information is shared with both the theories and the reality. However, current law system and notion are based upon the premise that the law regards material objects, thus the characteristic of the information, which is "Immaterial Being" is not reflected. Also, the management and approach to this issue is allopathic, exposing many problems. Thus, this paper examines the way of protecting information stipulated in the current law, contemplates its protection scope and limitation, and seeks the direction of the improvement, based on the critical mind explained above.

Practical Architectural Patterns and Guidelines for Designing Complex Mobile Applications (복잡도가 높은 모바일 어플리케이션 설계를 위한 아키텍처 패턴과 적용지침)

  • Jang, Jeong-Ran;La, Hyun-Jung;Kim, Soo-Dong
    • The KIPS Transactions:PartD
    • /
    • v.19D no.1
    • /
    • pp.63-80
    • /
    • 2012
  • Mobile devices with Android OS and iOS have been emerged as mobile computing devices where various software applications are deployed. Furthermore, they are anticipated to be used not only for traditional personal computing but also for enterprise computing. However, such mobile devices have their intrinsic characteristics such as limited resources and flexible network capabilities, which are not revealed in traditional computers. Hence, there is high demand for methods to develop mobile applications with reflecting their intrinsic characteristics. Since those characteristics belong to non-functional requirements, they should be reflected in architecture design while designing mobile applications. To design architecture, the architecture drivers that are architecture non-functional requirements are decided from mobile application characteristics. Conventional architecture design methods do not consider those characteristics so that the methods cannot be straightforwardly applied to mobile applications. In this paper, to efficiently develop mobile applications reflecting those characteristics, we propose a set of architecture patterns and define a guideline to apply those patterns. First, we define the characteristics of mobile applications distinguished and derive architectural drivers from them. Then, we propose architecture patterns in terms of static and dynamic views and define an architectural guideline to apply the patterns to designing architecture for mobile application. And, we perform case studies to verify the applicability of proposed patterns. Finally, we assess the proposed architecture patterns by proving how the patterns can fulfill identified architecture drivers and by comparing our approach with previous works.

A Prefetching and Memory Management Policy for Personal Solid State Drives (개인용 SSD를 위한 선반입 및 메모리 관리 정책)

  • Baek, Sung-Hoon
    • The KIPS Transactions:PartA
    • /
    • v.19A no.1
    • /
    • pp.35-44
    • /
    • 2012
  • Traditional technologies that are used to improve the performance of hard disk drives show many negative cases if they are applied to solid state drives (SSD). Access time and block sequence in hard disk drives that consist of mechanical components are very important performance factors. Meanwhile, SSD provides superior random read performance that is not affected by block address sequence due to the characteristics of flash memory. Practically, it is recommended to disable prefetching if a SSD is installed in a personal computer. However, this paper presents a combinational method of a prefetching scheme and a memory management that consider the internal structure of SSD and the characteristics of NAND flash memory. It is important that SSD must concurrently operate multiple flash memory chips. The I/O unit size of NAND flash memory tends to increase and it exceeded the block size of operating systems. Hence, the proposed prefetching scheme performs in an operating unit of SSD. To complement a weak point of the prefetching scheme, the proposed memory management scheme adaptively evicts uselessly prefetched data to maximize the sum of cache hit rate and prefetch hit rate. We implemented the proposed schemes as a Linux kernel module and evaluated them using a commercial SSD. The schemes improved the I/O performance up to 26% in a given experiment.

Development of a Scalable Clustering A/V Server for the Internet Personal-Live Broadcasting (인터넷 개인 생방송을 위한 Scalable Clustering A/V Server 개발)

  • Lee, Sang-Moon;Kang, Sin-Jun;Min, Byung-Seok;Kim, Hag-Bae;Park, Jin-Bae
    • The KIPS Transactions:PartC
    • /
    • v.9C no.1
    • /
    • pp.107-114
    • /
    • 2002
  • In these days, rapid advances of the computer system and the high speed network have made the multimedia services popularized among various applications and services in the internet. Internet live broadcasting, a part of multimedia services, makes it possible to provide not only existing broadcasting services including audio and video but also interactive communications which also expand application scopes by freeing from both temporal and spatial limitation. In the Paper, an interned Personal-live broadcasting server system is developed by allowing individual users to actively create or join live-broadcasting services with such basic multimedia devices as a PC camera and a sound card. As the number of broadcasters and participants increases, concurrent multiple channels are established and groups are to be expanded. The system should also guarantee High Availability (HA) for continuous services even in the presence of partial failure of the cluster. Furthermore, a transmission mode switching is supported to consider network environments in the user system.

A Study on the Impact of CSV(Creating Shared Value) of Delivery Companies on Confidence and Intention to Use Delivery Service: Focused on Senior Parcel Delivery Service (택배업체의 CSV(공유가치창출)가 신뢰 및 사용의도에 미치는 영향에 관한 연구 : 실버택배 서비스를 중심으로)

  • Kim, Yoon Jeong;Kim, Eun Jung;Kim, Jong Weon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.5
    • /
    • pp.85-100
    • /
    • 2017
  • The Delivery Companies are Facing the Difficulty in their Delivery Services due to the Continuously Increasing Delivery Demand and Insufficient Supply of Delivery Persons to Satisfy the Demand. In Such Circumstances, the Delivery Companies have been Implementing the CSV Service by Introducing the Senior Parcel Delivery Service Creating Jobs for Senior Citizens. This Paper Investigated the Impact of the Quality of Senior Parcel Delivery Service, CSV Activities, and Individual Characteristic Factors of Consumers on the Customers' Confidence and Intention to Use the Delivery Service of Delivery Companies. For the Empirical Analysis, the Online/Offline Questionnaire Survey was Executed with the Individuals who used the Delivery Service and 216 Samples were Finally Selected for Empirical Analysis. In Accordance with the Analysis Results, the Speed, the Quality of Senior Parcel Delivery Service, had Significant Impact on the Customers' Confidence, but Safety had no Significant Impact on it. Next, the Sincerity of CSV Activity by Senior Parcel Delivery Service Companies Showed the Significant Impact on the Customers' Confidence. However, the Adequacy of CSV Activity had No Significant Impact on the Customers' Confidence. Furthermore, the Consumption Value and Ethical Consumption Propensity, the Individual Features of Consumers, Demonstrated the Significant Impact on the Customers' Confidence and also on the Customers' Confidence on and their Intention to use Senior Parcel Delivery Service Companies.

An implementation of the continuous wave doppler system for blood flow measurement using the ultrasound (효율적인 혈류 속도 측정을 위한 연속 초음파 도플러 장치의 구현)

  • 박형재;김영길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.516-519
    • /
    • 2001
  • To diagnose a patient's blood vessel disease, apoplexy, hypertension, arteriosclerosis, the blood velocity is very important. Determining the blood velocity methods using ultrasound are Continuous Doppler System and Pulse Doppler System. In using the Pulse Doppler System, we can obtain the position of blood velocity. But it is more complex hardware than Continuous Doppler System and it has low SNR(signal-noise ratio). So in this study, to obtain a believable information we use the Continuous Pulse Doppler System. Thus system have analog part and digital part. In analog part is composed of ultrasound generating part, the amplifying part to amplify the received signal from ultrasound sensor, the demodulation part to detect blood velocity and the filtering part to remove the noise. In digital part is composed of the A/D conversion part, digital signal processing part, and the communication part to communicate the PC. In this study to implement efficient ultrasound blood velocity measurement system, we can get the patient's blood velocity information in realtime. Thus, It is a useful in the accurate diagnosis with C.T(computered tomography), M.R.I(magnetic resonance imaging).

  • PDF

Design of Pattern Array Method for Multi Data Augmentation of Power Equipment uisng Single Image Pattern (단일 이미지 패턴을 이용한 다수의 전력설비 데이터를 증강하기 위한 패턴 배열화 기법 설계)

  • Kim, Seoksoo
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.1-8
    • /
    • 2020
  • As power consumption is maximized, research on augmented reality-based monitoring systems for on-site facility managers to maintain and repair power facilities is being actively conducted as individual power brokerages and power production facilities increase. However, in the case of existing augmented reality-based monitoring systems, it is difficult to accurately detect patterns due to problems such as external environment, facility complexity, and interference with the lighting environment, and it is not possible to match various sensing information and service information for power facilities to one pattern. there is a problem. For this reason, since sensor information is matched using a single image pattern for each sensor of a power facility, a plurality of image patterns are required to augment and provide all information. In this paper, we propose a single image pattern arrangement method that matches and provides a plurality of information through an array combination of feature patterns in a single image composed of a plurality of feature patterns.

A Research on the Digital Information of the Deceased (사자(死者)의 디지털 정보에 관한 연구)

  • Kim, Young-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.12
    • /
    • pp.247-253
    • /
    • 2010
  • The demand that needs 'Digital Legacy', a notion that an Internet user can transfer his private blogs, e-mail and financial assets to inheritors and party interested when he died suddenly in the accident, has been growing recently. This issue has become a social hot potato since Justine Ellsworth's father in USA sued Yahoo for the right to access his son's Yahoo e-mail account after Justine Ellsworth had died in Iraq, in November, 2004 and the problems happened to deal with suicide-related blogs and homepages when great entertainers in Korea committed suicide and soldiers' parents in the situation of warship Chonan tragedy in Korea demanded access to soldiers' homepages and e-mail accounts. The point at issue focuses on the property matters about the digital information of the deceased and the relationship between the deceased and the Internet Service Provider(ISP). This research looks into the trend of judicial precedents and laws related to the digital information of the deceased and suggests the preliminary data of the next research.

Context-Aware App-Store System based on Collective Intelligence (집단지성 기반 상황인지 앱스토어 시스템)

  • Lim, Won-Jun;Lee, Kang-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.2
    • /
    • pp.11-20
    • /
    • 2015
  • In this paper, we propose a context awareness system to transfer accurate information of the app store based on collective intelligence. By using collective intelligence the system minimizes the errors that could occur when an individual process the problems, recommends APIs for developers and builds the app store for not only customers but also developers. In addition, this system applies the ontology technique to aware the context of consumers, recommends the app suitable for the consumer and provides the information for app developers. By utilizing the deduction technique of the Jena, the context awareness system infers the context of a consumer and constructs the app store system which improves the existing app stores. In the point of service transfer and accuracy, the proposed app store system module show better performance than the existing app store.