• Title/Summary/Keyword: ID Management

Search Result 359, Processing Time 0.024 seconds

Infrared-based User Location Tracking System for Indoor Environments (적외선 기반 실내 사용자 위치 추적 시스템)

  • Jung, Seok-Min;Jung, Woo-Jin;Woo, Woon-Tack
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.5
    • /
    • pp.9-20
    • /
    • 2005
  • In this paper, we propose ubiTrack, a system which tracks users' location in indoor environments by employing infrared-based proximity method. Most of recently developed systems have focussed on performance and accuracy. For this reason, they adopted the idea of centralized management, which gathers all information in a main system to monitor users' location. However, these systems raise privacy concerns in ubiquitous computing environments where tons of sensors are seamlessly embedded into environments. In addition, centralized systems also need high computational power to support multiple users. The proposed ubiTrack is designed as a passive mobile architecture to relax privacy problems. Moreover, ubiTrack utilizes appropriate area as a unit to efficiently track users. To achieve this, ubiTrack overlaps each sensing area by utilizing the TDM (Time-Division Multiplexing) method. Additionally, ubiTrack exploits various filtering methods at each receiver and utilization module. The filtering methods minimize unexpected noise effect caused by external shock or intensity weakness of ID signal at the boundary of sensing area. ubiTrack can be applied not only to location-based applications but also to context-aware applications because of its associated module. This module is a part of middleware to support communication between heterogeneous applications or sensors in ubiquitous computing environments.

Triathlon-Related Overuse Injury and Medical Issues (트라이애슬론의 과사용 부상과 의학적 위험요인에 대한 고찰)

  • Park, Chan-Ho;Kwak, Yi-Sub;Kim, Tae-Un
    • Journal of Life Science
    • /
    • v.20 no.2
    • /
    • pp.314-320
    • /
    • 2010
  • As the nature of triathlons is competition in three successive sports, triathletes experience elevated levels of stress on the body that are absent in single-sport athletic events, and consequently there are more potential medical problems to prepare for. Triathletes can also experience problems such as hypothermia, heat illness, excessive exposure to ultraviolet radiation, musculoskeletal injuries and trauma, immunosuppression, and haemolysis. Depending on the potentiality of such above-listed problems occurring in any given race, race organizers will prepare preventative measures and treatments accordingly. Olympic distance is not the only triathlon racing distance. Sprints, which are normally around half the Olympic distance, are common distances, as well as Long (2 km swim, 80 km bike, 20 km run), Ironman (3.8 km swim, 180 km bike, 42 km run), and ultra-distance events varying in length. Races of longer duration normally result in a higher percentage of athletes experiencing the above-mentioned medical problems, as well as inducing additional health risks such as hyponatraemia. Minimizing the occurrences of serious health issues is possible through the following means: carefully preparing for the probable race-day weather conditions; proper management and organization of the race; preparing an extensive water-safety and ground-course safety plan; distributing necessary nutrition along the course; and stressing the importance for athletes to have proper knowledge concerning race nutrition, biomechanical technique, physical preparation, and utilization of safe equipment. While risks of competing in triathlon are many, the instances of such medical problems are not excessive, and the triathlon has a reputation of being a reasonably safe sport as long as athletes with high risk take added precautions.

Study Focused on Task Process regarding Effective Information Transfer of Ancillary Tests in Diagnostic Pathology (병리추가조직검사 정보전달을 위한 업무프로세스 연구)

  • Ko, Jae-Nam;Park, Yun-Ik;Jung, Jin-Gyeong;Ahn, Sang-Ho;Kim, Jae-Ho;Shin, Hwa-Jeong;Hyun, Ji-Suk;Kim, Kyeong-Ho
    • Quality Improvement in Health Care
    • /
    • v.22 no.2
    • /
    • pp.95-108
    • /
    • 2016
  • Purpose: Ancillary tests such as immunohistochemistry or molecular testing for pathologic diagnosis are performed using ready-made tissue blocks for a histological examination. Various methods and processes during ancillary testing cause some of issues, particularly in the time required and the results reporting scheme. Methods: To solve these issues, we constructed real-time management software. When a pathologist or a clinician had ancillary tests examined using this software by selecting the codes of the needed ancillary tests on site and the system assigned the tests to each laboratory. Then, pathology technologists checked the referred tests and performed the examination. In clinical departments, serial number of each ancillary test can be matched the original pathologic ID. In the department of pathology, numbers of tissue blocks that needed additional tests could be indicated and detected using one-click detection system when a clinician referred the test. Results: Using this system resulted in simplifying the referral procedures from nine-steps to three-steps in each clinical department and from seven-steps to two-steps in department of pathology. Errors that happened on the paper-based request system were also reduced. Furthermore, the time required was saved by seven hours in pathologic laboratory on average. Mean durations from requesting to reporting of the ancillary test was reduced by three days for specimens of health promotion center. Conclusion: Construction of an effective information transfer system may be helpful for shortening the time required, reducing errors, and checking processing information of the tests in real time.

Study on WP-IBE compliant Mobile IPSec (WP-IBE 적용 Mobile IPSec 연구)

  • Choi, Cheong Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.11-26
    • /
    • 2013
  • In the wireless Internet, it is so restrictive to use the IPSec. The MIPv4 IPSec's path cannot include wireless links. That is, the IPSec of the wireless Internet cannot protect an entire path of Host-to-Host connection. Also wireless circumstance keeps a path static during the shorter time, nevertheless, the IKE for IPSec SA agreement requires relatively long delay. The certificate management of IPSec PKI security needs too much burden. This means that IPSec of the wireless Internet is so disadvantageous. Our paper is to construct the Mobile IPSec proper to the wireless Internet which provides the host-to-host transport mode service to protect even wireless links as applying excellent WP-IBE scheme. For this, Mobile IPSec requires a dynamic routing over a path with wireless links. FA Forwarding is a routing method for FA to extend the path to a newly formed wireless link. The FA IPSec SA for FA Forwarding is updated to comply the dynamically extended path using Source Routing based Bind Update. To improve the performance of IPSec, we apply efficient and strong future Identity based Weil Pairing Bilinear Elliptic Curve Cryptography called as WP-IBE scheme. Our paper proposes the modified protocols to apply 6 security-related algorithms of WP-IBE into the Mobile IPSec. Particularly we focus on the protocols to be applied to construct ESP Datagram.

Sampling based Network Flooding Attack Detection/Prevention System for SDN (SDN을 위한 샘플링 기반 네트워크 플러딩 공격 탐지/방어 시스템)

  • Lee, Yungee;Kim, Seung-uk;Vu Duc, Tiep;Kim, Kyungbaek
    • Smart Media Journal
    • /
    • v.4 no.4
    • /
    • pp.24-32
    • /
    • 2015
  • Recently, SDN is actively used as datacenter networks and gradually increase its applied areas. Along with this change of networking environment, research of deploying network security systems on SDN becomes highlighted. Especially, systems for detecting network flooding attacks by monitoring every packets through ports of OpenFlow switches have been proposed. However, because of the centralized management of a SDN controller which manage multiple switches, it may be substantial overhead that the attack detection system continuously monitors all the flows. In this paper, a sampling based network flooding attack detection and prevention system is proposed to reduce the overhead of monitoring packets and to achieve reasonable functionality of attack detection and prevention. The proposed system periodically takes sample packets of network flows with the given sampling conditions, analyzes the sampled packets to detect network flooding attacks, and block the attack flows actively by managing the flow entries in OpenFlow switches. As network traffic sampler, sFlow agent is used, and snort, an opensource IDS, is used to detect network flooding attack from the sampled packets. For active prevention of the detected attacks, an OpenDaylight application is developed and applied. The proposed system is evaluated on the local testbed composed with multiple OVSes (Open Virtual Switch), and the performance and overhead of the proposed system under various sampling condition is analyzed.

A Study on Structual Relationship among Service Quality, Festival Satisfaction, After Behavioral Intention in Regional Festival - A Case of Iksan National Stone Culture Festival - (지역축제의 서비스품질과 축제만족도, 사후행동의도 간의 구조관계에 관한 연구 - 익산 전국돌문화축제를 사례로-)

  • Kim, Hong-Chul
    • Journal of the Korean association of regional geographers
    • /
    • v.18 no.3
    • /
    • pp.326-335
    • /
    • 2012
  • The purpose of this study id to identify service quality of national stone culture festival, to find relationship service quality to festival satisfaction and after behavioral intention of festival participants. To achieve the purpose of this study, 13 elements of service quality was chosen through previous literature study. And 3 factors were extracted by 1st factor analysis, these are hardware, software, and humanware factor. And second factor analysis was performed to identify validity and reliability these factors. And 5th hypothesis was established and adopted in three hypothesis. That is Hardware service quality factor have a influence to festival satisfaction of participants, festival satisfaction of participants have a influence to revisitation and recommendation intention. This paper indicates that results of this study is useful to regional festival planning to settle down as a sustainable events, necessary to retain service quality and satisfaction as a precedent condition.

  • PDF

Traffic Signal Control Algorithm for Isolated Intersections Based on Travel Time (독립교차로의 통행시간 기반 신호제어 알고리즘)

  • Jeong, Youngje;Park, Sang Sup;Kim, Youngchan
    • Journal of Korean Society of Transportation
    • /
    • v.30 no.6
    • /
    • pp.71-80
    • /
    • 2012
  • This research suggested a real-time traffic signal control algorithm using individual vehicle travel times on an isolated signal intersection. To collect IDs and passing times from individual vehicles, space-based surveillance systems such as DSRC were adopted. This research developed models to estimate arrival flow rates, delays, and the change rate in delay, by using individual vehicle's travel time data. This real-time signal control algorithm could determine optimal traffic signal timings that minimize intersection delay, based on a linear programming. A micro simulation analysis using CORSIM and RUN TIME EXTENSION verified saturated intersection conditions, and determined the optimal traffic signal timings that minimize intersection delay. In addition, the performance of algorithm varying according to market penetration was examined. In spite of limited results from a specific scenario, this algorithm turned out to be effective as long as the probe rate exceeds 40 percent. Recently, space-based traffic surveillance systems are being installed by various projects, such as Hi-pass, Advanced Transportation Management System (ATMS) and Urban Transportation Information System (UTIS) in Korea. This research has an important significance in that the propose algorithm is a new methodology that accepts the space-based traffic surveillance system in real-time signal operations.

Protecting Individuals from Secondary Privacy Loss using Breached Personal Data Information Center (개인정보 오.남용 방지 및 보호를 위한 정보공유센터 프레임워크)

  • Ko, Yu-Mi;Choi, Jae-Won;Kim, Beom-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.391-400
    • /
    • 2012
  • This study focused on the role of the center for private information, which can manage and share the personal data from data breach incidents. Especially, this study addresses on the importance of establishing information management systems for preventing secondary misappropriation of breached personal data and private information. The database of breached personal data can be used for reducing privacy worries of potential victims of secondary misuse of personal data. Individuals who use the same IDs and passwords on multiple websites may find this service more effective and necessary. The effectiveness of this breached data center on reducing secondary privacy infringement may differ depending on the extend of data being shared and the conditions of data submission. When businesses experienced data breach and submission of data to this center is required by the law, the accuracy and effectiveness of this service can be enhanced. In addition, centralized database with high quality data set can increase matching for private information and control the secondary misappropriation of personal data or private information better.

Study on The Turnover Reason of Family Restaurant Cook Part Employee (패밀리레스토랑 조리 종사원의 이직원인에 관한 연구)

  • 유양자;윤지연
    • Korean journal of food and cookery science
    • /
    • v.17 no.1
    • /
    • pp.13-22
    • /
    • 2001
  • This study was to investigate the reason of family restaurant cook part employee's turnover. One hundred and forty seven family restaurant employees in Seoul area were surveyed to obtain the information from Oct. 1 to 10 in 2000. There were sixty males and eighty seven females. The group of twenty years old to twenty nine years old(95,2%) was the largest one by age, and the group of junior college graduated(71.4%) was the largest one by learning. On order, manager was 4.1%, captain was 13.6%, and employee was 82.3%. Except 15.6% employee, almost family restaurant cook part employees' service of duty was under 2 years. The highest scored turnover factor was work system(3.59), and then human relation(3.18), another way(3.11), unbelievable management(3.04). The rest factors effected on turnover not too much. The mean of female's turnover factor score(3.06) is higher then male(3.00), the group of over fifty years 0Id(3.32) had the highest mean score in aged group, on learning, the group of Master degree's mean score(4.24) is highest. The manager's mean score(3.23) was highest in order, and the employees who's service duty was over five years(3.35) had the highest mean score in service duty group.

  • PDF

A Mutual P3P Methodology for Privacy Preserving Context-Aware Systems Development (프라이버시 보호 상황인식 시스템 개발을 위한 쌍방향 P3P 방법론)

  • Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.18 no.1
    • /
    • pp.145-162
    • /
    • 2008
  • One of the big concerns in e-society is privacy issue. In special, in developing robust ubiquitous smart space and corresponding services, user profile and preference are collected by the service providers. Privacy issue would be more critical in context-aware services simply because most of the context data themselves are private information: user's current location, current schedule, friends nearby and even her/his health data. To realize the potential of ubiquitous smart space, the systems embedded in the space should corporate personal privacy preferences. When the users invoke a set of services, they are asked to allow the service providers or smart space to make use of personal information which is related to privacy concerns. For this reason, the users unhappily provide the personal information or even deny to get served. On the other side, service provider needs personal information as rich as possible with minimal personal information to discern royal and trustworthy customers and those who are not. It would be desirable to enlarge the allowable personal information complying with the service provider's request, whereas minimizing service provider's requiring personal information which is not allowed to be submitted and user's submitting information which is of no value to the service provider. In special, if any personal information required by the service provider is not allowed, service will not be provided to the user. P3P (Platform for Privacy Preferences) has been regarded as one of the promising alternatives to preserve the personal information in the course of electronic transactions. However, P3P mainly focuses on preserving the buyers' personal information. From time to time, the service provider's business data should be protected from the unintended usage from the buyers. Moreover, even though the user's privacy preference could depend on the context happened to the user, legacy P3P does not handle the contextual change of privacy preferences. Hence, the purpose of this paper is to propose a mutual P3P-based negotiation mechanism. To do so, service provider's privacy concern is considered as well as the users'. User's privacy policy on the service provider's information also should be informed to the service providers before the service begins. Second, privacy policy is contextually designed according to the user's current context because the nomadic user's privacy concern structure may be altered contextually. Hence, the methodology includes mutual privacy policy and personalization. Overall framework of the mechanism and new code of ethics is described in section 2. Pervasive platform for mutual P3P considers user type and context field, which involves current activity, location, social context, objects nearby and physical environments. Our mutual P3P includes the privacy preference not only for the buyers but also the sellers, that is, service providers. Negotiation methodology for mutual P3P is proposed in section 3. Based on the fact that privacy concern occurs when there are needs for information access and at the same time those for information hiding. Our mechanism was implemented based on an actual shopping mall to increase the feasibility of the idea proposed in this paper. A shopping service is assumed as a context-aware service, and data groups for the service are enumerated. The privacy policy for each data group is represented as APPEL format. To examine the performance of the example service, in section 4, simulation approach is adopted in this paper. For the simulation, five data elements are considered: $\cdot$ UserID $\cdot$ User preference $\cdot$ Phone number $\cdot$ Home address $\cdot$ Product information $\cdot$ Service profile. For the negotiation, reputation is selected as a strategic value. Then the following cases are compared: $\cdot$ Legacy P3P is considered $\cdot$ Mutual P3P is considered without strategic value $\cdot$ Mutual P3P is considered with strategic value. The simulation results show that mutual P3P outperforms legacy P3P. Moreover, we could conclude that when mutual P3P is considered with strategic value, performance was better than that of mutual P3P is considered without strategic value in terms of service safety.