• Title/Summary/Keyword: Mail

Search Result 1,928, Processing Time 0.027 seconds

Effects of Self-care Program Using SMS, E-mail, or Telephone Call on Self-care Compliance and Nutritional Status in Hemodialysis Patients (혈액투석환자에서 문자메시지(SMS), 이메일 및 전화를 이용한 자가간호 프로그램이 자가간호 이행과 영양 상태에 미치는 효과)

  • An, Gyeong-Ju
    • Journal of Korean Biological Nursing Science
    • /
    • v.11 no.2
    • /
    • pp.157-166
    • /
    • 2009
  • Purpose: The purpose of this study was to determine the effects of self-care program using Short message service (SMS), e-mail, or telephone call on self-care compliance and nutritional status in maintenance of hemodialysis patient. Methods: Nonequivalent pretest-posttest control experimental design was used. Ninety-six patients were allocated to control (n=24), SMS (n=24), e-mail (n=24), or telephone (n=24) group from four hospitals. Experimental groups received self-care program about hemodialysis diet, drug administration, exercise, and fistula care by SMS, e-mail, or telephone call respectively at 3 times a week for 4 weeks. Results: Subjective self-care compliance, and objective self-care compliance including interdialytic weight of SMS and telephone groups were significantly increased than those of control groups. However, nutritional status of SMS and e-mail groups were significantly improved than those of control groups in albumin and protein level. Conclusion: Self-care program using SMS and telephone call were effective on promoting self-care compliance, while SMS and e-mail were effective on improving nutritional status. The pop-up remaining effect and easy accessible effect of SMS message in busy daily life was considered as an alarm to control fluid and diet.

  • PDF

A Study on Conditional Access System for Data Confidential using Smart-Card (스마트 카드를 이용한 자료 유출 제한 시스템에 대한 연구)

  • 김신홍;이광제
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.37 no.5
    • /
    • pp.125-131
    • /
    • 2000
  • In this paper, we proposed conditional access algorithm for data confidential using smart card. This algorithm is constructed smart card and E-mail gateway for restricting of user's illegal confidential data transmission. After processing of certification procedure in smart card, each E-mail forwarded to E-mail gateway(EG). The EG selects outgoing E-mail and it is sent to fire-wall E-mail processing program, it is checked attached file in transmission mail and if it is attached file, it writes to database. This time, it can be used evidence data about user's illegal confidential data transmission, because of using registered content and smart card certification data in database. in addition to, we can get psychologically effect of prevention to send illegally, and this system can prevent spam mail in EG, also.

  • PDF

A Push Agent System for Personalizing e-Mails using Extraction of User Preference Mail Formatn (사용자 선호 메일 형식을 통한 개인화 이메일 푸쉬 에이전트 시스템)

  • 이광형;박재표;이종희;전문석
    • The Journal of Society for e-Business Studies
    • /
    • v.9 no.2
    • /
    • pp.109-121
    • /
    • 2004
  • In this paper, we propose a system that generates a new customizing information for customer with classification and analysis in detail and provides customized information to individual customers automatically. A proposed system generate preference information and preference e-mail format as analysis and calculate that e-mail open rate and mouse event information. Using generated interesting information and preference e-mail format, individual customer's interest information according to e-mail standard and format that customer prefers through agent automatically recompose and push to customer. From experiment, the designed and implemented system showed high e-mail open ratio and user's satisfaction in performance assessment.

  • PDF

Guidelines for Instructional Use of E-mail (전자우편의 수업적 활용 지침)

  • Kim, Won-Seob;Yoon, Gwan-Sik
    • The Journal of Korean Institute for Practical Engineering Education
    • /
    • v.2 no.2
    • /
    • pp.83-90
    • /
    • 2010
  • The purpose of this study was to investigate guidelines for instructional use of e-mail and the method in the present investigation was followed by an analysis of research literatures. This study suggests the following conclusions. First, instructors should use e-mail effectively to improve communication between an instructor and a learner or learners. Communication was essential to support a good instruction. Second, to use effectively e-mail in teaching and learning process, guidelines should followed by considering e-mail characteristics. These guidelines were as follows: (1) Spelling and grammar should be followed correctly. (2) Messages should be followed shortly and concisely. (3) Summaries should be stated in your first sentence. (4) Messages should be responded rapidly. (5) Messages should be responded kindly. (6) Sarcasm and humor should be used carefully.

  • PDF

A Fair Certified Electronic Mail Protocol that Enhances Guarantee of Reception (수신 보장성이 향상된 공평한 배달 증명 전자 메일 프로토콜)

  • 박용수;조유근
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.1
    • /
    • pp.86-94
    • /
    • 2003
  • Certified e-mail system guarantees that recipient will get mail content if and only if mall originator receives a receipt. Unlike previous schemes, Optimistic protocols recently published generate a receipt when it meets the condition that the mail content can be accessed by recliner at any time. So originator cannot assure the delivery of e-mail although he can get a receipt. In this paper, we show some flaws in optimistic protocols and propose improved schemes using delivery deadline. Modified protocols guarantee proof-of-receipt and eliminate the problem mentioned above. Furthermore, proposed modification technique can be applicable to most optimistic protocols and is efficient in the sense that modified schemes do not increase the number of messages.

Maintenance Method of Mail Sorting Machine Based on FMEA (FMEA 기반 우편 기계 유지 보수 방법)

  • Park, Jeong-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.5
    • /
    • pp.1601-1607
    • /
    • 2010
  • This paper presents FMEA (Failure Mode Effect Analysis) for maintenance of mail sorting machine which is for automatic sorting of mail. We suggest the update method of regular diagnosis item and period for maintenance of mail sorting machine using the risk priority number which is calculated by severity, occurrence, and detection of failure mode of mail sorting machine, and shows FMEA adoption example of letter sorting machine. This paper also describes the current maintenance system and status of mail sorting machine in the domestic postal logistics environment, and FMEA adoption step. The proposed maintenance using FMEA will be adapted for more easy and efficiency maintenance of mail sorting machine.

A Study on the Security Structure of Next Generation E-mail System (차세대 이메일 보안 기술에 관한 연구)

  • Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.183-189
    • /
    • 2008
  • E-mail's role has been increased due to its merit which is sending demanded information in real-time anywhere, anytime. However, Today's E-mail security threats have being changed intelligently to attack against the specific agency. The threat is a limit to respond. Therefore precise definition and development of security technology is needed to analyze changing environment and technologies of e-mail so that remove fundamental security threat. we proposed Next Generation E-mail System Security Structure and the Next Generation fusion System using authentication As a result, in this study, we development of Next Generation E-mail System Security Structure. This system can protect E-mail user from social engineering hacking technique, spam, virus, malicious code and fabrication.

  • PDF

A Study on the Development of Web-based Full Motion Video E-mail System using MPEG-4 (웹을 기반으로 한 MPEG-4 동영상 E-mail 시스템의 개발)

  • 고재승
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.3
    • /
    • pp.283-294
    • /
    • 2002
  • Now is the time for web-based video e-mail system because of world wide use of internet. But video data is so large, then data compression is much needed for transmission by web. In this paper, my colleagues and I implement full motion video e-mail system using MPEG-4, the international standards for audio-visual data. This video e-mail system is made of web-based active-X control, so easily accessible by web, and applies real-time audio-video compression. It's possible for everyone to send video e-mail for free to everywhere in the world if this system is used. The main application areas of this system are multimedia mailing service, web-based video advertisement, remote education, remote medical service and shopping mall construction, etc.

  • PDF

An Implementation and Evaluation of Junk Mail Filtering System to use the FQDN Check and personalized Quarantine Process (FQDN과 개인화 격리 처리를 이용한 정크메일 차단 시스템의 구현 및 평가)

  • Kim, Sung-Chan;Jun, Moon-Seog;Choun, Jun-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.6
    • /
    • pp.3-13
    • /
    • 2006
  • Internet mail has become a common communication method to send and receive an amount of data due to the tremendous high speed Internet service increment. But in other respect, the risk and damage of Junk mail is growing rapidly and nowadays Junk mail delivery problem is becoming more serious, because this is used for an attack or propagation scheme of malicious code. It's a most dangerous dominant cause for computer system accident. This paper shows the Junk mail characteristic which is based on the analysis of mail log in reality and then shows the implementation of the FQDN (Fully Qualified Domain Name) check and Personalized classification system and evaluates its performance.

E-mail Sending-Server Authorization Method using a Distance Estimation Algorithm between IP Addresses for Filtering Spam (스팸메일 차단을 위해 IP 주소간 거리 측정 알고리즘을 이용하는 전자우편 발송서버의 권한확인 방법)

  • Yim Hosung;Shim Jaehong;Choi Kyunghee;Jung Gihyun
    • The KIPS Transactions:PartC
    • /
    • v.12C no.5 s.101
    • /
    • pp.765-772
    • /
    • 2005
  • In this paper, we propose E-mail sending-server authorization method using a distance estimation algorithm between W addresses to check whether the E-mail sending server is registered in the domain of mail sending server or belongs to the domain for filtering spam mail. This method utilizes the distance between the IP address of sending server and IP addresses registered in the DNS to figure out that the E-mail sending server exists in the domain to filter spam mail. The experimental result of applying the proposed algorithm to sample E-mails gathered in a large size laboratory says that 88 percents of legitimate E-mails and only 10 percents of spam mails are sent by servers in the same domains of senders. The algorithm may be effectively used to block spam mails sent by servers outside of the domains of mail senders. It may be also hired as a temporary E-mail protecting system until the standard E-mail authorization protocol is fully deployed.