• Title/Summary/Keyword: Personal Communication Services

Search Result 358, Processing Time 0.023 seconds

Private information protection method and countermeasures in Big-data environment: Survey (빅데이터 환경에서 개인민감정보 보호 방안 및 대응책: 서베이)

  • Hong, Sunghyuck
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.10
    • /
    • pp.55-59
    • /
    • 2018
  • Big-data, a revolutionary technology in the era of the 4th Industrial Revolution, provides services in various fields such as health, public sector, distribution, marketing, manufacturing, etc. It is very useful technology for marketing analysis and future design through accurate and quick data analysis. It is very likely to develop further. However, the biggest problem when using Big-data is privacy and privacy. When various data are analyzed using Big-data, the tendency of each user can be analyzed, and this information may be sensitive information of an individual and may invade privacy of an individual. Therefore, in this paper, we investigate the necessary measures for Personal private information infringement that may occur when using Personal private information in Big-data environment, and propose necessary Personal private information protection technologies to contribute to protection of Personal private information and privacy.

An OpenAPI based Security Framework for Privacy Protection in Social Network Service Environment (소셜 네트워크 서비스 환경에서 개인정보보호를 위한 OpenAPI기반 보안 프레임워크)

  • Yoon, Yongseok;Kim, Kangseok;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1293-1300
    • /
    • 2012
  • With the rapid evolution of mobile devices and the development of wireless networks, users of mobile social network service on smartphone have been increasing. Also the security of personal information as a result of real-time communication and information-sharing are becoming a serious social issue. In this paper, a framework that can be linked with a social network services platform is designed using OpenAPI. In addition, we propose an authentication and detection mechanism to enhance the level of personal information security. The authentication scheme is based on an user ID and password, while the detection scheme analyzes user-designated input patterns to verify in advance whether personal information protection guidelines are met, enhancing the level of personal information security in a social network service environment. The effectiveness and validity of this study were confirmed through performance evaluations at the end.

Clinical Information Interchange System using HL7-CDA

  • Jung, Yong Gyu;Lee, Young Ho
    • International journal of advanced smart convergence
    • /
    • v.1 no.2
    • /
    • pp.47-51
    • /
    • 2012
  • In highly developed society, information and communication technologies are widely used for better medical services. These information and communication technologies should be more and more acceptable in all hospitals for exchange medical records. EMR becomes more convenient than the previously used paper charts. It will be able to record medical institutions every time and dual treatment. Each is different specifications for each medical institution to use the program or document to exchange it. The personal clinic records still does not exchange well. To solve this gap between medical alienation, this paper describes the concepts of HL7-CDA and proposes types of telemedicine system. To resolve time and space constraints, new form of treatment methods presents in future directions after described about related systems. CDA enables electronic medical records to the each medical center and gradually expanded by exchanging the patient's medical records. This paper is using XML-based CDA documents as a hierarchical for medical information exchange standards compliant HL7-CDA documents. It could be possible currently used structural variety of multimedia data. Thus It is able to send and receive HL7-CDA-based medical information and clinical information to identify the medical institutions of medical information with interchange system design and building standards, and through mutual exchange of clinical information.

Use of unmanned aerial systems for communication and air mobility in Arctic region

  • Gennady V., Chechin;Valentin E., Kolesnichenko;Anton I., Selin
    • Advances in aircraft and spacecraft science
    • /
    • v.9 no.6
    • /
    • pp.525-536
    • /
    • 2022
  • The current state of telecommunications infrastructure in the Arctic does not allow providing a wide range of required services for people, businesses and other categories, which necessitates the use of non-traditional approaches to its organization. The paper proposes an innovative approach to building a combined communication network based on tethered high-altitude platform station (HAPS) located at an altitude of 1-7 km and connected via radio channels with terrestrial and satellite communication networks. Network configuration and composition of telecommunication equipment placed on HAPS and located on the terrestrial and satellite segment of the network was justified. The availability of modern equipment and the distributed structure of such an integrated network will allow, unlike existing networks (Iridium, Gonets, etc.), to organize personal mobile communications, data transmission and broadband Internet up to 100 Mbps access for mobile and fixed subscribers, rapid transmission of information from Internet of Things (IoT) sensors and unmanned aerial vehicles (UAV). A substantiation of the possibility of achieving high network capacity in various paths is presented: inter-platform radio links, subscriber radio links, HAPS feeder lines - terrestrial network gateway, HAPS radio links - satellite retransmitter (SR), etc. The economic efficiency of the proposed solution is assessed.

Design, Deployment and Implementation of Local Area Network (LAN) at BAEC Head Quarter

  • Osman Goni;Md. Abu Shameem
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.141-146
    • /
    • 2024
  • A local area network (LAN) is a computer network within a small geographical area such as a home, school, computer laboratory, office building or group of buildings. A LAN is composed of interconnected workstations and personal computers which are each capable of accessing and sharing data and devices, such as printers, scanners and data storage devices, anywhere on the LAN. LANs are characterized by higher communication and data transfer rates and the lack of any need for leased communication lines. Communication between remote parties can be achieved through a process called Networking, involving the connection of computers, media and networking devices. When we talk about networks, we need to keep in mind three concepts, distributed processing, network criteria and network structure. The purpose of this Network is to design a Local Area Network (LAN) for a BAEC (Bangladesh Atomic Energy Commission) Head Quarter and implement security measures to protect network resources and system services. To do so, we will deal with the physical and logical design of a LAN. The goal of this Network is to examine of the Local Area Network set up for a BAEC HQ and build a secure LAN system.

The Effect of Eye Contact on User Experience in Synchronous Online Communication (실시간 온라인 커뮤니케이션에서 눈 맞춤이 사용자 경험에 미치는 영향)

  • Shin, Hyorim;Lee, Soyeon;Choi, Junho
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.8
    • /
    • pp.20-31
    • /
    • 2021
  • The spread of non-face-to-face culture due to COVID-19 led to innovation in untact services and the increase of non-face-to-face communication through video conference platforms. However, it is difficult to identify nonverbal expressions in synchronous online communication. Moreover, it is hard to interact with people by making eye contact. Despite the positive effects of eye contact, including such as sharing emotions and helping build intimacy, no research has empirically verified the effectiveness of eye contact in synchronous online communication. Thus, the study verified the effectiveness of eye contact in synchronous online communication. Depending on the context of the communication and whether(or not) there is eye contact, six video treatments were used to measure four dependent variables-Continuance Intention to Use, Performance Expectancy, Interactivity, and Personal Connection. The study shows that the communication with eye contact in all contexts was rated higher than the one without eye contact in all measurement variables. This study will help to provide a better user experience in synchronous online communication by verifying the effectiveness of eye contact in synchronous online communication and proposing the need of technology and the direction of the technological development.

Comparative Analysis of TOA and TDOA method for position estimation of mobile station (이동국 위치 추정을 위한 TOA와 TDOA방법의 비교 분석)

  • 윤현성;호인석;이장호;변건식
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.05a
    • /
    • pp.167-172
    • /
    • 2000
  • This paper is aimed at developing an location tracking for mobile station employing currently available mobile communication network of cellular phone and PCS(Personal Communication System). When the location tracking of mobile stations is in services, the services such as Emergency-119, crime investigation, effective urban traffic management or the safety protection of Alzheimer's patients, ran be available. This paper is to track the mobile station in communication network in NLOS environment. To achieve reduction of the standard noise, Kalman filter is used. In terms of the distance, positions are located by using TOA and TDOA methods in the environment that removes NLOS bias in the measured data. And then smoothing method is used. to achieve reduction of the position error values

  • PDF

A Novel D2D Communication Scheme for Location-Based OTT Service in Cellular Networks (셀룰러 통신망에서 위치기반 OTT 서비스 지원을 위한 D2D 통신 방안)

  • Han, Kyeong-Il;Min, Sang-Won
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.16 no.6
    • /
    • pp.195-207
    • /
    • 2017
  • Since the smart phone was first introduced, the amount of mobile traffic has increased explosively. The OTT service with personal broadcasting and TV contents and the number of users have been increased in wired network, and there are needs to expand the OTT service to mobile network. In the case of the OTT service in mobile network, the relative small and finite resource may cause the overload of the network due to the massive and high transfer rate. In this paper, we consider a future situation of the OTT user services in the cellular network and propose a novel D2D communication scheme for location-based OTT service, which can reduce and distribute the amount of video traffics. To effectively handle the traffic of OTT services, we propose D2DS and LCS functional blocks in EPC network, which can provide location-based service and D2D management. And, we suggest additional procedures for the location-based service of both content provider and contents receiver UEs with the operation of the proposed D2DS and LCS function block.

A Study on the Variable Password Generation Method in Internet Authentication System (변동형 비밀번호 생성방법 및 이를 이용한 인터넷 인증 시스템에 관한 연구)

  • Kang, Jung-Ha;Kim, Jae Young;Kim, Eun-Gi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.3
    • /
    • pp.1409-1415
    • /
    • 2013
  • With the development of Internet communication and the use of a variety of online services has been greatly expanded. Therefore, the importance of authentication techniques for users of online services has increased. The most commonly used methods for user authentication is a technique that utilizes a prearranged password. However, the existing password scheme for authentication must use the same password every time. Therefore, the password being leaked by attackers, it can be used maliciously. In this paper, we proposed the Variable Password Generation Method in Internet Authentication System that generates a new password using information such as the access date, time, and IP address when user logs in. The method proposed in this paper prevents disclosure of personal information due to password exposure and improves the reliability and competitiveness in the field of security systems.

Remote Devices Data Monitoring System based on Wireless PDA (무선 PDA 기반의 원격 장치 데이터 모니터링 시스템)

  • Seo, Jung-Hee;Kim, Kil-Young;Park, Hung-Bog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.611-614
    • /
    • 2007
  • This paper suggests a TCP/IP-based remote data monitoring system, which combines PDA (Personal Digital Assistant) and WLAN (Wireless Local Area Network) technologies. Wireless PDA devices are used for remote monitoring of wireless communication by continuously collecting remote device data transmitted from servers such as temperature, humidity and device status, and displaying them on mobile devices. Therefore, remote data monitoring systems that integrate wireless and wired services provide data collection adaptive to administrators and efficient identification of device status.

  • PDF