• Title/Summary/Keyword: home multimedia

Search Result 355, Processing Time 0.033 seconds

Development and Application of Internet-based Consumer Education Program for Children (인터넷 기반 아동소비자 교육프로그램 개발 및 적용)

  • 김영옥
    • Journal of Korean Home Economics Education Association
    • /
    • v.15 no.3
    • /
    • pp.13-28
    • /
    • 2003
  • This study presents a development of internet-based consumer education program for children. We also investigate how this program affects on the children's consumer competency and how much children are interested in this program. This program consists of 6 domains: the concept of consumer. wants and scarcity. advertisement, tips on purchasing. consumer's rights. and consumer's problem imd solutions. In order to attract children. multimedia data such as pictures. drawings. and animations were included in designing the screens. The subjects of this study were 40 children at forth grade to participate in consumer education program. Surveys were conducted twice to collect data for consumer competency and children's interest in the program. According to the results of t-test. We found that consumer education has a positive effect on consumer knowledge and consumer-role attitude but has not a positive effect on consumer skill. We also found that children's interest on this program was very high.

  • PDF

Development of Evaluation Index and Multi-layer Evaluation System for Quality Management of Elderly Long-term Care Institution (노인장기요양기관(시설급여) 평가의 품질관리를 위한 평가지표 개발 및 다층평가시스템 방안)

  • Lee, Sang-Jin;Kim, Yun-Jeong
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.9 no.11
    • /
    • pp.1015-1026
    • /
    • 2019
  • The purpose of this study is to develop evaluation indexes for improving the quality of long-term care institutions (facility salary) evaluation in the sense that the applicability and effectiveness of previous studies related to the development of evaluation indexes for long-term care facilities for elderly are insufficient. There was this. To this end, an analytical review of the 2018 long-term care institution (accommodation benefit) evaluation index, an analysis of Japan's elderly long-term care home evaluation index, and the elderly long-term care facility workers in Korea and the special care home for the elderly in Japan FGI on evaluation indicators and evaluation system was conducted. Based on the results of the research, evaluation indicators were developed in terms of supporting users to receive high quality services. The characteristics of the elderly, that is, the characteristics of elderly diseases that are difficult to maintain and improve, the direction and transparency of institutional operation, and the need for terminal care were reflected. Forty-three evaluation indicators were presented, covering institutional operations, environment and safety, beneficiary rights protection, payroll process, and payroll results. In addition, we proposed a four-step multi-level evaluation system that can improve the efficiency of the evaluation process by improving the redundant and unnecessary evaluation process.

Research of Specific Domestic De-identification Technique for Protection of Personal Health Medical Information in Review & Analysis of Overseas and Domestic De-Identification Technique (국내외 비식별화 기술에 관한 검토 분석에 따른 개인건강의료정보 보호를 위한 국내 특화 비식별화 기술 제안에 관한 연구)

  • Lee, Pilwoo;In, Hanjin;Kim, Cheoljung;Yeo, Kwangsoo;Song, Kyoungtaek;Yu, Khigeun;Baek, Jongil;Kim, Soonseok
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.7
    • /
    • pp.9-16
    • /
    • 2016
  • As life in a rapidly changing Internet age at home and abroad, large amounts of information are being used medical, financial, services, etc. Accordingly, especially hospitals, is an invasion of privacy caused by leakage and intrusion of personal information in the system in medical institutions, including clinics institutions. To protect the privacy & information protection of personal health medical information in medical institutions at home and abroad presented by national policies and de-identification processing technology standards in accordance with the legislation. By comparative analysis in existing domestic and foreign institutional privacy and de-identification technique, derive a advanced one of pseudonymization and anonymization techniques for destination data items that fell short in comparison to the domestic laws and regulations, etc. De-identification processing technology for personal health information is compared to a foreign country pharmaceutical situations. We propose a new de-identification techniques by reducing the risk of re-identification processing to enable the secondary use of domestic medical privacy.

A Design of TDMA/TDD MAC Protocol for Full-Duplex Multi-User Voice Communication Systems Based on Sensor Network (센서 네트워크 기반의 다수 사용자간 Full-Duplex 음성 통신 시스템을 위한 TDMA/TDD MAC 프로토콜 설계)

  • Kim, Jisoo;Lee, Jae Hyoung;Cho, Sung Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.3
    • /
    • pp.239-246
    • /
    • 2013
  • The IEEE 802.15.4 offers standard about PHY and MAC layer and features low power, low bandwidth, and low speed data communication. Because of this reason, IEEE 802.15.4 is only within a limited range such as sensor detection and home network; nevertheless, the research about transmission multimedia data like voice packet through wireless sensor networks is conducted widely. In this paper, we proposed the group communication system based on the sensor network. TDMA/TDD MAC based on the IEEE 802.15.4 PHY for voice communication on the sensor network is designed by improvement existing peer-to-peer voice communication on the sensor network and hardware is implemented for group communication. To measure the quality of designed system, mean opinion score (MOS) is obtained from the experiment and verified by using sine wave method. As a result of an experiment, we expect that a many cases of application solution can be developed using presented system.

A Study on the Development Site Security for Embedded Software (임베디드 소프트웨어 개발현장보안에 관한 연구)

  • Yeo, Sang-Soo;Kim, Tai-Hoon;Cho, Sung-Eon;Kouich, Sakurai
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.3
    • /
    • pp.259-265
    • /
    • 2007
  • Systematic components for implementing ubiquitous computing, for example, electronic devices, electric home appliances, and controllers, etc, are consist of not only circuits but also softwares expected to do some special system-controlling functions, and these softwares used to be called like as embedded software. Because embedded software is a core component controlling systems, the codes or control flows should be protected from being opened to the public or modified. Embedded software security can be divided into 2 parts: first is the unauthorized access to development site and embedded software, second is the unauthorized disclosure or modification. And this research is related to the first aspect of them.This paper proposes some security check requirements related to embedded software development site by analyzing the ALC_DVS.1 of the ISO/IEC 15408 and Base Practices (BPs) of the ISO/IEC 21827. By applying this research, we expect to protect unauthorized modification of embedded software indirectly.

  • PDF

A Traitor Tracing Using an Efficient Key Renewal in Embedded System (임베디드 시스템에서 효율적인 키 갱신을 적용한 Traitor Tracing)

  • Park, Jong-Hyuk;Lee, Deok-Gyu;Yeo, Sang-Soo;Kim, Tai-Hoon;Lee, Seung;Cho, Seong-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.3
    • /
    • pp.245-254
    • /
    • 2008
  • If the broadcast message is sent, first of all, the privileged users will decode the session key by using his or her personal key, which the user got previously. The user willget the digital information through this session key. As shown above, the user will obtain messages or session keys using the keys transmitted from a broadcaster, which process requires effective ways for the broadcaster to generate and distribute keys. In addition, when a user wants to withdraw or sign up, an effective process to renew a key is required. It is also necessary to chase and check users' malicious activities or attacking others. This paper presents a method called Traitor Tracing to solve all these problems. Traitor tracing can check attackers and trace them. It also utilizes a proactive way for each user to have effective renewal cycle to generate keys.

  • PDF

IP Over USB for Improved QoS of UDP/IP Messages (UDP/IP 메시지 전송의 QoS 성능 향상을 위한 IP Over USB)

  • Jang, Byung-Chul;Park, Hyeon-Hui;Yang, Seung-Min
    • The KIPS Transactions:PartA
    • /
    • v.14A no.5
    • /
    • pp.295-300
    • /
    • 2007
  • The Linux-based embedded systems such as mobile telephones. PDAs and MP3 players are widely in use. USB(Universal Serial Bus) is the interface for data communication between the computers and these peripheral devices. Some embedded systems like intelligent home networking and multimedia streaming require guaranteed QoS(Quality of Service), which is needed for real time transmission of UDP/IP messages through USB. Although USB Ethernet driver is supported by USB Gadget API in Linux, it is unable to provide the desirable QoS required by each type or small embedded systems due to the unpredictability or TCP/IP Stack in Linux. This paper proposes IP-Over-USB to improve QoS of UDP/IP message transmission in the embedded systems using USB in Linux system.

국가단위 인트라넷 구축방안에 관한 연구

  • Yoon, Seok-Min;Kim, Yu-Sin;Kang, Sung-Ho;Choi, Sung
    • Proceedings of the Technology Innovation Conference
    • /
    • 1997.07a
    • /
    • pp.307-329
    • /
    • 1997
  • Nowadays the whole World is overwhelmed by the wave of Information Technology. In particular, in this Information & Communication Era such advanced countries as United States, Germany, and France are now launching and preparing Government levels Information Technology Policy and Strategies in order to keep their information initiative and superiority. Ever since 1993 when the US government have been advocating m as well as NPR, the US is concentrating their all energies and efforts on the redeem of their former national competitiveness which was snatched up to Japan, meanwhile also Japanese government, who has announced NEW SOCIETY CAPITAL CONSTRUCTION PROGRAM in 1994 to be completed by 2010, is trying to do their whole national endeavors to enter into the highly enhanced information society. Recently also our Government enacted the LAW of INFORMATION TECHNOLOGY PROMOTE & EXPEDITE in 1995 then sequently in the next year announced its detailed enforcement regulations, targeting at one of the leading countries with highly advanced Information Technology. The concept of Internet which takes the concept of Internet into the inner side of the industries has been, since implemented in 1995, showing really the rapid growth and at the same time it is highlighted onto the next generations Information-network. The merits of Internet, representing as the affordable cost, continuous standardization, various functionalities of multimedia excellent expansibilities, easy interface is the most adequate choice as a newest method for our country that announce to be one of leading countries in the realization of Information Technology and expects immediate effect on the construction of Internet in the level of whole country. In an effort to construct the nations level of Internet by firstly the build-up and connection of each central and each local government level of internet, a few methods for nation levels internet build-up are here studied and described, while in the beginnings stage through both e-mails and internet home pages the nation level of internet can be established in stages. The construction of Internet in the level of the nation is not an issue of simple option but an essential and inevitable choice for the survival in 2000s and as well the jump-up and penetration onto the real advanced country in the New Era.

  • PDF

Development of a High Performance Web Server Using A Real-Time Compression Architecture (실시간 압축 전송 아키텍쳐를 이용한 고성능 웹 서버 구현)

  • 민병조;강명석;우천희;남의석;김학배
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.3
    • /
    • pp.345-354
    • /
    • 2004
  • In these days, such services are popularized as E-commerce, E-government, multimedia services, and home networking applications. Most web traffics generated contemporarily basically use the Hyper Text Transfer Protocol(HTTP). Unfortunately, the HTTP is improper for these applications that comprise significant components of the web traffics. In this paper, we introduce a real-time contents compression architecture that maximizes the web service performance as well as reduces the response time. This architecture is built into the linux kernel-based web accelerating module. It guarantees not only the freshness of compressed contents but also the minimum time delay using an server-state adaptive algorithm, which can determine whether the server sends the compressed message considering the consumption of server resources when heavy requests reach the web server Also, We minimize the CPU overhead of the web server by exclusively implementing the compression kernel-thread. The testing results validates that this architecture saves the bandwidth of the web server and that elapsed time improvement is dramatic.

  • PDF

Interactive Broadcasting Service using Smart-phone with Emotional Recognition (감정인식 기능의 스마트폰을 통한 양방향 방송서비스)

  • Cho, Myeon-Gyun
    • Journal of Satellite, Information and Communications
    • /
    • v.8 no.4
    • /
    • pp.117-123
    • /
    • 2013
  • The development of the latest emotional recognition and multimedia technology has changed the traditional broadcasting system. The previous broadcasting system, which was operated by the terrestrial broadcasters, is now transformed to the viewer-centered and bidirectional broadcasting through the convergence of internet, mobile and smart TV. In this paper, smart-phone application for estimating human emotion(sadness, anger, depression) has been developed and emerged with smart TV, thereby we can present broadcasting service for enhancing the sense of common humanity among people of same group. If there is friend in the depression, we can bring comfort to him by inviting one for TV program what I watch and having a honest talk with facial avatar or emoticon. The proposed emotional broadcasting service inter-working with smart-phone application can give feeling of belonging and happiness to the people suffering from the blues, and it can prevent him from attempting suicide. In addition, smart-phone based emotional broadcasting service can be expended to program recommendation service customized to user's emotion, emotional LED lighting service to maximize the sense of reality and home shopping service taking advantage of the mood of customer.