• Title/Summary/Keyword: 개인추적

Search Result 387, Processing Time 0.024 seconds

DEVELOPMENT OF REAL-TIME PRECISE POSITIONING ALGORITHM USING GPS L1 CARRIER PHASE DATA (GPS L1 반송파 위상을 이용한 실시각 정밀측위 알고리즘 구현)

  • 조정호;최병규;박종욱;박관동;임형철;박필호
    • Journal of Astronomy and Space Sciences
    • /
    • v.19 no.4
    • /
    • pp.377-384
    • /
    • 2002
  • We have developed Real-time Phase DAta processor(RPDAP) for GPS L1 carrie. And also, we tested the RPDAP's positioning accuracy compared with results of real time kinematic(RTK) positioning. While quality of the conventional L1 RTK positioning highly depend on receiving condition, the RPDAP can gives more stable positioning result because of different set of common GPS satellites, which searched by elevation mask angle and signal strength. In this paper, we demonstrated characteristics of the RPDAP compared with the L1 RTK technique. And we discussed several improvement ways to apply the RPDAP to precise real-time positioning using low-cost GPS receiver. With correcting the discussed weak points in new future, the RPDAP will be used in the field of precise real-time application, such as precise car navigation and precise personal location services.

Development of Safety Devices for Marine Leisure (해양레저 안전장비 개발)

  • Ku Ja-Young;Yim Jeong-Bin;Lee Je-Eung;Nam Taek-Keun;Jeong Joong-Sik;Park Seong-Hyeon;Yang Weon-Jae;Ahn Yeong-Sub
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2006.06b
    • /
    • pp.241-246
    • /
    • 2006
  • This paper describes two kinds of personal hand-held electronic devices to support marine leisure safety. The one is Radar response-type safety device triggering by the pulse signal from a commercial 9GHz-band Radar to provide quick search and rescue with combined civilian-government-military fleets. The other one is M-RFID (Marine Radio Frequency IDentification) based safety electronic device using 900MHz Tx/Rx with spread spectrum frequency hopping and GPS. Through the field tests at sea using Korea Coast Guard's warship the operating performances are verified. Further plan for practical use of each device was also discussed.

  • PDF

Study on RFID tag Design and Privacy Protection (RFID tag 설계 및 프라이버시 보호에 관한 연구)

  • Baek, Hyun-Ok;Cho, Tae-Kyung;Yoo, Hyun-Joong;Park, Byoung-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.1
    • /
    • pp.41-49
    • /
    • 2007
  • RFID in which subminiature IC chip with the indentified information is built a core technique that can recognize, trace and manage various information of an object using radio frequency in the age of Ubiquitous. Several pressing matters about an infringement of Privacy and a security of private information should be settled as soon as possible because an information of specific circumstance can be collected and used without any awareness by others as well as a private information. In addition, various algorithms with high level of security, which is normally used in wire, can be hardly applied to RFID tag because of a lot of restrictions of tag. In this report, designed-RFID tag based on the standard of ISO/IEC 18000-6 and the problems which originated from the technical procedure of that design were analyzed, and the algorithm which could be applied to the designed-tag was also investigated.

  • PDF

Duration of Abstinence after Discharge from Alcoholism Inpatient Treatment - Comparing Voluntarily vs. Involuntarily Admitted Patients - (알코올중독자의 입원동의 여부에 따른 퇴원후 단주기간에 관한 연구)

  • Rhee, Chaie-Won
    • Korean Journal of Social Welfare Studies
    • /
    • no.39
    • /
    • pp.57-81
    • /
    • 2008
  • Motivation has been identified as an important factor predicting long-term outcomes of alcohol abuse treatment. Whether a patient agreed on his/her inpatient treatment at time of hospitalization could be an indicator of their motivation for treatment. This study focused on this aspect of treatment motivation and examined whether this factor predicts post-discharge abstinence. A sample of 145 individuals who were hospitalized for alcohol abuse treatment participated in the baseline data collection, of which only 66 successfully completed the 8 month follow-up telephone interview. The findings of survival analysis suggest that voluntarily admitted individuals had significantly longer duration of post-discharge abstinence compared to their counterparts. A Cox proportional hazards regression model revealed that voluntary admission and family support were significant predictors for post-discharge relapse of drinking, after controlling for the effects of marital status, living alone, and working status. Implications for social work practice are discussed.

The Changes of Welfare and Labor Market Status of Participants of Self-sufficiency Support Program in Korea (자활사업 참여자의 수급 지위와 노동시장 지위 변동)

  • Baek, Hakyoung;Cho, Sungeun
    • Korean Journal of Social Welfare Studies
    • /
    • v.43 no.1
    • /
    • pp.143-178
    • /
    • 2012
  • This study analyzed the changes of welfare and labor market status of participants of Self-sufficiency Support Program in Korea thorough of analysis follow-up data which were collected about the experiences and changes of participants of the program in Gyeonggi province in 2005. As the results, many of participants exited from the program within five years, and hardly anyone depends on the welfare or the program, also there is very little the revolving door phenomenon. Whatever, the program have positive effects the changes of welfare and labor market status of them. Also, self-sufficiency communities, the small enterprises are started by more two participants and aim the economic independence of them and contribution to social economy have played important role for their persistent work and economic self-reliance. The people exited from the program, however, hardly succeed in exit from the welfare and their economic conditions still are not good. Therefore, we have to arrange the program for the participants' self-sufficiency, and we rather have to effort to secure their economic well-being than emphasize the immediately employment or establishment a business.

A Study on the Islamic Libraries in the Middle Ages (중세 이슬람 도서관 연구)

  • Yoon, Hee-Yoon
    • Journal of Korean Library and Information Science Society
    • /
    • v.50 no.3
    • /
    • pp.1-22
    • /
    • 2019
  • Western society has depreciated the Middle Ages as the 'Darkness'. However, if Islam, which led the medieval millennium, had not spread paper and art of papermaking, and Arabic translations to the Western countries, translating and interpreting Arabic manuscripts into Greek and Latin, Gutenberg's printing press, Reformation, and Renaissance could not take place. They were not destructors of ancient knowledge and civilization, but were the protagonists of restoration and resurrection. The base camp is the Mosque and Islamic library(the House of Wisdom), which was referred to as a Muslim community. This study traced Islamic libraries that emerged in the process of establishing the Islamic dynasties and controlling Arabian Peninsula, Africa, Iberian Peninsula. For this purpose, the Islamic library was divided into the caliph library led by the royal families, the public library attached to the mosques, and the private library established by the viziers and scholars, etc. Then, the researcher analyzed history and development, roles and functions, impact and Importance on human civilization, and stagnation and decline, focusing on major libraries that existed in the Islamic cities of Damascus, Mecca, Baghdad, Aleppo, Cordoba, Cairo, Fes, Tunis, etc.

Current State and Limit of Mobile-Based Mental Health Intervention Using Information & Communication Technology (정보통신기술(Information & Communication Technology)을활용한 모바일 기반 정신건강개입의 현황과 한계)

  • Lee, Sang Min;Kim, Seung-Jun;Im, Woo-Young;Paik, Jong-Woo
    • Korean Journal of Psychosomatic Medicine
    • /
    • v.24 no.1
    • /
    • pp.61-65
    • /
    • 2016
  • Currently, a variety of Information and Communication Technology(ICT) is being broadly utilized for mental health. Especially, mobile application is one of the effective ICT, and several applications have been developed after the spread of smartphones. The mobile-based mental health has several strengths, such as better treatment accessibility and easier check-ups of symptoms or daily activities by real-time monitoring. Better follow-ups of treatment course, more customized feedback and better transportability enable patients to be more adherent. However, there are some limitations of mobile technology about the mental health, such as technical troubles of electric errors, data safety problems and personal information extrusion. Therefore, full considerations should be given during the development and provision of the technology. Most of all, mental health specialists should actively participate in the development process by incorporation of evidence-based experiences and assurance of good clinical qualities.

Adolescents' Gaming Disorder Study and Parenting Attitude : Based on the Escape Theory (부모양육태도와 청소년 게임과몰입 연구 : 도피이론을 중심으로)

  • Lee, Daeyoung;Jeoung, Euijun
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.9 no.8
    • /
    • pp.199-208
    • /
    • 2019
  • The escape theory is the theory of problem behavior such as suicide. The purpose of this study is to investigate the causes of gaming disorder, which has been attracting attention as a typical youth problem, through escape theory. Suicide theory is a process in which the problem triggered by the negative external environment flows into internal attribution and self-criticism, and this leads to a process leading to problematic behavior with disgust self-awareness. This process was applied to the environment, psychology, and behavior of adolescents. As a result, the lack of affection and consistency of the parents resulted in negative external environment, which affected the self-esteem of children by creating a negative external environment. And low self-esteem caused negative emotions, lowered self control, and confirmed to induce game addiction. The results of this analysis show that game addiction has a structure similar to obsessive behaviors such as binge eating and shopping addiction explained through the escape theory model and it is necessary to concentrate more on the environmental psychological factors for game addiction research.

Convergence Technologies by a Long-term Case Study on Telepresence Robot-assisted Learning (텔레프리젠스 로봇보조학습 사례 연구를 통한 융합기술)

  • Lim, Mi-Suk;Han, Jeong-Hye
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.7
    • /
    • pp.106-113
    • /
    • 2019
  • The purpose of this paper is aimed to derive suggestions for convergence technology for effective management of distance education by analyzing a long-term case. The experiment was designed with notebook, smartphone or tablet based robot controlled by a remote instructor and a learner, who have experience of distance learning including robot assisted learning. The tablet based robot has the display system of feedback to speakers. During five months, three types of experiments were conducted randomly and a participant was interviewed thoroughly. The result, like the previous research, demonstrates that the task performance of the learner in telepresence robot-assisted learning was better than that in the notebook, and smartphone based. However, it is believed to be necessary to adjust the system for eye-contact and voice transmission for the remote instructor. The instructor required an additional sight by supplementing an extra camera and automatic direction control to source of sound.

A Secure RFID Search Protocol Protecting Mobile Reader's Privacy Without On-line Server (온라인 서버가 없는 환경에서 이동형 리더의 프라이버시를 보호하는 안전한 RFID 검색 프로토콜)

  • Lim, Ji-Wwan;Oh, Hee-Kuck;Kim, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.73-90
    • /
    • 2010
  • Recently, Tan et al. introduced a serverless search protocol in which a mobile reader maintains a tag authentication list and authenticates a tag using the list without connecting authentication server. A serverless RFID system is different from general RFID systems which use on-line server models. In the serverless RFID system, since the mobility of a personalized reader must be considered, we have to protect not only the privacy of a tag but also the privacy of a mobile reader. In this paper, we define new security requirements for serverless RFID search system and propose a secure serverless RFID search system. In our system, since tag authentication information maintained by a reader is updated in every session, we can provide the backward untraceability of a mobile reader. Also we use an encrypted timestamp to block a replay attack which is major weakness of search protocols. In addition, we define a new adversary model to analyze a serverless RFID search system and prove the security of our proposed system using the model.