• Title/Summary/Keyword: 사용자 편의와 안전

Search Result 236, Processing Time 0.029 seconds

Fishberry: A Remote Fishbowl Management System (원격 어항 관리 시스템)

  • Shin, Je-Woo;Cha, Hae-Wun;Kim, Byeong-Gab;Kong, Ki-sok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.6
    • /
    • pp.95-102
    • /
    • 2019
  • As the number of fish keepers increases, fishbowl-related convenience products are on the rise. Existing products are not welcomed by consumers because of their lack of functions or high price. In this paper, we deal with a system that remotely controls sensors and motors of fish bowl based on Raspberry Pi and Arduino. In Android applications, you can use the following functions. firstly, feeding. Second, water changing. Third, it measures, visualizes temperature and pH values including alert function. Through the several experiments, it was verified that the system can be quickly accessed from the outside, and when it is appropriate to change water. This system allows the user to keep the fish more comfortable and safe.

The Study on a Security Safeguard Plan for SCADA Infrastructure (SCADA 시설에 대한 보안강화 방안에 관한 연구)

  • Chung, Yoon-Jung
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.153-160
    • /
    • 2006
  • The control system is accomplishing very important role in our life currently as the national critical Infrastructure and large scale industry plant. We manage SCADA system to manage generally the control system interconnected with the information system. The operating system of SCADA is changing also to the well-known OS like Windows or UNIX for offer various convenience and facility to the user. We offered the reason why such change of the system makes so that it is exposed to cyber terror. In the traditional SCADA system is managed safely by an isolated network system physically. It is the trend to increase gradually though a cyber terror possibility is thinner on a control system than a information system but the cyber terror gives a nation or community wide damage influence of large scale if it happens. Therefore this paper presents a security safeguard plan about SCADA system and helps prepare systematic security strategy and enhance the security level implement.

  • PDF

[ $C^{\ast}$ ]-integral Based Life Assessment of High Temperature Pipes ($C^{\ast}$-적분에 기초한 고온배관 수명평가)

  • Lee Hyungyil
    • Journal of the Korean Institute of Gas
    • /
    • v.4 no.4 s.12
    • /
    • pp.25-33
    • /
    • 2000
  • In recent years, the subject of remaining life assessment has drawn considerable attention in power plants, where various structural components typically operate at high temperature and pressure. Thus a life prediction methodology accounting for high temperature creep fracture is increasingly needed for the components. Critical defects in such structures are generally found in the form of semi-elliptical surface crack, and the analysis of which is consequently an important problem in engineering fracture mechanics. On this background, we first develop an auto mesh generation program for detailed 3-D finite element analyses of axial and circumferential semi-elliptical surface cracks in a piping system. A high temperature creep fracture parameter $C^{\ast}$-integral is obtained from the finite element analyses of generated 3-D models. Post crack growth module is further appended here to calculate the amount of crack growth. Finally the remaining lives of surface cracked pipes for various analytical parameters are assessed using the developed life assessment program.

  • PDF

Design and Implementation of a Diagnostic System for MOST Network using Wireless LAN (무선 랜을 이용한 MOST 네트워크 진단 시스템의 설계 및 구현)

  • Jang, Si-Woong;Kim, Kyeoung-Jin;Jeon, Young-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.8
    • /
    • pp.1695-1703
    • /
    • 2011
  • According to increase of the number of electronic devices for user comfort and safety, electronic systems are being constructed by using network to effectively control the devices. In this paper, we design and implement the MOST network diagnostic system by using wireless LAN to diagnose MOST network and the devices connected by the network and to effectively manage them. MOST, which is a vehicle multimedia network standard for the next generation, is being used for construction of car infotainment systems, and enables to develop various devices which are required for them. The wireless diagnostic system implemented in this paper enables to self-diagnose MOST network and also to check errors by diagnosing status of MOST electronic devices. We also can check and manage status of a in-vehicle MOST network system using mobile devices based on wireless LAN.

A Survey Analysis of Internet of Things Security Issues and Combined Service

  • Kim, HyunHo;Lee, HoonJae;Lee, YoungSil
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.8
    • /
    • pp.73-79
    • /
    • 2020
  • Since the start of the 4th industrial revolution, technologies have been developed in the Internet of Things (IoT), artificial intelligence (AI), virtual reality (VR), and 5G. Compared to other technologies IoT is currently being commercialized more than other technologies where the numbers of connected things are increases every year. The IoT has a huge advantage to provide convenience and lots of information to users, but security cannot keep up with the speed of development. IoT services continue to provide services for related devices, but at present, more and more types of new services are being combined with other technologies by utilizing the services of devices. This paper reviews and analyzes research on security issues and services related to the Internet of Things to explore how security trends and service delivery will develop in the future.

Subway Congestion Prediction and Recommendation System using Big Data Analysis (빅데이터 분석을 이용한 지하철 혼잡도 예측 및 추천시스템)

  • Kim, Jin-su
    • Journal of Digital Convergence
    • /
    • v.14 no.11
    • /
    • pp.289-295
    • /
    • 2016
  • Subway is a future-oriented means of transportation that can be safely and quickly mass transport many passengers than buses and taxis. Congestion growth due to the increase of the metro users is one of the factors that hinder citizens' rights to comfortably use the subway. Accordingly, congestion prediction in the subway is one of the ways to maximize the use of passenger convenience and comfort. In this paper, we monitor the level of congestion in real time via the existing congestion on the metro using multiple regression analysis and big data processing, as well as their departure station and arrival station information More information about the transfer stations offer a personalized congestion prediction system. The accuracy of the predicted congestion shows about 81% accuracy, which is compared to the real congestion. In this paper, the proposed prediction and recommendation application will be a help to prediction of subway congestion and user convenience.

Study on Face recognition algorithm using the eye detection (눈 검출을 이용한 얼굴인식 알고리즘에 관한 연구)

  • Park, Byung-Joon;Kim, Ki-young;Kim, Sun-jib
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.6
    • /
    • pp.491-496
    • /
    • 2015
  • Cloud computing has emerged with promise to decrease the cost of server additional cost and expanding the data storage and ease for computer resource sharing and apply the new technologies. However, Cloud computing also raises many new security concerns due to the new structure of the cloud service models. Therefore, the secure user authentication is required when the user is using cloud computing. This paper, we propose the enhanced AdaBoost algorithm for access cloud security zone. The AdaBoost algorithm despite the disadvantage of not detect a face inclined at least 20, is widely used because of speed and responsibility. In the experimental results confirm that a face inclined at least 20 degrees tilted face was recognized. Using the FEI Face Database that can be used in research to obtain a result of 98% success rate of the algorithm perform. The 2% failed rate is due to eye detection error which is the people wearing glasses in the picture.

The Researches in the Present State of Applying Smart Device in Vehicle and Implementing Bi-Directional Mirroring Services (Smart Device 차량 도입 현황 및 양방향 Mirroring 구현에 관한 연구)

  • Park, Hwa-Beom;Lee, Jean;Kim, Young-kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.127-130
    • /
    • 2017
  • The information and communication technology that is being developed recently has been greatly influencing the automobile market. In recent years, devices equipped with IT technology have been installed for the safety and convenience of the driver. It is necessary to develop a system that can link the Smartphone with the vehicle in accordance with these changes. In this paper, first of all we analyze the car connectivity services that served by the other competitors. In addition, we proposed and implemented the improved system that can support and control most of smart device application in vehicle by user's NEEDS. We also implemented the application that can restrict the applications which unsatisfied the drive regulations and designed and proposed the scenario that can apply our company's car connectivity system in future.

  • PDF

Privacy-Preserving Aggregation of IoT Data with Distributed Differential Privacy

  • Lim, Jong-Hyun;Kim, Jong-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.6
    • /
    • pp.65-72
    • /
    • 2020
  • Today, the Internet of Things is used in many places, including homes, industrial sites, and hospitals, to give us convenience. Many services generate new value through real-time data collection, storage and analysis as devices are connected to the network. Many of these fields are creating services and applications that utilize sensors and communication functions within IoT devices. However, since everything can be hacked, it causes a huge privacy threat to users who provide data. For example, a variety of sensitive information, such as personal information, lifestyle patters and the existence of diseases, will be leaked if data generated by smarwatches are abused. Development of IoT must be accompanied by the development of security. Recently, Differential Privacy(DP) was adopted to privacy-preserving data processing. So we propose the method that can aggregate health data safely on smartwatch platform, based on DP.

An Analysis of the Research Trend on Smart Mobility : Topic Modeling Approach (스마트 모빌리티 연구 동향에 관한 분석 : 토픽 모델링의 적용)

  • Park, Jungtae;Kim, Choongyoung;Kim, Taejong
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.2
    • /
    • pp.85-100
    • /
    • 2022
  • Recently, with the widespread expansion of convergence based on digital connectivity, the transportation and mobility fields are rapidly changing, and research related to this is also diversifying. This study aims to analyze the research trends in the mobility field and identify key research areas and topics. Topic modeling analysis has been proved as a useful approach for analyzing the research trends. The abstracts of 142 research papers concerning mobility from the Korean academic citation index were analyzed, derived 9 research topics and linked to 6 key elements of research framework. The result showed that 'Advanced vehicle and transportaion technology' and 'Linkage and integrated services among means for mobility' were most actively studied research fields. It also found that research on insurance, law, regulation for securing user's safety and conflict-resolving with the existing industry has been conducted.