• Title/Summary/Keyword: 유비쿼터스 사회

Search Result 446, Processing Time 0.022 seconds

WSN Safety Monitoring using RSSI-based Ranging Technique in a Construction Site (무선센서 네트워크를 이용한 건설현장 안전관리 모니터링 시스템)

  • Jang, Won-Suk;Shin, Do Hyoung
    • Journal of Korean Society of societal Security
    • /
    • v.2 no.2
    • /
    • pp.49-54
    • /
    • 2009
  • High incident of accidents in construction jobsite became a social problem. According to the International Labour Organization (ILO), more than 60,000 fatal accidents occur each year in construction workplace worldwide. This number of accidents accounts for about 17 percent of all fatal workplace accidents. Especially, accidents from struck-by and falls comprise of over 60 percent of construction fatalities. This paper introduces a prototype of a received signal strength index (RSSI)-based safety monitoring to mitigate the potential accidents caused by falls and struck-by. Correlation between signal strength and noise index is examined to create the distance profile between a transmitter and a receiver. Throughout the distributed sensor nodes attached on potential hazardous objects, the proposed prototype envisions that construction workers with a tracker-tag can identify and monitor their current working environment in construction workplace, and early warning system can reduce the incidents of fatal accident in construction job site.

  • PDF

A Study on the Acceptance Factors of Healthcare Information Services Converged with Cognitive Computing (인지 컴퓨팅 융합 헬스케어 정보서비스 수용요인에 관한 연구)

  • Pae, Young-Woo;Bong, Jin-Sook;Min, Wonki;Shin, Yongtae
    • Journal of KIISE
    • /
    • v.42 no.6
    • /
    • pp.734-747
    • /
    • 2015
  • The aging population and the advancement of science and technology are transforming the healthcare industry to focus on health management for the prevention of diseases. The U-health and remote healthcare services have not yet achieved the social agreement in the nation; however, these have been extensively used in the global scale. The innovation of user experience through cognitive computing are expected to increase the health effects of consumers, by converging with healthcare information services. This study suggests the conceptual model of healthcare information service converged with cognitive computing. Then, the acceptance factors for consumers have been investigated. For this purpose, reliability and validity analysis have been conducted using an online survey. The path analysis was performed to verify the hypotheses and moderating effect based upon the gender, by using structural equation modeling.

Development of the High Efficient 2-axis Step Motion Control System using NI PXI-7352 (NI PXI-7352를 활용한 PC 기반의 고성능 2축 스텝 모션 제어시스템 개발)

  • Lee, Un-Seon;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.2
    • /
    • pp.179-184
    • /
    • 2010
  • The automatic control and motion control technology including the sensor network technology are important in the ubiquitous environment to make human life easy. In the industrial site and living environment, the demand for the motion control technology and position control technology which are faster and more precise is increasing. Especially, demand for the PC based motion control system is mounting in order to keep up with the improved GUI environment and ever-changing industrial site. This research is focused to develop the Highly Efficient 2-axis Step Motion Control System which can be variously applied in the industrial site on the basis of the LabVIEW - graphic code programming language - with user interface, using the NI PXI-7352 controller and the NI step motor in which it provides the high reliability and the precise motion control.

The data transmission of the of u-lD sensor networks configuration with a Bluetooth (Bluetooth를 이용한 u-lD센서네트워크 구성에서의 데이터 전송)

  • Kim Young-kil;Park Ji-hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.2
    • /
    • pp.242-246
    • /
    • 2005
  • RFID(Radio Frequency Identification) which is emerging from a change in digital convergence paradigm and recently rapidly advancing throughout the overall society is the core technology based on Ubiquitous network. In other words, This is a technology to identify the information of the object and recognize the situation by attaching electrical tag to an object and using Reader that can read the information of the object. With the emergence of the technology, it has turned the existing maintenance of the product into the network and intelligence of the product control by using the bar cord to maintain the product and will lead a revolution throughout overall society by affecting the fields of distribution and product maintenance as well as those of medicines, chemicals and food which the electrical tag can be attached to. his paper shows that utilizing the Bluetooth which is a local wireless telecommunication in the standalone imbedded system can implement the piconet configuration among the Readers and the data telecommunication with the main server.

A Study on Treatment Way of a Malicious Code to injected in Windows System File (Windows 시스템 파일에 기생하는 악성코드의 치료 방법 연구)

  • Park, Hee-Hwan;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.255-262
    • /
    • 2006
  • A Malicious code is used to SMiShing disguised as finance mobile Vishing, using Phishing, Pharming mail, VoIP service etc. to capture of personal information. A Malicious code deletes in Anti-Virus Spyware removal programs. or to cure use. By the way, the Malicious cord which is parasitic as use a DLL Injection technique, and operate are Isass.exe, winlogon.exe. csrss.exe of the window operating system. Be connected to the process that you shall be certainly performed of an exe back, and a treatment does not work. A user forces voluntarily a process, and rebooting occurs, or a blue screen occurs, and Compulsory end, operating system everyone does. Propose a treatment way like a bird curing a bad voice code to use a DLL Injection technique to occur in these fatal results. Click KILL DLL since insert voluntarily an end function to Thread for a new treatment, and Injection did again the Thread which finish an action of DLL, and an end function has as control Thread, and delete. The cornerstone that the treatment way that experimented on at these papers and a plan to solve will become a researcher or the revolutionary dimension that faced of a computer virus, and strengthen economic financial company meeting Ubiquitous Security will become.

  • PDF

An Implementation of Mobile Medical Reservation System using Geographic Information Service (지리정보 서비스를 이용한 모바일 진료예약 시스템의 구현)

  • Rho, Kyung-Taeg;Kim, Young-Hoon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.173-178
    • /
    • 2010
  • Recently, Technical innovation has been implemented in a broad variety of industry fields to reach an ubiquitous society, with the object of popularizing u-Hospital, the mobile technology with no restriction to the place tends to be used positively in Health care fields. The existing mobile medical reservation system has the problem of not making good use of location information of users due to the interface based on text in the existing web pages. This paper proposes an mobile medical reservation system using geographic information service to solve the problems of current reservation system by using RIA(Rich Internet Application) technology applicable to Web 2.0 environment. Our proposed system also does the all required processes in a few page view, gets the differentiated service from the existing system by allowing efficient data exchange using XML, and expects the improvement of user friendliness by flexible user interface.

A Study on the Internet and Smart-Phone Addiction Diagnosis's Comparison through internet usage pattern of College Students (대학생의 인터넷 이용패턴을 통한 인터넷과 스마트폰 중독진단에 관한 비교연구)

  • Kim, Hee-Jae
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.3
    • /
    • pp.1-10
    • /
    • 2014
  • Smartphone addiction and internet addiction cause a serious negative social problem due to the spread of the new media which is combined with the ubiquitous function. To evaluate the degree of Internet addiction and smartphone addiction of college students in the nearby areas, K-scale of internet addiction self-diagnosis scale and S-scale of smartphone addiction self-diagnosis scale for Korean adults were applied. This study aims to develop the survey questions, which get the basic internet patterns and access the web site, and to find the hidden addicts that is not found by general K-scale and S-scale using computers and smartphones. The result shows that a method of addiction diagnosis using the tolerance degree which is calculated by smart phone's internet main activities and using time(anticipated and real time) apart from K-scale and S-scale. So hidden internet and smartphone addicts could be found through the SPSS statistical analysis program.

  • PDF

Improvement Plan of Quality Control for 3D Geospatial Database (3차원 국토공간정보 품질관리 개선방안에 관한 연구)

  • Seo, Chang-Wan;Choi, Yun-Soo;Kim, Jae-Myeong;Kim, Young-Hak;Kim, Young-Gil
    • Spatial Information Research
    • /
    • v.17 no.2
    • /
    • pp.231-241
    • /
    • 2009
  • Recently, The importance of a quality control for implementing 3D geospatial database has being emphasized to build a 21st century knowledge society and an ubiquitous land. The improvement of 3D geospatial database quality control through establishing an integrated quality control makes data suppliers update data efficiently and users get high quality data. The purpose of this study was to derive the improvement plan of 3D geospatial database quality control through the analyses of the existing 3D geospatial database quality control and case studies. The results of this study are as follows. Firstly, we defined the concept of 3D geospatial database quality control. Secondly, we set the boundary, factors and process of 3D geospatial database quality control through classifying it in detail. Lastly, we drew improvement contents such as the quality control checklist by implementation process according to the improvement plan of 3D geospatial database implementation.

  • PDF

Link Budget and Performance Analysis of UWB Transmission Method for Off-body HDR Communication in WBAN System (WBAN에서 신체 외 고속통신을 위한 UWB 전송 방식의 링크버짓 및 성능 분석)

  • Choi, Nack-Hyun;Hwang, Jae-Ho;Jang, Sung-Jeen;Kim, Jae-Moung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.1
    • /
    • pp.53-64
    • /
    • 2009
  • For a realization of the ubiquitous society, applying IT to vehicle industry has recently been an attractive issue to make wireless communication in body area network possible to everywhere. In this paper, we propose the physical layer symbol structure based on PPM scheme of the IEEE 802.15.4a for the off-body high data rate WBAN system. We propose four symbol structures which is classified according to the number of the chip and whether the channel coding is used or not. We calculate the required SNR through the link budget calculation and the recently proposed off-body WBAN channel environment was applied in the simulation. The results of four systems show that small number of burst's chip enhances the performance and the system is capable to achieve the data rate of 10 Mbps.

  • PDF

Secure Knowledge Management for Prevent illegal data leakage by Internal users (내부 사용자에 의한 불법 데이터 유출 방지를 위한 안전한 지식관리 시스템)

  • Seo, Dae-Hee;Baek, Jang-Mi;Lee, Min-Kyung;Yoon, Mi-Yeon;Cho, Dong-Sub
    • Journal of Internet Computing and Services
    • /
    • v.11 no.2
    • /
    • pp.73-84
    • /
    • 2010
  • Rapid development of Internet has increased users' desire for more information, and as a result, it created 'deluge of information', generating so much information. Especially, profit-pursuing corporations have done a lot of research to secure its own technological power. However, damages caused by illegal copy of information by illegal outside users or insiders are coming to the fore as social problem. Therefore, this paper is to propose secure knowledge management system to prevent illegal copy of data by insiders. The proposed scheme is a secure knowledge management system that carries out explicit authentication for internal users using 2MAC and provides data based on the authentication, thereby preventing illegal copy of data by insiders.