• Title/Summary/Keyword: 인터넷 이용용도

Search Result 81, Processing Time 0.023 seconds

A Study on the Development of Digital Contents for Land Estimation (토지평가 디지털컨텐츠 개발에 관한 연구)

  • Song Eun-Jee
    • Journal of Digital Contents Society
    • /
    • v.4 no.2
    • /
    • pp.147-155
    • /
    • 2003
  • The problem of the objective adequacy on land estimation has been seriously discussed with the Issue of paradigm conversion on land policy as the economy situation has been worse enough to be confused due to the sale price which could not be predicted in Korea. Especially as the data of the government land value is not recognized as the official one, the separate alternation has been adopted to calculate the value of land compensation or development allotment. Rather it has raised a question in argument that the system of the declared value does not accomplish its basic function properly on the contrary of the original purpose to unify the computation of the government land value. To reconsider the adequacy of government land value, the most crucial factor is to select the items of land estimation reasonably. In addition, it is urgently required to develop the system of digital contents to provide the data of land evaluation which most of people could trust, who are facing of the flood of information through internet.

  • PDF

Design of Tour Guide System using Bluetooth 4.0 and WiFi Sensor Technology (블루투스4.0과 WiFi 센서 기술을 이용한 관광안내 시스템 설계)

  • Kim, Hee-Sook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.10
    • /
    • pp.6888-6894
    • /
    • 2015
  • Bluetooth 4.0 is the most appropriate technology for Internet of Things, which can be used to enhance and expand the existing areas and areas with a variety of applications. In this paper, an example of the services of the Internet of Things, we developed a tour guide system using the Bluetooth 4.0 and WiFi sensor technology. iBeacon-based push service have been limited to iOS smart phone series, non-iOS family and lower version of iOS 6 smart phones can not receive push-based services. This paper proposed in iBeacon and WiFi sensor is more than tourists, while maintaining the existing system (non-iOS smartphone users) can provide the service to you. Service tourist information as well as that can provide the advertising associated with the service. With 10 kinds of smart phones used in Korea was the experiment on the MAC information collected. This experiment is to track the behaviour of tourists in history can provide customized services can be based. Tourist destinations as well as amusement parks, resorts, etc. If you want to apply this system in a crowded place for user behavior information-gathering feature views over the a prevention of a missing child features such as notifications, risk, prevention is possible for a variety of applications.

Development of Real-time Video Surveillance System Using the Intelligent Behavior Recognition Technique (지능형 행동인식 기술을 이용한 실시간 동영상 감시 시스템 개발)

  • Chang, Jae-Young;Hong, Sung-Mun;Son, Damy;Yoo, Hojin;Ahn, Hyoung-Woo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.2
    • /
    • pp.161-168
    • /
    • 2019
  • Recently, video equipments such as CCTV, which is spreading rapidly, is being used as a means to monitor and cope with abnormal situations in almost governments, companies, and households. However, in most cases, since recognizing the abnormal situation is carried out by the monitoring person, the immediate response is difficult and is used only for post-analysis. In this paper, we present the results of the development of video surveillance system that automatically recognizing the abnormal situations and sending such events to the smartphone immediately using the latest deep learning technology. The proposed system extracts skeletons from the human objects in real time using Openpose library and then recognizes the human behaviors automatically using deep learning technology. To this end, we reconstruct Openpose library, which developed in the Caffe framework, on Darknet framework to improve real-time processing. We also verified the performance improvement through experiments. The system to be introduced in this paper has accurate and fast behavioral recognition performance and scalability, so it is expected that it can be used for video surveillance systems for various applications.

Expert System-based Context Awareness for Edge Computing in IoT Environment (IoT 환경에서 Edge Computing을 위한 전문가 시스템 기반 상황 인식)

  • Song, Junseok;Lee, Byungjun;Kim, Kyung Tae;Youn, Hee Yong
    • Journal of Internet Computing and Services
    • /
    • v.18 no.2
    • /
    • pp.21-30
    • /
    • 2017
  • IoT(Internet of Things) can enable networking and computing using any devices is rapidly proliferated. In the existing IoT environment, bottlenecks and service delays can occur because it processes data and provides services to users using central processing based on Cloud. For this reason, Edge Computing processes data directly in IoT nodes and networks to provide the services to the users has attracted attention. Also, numerous researchers have been attracted to intelligent service efficiently based on Edge Computing. In this paper, expert system-based context awareness scheme for Edge Computing in IoT environment is proposed. The proposed scheme can provide customized services to the users using context awareness and process data in real-time using the expert system based on efficient cooperations of resource limited IoT nodes. The context awareness services can be modified by the users according to the usage purpose. The three service modes in the security system based on smart home are used to test the proposed scheme and the stability of the proposed scheme is proven by a comparison of the resource consumptions of the servers between the proposed scheme and the PC-based expert system.

Secure Certificates Duplication Method Among Multiple Devices Based on BLE and TCP (BLE 및 TCP 기반 다중 디바이스 간 안전한 인증서 복사 방법)

  • Jo, Sung-Hwan;Han, Gi-Tae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.2
    • /
    • pp.49-58
    • /
    • 2018
  • A certificate is a means to certify users by conducting the identification of the users, the prevention of forgery and alteration, and non-repudiation. Most people use an accredited certificate when they perform a task using online banking, and it is often used for the purpose of proving one's identity in issuing various certificates and making electronic payments in addition to online banking. At this time, the issued certificate exists in a file form on the disk, and it is possible to use the certificate issued in an existing device in a new device only if one copies it from the existing device. However, most certificate duplication methods are a method of duplication, entering an 8-16 digit verification code. This is inconvenient because one should enter the verification code and has a weakness that it is vulnerable to security issues. To solve this weakness, this study proposes a method for enhancing security certificate duplication in a multi-channel using TCP and BLE. The proposed method: 1) shares data can be mutually authenticated, using BLE Advertising data; and 2) encrypts the certificate with a symmetric key algorithm and delivers it after the certification of the device through an ECC-based electronic signature algorithm. As a result of the implementation of the proposed method in a mobile environment, it could defend against sniffing attacks, the area of security vulnerabilities in the existing methods and it was proven that it could increase security strength about $10^{41}$ times in an attempt of decoding through the method of substitution of brute force attack existing method.

Elimination of the Redundant Sensor Data using the Mobile Agent Middleware (이동 에이전트 미들웨어를 이용한 중복 센서 데이터 제거)

  • Lee, Jeong-Su;Lee, Yon-Sik
    • Journal of Internet Computing and Services
    • /
    • v.12 no.3
    • /
    • pp.27-36
    • /
    • 2011
  • The sensor nodes of sensor network system are capable of wireless communication with sink nodes. They also acquire and transmit sensor data in broad region where people cannot access easily. However, the transmission of redundant data from sensor nodes reduces the lifetime of the entire system and substantial amount of resulted data needs to be resorted before implementing them to the specific applications. In this paper, the mobile agent middleware to eliminate the redundant sensor data is designed and implemented. In the proposed system, the mobile agent visits the destination sensor nodes according to the migration list offered by the meta table in the name space of the naming agent, eliminates the redundant sensor data corresponding to user condition, and acquires and transmits sensor data according to the purpose and needs. Thus, the excess transmission of the sensor data is avoided and the lifetime of the entire system can be extended. Moreover, the experiments using the mobile agent middleware with the conditions and limitations that are possible in real situation ore done to verify the successful elimination of the redundant sensor data and the efficiency of the data acquisition. Also, we show the potential applicability of the mobile agent middleware in various active sensor networks through the active rule based mobile agent middleware or the interaction with the active rule system.

Adaptive VM Allocation and Migration Approach using Fuzzy Classification and Dynamic Threshold (퍼지 분류 및 동적 임계 값을 사용한 적응형 VM 할당 및 마이그레이션 방식)

  • Mateo, John Cristopher A.;Lee, Jaewan
    • Journal of Internet Computing and Services
    • /
    • v.18 no.4
    • /
    • pp.51-59
    • /
    • 2017
  • With the growth of Cloud computing, it is important to consider resource management techniques to minimize the overall costs of management. In cloud environments, each host's utilization and virtual machine's request based on user preferences are dynamic in nature. To solve this problem, efficient allocation method of virtual machines to hosts where the classification of virtual machines and hosts is undetermined should be studied. In reducing the number of active hosts to reduce energy consumption, thresholds can be implemented to migrate VMs to other hosts. By using Fuzzy logic in classifying resource requests of virtual machines and resource utilization of hosts, we proposed an adaptive VM allocation and migration approach. The allocation strategy classifies the VMs according to their resource request, then assigns it to the host with the lowest resource utilization. In migrating VMs from overutilized hosts, the resource utilization of each host was used to create an upper threshold. In selecting candidate VMs for migration, virtual machines that contributed to the high resource utilization in the host were chosen to be migrated. We evaluated our work through simulations and results show that our approach was significantly better compared to other VM allocation and Migration strategies.

Proposal for Safety Management of Formwork Construction Using IT Technology (IT 기술을 이용한 거푸집 동바리공사 안전관리 제안)

  • Jeon, Kyong-Deck;Shin, Seung-Jung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.6
    • /
    • pp.93-99
    • /
    • 2020
  • In terms of construction work, the construction cost is lower than the importance of the construction, and since it is demolished after the completion of the construction, it is treated as a relatively small proportion compared to other construction types. Construction engineers who actually worked on the site talk about the safety of the construction work as the most important work of the various processes to ensure the quality and safety of the construction work. However, it is also true that safety management is difficult for temporary construction because various types of temporary materials are installed at various sites at the same time as construction progresses, and the main construction is carried out using them. Safety accidents in construction work are not much different even if they are carried out in temporary construction. The importance and safety of construction work cannot be neglected in view of the recent trend of large-scale construction, multi-purpose, excavation of large-scale underground spaces, and construction trends that are changing to skyscrapers. The purpose of this research is to secure the safety of Dongbar among the temporary materials used in construction work by using IT convergence technology, and to propose safety management to prevent safety accidents in the construction work.

Implementation of Urinalysis Service Application based on MobileNetV3 (MobileNetV3 기반 요검사 서비스 어플리케이션 구현)

  • Gi-Jo Park;Seung-Hwan Choi;Kyung-Seok Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.4
    • /
    • pp.41-46
    • /
    • 2023
  • Human urine is a process of excreting waste products in the blood, and it is easy to collect and contains various substances. Urinalysis is used to check for diseases, health conditions, and urinary tract infections. There are three methods of urinalysis: physical property test, chemical test, and microscopic test, and chemical test results can be easily confirmed using urine test strips. A variety of items can be tested on the urine test strip, through which various diseases can be identified. Recently, with the spread of smart phones, research on reading urine test strips using smart phones is being conducted. There is a method of detecting and reading the color change of a urine test strip using a smartphone. This method uses the RGB values and the color difference formula to discriminate. However, there is a problem in that accuracy is lowered due to various environmental factors. This paper applies a deep learning model to solve this problem. In particular, color discrimination of a urine test strip is improved in a smartphone using a lightweight CNN (Convolutional Neural Networks) model. CNN is a useful model for image recognition and pattern finding, and a lightweight version is also available. Through this, it is possible to operate a deep learning model on a smartphone and extract accurate urine test results. Urine test strips were taken in various environments to prepare deep learning model training images, and a urine test service application was designed using MobileNet V3.

A Study on the Use of ICT for Students' Active Class Participation: Focused on College English Reading Class (학생들의 능동적 수업참여를 위한 ICT 활용 연구 - 대학 영어 읽기 수업을 중심으로)

  • Choi, Mi-Yang
    • Journal of Digital Convergence
    • /
    • v.15 no.10
    • /
    • pp.419-428
    • /
    • 2017
  • This study investigates whether the use of smartphone and Facebook in the classroom induces students' active participation in their reading activities and what are the points to be considered when ICT-based English reading class is designed. Students in an English course, Practical English listening and reading, did their reading activities using their own smartphones and posted the results of the activities on Facebook. Smartphone was used primarily for web-browsing and Facebook as LMS. The pre-questionnaire was conducted to be referred to for designing activity tasks. The post-questionnaire and the interview with 10 students were conducted to identify how students perceive their class. The research results showed that the use of ICT induced students' active participation in their learning. As for the points to be considered, narrowing down the range of class activities, slowing down the pace of the class, explaining enough the goals and the steps of the activities, considering adopting campus LMS, and preparing solutions for cyberloafing were suggested.