• Title/Summary/Keyword: 통신권

Search Result 1,430, Processing Time 0.025 seconds

Compressed Sensing Based Low Power Data Transmission Systems in Mobile Sensor Networks (모바일 센서 네트워크에서 압축 센싱을 이용한 저전력 데이터 전송 시스템)

  • Hong, Jiyeon;Kwon, Jungmin;Kwon, Minhae;Park, Hyunggon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.11
    • /
    • pp.1589-1597
    • /
    • 2016
  • In this paper, we propose a system in a large-scale environment, such as desert and ocean, that can reduce the overall transmission power consumption in mobile sensor network. It is known that the transmission power consumption in wireless sensor network is proportional to the square of transmission distance. Therefore, if the locations of mobile sensors are far from the sink node, the power consumption required for data transmission increases, leading to shortened operating time of the sensors. Hence, in this paper, we propose a system that can reduce the power consumption by allowing to transmit data only if the transmission range of the sensors is within a predetermined distance. Moreover, the energy efficiency of the overall sensor network can even be improved by reducing the number of data transmissions at the sink node to gateway based on compressed sensing. The proposed system is actually implemented using Arduino and Raspberry Pi and it is confirmed that source data can be approximately decoded even when the gateway received encoded data fewer than the required number of data from the sink node. The performance of the proposed system is analyzed in theory.

Model Proposal for Detection Method of Cyber Attack using SIEM (SIEM을 이용한 침해사고 탐지방법 모델 제안)

  • Um, Jin-Guk;Kwon, Hun-Yeong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.43-54
    • /
    • 2016
  • The occurrence of cyber crime is on the rise every year, and the security control center, which should play a crucial role in monitoring and early response against the cyber attacks targeting various information systems, its importance has increased accordingly. Every endeavors to prevent cyber attacks is being attempted by information security personnel of government and financial sector's security control center, threat response Center, cyber terror response center, Cert Team, SOC(Security Operator Center) and else. The ordinary method to monitor cyber attacks consists of utilizing the security system or the network security device. It is anticipated, however, to be insufficient since this is simply one dimensional way of monitoring them based on signatures. There has been considerable improvement of the security control system and researchers also have conducted a number of studies on monitoring methods to prevent threats to security. In accordance with the environment changes from ESM to SIEM, the security control system is able to be provided with more input data as well as generate the correlation analysis which integrates the processed data, by extraction and parsing, into the potential scenarios of attack or threat. This article shows case studies how to detect the threat to security in effective ways, from the initial phase of the security control system to current SIEM circumstances. Furthermore, scenarios based security control systems rather than simple monitoring is introduced, and finally methods of producing the correlation analysis and its verification methods are presented. It is expected that this result contributes to the development of cyber attack monitoring system in other security centers.

Caregiver Burden of Patients with Dementia and Day Care Center of Small Size Model within a Zone of Life (치매환자 부양자부담과 생활권 내 소규모 주·야간 돌봄 서비스 모델)

  • Na, Seung-kwon;Park, Eun-Ju
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.4
    • /
    • pp.428-438
    • /
    • 2016
  • The aim of this study, in order to reduce the support burden of dementia primary caregiver, within the framework of long-term care insurance system to present its founding model for the development of new services. Previous research as analytical materials and based on the CARE study between 2012 to 2013. Primary caregiver burden of patient are both physical, psychological and economic aspects as well as difficulties in many aspects and had influence on many factors such as age, care burden, economic, health, and social support. It also came high-risk primary caregiver suffer from depression. This primary caregiver to take advantage of the elderly long-term care insurance system implemented at the time of the institutional support necessary for since 2008, presented additional services in this study. Of increasing the small sizes day care center (tentative name) to open an as established in the settlements at a scale of less than nine, within 5 minutes from the residence, limited dementia by expertise in the disease home care services scale model of the current system service It was to improve the quality of existing shares, small group sizes for day care centers and community life apart.

A Study of System Architecture for Intelligent Responsive Space (지능형 반응 공간 기술 개발을 위한 시스템 아키텍처)

  • Yeom, Ki-Won;Lee, Joong-Ho;Lee, Seung-Soo;Eom, Ju-Il;Park, Joon-Koo;Kim, Rae-Hyeon;Jo, Hyeon-Cheol;Kim, Geon-Hui;Gwon, Mi-Su;Yu, Ho-Yeon;Son, Yeong-Tae;Pyo, Jeong-Guk;Kim, Tea-Su;Park, Myeon-Ung;Park, Se-Hyeong;Ha, Seong-Do;Park, Ji-Hyung
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02c
    • /
    • pp.854-858
    • /
    • 2006
  • 디지털화의 가속, 고속 통신 인프라의 확대 등으로 전자, 정보 통신 기기들이 단일 네트워크로 연결되어 영상 및 음향 정보를 서로 공유할 수 있으며, 생활 공간 내에서 실생활의 질 향상을 위한 지능적 정보 서비스와 자연스럽고 편한 내추럴 인터페이스 기술에 의한 지능형 반응 정보 서비스 공간 기술이 중요한 이슈로 등장하고 있다. 본 연구에서는 지능형 반응 공간의 물리적 객체로서 학교, 연구 기관 및 회사 등의 회의실을 선정한다. 그리고, 이를 대상으로 회의 참여자들이 자연스럽고 편리하게 의견 교환, 관련 자료 및 정보 처리를 할 수 있는 시스템 구축을 위한 아키텍처에 대하여 논의한다. 본 연구에서 제안하는 시스템 아키텍처는 회의와 관련된 문서나 회의 내용 등의 정보를 실감 가시화 노드로 추상화되고 메타 정보화함으로써 전체 회의 내용의 파악과 회의 정보에 대한 체계적이고 논리적인 관리를 가능하게 한다. 또한 여러 사람의 공동 작업을 필요로 하는 정보 또는 문서에 대한 동시 편집 기능과 자연스러운 동작에 의한 데이터 조작을 지원하는 실감 워크벤치 및 워크스크린 기술, 정보 핸들링의 다양성과 조작의 편리성을 위한 실감 아이콘에 의하여 자연스럽고 편리한 회의를 가능하게 한다. 그리고, 이러한 요소 기술들이 에이전트에 의해 회의 프로세스 및 요소 기술들의 시스템적 통합을 가능하게 한다.

  • PDF

A Study on Practice of Protective Actions for Medical Information - A comparison between hospital administrators and occupational therapists - (의료정보 보호행동 실천에 관한 연구 - 병원행정관리자와 작업치료사를 비교 -)

  • Kweon, Eun-Ha
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.12
    • /
    • pp.1959-1970
    • /
    • 2013
  • Attempts were made in this paper to compare the practice of protective actions for information of patients' medical treatment between hospital administrators who do not make direct contact with patients and occupational therapists who usually do. The comparison between jobs in charge showed that occupational therapists did not practice much protective actions for information of patients' medical treatment ($3.52{\pm}.809$) compared to hospital administrators ($3.92{\pm}.724$), even though the former had received regular education about protection, management and supervision of patients' medical information more often ($3.17{\pm}1.129$) than the latter ($3.16{\pm}1.037$). In spite of the fact that occupational therapists were exposed frequently to the danger of revealing medical information in the process of their job performance through talks and communications with patients, they displayed relatively little concern for and awareness of keeping information of medical treatment from being leaked by them. It is thus suggested to promote awareness of medical staff to protect medical information by means of flexible educational system for each occupational group, periodical monitoring, continuing public relation, training and quality control for protection of medical information, as well as routine self-examination of such practice.

A study on the graphology in Korean based on relationship with personality types (한글에 대한 필적분석과 성격유형과의 관계성에 대한 연구)

  • Han, Sang-Deog;Han, Seung-Hee;Jeong, Yang-Kwon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.5
    • /
    • pp.703-711
    • /
    • 2013
  • The effort for identifying personal information for example one's personality, based on one's handwriting has been continued in foreign countries, however, there is no research on the graphology for Korean in Korea. In the area of handwriting analysis, of course, they have made attempts to identifying people depended on expert's individual ability or judgment. For these reasons, the academic approach is needed for the graphology for Korean. In this thesis, we performed the frequency analysis, test of difference, cross tabulation analysis, factor analysis, correlation analysis, regression analysis and logistic regression analysis by using the data on the test of personality diagnosis based on 5 factors method and writing habits such as the size and slope of letters for 339 adults. It can be shown that the 5 factors method has high consistency and reliability, so we accept these 5 factors as the personalities. In cross tabulation analysis, it is found that there is significant relationship between sex and the size of letters, hometown and the margin, job and habit. The correlations between 5 factors are very high and we can find the useful relationships between 5 factors and writing habit through regression analysis and correlation analysis. It is difficult and impossible to compare the Graphology between English and Korean because there are various interpretations and structures of Korean that is much different from those of English. But it is very important to try to test and analyze the Graphology in Korean to found the basic theories at the present stage when there is no research on the graphology for Korean.

The Security Risk and Countermeasures of Blockchain based Virtual Currency Trading (블록체인 기반 가상화폐 거래의 보안 위험 및 대응방안)

  • Chung, Young-Seek;Cha, Jae-Sang
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.1
    • /
    • pp.100-106
    • /
    • 2018
  • Since the concept of virtual currency called Bitcoin was announced in 2008, the blockchain technology, which is the basis of Bitcoin, is attracting attention as an important platform technology in the era of the 4th industrial revolution that can change our society in the future. Although Existing electronic financial transactions store and manage all transaction history at a reliable central organization such as government and bank, blockchain-based electronic financial transactions are composed of a distributed structure in which all participants participating in the transaction store and manage the transaction history, it is possible to secure transaction transparency while reducing system construction and operation costs. Besides the virtual currency that started with bit coins, the technology of these blockchains has been extended in various fields such as smart contracts and document management. The key technology area of this blockchain is security based on proven cryptographic technology to make it difficult to forge and hack, but there are security risks such as security vulnerabilities in the virtual currency trading service, We will discuss security risks in using virtual currency and discuss countermeasures. Especially security accidents of virtual currency exchanges are occurring frequently recently, the damage of users who trade the virtual currency is also increasing, we propose security threats and security countermeasures against virtual currency exchanges.

Development of Device Measuring Real-time Air Flow in Greenhouse (온실 공기유동 계측 시스템 개발)

  • Noh, Jae Seung;Kwon, Jinkyoung;Kim, Yu Yong
    • Journal of Bio-Environment Control
    • /
    • v.27 no.1
    • /
    • pp.20-26
    • /
    • 2018
  • This study was conducted to develop a device for measuring the air flow by space variation through monitoring program, which acquires data by each point from each environmental sensor located in the greenhouse. The distribution of environmental factors(air temperature, humidity, wind speed, etc.) in the greenhouse is arranged at 12 points according to the spatial variation and a large number of measurement points (36 points in total) on the X, Y and Z axes were selected. Considering data loss and various greenhouse conditions, a bit rate was at 125kbit/s at low speed, so that the number of sensors can be expanded to 90 within greenhouse with dimensions of 100m by 100m. Those system programmed using MATLAB and LabVIEW was conducted to measure distributions of the air flow along the greenhouse in real time. It was also visualized interpolated the spatial distribution in the greenhouse. In order to verify the accuracy of CFD modeling and to improve the accuracy, it will compare the environmental variation such as air temperature, humidity, wind speed and $CO_2$ concentration in the greenhouse.

A Study of Structural Changes in the Seoul Metropolitan Area's Economy Since the 1990's : A Decomposition Analysis of Labor Productivity (1990년대 이후 수도권 경제의 구조적 변화에 관한 연구 : 노동생산성의 요소분해를 중심으로)

  • Jeong, Jun-Ho
    • Journal of the Korean association of regional geographers
    • /
    • v.11 no.1
    • /
    • pp.83-100
    • /
    • 2005
  • The Seoul Metropolitan Area's economy has undergone structural changes since the 1990s. With recent structural changes in the Korean economy in mind, this paper employs a decomposition analysis of Gross Regional Domestic Product per head and labor productivity to examine how the region's economic performance has changed relative to that of Korea since the 1900s. There are some findings. First, a strong cumulative causation process, derived from industrial linkages and agglomeration effects, has oocurred in the Seoul Metropolitan Area, widening economic disparities between the Seoul Metropolitan Area and the other regions especially since the Korean financial crisis in 1997 mainly due to Gyeonggi province's overwhelming cumulative GRDP growth relative to the national average. Second, the Seoul Metropolitan Area has begun w display good economic performance in terms of labour productivity relative w the national average since the late 1990s, with the region's industrial upgrading being implemented. Finally, manufacturing, financial intermediation and communications have made sensitive contributions to relative Seoul Metropolitan Area's labor productivity growth.

  • PDF

A Study on Anti-collision Algorithm in Gen2 Protocol Based RFID Systems (Gen2기반 RFID시스템에서의 충돌방지 알고리즘에 관한 연구)

  • Quan Cheng-Hao;Mo Hee-Sook;Choi Gil-Young;Pyo Cheol-Sig;Chae Jong-Suk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.6B
    • /
    • pp.561-571
    • /
    • 2006
  • RFID technology, as one contact-less identification technology with using electronic tag, is the field where its multiple researches have been studied. Especially, in the field of supply chain management, when it is necessary to identify a lot of objects by real-time, performance of anti-collision algorithm for multiple tag identification has an effect on performance of entire system. GEN2 is global, open, interoperability protocol for UHF RFID system, the active researches and developments are processed about it. In this paper, we introduce an anti-collision algorithm based on Slotted-ALOHA for GEN2 protocol, focus on estimating number of tags and setting number of slots and review the previous works. We propose new scheme that can estimate number of tags efficiently, and define system efficiency newly when it's used in setting number of slots. We also present result of compare and analysis with previous scheme through simulation. The proposed scheme of estimating number of tags is easy to implement, number of tags which is less than 4 times of number of slots can estimate tags efficiently, we also proved that identification efficiency based on weighted-slot distinguished with definition of previous slot efficiency can improve system efficiency.