• Title/Summary/Keyword: Campus Information

Search Result 893, Processing Time 0.025 seconds

A Prototype for Real-time Indoor Evacuation Simulation System using Indoor IR Sensor Information (적외선 센서정보기반 실시간 실내 대피시뮬레이션 시스템 프로토타입)

  • Nam, Hyun-Woo;Kwak, Su-Yeong;Jun, Chul-Min
    • Spatial Information Research
    • /
    • v.20 no.2
    • /
    • pp.155-164
    • /
    • 2012
  • Indoor fire simulators have been used to analyse building safety in the events of emergency evacuation. These applications are primarily focused on simulating evacuation behaviors for the purpose of checking building structural problems in normal time rather than in real time situations. Therefore, they have limitations in handling real-time evacuation events with the following reasons. First, the existing models mostly experiment the artificial situations using randomly generated evacuees while real world requires actual data. Second, they take too long time in operation to generate real time data. Third, they do not produce optimal results to be used in rescueing or evacuation guidance. In order to solve these limitations, we suggest a method to build an evacuation simulation system that can be used in real-world emergency situations. The system performs numerous simulations in advance according to varying distributions of occupants. Then the resulting data are stored in DBMS. The actual person data captured in infrared sensor network are compared with the simulation data in DBMS and the querried data most closely is provided to the user. The developed system is tested using a campus building and the suggested processes are illustrated.

Caregiver Burden of Patients with Dementia and Day Care Center of Small Size Model within a Zone of Life (치매환자 부양자부담과 생활권 내 소규모 주·야간 돌봄 서비스 모델)

  • Na, Seung-kwon;Park, Eun-Ju
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.4
    • /
    • pp.428-438
    • /
    • 2016
  • The aim of this study, in order to reduce the support burden of dementia primary caregiver, within the framework of long-term care insurance system to present its founding model for the development of new services. Previous research as analytical materials and based on the CARE study between 2012 to 2013. Primary caregiver burden of patient are both physical, psychological and economic aspects as well as difficulties in many aspects and had influence on many factors such as age, care burden, economic, health, and social support. It also came high-risk primary caregiver suffer from depression. This primary caregiver to take advantage of the elderly long-term care insurance system implemented at the time of the institutional support necessary for since 2008, presented additional services in this study. Of increasing the small sizes day care center (tentative name) to open an as established in the settlements at a scale of less than nine, within 5 minutes from the residence, limited dementia by expertise in the disease home care services scale model of the current system service It was to improve the quality of existing shares, small group sizes for day care centers and community life apart.

Security Threats and Potential Security Requirements in 5G Non-Public Networks for Industrial Applications

  • Park, Tae-Keun;Park, Jong-Geun;Kim, Keewon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.11
    • /
    • pp.105-114
    • /
    • 2020
  • In this paper, we address security issues in 5G non-public networks for industrial applications. In contrast to public networks that offer mobile network services to the general public, 5G non-public networks provide 5G network services to a clearly defined user organization or groups of organizations, and they are deployed on the organization's defined premises, such as a campus or a factory. The main goal of this paper is to derive security threats and potential security requirements in the case that 5G non-public networks are built for discrete and process industries according to the four deployment models of 5G-ACIA (5G Alliance for Connected Industries and Automation). In order to clarify the scope of this paper, we express the security toolbox to be applied to 5G non-public networks in the form of the defense in depth concept. Security issues related to general 5G mobile communication services are not within the scope of this paper. We then derive the security issues to consider when applying the 5G-ACIA deployment models to the industrial domain. The security issues are divided into three categories, and they are described in the order of overview, security threats, and potential security requirements.

Design of Tour Guide System using Bluetooth 4.0 and WiFi Sensor Technology (블루투스4.0과 WiFi 센서 기술을 이용한 관광안내 시스템 설계)

  • Kim, Hee-Sook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.10
    • /
    • pp.6888-6894
    • /
    • 2015
  • Bluetooth 4.0 is the most appropriate technology for Internet of Things, which can be used to enhance and expand the existing areas and areas with a variety of applications. In this paper, an example of the services of the Internet of Things, we developed a tour guide system using the Bluetooth 4.0 and WiFi sensor technology. iBeacon-based push service have been limited to iOS smart phone series, non-iOS family and lower version of iOS 6 smart phones can not receive push-based services. This paper proposed in iBeacon and WiFi sensor is more than tourists, while maintaining the existing system (non-iOS smartphone users) can provide the service to you. Service tourist information as well as that can provide the advertising associated with the service. With 10 kinds of smart phones used in Korea was the experiment on the MAC information collected. This experiment is to track the behaviour of tourists in history can provide customized services can be based. Tourist destinations as well as amusement parks, resorts, etc. If you want to apply this system in a crowded place for user behavior information-gathering feature views over the a prevention of a missing child features such as notifications, risk, prevention is possible for a variety of applications.

A Study on the Management Improvement of an Academic Library Using Customer Relationship Management (CRM 기법을 이용한 대학도서관 경영개선에 관한 연구)

  • Park, Il-Jong;Yoo, Kyeong-Jong
    • Journal of the Korean Society for information Management
    • /
    • v.36 no.2
    • /
    • pp.31-56
    • /
    • 2019
  • The user satisfaction and needs of an academic library were caught through a questionnaire survey in this study. The aim of this study is to draw up the CRM based plan for meeting user needs on the study. The users' demographic information, library resources & their use, homepage, services, and facilities/environment of the library were categorized in the questionnaire and analyzed for this study. The major conclusions of this study are: (1) The library resources use was the highest, and its facilities/environment was the lowest in the user satisfaction study. It also revealed that there are much necessities for the quick acquisition and dissemination of the requested material to the library users, and for the inter-library loan (ILL) services among campuses for the subscription books in the library resources use study, too; (2) There are a lot of necessities for the improvement of OPAC retrieval and the subscription books system, and menu rearrangement in the library homepage; (3) There are a lot of necessities for the plans of more frequent library event, more detailed event guidance, and more reinforcement of public relations such as SMS, push services of SDI etc. in the library user services; and (4) There are a lot of necessities for the improved policies to the complaints of library users such as the lack of common study place and lockers, air conditioning and heating problem, complaints about facilities management of restroom (lack of toilet paper), library accessibility on campus, unauthorized user management etc. in the facilities/environment of the library.

Accuracy Analysis for Slope Movement Characterization by comparing the Data from Real-time Measurement Device and 3D Model Value with Drone based Photogrammetry (도로비탈면 상시계측 실측치와 드론 사진측량에 의한 3D 모델값의 정확도 비교분석)

  • CHO, Han-Kwang;CHANG, Ki-Tae;HONG, Seong-Jin;HONG, Goo-Pyo;KIM, Sang-Hwan;KWON, Se-Ho
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.23 no.4
    • /
    • pp.234-252
    • /
    • 2020
  • This paper is to verify the effectiveness of 'Hybrid Disaster Management Strategy' that integrates 'RTM(Real-time Monitoring) based On-line' and 'UAV based Off-line' system. For landslide prone area where sensors were installed, the conventional way of risk management so far has entirely relied on RTM data collected from the field through the instrumentation devices. But it's not enough due to the limitation of'Pin-point sensor'which tend to provide with only the localized information where sensors have stayed fixed. It lacks, therefore, the whole picture to be grasped. In this paper, utilizing 'Digital Photogrammetry Software Pix4D', the possibility of inference for the deformation of ungauged area has been reviewed. For this purpose, actual measurement data from RTM were compared with the estimated value from 3D point cloud outcome by UAV, and the consequent results has shown very accurate in terms of RMSE.

A Study on the Perception of Foreign Undergraduates on Online Lecture

  • Kim, Yoon-Hee;Lim, Eun-jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.9
    • /
    • pp.203-212
    • /
    • 2020
  • The purpose of this study is to analyze the perception of non-face-to-face online undergraduate lectures experienced by foreign learners, to identify problems of online lectures, and to suggest improvements. For this study, the perception of online lectures was investigated and analyzed by foreign undergraduate students who took online lectures at A and B universities. Through this, I explored the design direction, complementary measures, and direction of online lectures to be held at Korean universities in the future. As a result of this study, non-real-time lectures through E campus were recognized as advantages in that they could learn repeatedly and listen to lectures at home., Real-time lectures using Zoom were recognized as an advantage of being able to communicate between professors and learners. Both types of online lectures had many tasks and had difficulty in focusing on the lecture until the end. In the future, it was found that the amount of lecture contents and the amount of tasks should be reduced and the condition and sound quality of the lecture image should be improved. As for the evaluation method, they preferred online evaluation rather than offline evaluation, and they preferred relative evaluation rather than absolute evaluation. The results of this study were able to closely understand how learners perceive online lectures. Also, when conducting online lectures, I was able to know the points that need to be improved in the future. The results of this study are expected to contribute to the design direction of online lectures and the development of online contents at each university.

Modeling and Analysis of Wireless Lan Traffic (무선 랜 트래픽의 분석과 모델링)

  • Yamkhin, Dashdorj;Lee, Seong-Jin;Won, You-Jip
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.8B
    • /
    • pp.667-680
    • /
    • 2008
  • In this work, we present the results of our empirical study on 802.11 wireless LAN network traffic. We collect the packet trace from existing campus wireless LAN infra-structure. We analyzed four different data sets: aggregate traffic, upstream traffic, downstream traffic, tcp only packet trace from aggregate traffic. We analyze the time series aspect of underlying traffic (byte count process and packet count process), marginal distribution of time series, and packet size distribution. We found that in all four data sets there exist long-range dependent property in byte count and packet count process. Inter-arrival distribution is well fitted with Pareto distribution. Upstream traffic, i.e. from the user to Internet, exhibits significant difference in its packet size distribution from the rests. Average packet size of upstream traffic is 151.7 byte while average packet size of the rest of the data sets are all greater than 260 bytes. Packets with full data payloads constitutes 3% and 10% in upstream traffic and the downstream traffic, respectively. Despite the significant difference in packet size distribution, all four data sets have similar Hurst values. The Hurst alone does not properly explain the stochastic characteristics of the underlying traffic. We model the underlying traffic using fractional-ARIMA (FARIMA) and fractional Gaussian Noise (FGN). While the fractional Gaussian Noise based method is computationally more efficient, FARIMA exhibits superior performance in accurately modeling the underlying traffic.

A study on building evacuation simulation using Floor Field Model (Floor Field Model을 이용한 건축물의 대피시뮬레이션에 대한 연구)

  • Nam, Hyunwoo;Kwak, Suyeong;Jun, Chulmin
    • Journal of the Korea Society for Simulation
    • /
    • v.25 no.2
    • /
    • pp.1-11
    • /
    • 2016
  • The floor field model (hereafter referred to as FFM) is a cellular automata (hereafter referred to as CA)-based walk model used to model pedestrian behavior. Existing studies on FFM conducted experiments with simple structures (that have one room or one obstacle in a room) or relatively complicated structures (that have many rooms). In order to apply the FFM to real buildings, it is necessary to have additional methodologies to process information about the number of rooms, floors, stairs, and exit doors. In particular, it is necessary to process exit doors during this procedure. Exit doors that are recognized by pedestrians are of many types such as exit doors in rooms, stairs connected to corridors, and exit doors in a building. When calculating the static floor field (hereafter referred to as SFF) in the FFM, information about exit doors is needed and simulation results will be different depending on how the SFF is calculated using an exit door among the above-mentioned exit doors. In this study, an XML-format building data model is proposed according to data structures required by the FFM. This study also defines a methodology to process a number of exit doors. Accordingly, this study developed a building data construction and evacuation simulator and simulation experiments were conducted with university campus building.

Emerging P2P Traffic Analysis and Modeling (P2P 트래픽의 특성 분석과 트래픽 모델링)

  • 주성돈;이채우
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.2B
    • /
    • pp.279-288
    • /
    • 2004
  • Rapidly emerging P2P(Peer to Peer) applications generate very bursty traffic, which gives a lot of burden to network, and the amount of such traffic is increasing rapidly. Thus it is becoming more important to understand the characteristics of such traffic and reflect it when we design and analyze the network. To do that we measured the traffic in a campus network and present flow statistics and traffic models of the measured traffic, and compare them with those of the web traffic. The results indicate that P2P traffic is much burstier than web traffic and as a result it negatively affects network performance. We modeled P2P traffic using self-similar traffic model to predict packet delay and loss occurred in network which are very important to evaluate network performance. We also predict queue length distribution and loss probability in SSQ(Single Sewer Queue). To assess accuracy of traffic model, we compare the SSQ statistics of traffic models with that of the traffic trace. The results show that self-similar traffic models we use can predict P2P traffic behavior in network precisely. It is expected that the traffic models we derived can be used when we design network capacity and predict network performance and QoS of the P2P applications.