• Title/Summary/Keyword: Connected home

Search Result 355, Processing Time 0.032 seconds

Time use of Employed Wives and the Influencing Factors on it. (취업주부의 시간사용과 영향요인)

  • 한경미
    • Journal of Families and Better Life
    • /
    • v.9 no.2
    • /
    • pp.171-190
    • /
    • 1991
  • This study focused on time use and the influencing factors of employed wives. Its aims are specified as follows.:1) to figure out the tendency of time use spent on a holiday and weekday by employed wives ; (2) to find out factors influencing the amount of time in each domain spent on each day. The samples were composed for 396 employed wives living in Seoul and Kwangju city who had the eldest child less than 18years old. were sampled based on their work kind, work status, and residential quarter. The results are as follows; 1) Employed wives spend 423 minutes a weekday, and 513 minutes a holiday on the sleep and 522 minutes(weekday ), 618 minutes (holiday) on the total Physiological time 599 minutes (weekday), 72 minutes(holiday) were devoted to the employed time. compared to 214 minutes. 395 minutes for the housework Finally 103 minutes and 349 minutes were assigned to leisure time. Compared with the research results in Japan and the United States, this shows large difference. Korean wives; work time is excessively too long while the time for leisure and psysiological time is too short, which means the life style of Korean wives ti too simple and monotonous. 2) Social demographic variables(such as work status, education, income, wive's relative income rate, family type. family number, the younger child's age, and etc. )and variables connected with employment (such as employed work time and employment motivation) significantly differentiate the time use. A wive with higher education, employment status, and income level, spends more time for the psysiological , leisure time, and manegerial housework time, while spending less time for work and physical housework.

  • PDF

Improved authentication mechanism of the RADIUS protocol in the Internet of Things (사물인터넷 환경에서 RADIUS 프로토콜의 향상된 인증기법)

  • Kim, Young-Se;Han, Keun-hee;Kim, Kee-cheon
    • Journal of Internet of Things and Convergence
    • /
    • v.2 no.1
    • /
    • pp.1-6
    • /
    • 2016
  • The IOT environment, people connected to the network, object, everything such as space (Things) generates data in real time. The information between the object collecting, sharing, are utilized. Currently health care, research in various fields such as smart home has been promoted. Also appeared concepts emphasized all things(IOE) Internet connection between the geographic space and the Internet. Human, while important connections between the objects, such as objects, studies of efficient and secure authentication technologies have been developed. In this paper, we propose a RADIUS (Remote Authentication Dial In User Service) protocol for improved mutual authentication between each object in the IOT environment.

Design and FPGA Implementation of the Scalar Multiplier for a CryptoProcessor based on ECC(Elliptic Curve Cryptographics) (ECC(Elliptic Curve Crptographics) 기반의 보안프로세서를 위한 스칼라 곱셈기의 FPGA 구현)

  • Choi, Seon-Jun;Hwang, Jeong-Tae;Kim, Young-Chul
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.1071-1074
    • /
    • 2005
  • The ECC(Elliptic Curve Cryptogrphics), one of the representative Public Key encryption algorithms, is used in Digital Signature, Encryption, Decryption and Key exchange etc. The key operation of an Elliptic curve cryptosystem is a scalar multiplication, hence the design of a scalar multiplier is the core of this paper. Although an Integer operation is computed in infinite field, the scalar multiplication is computed in finite field through adding points on Elliptic curve. In this paper, we implemented scalar multiplier in Elliptic curve based on the finite field $GF(2^{163})$. And we verified it on the Embedded digital system using Xilinx FPGA connected to an EISC MCU(Agent 2000). If my design is made as a chip, the performance of scalar multiplier applied to Samsung $0.35\;{\mu}m$ Phantom Cell Library is expected to process at the rate of 8kbps and satisfy to make up an encryption processor for the Embedded digital information home system.

  • PDF

A Study on the Ontology-Based Context Aware System for MBAN (MBAN(Medical Body Area Network)에서의 온톨로지 기반 상황인지 시스템 개발에 관한 연구)

  • Wang, Jong Soo;Lee, Dong Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.1
    • /
    • pp.19-29
    • /
    • 2011
  • The u-Healthcare system, a new paradigm, provides healthcare and medical service anytime, anywhere in daily life using wired and wireless networks. It only doesn't reach u-Hospital at home, to manage efficient personal health in fitness space, it is essential to feedback process through measuring and analyzing a personal vital signs. MBAN(Medical Body Area Network) is a core of this technology. MBAN, a new paradigm of the u-Healthcare system, can provide healthcare and medical service anytime, anywhere on real time in daily life using u-sensor networks. In this paper, an ontology-based context-awareness in MBAN proposed system development methodology. Accordingly, ontology-based context awareness system on MBAN to Elderly/severe patients/aged/, with measured respiratory rate/temperature/pulse and vital signs having small variables through u-sensor network in real-time, discovered abnormal signs and emergency situations which may happen to people at sleep or activity, alarmed and connected with members of a family or medical emergency alarm(Emergency Call) and 119 system to avoid sudden accidents for early detection. Therefore, We have proposed that accuracy of biological signal sensing and the confidence of ontology should be inspected.

Teleoperation System of a Mobile Robot over the Internet (인터넷을 이용한 이동로봇의 원격 운용 시스템)

  • Park, Taehyun;Gang, Geun-Taek;Lee, Wonchang
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.8 no.3
    • /
    • pp.270-274
    • /
    • 2002
  • This paper presents a teleoperation system that combines computer network and an autonomous mobile robot. We control remotely an autonomous mobile robot with vision over the Internet to guide it under unknown environments in the real time. The main feature of this system is that local operators need a web browser and a computer connected to the communication network and so they can command the robot in a remote location through the home page. The hardware architecture of this system consists of an autonomous mobile robot, workstation, and local computers. The software architecture of this system includes the client part for the user interface and robot control as well as the server part for communication between users and robot. The server and client systems are developed using Java language which is suitable to internet application and supports multi-platform. Furthermore. this system offers an image compression method using JPEG concept which reduces large time delay that occurs in network during image transmission.

Machine-to-Machine (M2M) Communications in Vehicular Networks

  • Booysen, M.J.;Gilmore, J.S.;Zeadally, S.;Rooyen, G.J. Van
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.529-546
    • /
    • 2012
  • To address the need for autonomous control of remote and distributed mobile systems, Machine-to-Machine (M2M) communications are rapidly gaining attention from both academia and industry. M2M communications have recently been deployed in smart grid, home networking, health care, and vehicular networking environments. This paper focuses on M2M communications in the vehicular networking context and investigates areas where M2M principles can improve vehicular networking. Since connected vehicles are essentially a network of machines that are communicating, preferably autonomously, vehicular networks can benefit a lot from M2M communications support. The M2M paradigm enhances vehicular networking by supporting large-scale deployment of devices, cross-platform networking, autonomous monitoring and control, visualization of the system and measurements, and security. We also present some of the challenges that still need to be addressed to fully enable M2M support in the vehicular networking environment. Of these, component standardization and data security management are considered to be the most significant challenges.

A Treatment for Intractable Pain (악성동통(惡性疼痛) 치료(治療)를 위(爲)한 경막외(硬膜外) 터널 카데터 거치법(据置法))

  • Jeon, Jae-Kyu;Chung, Jung-Kil;Chung, Sang-Bum
    • The Korean Journal of Pain
    • /
    • v.1 no.1
    • /
    • pp.59-63
    • /
    • 1988
  • Recently, epidural tunnelling was introduced for the convenience of keeping a catheter inserted for a long period of time. We had 15 cases in which used epidural tunnelling for the treatment of intractable pain mainly in terminal cancer patients. Epidural puncture with cannulation was carried out in the same technique as used for epidural anesthesia. After the subcutaneous epidural tunnelling was done from the site of the epidural entry to the anterior chest, just under the slim using a tunnelling device, the catheter was threaded through the tunnelling needle at the site of the outlet, was fixed and the tip of the catheter was connected to a filter. Five ml (2 mg) of saline diluted morphine can be given at home as needed when intractable pawn occurs. This long-term treatment of intractable pain by morphine injections through the epidural cannula place by subcutaneous tunnelling, is very convenient for the patient's daily routine and a better alternative in such a situation. Our technique, its advantages and problems were described in this paper.

  • PDF

A Study on the Forms Of Japanese Trousers (일본 바지형제 고찰)

  • Kim In Sook
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.14 no.1 s.33
    • /
    • pp.55-67
    • /
    • 1990
  • This is a review on the longitudinal transformation of the Japanese trousers, which is prepared as a pre-study for the comparative analysis of the forms of Korean and Japanese folk trousers. The special traits of the Japanese trousers are found to be as follows: 1) The Japanese trousers seem to have their root in the Northern-Asian or Schithian culture. 2) While the ancient forms of Japanese trousers, esp., those of the 8C before include the same types as Korean folk trousers, the Medieval and Recent era trousers quite differ and transform themselves into the unique Japanese type. 3) All Japanese trousers can largely be classified into formal and functional trousers. Formal trousers play important role as one of the ceremonial wardrobe and are treated rather as an outermost-wear than as an inner-wear. 4) The formal trousers have skirt-like features with much fullness as are presented in many deep pleats, long crotch lines and long sashes connected to the belt; the femine trousers even omit crotch line. 5) The principal forms of Japanese trousers consist of I, $\wedge,\;\wedge$; the $\lambda$ form of Korean and Chinese type had never existed. 6) Varieties of the composite type of Japanese-Western style appear among the trousers of recent time.

  • PDF

HoneyThing: A New Honeypot Design for CPE Devices

  • Erdem, Omer;Pektas, Abdurrahman;Kara, Mehmet
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4512-4526
    • /
    • 2018
  • The Internet of Things (IoT) has become an emerging industry that is broadly used in many fields from industrial and agricultural manufacturing to home automation and hospitality industry. Because of the sheer number of connected devices transmitting valuable data, the IoT infrastructures have become a main target for cyber-criminals. One of the key challenges in protecting IoT devices is the lack of security measures by design. Although there are many hardware and software based security solutions (firewalls, honeypots, IPDS, anti-virus etc.) for information systems, most of these solutions cannot be applied to IoT devices because of the fact that IoT devices have limited computing resources (CPU, RAM,). In this paper, we propose a honeypot system called HoneyThing for modem/router devices (i.e. a kind of IoT device). HoneyThing emulates TR-069 protocol which is prevalent protocol used to remotely manage customer-premises equipment (CPE) devices, e.g. modems, routers. Honeything also serves an embedded web server simulating a few actual, critical vulnerabilities associated with the implementation of TR-069 protocol. To show effectiveness of the HoneyThing in capturing real world attacks, we have deployed it in the Internet. The obtained results are highly promising and facilitate to reveal network attacks targeting to CPE devices.

Effects of Family Characteristics and Life-Styles on Children's Emotional Problems: The Second Grade Elementary Students (가족특성과 생활습관이 아동의 정서문제에 미치는 영향: 초등 2학년 아동을 중심으로)

  • Kang, Su Kyoung;Kim, Yeoun Jung
    • Human Ecology Research
    • /
    • v.51 no.4
    • /
    • pp.371-382
    • /
    • 2013
  • The purpose of this study is to investigate children's emotional problems (attention problem, aggression, somatic symptom, social withdrawal, depression) and to examine the relationship between children's emotional problems with family characteristics (parent education, parent job, family income), life-styles (gaming times, TV times, sleep time). The sample was 2,140 collections of second grade children and their parents who participated in Korea Youth Panel Survey on 2011. We analyzed the data which were collected by means of questionnaires and the data were analyzed with t -test, ANOVA, Pearson correlation analysis, and regression analysis with SPSS ver. 19.0. The results were summarized as follows. The level of children's emotional problem was relatively low on average. There is a significant difference in the children's emotional problems according to family characteristics and life-styles. There was a relationship between children's emotional problems (attention problem, aggression, somatic symptom, social withdrawal, depression) and life-styles (gaming times, TV times). The significant factors influencing the children's emotional problems are connected with father's education, mother's job, family income, family characteristics, gaming time and TV time of life style. It is noted that parent education level was an important factor for children's attention problem and aggression. Amongst children's life-styles, gaming time and TV time are negative factors for social withdrawal and depression.