• Title/Summary/Keyword: Convergence Protection Performance

Search Result 107, Processing Time 0.026 seconds

A Study on the Control System of Plant Growth Using IT Convergence Technology (IT 융합기술을 이용한 식물생장 제어시스템 연구)

  • Kim, Min-Soo;Jee, Seung-Wook;Kim, Min-Kyu;Cho, Young-Chang
    • Journal of IKEEE
    • /
    • v.22 no.4
    • /
    • pp.959-964
    • /
    • 2018
  • In this study, a study is conducted on a monitoring system that can control the environment of plants using sensors in conjunction with the LED light system and the plant growth control system. To verify the performance of the developed plant growth system, an experiment was conducted on the characteristics of energy efficiency, data transmission rate, and light volume control. The experiment resulted in a satisfactory result by controlling more than 80% energy efficiency, 1Mb/sec wireless communication speed, and 5 levels of optical control. The proposed system can be applied to LED plant facilities and will contribute to the automation of agriculture by organizing an automated system for production efficiency and labor cost reduction for future commercialization.

Implementation of Cough Detection System Using IoT Sensor in Respirator

  • Shin, Woochang
    • International journal of advanced smart convergence
    • /
    • v.9 no.4
    • /
    • pp.132-138
    • /
    • 2020
  • Worldwide, the number of corona virus disease 2019 (COVID-19) confirmed cases is rapidly increasing. Although vaccines and treatments for COVID-19 are being developed, the disease is unlikely to disappear completely. By attaching a smart sensor to the respirator worn by medical staff, Internet of Things (IoT) technology and artificial intelligence (AI) technology can be used to automatically detect the medical staff's infection symptoms. In the case of medical staff showing symptoms of the disease, appropriate medical treatment can be provided to protect the staff from the greater risk. In this study, we design and develop a system that detects cough, a typical symptom of respiratory infectious diseases, by applying IoT technology and artificial technology to respiratory protection. Because the cough sound is distorted within the respirator, it is difficult to guarantee accuracy in the AI model learned from the general cough sound. Therefore, coughing and non-coughing sounds were recorded using a sensor attached to a respirator, and AI models were trained and performance evaluated with this data. Mel-spectrogram conversion method was used to efficiently classify sound data, and the developed cough recognition system had a sensitivity of 95.12% and a specificity of 100%, and an overall accuracy of 97.94%.

A Study on How to Vitalize the ESG Management Strategy of SMEs through ESG Management Cases

  • KIM, Jin-Kwon;KIM, Min-Su;AHN, Tony-DongHui
    • The Journal of Economics, Marketing and Management
    • /
    • v.10 no.6
    • /
    • pp.39-46
    • /
    • 2022
  • Purpose: The purpose of this study is to look at the current status and cases of ESG at home and abroad, and through this, seek ways to activate the ESG strategy of domestic SMEs and suggest a direction. Research design, data and methodology: This study examines the current status of ESG management at home and abroad and examples of companies through related literature on ESG management and performance. Through this, the strategic direction of ESG management of domestic SMEs was presented. Results: Compared to the government and major corporations, SMEs can be said to lack ESG management activities. ESG activities include environmental activities such as carbon neutrality, waste management, eco-friendly supply chain management, establishment of safety and health processes to improve workers' environment, expansion of governance to guarantee autonomy and profitability such as fair trade, protection of social and shareholder rights such as anti-corruption, etc. should be based on Therefore, there are difficulties in ESG activities of SMEs that lack funds and manpower. Conclusions: Compared to the government and major corporations, SMEs can be said to lack ESG management activities However, it will be possible to establish and implement ESG management strategies based on the strengths of SMEs and the characteristics of each company.

Influence of Living Characteristics as Environment Related Behavior - Case of the Gimhae City, Gyongsangnam-do, Korea - (생활환경 여건이 환경관련 행동에 미치는 영향 연구 - 경상남도 김해시를 대상으로 -)

  • Hong, Suk-Hwan;Lee, Chang-Ho;Kim, Ji-Suk;Pi, Jae-Hwang
    • Korean Journal of Environment and Ecology
    • /
    • v.31 no.3
    • /
    • pp.329-336
    • /
    • 2017
  • We analyzed the influence of living characteristics as environment related behavior by questionnaire survey analysis. Survey was conducted to 569 people living in Gimhae city, Gyongsangnam-do, Korea. By the results of correlation analysis, items with high levels of practice were related to legal regulations. However, group who are less interested in preserving the environment have lower performance in all aspects of their activities. In the relationship between social characteristics and environment related behavior, residents were generally aware of the practice of detached house dweller group rather than of apartment dweller. As the age increased, have more willing to practice. While the higher levels of education group do not make environment related behave better. However, it seemed that the student group's distinct characteristics was reflected in the education level. As this study, improvement of environmental awareness is needed to improve practice of environment related behavior rather than regal approach. Policy for environment related behavior is necessary to vary the methodology based on analysis of social characteristics, such as gender, residential type and education level rather than generalization.

Application and Development Strategies of a Secure Real-Time Operating System in Weapon Systems within the Defense Sector (국방분야 보안 RTOS의 무기체계 적용 및 발전 방안)

  • Sang-Seung Lee;Keun-Ha Choi;Seung-Hyeon Hwang;Hyun-Ji Kim;Kyung-Deok Seo;Hwa-Eun Seong
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.5
    • /
    • pp.189-193
    • /
    • 2024
  • As cyber threats increase in the defense sector, the security of weapon system software is becoming increasingly important. Currently, most of the embedded software installed in domestic weapon systems operates based on foreign real-time operating systems(RTOS) that have no security. As a result, the localization and security enhancement of embedded software for weapon systems have emerged as urgent tasks. This study aims to propose the application and development strategies of secure RTOS for weapon systems. To this end, we examined the technological trends of domestic and foreign RTOS and secure RTOS, and analyzed the problems of current embedded software in weapon systems. The results revealed major issues such as low localization, vulnerability to cyber attacks, difficulty in maintenance, increased costs, and loss of opportunities for accumulating technological capabilities. An investigation of the current status of embedded software applied to existing weapon systems found that embedded SW are in operation across all fields, including maneuver, firepower, protection, command and control, communication, naval vessels, and aircraft. Among them, 99% rely on foreign RTOS such as VxWorks. A review of the core functions and applicability of secure RTOS to weapon systems suggests that it can be applied to key areas requiring real-time performance and security, such as fire control, navigation devices, and flight control in existing and future weapon systems. However, ensuring performance and reliability, securing verification and compatibility, and systematic government support were raised as prerequisites.

G-RAID: A Green RAID Mechanism for enhancing Energy-Efficiency in Massive Storage System (G-RAID: 대용량 저장장치에서 에너지 효율향상을 위한 그린 RAID 기법)

  • Kim, Young-Hwan;Suck, Jin-Sun;Park, Chang-Won;Hong, Ji-Man
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.6
    • /
    • pp.21-30
    • /
    • 2011
  • In the global IT market, a lot of issues for responding to various environmental regulations emerged. In case of the data centers, it is consuming huge amounts of energy to maintain. So there have been various technical attempts as Consolidation, Virtualization, Optimization to efficiently manage energy and data storage to fix the problems. In this paper, we propose a new RAID(Redundant Array of Independent Disks) mechanism which is differing the intensity of power consumption and works to provide data protection and disaster recovery(backup, mirroring etc.) to stratify multiple volumes. G-RAID minimize the power consumption and the lower of I/O performance by selecting the volume depending on the frequency of data access while classifying the power consumption between volumes in storage system. Also, it is possible that a filesystem and block map information of G-RAID is processed by basic unit which is group located in a row for the blocks to work efficiently and can minimize the performance degradation of block mapping load by the access frequency in each groups. As a result, we obtained to elevate a little bit of response time caused by block relocation work, but showed the decrease of power consumption by 38%.

The impact of Covid-19 on the Performing Arts Sector and the responses needed (코로나19로 본 공연예술계 충격과 그 대응 방안)

  • Lee, Soo-Young
    • Journal of Digital Convergence
    • /
    • v.19 no.3
    • /
    • pp.453-463
    • /
    • 2021
  • The purpose of this study is to establish the most severe impacts of Covid-19 in the field of the performing arts and to explore countermeasures taken both at home and abroad. This study has been conducted through literature surveys. The conclusion is as follows. First, since the outbreak of Covid-19, theater venues around the world have actively taken part in uploading recorded performances to streaming services. Secondly, these performance visualizings are generally considered as being complimentary goods rather than a substitute for live performance. Thirdly, although more audiences are tuning into watch on-line performances, consumption is concentrated on a few theaters which have a worldwide reputation and a broad range of content. Fourthly, to tackle the impact that Covid-19, the UK government announced a series of job protection schemes in the field of the Arts. In addition, Arts Council England prepared an emergency response package. In Korea, some countermeasures such as government support for artists and cultural establishments have also been implemented. Lastly, some suggestions for the sector. I conclude that there is an need for domestic companies to secure core contents of significant quality and to make strategic alliances with leading overseas performance companies so that they may cooperate together.

Protection Strategies Against False Data Injection Attacks with Uncertain Information on Electric Power Grids

  • Bae, Junhyung;Lee, Seonghun;Kim, Young-Woo;Kim, Jong-Hae
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.1
    • /
    • pp.19-28
    • /
    • 2017
  • False data injection attacks have recently been introduced as one of important issues related to cyber-attacks on electric power grids. These attacks aim to compromise the readings of multiple power meters in order to mislead the operation and control centers. Recent studies have shown that if a malicious attacker has complete knowledge of the power grid topology and branch admittances, s/he can adjust the false data injection attack such that the attack remains undetected and successfully passes the bad data detection tests that are used in power system state estimation. In this paper, we investigate that a practical false data injection attack is essentially a cyber-attack with uncertain information due to the attackers lack of knowledge with respect to the power grid parameters because the attacker has limited physical access to electric facilities and limited resources to compromise meters. We mathematically formulated a method of identifying the most vulnerable locations to false data injection attack. Furthermore, we suggest minimum topology changes or phasor measurement units (PMUs) installation in the given power grids for mitigating such attacks and indicate a new security metrics that can compare different power grid topologies. The proposed metrics for performance is verified in standard IEEE 30-bus system. We show that the robustness of grids can be improved dramatically with minimum topology changes and low cost.

Data Storage and Security Model for Mobile Healthcare Service based on IoT (IoT 기반의 모바일 헬스케어 서비스를 위한 데이터 저장 및 보호 모델)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.15 no.3
    • /
    • pp.187-193
    • /
    • 2017
  • Objects Internet-based healthcare services provide healthcare and healthcare services, including measurement of user's vital signs, diagnosis and prevention of diseases, through a variety of object internet devices. However, there is a problem that new security vulnerability can occur when inter-working with the security weakness of each element technology because the internet service based on the object Internet provides a service by integrating various element technologies. In this paper, we propose a user privacy protection model that can securely process user's healthcare information from a third party when delivering healthcare information of users using wearable equipment based on IoT in a mobile environment to a server. The proposed model provides attribute values for each healthcare sensor information so that the user can safely handle, store, and store the healthcare information, thereby managing the privacy of the user in a hierarchical manner. As a result of the performance evaluation, the throughput of IoT device is improved by 10.5% on average and the server overhead is 9.9% lower than that of the existing model.

Trend and Improvement for Privacy Protection of Future Internet (미래 인터넷 기술의 Privacy 보호 기술 동향 및 개선)

  • Kim, DaeYoub
    • Journal of Digital Convergence
    • /
    • v.14 no.6
    • /
    • pp.405-413
    • /
    • 2016
  • To solve various problems of the Internet as well as to enhance network performance, various future Internet architectures utilize cached data in network nodes or in proxy servers. Named-data networking (NDN), one of future Internet architectures, implements in-network data caching functionality, and then responds itself to request messages. However, it can cause users' privacy invasion that the publisher of data can not engage in the sharing/using process of the data anymore after the data was cached in-network. So NDN implements both encryption-based access control and group access control. But, since such access control schemes need to exchange additional messages in order to search for a proper access control list and keys, it causes inefficiency. This paper surveys the access control schemes of NDN, and then proposes an improved scheme.