• Title/Summary/Keyword: Device and Service

Search Result 1,900, Processing Time 0.037 seconds

Development of Algorithm and Program for the Ground Fault Detection in Ungrounded Distribution Power System (비접지 배전계통 지락고장 검출 알고리즘 및 프로그램 개발)

  • Park, So-Young;Shin, Chang-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.10
    • /
    • pp.2619-2627
    • /
    • 2009
  • The ground fault is occupying 70% among the total number of faults in ungrounded distribution power system. When the ground fault occurs in ungrounded system, the fault current is so small that it is hard to detect. But fault handling is very important because to continue power supply during fault conditions may cause the fault spreading and the distribution device in trouble. This paper presents the fault line detection method by using GPT signal detecting zero sequence voltage, and the fault section detection method by detecting whether GPT signal is disappeared or not during shifting normally open switch, which is connecting switch between distribution lines with open state in order to restore the outage area under emergency situation, and during isolating each section one by one which belongs to the fault line. This method is efficient because there is no whole power interruption during the fault section detection, and it is possible to perform both the fault section detection and the service restoration for the outage area at the same time, and it can apply to various distribution system configuration. Program for the fault restoration was developed applying proposed method, and it has been validated by applying to the pilot project of distribution automation system in Vietnam which has the ungrounded distribution system.

A Study on the Evaluation of Long-term Development Plans for Libraries with SMART Method: Focus on a Case of the B University's Library (SMART 평가기법을 통한 도서관 장기발전계획 평가에 관한 연구 - B대학교 학술정보관의 사례를 중심으로 -)

  • Noh, Dong-Jo
    • Journal of Korean Library and Information Science Society
    • /
    • v.37 no.4
    • /
    • pp.351-370
    • /
    • 2006
  • The goal of this study was to evaluate vision, mission, strategies, and action plans from the long-term development plan for the B University's library, and specificity, measurability, achievability, relevance, and time-frame were measured and evaluated for each with SMART method. The results obtained through this study are as below : Firstly, SMART evaluation result for the B University's library was 3.80 for the vision, 3.97 for the mission, 3.74 for strategies, and 3.64 for action plans. Secondly, specificity of the long-term development plan for the B University's library was 4.06, measurability was 3.72, achievability was 3.68, relevance was 3.90, and time-frame was 3.58. Thirdly, the overall evaluation of the long-term development plan for the B University's library showed that among components from the development plan, the mission was the most superior while action plans had problems. Fourthly, in SMART evaluation factors, specificity was the most superior while time-frame had problems such that it should be supplemented in the future.

  • PDF

Light ID and HMD-AR Based Interactive Exhibition Design for Jeonju Hanok Village Immersive 3D View (전주 한옥마을의 실감 3D View를 위한 Light ID 및 HMD-AR 기반 인터렉티브 전시 설계)

  • Min, Byung-Jun;Mariappan, Vinayagam;Cha, Jae-Sang;Kim, Dae-Young;Cho, Ju-Phil
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.4
    • /
    • pp.414-420
    • /
    • 2018
  • The digital convergence looking for new ways to engage visitors by superimposing virtual content on projection over the real world captured media contents. This paper propose the Light ID based interactive 3D immersive exhibition things view using HMD AR technology. This approach does not required to add any additional infrastructure to be built-in to enable service and uses the installed Lighting or displays devices in the exhibit area. In this approach, the Light ID can be used as a Location Identifier and communication medium to access the content unlike the QR Tag which supports provide the download information through web interface. This utilize the advantages of camera based optical wireless communication (OWC) to receive the media content on smart device to deliver immersive 3D content visualization using AR. The proposed exhibition method is emulated on GALAXY S8 smart phone and the visual performance is evaluated for Jeonju Hanok Village. The experimental results shows that the proposed method can give immersive 3D view for exhibit things in real-time.

LED Beam Shaping and Fabrication of Optical Components for LED-Based Fingerprint Imager (LED 빔조형에 의한 초소형 이미징 장치의 제조 기술)

  • Joo, Jae-Young;Song, Sang-Bin;Park, Sun-Sub;Lee, Sun-Kyu
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.36 no.10
    • /
    • pp.1189-1193
    • /
    • 2012
  • The Miniaturized Fingerprint Imager (MFI) is a slim optical mouse that can be used as an input device for application to wireless portable personnel communication devices such as smartphones. In this study, we have fabricated key optical components of an MFI, including the illumination optical components and imaging lens. An LED beam-shaping lens consisting of an aspheric lens and a Fresnel facet was successfully machined using a diamond turning machine (DTM). A customized V-shaped groove for beam path banding was fabricated by the bulk micromachining of silicon that was coated with aluminum using the shadow effect in thermal evaporation. The imaging lens and arrayed multilevel Fresnel lenses were fabricated by electron beam lithography and FAB etching, respectively. The proposed optical components are extremely compact and have high optical efficiency; therefore, they are applicable to ultraslim optical systems.

The Improvement Plan for Indicator System of Personal Information Management Level Diagnosis in the Era of the 4th Industrial Revolution: Focusing on Application of Personal Information Protection Standards linked to specific IT technologies (제4차 산업시대의 개인정보 관리수준 진단지표체계 개선방안: 특정 IT기술연계 개인정보보호기준 적용을 중심으로)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.12
    • /
    • pp.1-13
    • /
    • 2021
  • This study tried to suggest ways to improve the indicator system to strengthen the personal information protection. For this purpose, the components of indicator system are derived through domestic and foreign literature, and it was selected as main the diagnostic indicators through FGI/Delphi analysis for personal information protection experts and a survey for personal information protection officers of public institutions. As like this, this study was intended to derive an inspection standard that can be reflected as a separate index system for personal information protection, by classifying the specific IT technologies of the 4th industrial revolution, such as big data, cloud, Internet of Things, and artificial intelligence. As a result, from the planning and design stage of specific technologies, the check items for applying the PbD principle, pseudonymous information processing and de-identification measures were selected as 2 common indicators. And the checklists were consisted 2 items related Big data, 5 items related Cloud service, 5 items related IoT, and 4 items related AI. Accordingly, this study expects to be an institutional device to respond to new technological changes for the continuous development of the personal information management level diagnosis system in the future.

A Study on the Usage of Investigation of Google Cloud Data (Smartphone user-oriented) (구글 클라우드 데이터의 수사활용 방안에 관한 연구 (스마트폰 사용자 중심))

  • Kim, Dongho;Lee, Sangjin
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.109-120
    • /
    • 2018
  • The smartphone is the communication device that is the most personal to the user, and it keeps a lot of information related to the user and makes information communication with other devices. With these characteristics, forensics on smartphones are one of the most basic methods of investigation in criminal investigations, and have actually contributed to the settlement of the case by providing many clues. However, recently, it is designed to encrypt data stored as a social issue related to the protection of user's personal information, or to delete deleted data or to delete log data together. So, any solutions? In this paper, I try to find the answer from cloud data stored by smartphone user account. Cloud forensics should approach complementary relationships rather than smartphone forensics. There are a lot of data stored in the cloud that can be meaningfully used in the investigation. Online activity information of users, such as Internet usage, YouTube view, and contents purchase information, cloud service such as e-mail, cloud drive, and location information are the most representative data. These data can be unvaluable, but here are some important clues in various types of criminal investigations. In this paper, I propose a method to extract data from the google cloud so that the data can be used for investigation, and to utilize the extracted data for investigation. And it explains the role of the extracted artifacts in the actual investigation business through virtual cases and proves its value.

Study on Business Model of e-Call System and Feasibility Analysis (긴급구난체계(e-Call) 비즈니스 모델 개발 및 타당성 연구)

  • Sim, Min-Kyung;Lee, Yong-Ju;Lee, Seung-Jun;Lee, Choul-Ki
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.17 no.6
    • /
    • pp.1-13
    • /
    • 2018
  • The number of deaths in Korea is higher than the OECD average. Therefore, an e-Call system is being developed as a vehicle ICT-based emergency rescue system that automatically detects an accident in the event of a vehicle accident and transmits related information to the center. In order to overcome the limitations of social acceptability and function of e-Call system, we propose a model that allows users to be aware of the necessity of service voluntarily. We predicted the market share of e-call services according to the proposed business model and analyzed it through B/C analysis. Benefits are calculated on a penetration basis, and device purchase and communications costs are calculated for each period. B/C analysis shows that pessimistic scenarios are 0.98 in 2025 and 1.01 in 2030. In an optimistic scenario, it is 1.05 in 2025 and 1.20 in 2030, which is more economical.

A Study of Data Communication Between the Web and the IoT Platform in WoT (WoT 환경에서 웹과 IoT 플랫폼 사이의 데이터 통신 연구)

  • Phyo, Gyung-soo;Park, Jin-tae;Moon, Il-young
    • Journal of Advanced Navigation Technology
    • /
    • v.20 no.4
    • /
    • pp.374-379
    • /
    • 2016
  • Recently, IoT(Internet of Things) to connect the objects and people has attracted attention. And it is rapidly developing. IoT is to develop, experts are predicting that the device is connected to the Internet to break through around 100 billion within 10 years. However, the current IoT companies are having a difficult state to the other each other IoT platform for interaction between data silos effects. These silos effects will limit the IoT grow to a larger market. Thus, the IoT service supplier shall develop an open platform for interaction IoT data between each IoT platform. These web technologies for current open IoT platform has emerged. If developers are using familiar, easy-to-learn Web technologies, developers can take advantage of a variety of services for the collected data, and found the IoT devices can be bypassed if there is a problem on the network. In this paper, we investigate the data communications technology that can be used in WoT environment to overcome these silos effects. As a result, the polling method that can simply send the IoT information the fastest.

A Partial Encryption Method for the Efficiency and the Security Enhancement of Massive Data Transmission in the Cloud Environment (클라우드 환경에서의 대용량 데이터 전송의 효율성과 보안성 강화를 위한 부분 암호화 방법)

  • Jo, Sung-Hwan;Han, Gi-Tae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.9
    • /
    • pp.397-406
    • /
    • 2017
  • In case of using the existing encrypted algorithm for massive data encryption service under the cloud environment, the problem that requires much time in data encryption come to the fore. To make up for this weakness, a partial encryption method is used generally. However, the existing partial encryption method has a disadvantage that the encrypted data can be inferred due to the remaining area that is not encrypted. This study proposes a partial encryption method of increasing the encryption speed and complying with the security standard in order to solve this demerit. The proposed method consists of 3 processes such as header formation, partial encryption and block shuffle. In step 1 Header formation process, header data necessary for the algorithm are generated. In step 2 Partial encryption process, a part of data is encrypted, using LEA (Lightweight Encryption Algorithm), and all data are transformed with XOR of data in the unencrypted part and the block generated in the encryption process. In step 3 Block shuffle process, the blocks are mixed, using the shuffle data stored with the random arrangement form in the header to carry out encryption by transforming the data into an unrecognizable form. As a result of the implementation of the proposed method, applying it to a mobile device, all the encrypted data were transformed into an unrecognizable form, so the data could not be inferred, and the data could not be restored without the encryption key. It was confirmed that the proposed method could make prompt treatment possible in encrypting mass data since the encryption speed is improved by approximately 273% or so compared to LEA which is Lightweight Encryption Algorithm.

A Study on the Development and Implementation of a Data-mining Based Prototype for Hospital Bill Claim Reduction System (데이터마이닝 기법을 활용한 의료보험 진료비청구 삭감분석시스템 개발 및 구현에 관한 연구)

  • Yoo, Sang-Jin;Park, Mun-Ro
    • Information Systems Review
    • /
    • v.7 no.1
    • /
    • pp.275-295
    • /
    • 2005
  • Changes in business environment caused by globalization of the world economy and the beginning of the knowledge society forced hospitals to equip with tools for the enhanced competitiveness. In other words, hospitals must aim three targets such as acquisition of advanced medical skills and equipments, improvement of service level for patients, and achievement of superior managerial performance simultaneously. This study has been done to suggest a way to reduce the possibility of hospital bill claim reduction as an alternative for the achievement of superior managerial performance. If the reduction rate of hospital bill claim is high, it will put negative impact on the hospital's revenue stream and hospital's reliability. Thus, if they want to stay competitive, hospitals need to device ways to cut the reduction rate as much as possible. In this study, a prototype system has been developed and implemented to check the possibility to cut the reduction rate through deep analysis of causes of reduction. The prototype first developed utilizing data mining techniques and the relation rules algorithm. Then the prototype was tested its performance using the D hospital's live data.