• Title/Summary/Keyword: Device-to-Device communication

Search Result 3,527, Processing Time 0.038 seconds

Fabrication of Portable Self-Powered Wireless Data Transmitting and Receiving System for User Environment Monitoring (사용자 환경 모니터링을 위한 소형 자가발전 무선 데이터 송수신 시스템 개발)

  • Jang, Sunmin;Cho, Sumin;Joung, Yoonsu;Kim, Jaehyoung;Kim, Hyeonsu;Jang, Dayeon;Ra, Yoonsang;Lee, Donghan;La, Moonwoo;Choi, Dongwhi
    • Korean Chemical Engineering Research
    • /
    • v.60 no.2
    • /
    • pp.249-254
    • /
    • 2022
  • With the rapid advance of the semiconductor and Information and communication technologies, remote environment monitoring technology, which can detect and analyze surrounding environmental conditions with various types of sensors and wireless communication technologies, is also drawing attention. However, since the conventional remote environmental monitoring systems require external power supplies, it causes time and space limitations on comfortable usage. In this study, we proposed the concept of the self-powered remote environmental monitoring system by supplying the power with the levitation-electromagnetic generator (L-EMG), which is rationally designed to effectively harvest biomechanical energy in consideration of the mechanical characteristics of biomechanical energy. In this regard, the proposed L-EMG is designed to effectively respond to the external vibration with the movable center magnet considering the mechanical characteristics of the biomechanical energy, such as relatively low-frequency and high amplitude of vibration. Hence the L-EMG based on the fragile force equilibrium can generate high-quality electrical energy to supply power. Additionally, the environmental detective sensor and wireless transmission module are composed of the micro control unit (MCU) to minimize the required power for electronic device operation by applying the sleep mode, resulting in the extension of operation time. Finally, in order to maximize user convenience, a mobile phone application was built to enable easy monitoring of the surrounding environment. Thus, the proposed concept not only verifies the possibility of establishing the self-powered remote environmental monitoring system using biomechanical energy but further suggests a design guideline.

About the Multi-layered Communication of Princess Pari on the Webtoon Platform of Daum -Focusing on Analysis of Narrative Structure and Comments (Daum 웹툰 <바리공주>를 통해 본 고전 기반 웹툰 콘텐츠의 다층적 대화 양상 -서사구조와 댓글 분석을 중심으로)

  • Choe, Key-Sook
    • Journal of Popular Narrative
    • /
    • v.25 no.3
    • /
    • pp.303-345
    • /
    • 2019
  • This article analyzes the multi-layered communication in the Webtoon Princess Pari, released on the Daum portal site, created (written and illustrated) by Kim Naim, through analyzing the narrative structure and comments with the qualitative / quantitative methodology. The webtoon Princess Pari is structured in an omnibus style in which unit narratives are intermittently articulated, multi-lined, and interconnected. As integrated narratives which link with unitary narratives, Pari's growth story as a shaman and a romance narrative are structured. The classical original story of the shaman was used as a prehistory corresponding to the prequel of the webtoon through a preview, and the writer restructured the narrative to overcome the contradictions of the gender asymmetry and the patriarchal ideology of the original text. The viewer then creates a conversational space by giving critical and reflective comments. According to a statistical analysis conducted through sampling, the types of comments can be classified as follows: Appreciation and criticism of the contents ≫ Emotional response ≫ Intuitive overall review ≫ Knowledge and reflection ≫ Comments on comments. In the process of creation and acceptance of the Webtoon, a multi-layered dialogue between classical and modern, content and audience, acceptance and creation has been at play. In the creation dimension, the writer used a device to fill the gap of mythical symbols of the contents. At the level of the audience, they formed a culture of sharing information, knowledge, and reflection about tradition/folk/culture through comments. This corresponds to classical and modern dialogue through the webtoon. The viewers form a sympathetic bond, attempt hermeneutical coordination, supplement the information, and search for a balanced angle through controversial conversation. In addition, by commenting on attitudes, views, and perspective, the commentators showed a behavioral pattern corresponding to meta-criticism in literature. The viewers' comments acted as feedback on the creation of the webtoons, so that the creation and acceptance itself influenced the production of the content of the webtoon. The webtoon Princess Pari, which was based on Korean classical narrative, has been reorganized onto 'moving and dynamic' content, which leads to sense, thinking, criticism and reflection through the formation of various dialogues.

Comparison of Center Error or X-ray Field and Light Field Size of Diagnostic Digital X-ray Unit according to the Hospital Grade (병원 등급에 따른 X선조사야와 광조사야 간의 면적 및 중심점 오차 비교)

  • Lee, Won-Jeong;Song, Gyu-Ri;Shin, Hyun-yi
    • Journal of the Korean Society of Radiology
    • /
    • v.14 no.3
    • /
    • pp.245-252
    • /
    • 2020
  • The purpose of this study was intended to recognize the importance of quality control (QC) in order to reduce exposure and improve image quality by comparing the center-point (CP) of according to hospital grade and the difference between X-ray field (XF) and light field (LF) in diagnostic digital X-ray devices. XF and LF size, CP were measured in 12 digital X-ray devices at 10 hospitals located in 00 metropolitan cities. Phantom was made in different width respectively, using 0.8 mm wire after attaching to the standardized graph paper on transparent plastic plate and marked as cross wire in the center of the phantom. After placing the phantom on the table of the digital X-ray device, the images were obtained by shooting it vertically each field of survey. All images were acquired under the same conditions of exposure at distance of 100cm between the focus-detector. XF and LF size, CP error were measured using the picture archiving communication system. data were expressed as mean with standard error and then analyzed using SPSS ver. 22.0. The difference in field between the XF and LF size was the smallest in clinic, followed by university hospitals, hospitals and general hospitals. Based on the university hospitals with the least CP error, there was a statistically significant difference in CP error between university hospitals and clinics (p=0.024). Group less than 36-month after QC had fewer statistical errors than 36-month group (0.26 vs. 0.88, p=0.036). The difference between the XF and LF size was the lowest in clinic and CP error was the lowest in university hospital. Moreover, hospitals with short period of time after QC have fewer CP error and it means that introduction of timely QC according to the QC items is essential.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Study on the Current Status of Smart Garden (스마트가든의 인식경향에 관한 연구)

  • Woo, Kyung-Sook;Suh, Joo-Hwan
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.49 no.2
    • /
    • pp.51-60
    • /
    • 2021
  • Modern society is becoming more informed and intelligent with the development of digital technology, in which humans, objects, and networks relate with each other. In accordance with the changing times, a garden system has emerged that makes it easy to supply the ideal temperature, humidity, sunlight, and moisture conditions to grow plants. Therefore, this study attempted to grasp the concept, perception, and trends of smart gardens, a recent concept. To achieve the purpose of this study, previous studies and text mining were used, and the results are as follows. First, the core characteristics of smart gardens are new gardens in which IoT technology and gardening techniques are fused in indoor and outdoor spaces due to technological developments and changes in people's lifestyles. As technology advances and the importance of the environment increases, smart gardens are becoming a reality due to the need for living spaces where humans and nature can co-exist. With the advent of smart gardens, it will be possible to contribute to gardens' vitalization to deal with changes in garden-related industries and people's lifestyles. Second, in current research related to smart gardens and users' experiences, the technical aspects of smart gardens are the most interesting. People value smart garden functions and technical aspects that enable a safe, comfortable, and convenient life, and subjective uses are emerging depending on individual tastes and the comfort with digital devices. Third, looking at the usage behavior of smart gardens, they are mainly used in indoor spaces, with edible plants are being grown. Due to the growing importance of the environment and concerns about climate change and a possible food crisis, the tendency is to prefer the cultivation of plants related to food, but the expansion of garden functions can satisfying users' needs with various technologies that allow for the growing of flowers. In addition, as users feel the shapes of smart gardens are new and sophisticated, it can be seen that design is an essential factor that helps to satisfy users. Currently, smart gardens are developing in terms of technology. However, the main components of the smart garden are the combination of humans, nature, and technology rather than focusing on growing plants conveniently by simply connecting potted plants and smart devices. It strengthens connectivity with various city services and smart homes. Smart gardens interact with the landscape of the architect's ideas rather than reproducing nature through science and technology. Therefore, it is necessary to have a design that considers the functions of the garden and the needs of users. In addition, by providing citizens indoor and urban parks and public facilities, it is possible to share the functions of communication and gardening among generations targeting those who do not enjoy 'smart' services due to age and bridge the digital device and information gap. Smart gardens have potential as a new landscaping space.

A Study on the Improvement of Flexible Working Hours (유연근로시간제 개선에 대한 연구)

  • Kwon, Yong-man;Seo, Ei-seok
    • Journal of Venture Innovation
    • /
    • v.4 no.2
    • /
    • pp.97-108
    • /
    • 2021
  • Labor contracts appear in form as an exchange relationship between labor products and wages, but since they transcend the level of simple barter, they can be economically identified as "trading" and can be identified as "rental." From a legal point of view, a legal device that legally supports and imposes binding force on commodity exchange relations is a contract. Such a labor contract led to a relationship in which wages were received and a certain amount of time was placed under the direction and supervision of the employer as a counter benefit to the receipt of wages. Since working hours are subordinate hours with one's labor under the disposition authority of the employer, long hours of work can be done for the health and safety of workers and furthermore, it can be an act that violates the value to enjoy as a human being. The reduction of working hours needs to be shortened in terms of productivity and enjoyment of workers' culture so that they can expand and reproduce, but users' corporate management labor and production activities should also be compatible compared to those pursued by capitalist countries. Working hours can be seen as individual time and time in society as a whole, and long hours of work at the individual level are reduced, which is undesirable at the individual level, but an increase in products due to an increase in production time at the social level can help social development. It is necessary to consider working hours in terms of finding the balance between these individual and social levels. If the regulation method of working hours was to regulate the total amount of working hours, flexibility and elasticity of working hours are a qualitative regulation method that allows companies to flexibly allocate and organize working hours within a certain range of up to 52 hours per week. Accordingly, it is necessary to shorten working hours, but expand and implement the flexible working hours system according to the situation of the company. To this end, it is necessary to flexibly operate the flexible working hours system, which is currently limited to six months, handle the selective working hours by agreement between employers and workers, and expand the target work of discretionary working hours according to the development of information and communication technology and new types based on the 4th industrial revolution.

Design Evaluation Model Based on Consumer Values: Three-step Approach from Product Attributes, Perceived Attributes, to Consumer Values (소비자 가치기반 디자인 평가 모형: 제품 속성, 인지 속성, 소비자 가치의 3단계 접근)

  • Kim, Keon-Woo;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.4
    • /
    • pp.57-76
    • /
    • 2017
  • Recently, consumer needs are diversifying as information technologies are evolving rapidly. A lot of IT devices such as smart phones and tablet PCs are launching following the trend of information technology. While IT devices focused on the technical advance and improvement a few years ago, the situation is changed now. There is no difference in functional aspects, so companies are trying to differentiate IT devices in terms of appearance design. Consumers also consider design as being a more important factor in the decision-making of smart phones. Smart phones have become a fashion items, revealing consumers' own characteristics and personality. As the design and appearance of the smartphone become important things, it is necessary to examine consumer values from the design and appearance of IT devices. Furthermore, it is crucial to clarify the mechanisms of consumers' design evaluation and develop the design evaluation model based on the mechanism. Since the influence of design gets continuously strong, various and many studies related to design were carried out. These studies can classify three main streams. The first stream focuses on the role of design from the perspective of marketing and communication. The second one is the studies to find out an effective and appealing design from the perspective of industrial design. The last one is to examine the consumer values created by a product design, which means consumers' perception or feeling when they look and feel it. These numerous studies somewhat have dealt with consumer values, but they do not include product attributes, or do not cover the whole process and mechanism from product attributes to consumer values. In this study, we try to develop the holistic design evaluation model based on consumer values based on three-step approach from product attributes, perceived attributes, to consumer values. Product attributes means the real and physical characteristics each smart phone has. They consist of bezel, length, width, thickness, weight and curvature. Perceived attributes are derived from consumers' perception on product attributes. We consider perceived size of device, perceived size of display, perceived thickness, perceived weight, perceived bezel (top - bottom / left - right side), perceived curvature of edge, perceived curvature of back side, gap of each part, perceived gloss and perceived screen ratio. They are factorized into six clusters named as 'Size,' 'Slimness,' 'No-Frame,' 'Roundness,' 'Screen Ratio,' and 'Looseness.' We conducted qualitative research to find out consumer values, which are categorized into two: look and feel values. We identified the values named as 'Silhouette,' 'Neatness,' 'Attractiveness,' 'Polishing,' 'Innovativeness,' 'Professionalism,' 'Intellectualness,' 'Individuality,' and 'Distinctiveness' in terms of look values. Also, we identifies 'Stability,' 'Comfortableness,' 'Grip,' 'Solidity,' 'Non-fragility,' and 'Smoothness' in terms of feel values. They are factorized into five key values: 'Sleek Value,' 'Professional Value,' 'Unique Value,' 'Comfortable Value,' and 'Solid Value.' Finally, we developed the holistic design evaluation model by analyzing each relationship from product attributes, perceived attributes, to consumer values. This study has several theoretical and practical contributions. First, we found consumer values in terms of design evaluation and implicit chain relationship from the objective and physical characteristics to the subjective and mental evaluation. That is, the model explains the mechanism of design evaluation in consumer minds. Second, we suggest a general design evaluation process from product attributes, perceived attributes to consumer values. It is an adaptable methodology not only smart phone but also other IT products. Practically, this model can support the decision-making when companies initiative new product development. It can help product designers focus on their capacities with limited resources. Moreover, if its model combined with machine learning collecting consumers' purchasing data, most preferred values, sales data, etc., it will be able to evolve intelligent design decision support system.

Edge to Edge Model and Delay Performance Evaluation for Autonomous Driving (자율 주행을 위한 Edge to Edge 모델 및 지연 성능 평가)

  • Cho, Moon Ki;Bae, Kyoung Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.1
    • /
    • pp.191-207
    • /
    • 2021
  • Up to this day, mobile communications have evolved rapidly over the decades, mainly focusing on speed-up to meet the growing data demands of 2G to 5G. And with the start of the 5G era, efforts are being made to provide such various services to customers, as IoT, V2X, robots, artificial intelligence, augmented virtual reality, and smart cities, which are expected to change the environment of our lives and industries as a whole. In a bid to provide those services, on top of high speed data, reduced latency and reliability are critical for real-time services. Thus, 5G has paved the way for service delivery through maximum speed of 20Gbps, a delay of 1ms, and a connecting device of 106/㎢ In particular, in intelligent traffic control systems and services using various vehicle-based Vehicle to X (V2X), such as traffic control, in addition to high-speed data speed, reduction of delay and reliability for real-time services are very important. 5G communication uses high frequencies of 3.5Ghz and 28Ghz. These high-frequency waves can go with high-speed thanks to their straightness while their short wavelength and small diffraction angle limit their reach to distance and prevent them from penetrating walls, causing restrictions on their use indoors. Therefore, under existing networks it's difficult to overcome these constraints. The underlying centralized SDN also has a limited capability in offering delay-sensitive services because communication with many nodes creates overload in its processing. Basically, SDN, which means a structure that separates signals from the control plane from packets in the data plane, requires control of the delay-related tree structure available in the event of an emergency during autonomous driving. In these scenarios, the network architecture that handles in-vehicle information is a major variable of delay. Since SDNs in general centralized structures are difficult to meet the desired delay level, studies on the optimal size of SDNs for information processing should be conducted. Thus, SDNs need to be separated on a certain scale and construct a new type of network, which can efficiently respond to dynamically changing traffic and provide high-quality, flexible services. Moreover, the structure of these networks is closely related to ultra-low latency, high confidence, and hyper-connectivity and should be based on a new form of split SDN rather than an existing centralized SDN structure, even in the case of the worst condition. And in these SDN structural networks, where automobiles pass through small 5G cells very quickly, the information change cycle, round trip delay (RTD), and the data processing time of SDN are highly correlated with the delay. Of these, RDT is not a significant factor because it has sufficient speed and less than 1 ms of delay, but the information change cycle and data processing time of SDN are factors that greatly affect the delay. Especially, in an emergency of self-driving environment linked to an ITS(Intelligent Traffic System) that requires low latency and high reliability, information should be transmitted and processed very quickly. That is a case in point where delay plays a very sensitive role. In this paper, we study the SDN architecture in emergencies during autonomous driving and conduct analysis through simulation of the correlation with the cell layer in which the vehicle should request relevant information according to the information flow. For simulation: As the Data Rate of 5G is high enough, we can assume the information for neighbor vehicle support to the car without errors. Furthermore, we assumed 5G small cells within 50 ~ 250 m in cell radius, and the maximum speed of the vehicle was considered as a 30km ~ 200 km/hour in order to examine the network architecture to minimize the delay.

Could a Product with Diverged Reviews Ratings Be Better?: The Change of Consumer Attitude Depending on the Converged vs. Diverged Review Ratings and Consumer's Regulatory Focus (평점이 수렴되지 않는 리뷰의 제품들이 더 좋을 수도 있을까?: 제품 리뷰평점의 분산과 소비자의 조절초점 성향에 따른 소비자 태도 변화)

  • Yi, Eunju;Park, Do-Hyung
    • Knowledge Management Research
    • /
    • v.22 no.3
    • /
    • pp.273-293
    • /
    • 2021
  • Due to the COVID-19 pandemic, the size of the e-commerce has been increased rapidly. This pandemic, which made contact-less communication culture in everyday life made the e-commerce market to be opened even to the consumers who would hesitate to purchase and pay by electronic device without any personal contacts and seeing or touching the real products. Consumers who have experienced the easy access and convenience of the online purchase would continue to take those advantages even after the pandemic. During this time of transformation, however, the size of information source for the consumers has become even shrunk into a flat screen and limited to visual only. To provide differentiated and competitive information on products, companies are adopting AR/VR and steaming technologies but the reviews from the honest users need to be recognized as important in that it is regarded as strong as the well refined product information provided by marketing professionals of the company and companies may obtain useful insight for product development, marketing and sales strategies. Then from the consumer's point of view, if the ratings of reviews are widely diverged how consumers would process the review information before purchase? Are non-converged ratings always unreliable and worthless? In this study, we analyzed how consumer's regulatory focus moderate the attitude to process the diverged information. This experiment was designed as a 2x2 factorial study to see how the variance of product review ratings (high vs. low) for cosmetics affects product attitudes by the consumers' regulatory focus (prevention focus vs. improvement focus). As a result of the study, it was found that prevention-focused consumers showed high product attitude when the review variance was low, whereas promotion-focused consumers showed high product attitude when the review variance was high. With such a study, this thesis can explain that even if a product with exactly the same average rating, the converged or diverged review can be interpreted differently by customer's regulatory focus. This paper has a theoretical contribution to elucidate the mechanism of consumer's information process when the information is not converged. In practice, as reviews and sales records of each product are accumulated, as an one of applied knowledge management types with big data, companies may develop and provide even reinforced customer experience by providing personalized and optimized products and review information.

Contactless Data Society and Reterritorialization of the Archive (비접촉 데이터 사회와 아카이브 재영토화)

  • Jo, Min-ji
    • The Korean Journal of Archival Studies
    • /
    • no.79
    • /
    • pp.5-32
    • /
    • 2024
  • The Korean government ranked 3rd among 193 UN member countries in the UN's 2022 e-Government Development Index. Korea, which has consistently been evaluated as a top country, can clearly be said to be a leading country in the world of e-government. The lubricant of e-government is data. Data itself is neither information nor a record, but it is a source of information and records and a resource of knowledge. Since administrative actions through electronic systems have become widespread, the production and technology of data-based records have naturally expanded and evolved. Technology may seem value-neutral, but in fact, technology itself reflects a specific worldview. The digital order of new technologies, armed with hyper-connectivity and super-intelligence, not only has a profound influence on traditional power structures, but also has an a similar influence on existing information and knowledge transmission media. Moreover, new technologies and media, including data-based generative artificial intelligence, are by far the hot topic. It can be seen that the all-round growth and spread of digital technology has led to the augmentation of human capabilities and the outsourcing of thinking. This also involves a variety of problems, ranging from deep fakes and other fake images, auto profiling, AI lies hallucination that creates them as if they were real, and copyright infringement of machine learning data. Moreover, radical connectivity capabilities enable the instantaneous sharing of vast amounts of data and rely on the technological unconscious to generate actions without awareness. Another irony of the digital world and online network, which is based on immaterial distribution and logical existence, is that access and contact can only be made through physical tools. Digital information is a logical object, but digital resources cannot be read or utilized without some type of device to relay it. In that respect, machines in today's technological society have gone beyond the level of simple assistance, and there are points at which it is difficult to say that the entry of machines into human society is a natural change pattern due to advanced technological development. This is because perspectives on machines will change over time. Important is the social and cultural implications of changes in the way records are produced as a result of communication and actions through machines. Even in the archive field, what problems will a data-based archive society face due to technological changes toward a hyper-intelligence and hyper-connected society, and who will prove the continuous activity of records and data and what will be the main drivers of media change? It is time to research whether this will happen. This study began with the need to recognize that archives are not only records that are the result of actions, but also data as strategic assets. Through this, author considered how to expand traditional boundaries and achieves reterritorialization in a data-driven society.