• Title/Summary/Keyword: Intelligent Notification

Search Result 28, Processing Time 0.022 seconds

A Study on the Development of Taxi Safety Support System Using the Beacon Device (비콘 단말기를 이용한 택시안심이용시스템의 구현에 관한 연구)

  • Kim, Yong-Tae;Kim, Jin-Man
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.26 no.6
    • /
    • pp.452-457
    • /
    • 2016
  • In this paper, we propose a taxi safety support system using the beacon device to reduce the anxiety and increase the satisfaction of taxi passengers. At first, we design a USB-type low power beacon device that can be easily installed inside a taxi and propose a distance and estimation method using beacon signal strength. Mobile applications for passengers and drivers based on beacon signals are developed. The server operation program for situation recognition, position estimation, risk management and notification of the taxi passenger is also developed. An accident risk management method is proposed using the recognition of getting on and off of the taxi passenger. The proposed methods are verified for applicability and usefulness through practical experiments.

An SoC-based Context-Aware System Architecture (SoC 기반 상황인식 시스템 구조)

  • Sohn, Bong-Ki;Lee, Keon-Myong;Kim, Jong-Tae;Lee, Seung-Wook;Lee, Ji-Hyong;Jeon, Jae-Wook;Cho, Jun-Dong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.4
    • /
    • pp.512-516
    • /
    • 2004
  • Context-aware computing has been attracting the attention as an approach to alleviating the inconvenience in human-computer interaction. This paper proposes a context-aware system architecture to be implemented on an SoC(System-on-a-Chip). The proposed architecture supports sensor abstraction, notification mechanism for context changes, modular development, easy service composition using if-then rules, and flexible context-aware service implementation. It consists of the communication unit, the processing unit, the blackboard, and the rule-based system unit, where the first three components reside in the microprocessor part of the SoC and the rule-based system unit is implemented in hardware. For the proposed architecture, an SoC system has been designed and tested in an SoC development platform called SystemC and the feasibility of the behavoir modules for the microprocessor part has been evaluated by implementing software modules on the conventional computer platform. This SoC-based context-aware system architecture has been developed to apply to mobile intelligent robots which would assist old people at home in a context-aware manner.

An Implementation of Context-Awareness Support System based on Voice Service for Medical Environments (의료 환경을 위한 음성 서비스 기반의 상황인식 지원 시스템의 구현)

  • Shim, Choon-Bo;Shin, Yang-Won;Park, Byung-Rae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.4 s.36
    • /
    • pp.29-36
    • /
    • 2005
  • As computing environments are more rapidly developed, an adaptive and intelligent services using post PC such as PDA. Laptop, and Tablet PC in case of rounding and examining patients are highly demanded. The objective of this study is to design and implement a context-awareness support system based on voice service for medical environments. To achieve it, we propose a context middleware which plays an important role in recognizing a client with PDA by using a Bluetooth wireless communication technology as well as in executing an appropriate execution module, like delivery for diagnosis information of patients, according to the staff's context acquired from a context server. In addition, the context server functions as a manager that efficiently stores context information such as client's current status, physical environment, and device resources into a database server. Finally, for verifying the usefulness of the proposed system, we develop an application system which provides voice playing services for notification of other physicians through our context middleware.

  • PDF

A Study to Apply A Fog Computing Platform (포그 컴퓨팅 플랫폼 적용성 연구)

  • Lee, Kyeong-Min;Lee, Hoo-Myeong;Jo, Min-Sung;Choi, Hoon
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.15 no.6
    • /
    • pp.60-71
    • /
    • 2019
  • As IoT systems such as smart farms and smart cities become popular, a large amount of data collected from many sensor nodes is sent to a server in the Internet, which causes network traffic explosion, delay in delivery, and increase of server's workload. To solve these problems, the concept of fog computing has been proposed to store data between IoT systems and servers. In this study, we implemented a software platform of the fog node and applied it to the prototype smart farm system in order to check whether the problems listed above can be solved when using the fog node. When the fog node is used, the time taken to control an IoT device is lower than the response time of the existing IoT device-server case. We confirmed that it can also solve the problem of the Internet traffic explosion and the workload increase in the server. We also showed that the intelligent control of IoT system is feasible by having the data visualization in the server and real time remote control, emergency notification in the fog node as well as data storage which is the basic capability of the fog node.

A Study on the standardization of ETCS (Focused on RF) (자동요금징수시스템(ETCS) 표준화 연구(주파수방식을 중심으로))

  • Kwon, Han-Joon;Lee, Ki-Hyun;Kim, Yong-Deak
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.3
    • /
    • pp.62-73
    • /
    • 2008
  • In this paper, domestic standard revision plan of dynamic frequency method which is used both in unmanned automatic toll collection system and manned collection system of the express highway is presented. For such ETCS, the infrared rays (870 nm) of active frequency method and the frequency integrated method (5.8 GHz) are adopted and extended to be operated to the all around the Toll Gate. This standardization plan is based on inter connection reference model between OSI (Open System Interconnection) in process of ITS short range radio communication standardization of 5.8 GHz bandwidth to support traffic information and control system service, and the derived revision plan by starting from physical layer which support interoperability for multiple access between RSE (Road Side Equipment) and OBE (On Board Equipment), in which is categorized into physical layer, data link layer, and application layer. In case of radiation power, existing standard is divided by class1 (within 10 m) and Class2 (within 100 m) according to transmission lengthwhile it is operated with just single standard 'Class1' because of notification of Ministry of Information and Communication in 2004. In the case of the limitation value of incident power in communication area, considering operation plan of ETCS that is on actuality operation the measurements are reflected to the standard. In other wort this paper proposed the improvement standard of incident power, pseudo response in the communication area and radiated power in order to secure stability and compatibility among operator systems about the needed part on ETCS operation.

  • PDF

The Android-based Bluetooth Device Application Design and Implementation (안드로이드 기반의 블루투스 디바이스 응용 설계 및 구현)

  • Cho, Hyo-Sung;Lee, Hyuk-Joon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.1
    • /
    • pp.72-85
    • /
    • 2012
  • Today, although most bluetooth hands-free devices within a vehicle provide telephone service functions such as voice communication, caller id display and SMS message display and so on, they do not provide a function that displays Internet-based text data. We need to develop a scheme that displays the internet-based text data including existing hands-free function because the request for using the Internet service is increasing within a vehicle recently. The proposed bluetooth device application includes advanced function such as SNS message arrival notification, the message display function and we chose Android as the implementation mobile platform giving consideration to the fact that most SNS applications operate on Android and the platform is easily embedded into small embedded device. Smartphone or tablet PC connected with the proposed bluetooth device is an Android-based device and we designed a form of Android app for the function implementation of the devices. When the audio-text gateway app receives SNS text data, it extracts title and sender information from the message header information in a form of text data and sends them via ACL (Asynchronous Connection-Oriented) link to the bluetooth device showing the data on the screen. Android-based bluetooth devices are not possible to play voice through speaker because the bluetooth hands-free or headset profile ported within Android platform normally only includes audio gateway's function. The proposed bluetooth device application, therefore, applies the streaming scheme that sends data via ACL link instead of the way that sending them via SCO (Synchronous Connection-Oriented) link.

KANO-TOPSIS Model for AI Based New Product Development: Focusing on the Case of Developing Voice Assistant System for Vehicles (KANO-TOPSIS 모델을 이용한 지능형 신제품 개발: 차량용 음성비서 시스템 개발 사례)

  • Yang, Sungmin;Tak, Junhyuk;Kwon, Donghwan;Chung, Doohee
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.1
    • /
    • pp.287-310
    • /
    • 2022
  • Companies' interest in developing AI-based intelligent new products is increasing. Recently, the main concern of companies is to innovate customer experience and create new values by developing new products through the effective use of Artificial intelligence technology. However, due to the nature of products based on radical technologies such as artificial intelligence, intelligent products differ from existing products and development methods, so it is clear that there is a limitation to applying the existing development methodology as it is. This study proposes a new research method based on KANO-TOPSIS for the successful development of AI-based intelligent new products by using car voice assistants as an example. Using the KANO model, select and evaluate functions that customers think are necessary for new products, and use the TOPSIS method to derives priorities by finding the importance of functions that customers need. For the analysis, major categories such as vehicle condition check and function control elements, driving-related elements, characteristics of voice assistant itself, infotainment elements, and daily life support elements were selected and customer demand attributes were subdivided. As a result of the analysis, high recognition accuracy should be considered as a top priority in the development of car voice assistants. Infotainment elements that provide customized content based on driver's biometric information and usage habits showed lower priorities than expected, while functions related to driver safety such as vehicle condition notification, driving assistance, and security, also showed as the functions that should be developed preferentially. This study is meaningful in that it presented a new product development methodology suitable for the characteristics of AI-based intelligent new products with innovative characteristics through an excellent model combining KANO and TOPSIS.

APPLICATION OF FUZZY SET THEORY IN SAFEGUARDS

  • Fattah, A.;Nishiwaki, Y.
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1993.06a
    • /
    • pp.1051-1054
    • /
    • 1993
  • The International Atomic Energy Agency's Statute in Article III.A.5 allows it“to establish and administer safeguards designed to ensure that special fissionable and other materials, services, equipment, facilities and information made available by the Agency or at its request or under its supervision or control are not used in such a way as to further any military purpose; and to apply safeguards, at the request of the parties, to any bilateral or multilateral arrangement, or at the request of a State, to any of that State's activities in the field of atomic energy”. Safeguards are essentially a technical means of verifying the fulfilment of political obligations undertaken by States and given a legal force in international agreements relating to the peaceful uses of nuclear energy. The main political objectives are: to assure the international community that States are complying with their non-proliferation and other peaceful undertakings; and to deter (a) the diversion of afeguarded nuclear materials to the production of nuclear explosives or for military purposes and (b) the misuse of safeguarded facilities with the aim of producing unsafeguarded nuclear material. It is clear that no international safeguards system can physically prevent diversion. The IAEA safeguards system is basically a verification measure designed to provide assurance in those cases in which diversion has not occurred. Verification is accomplished by two basic means: material accountancy and containment and surveillance measures. Nuclear material accountancy is the fundamental IAEA safeguards mechanism, while containment and surveillance serve as important complementary measures. Material accountancy refers to a collection of measurements and other determinations which enable the State and the Agency to maintain a current picture of the location and movement of nuclear material into and out of material balance areas, i. e. areas where all material entering or leaving is measurab e. A containment measure is one that is designed by taking advantage of structural characteristics, such as containers, tanks or pipes, etc. To establish the physical integrity of an area or item by preventing the undetected movement of nuclear material or equipment. Such measures involve the application of tamper-indicating or surveillance devices. Surveillance refers to both human and instrumental observation aimed at indicating the movement of nuclear material. The verification process consists of three over-lapping elements: (a) Provision by the State of information such as - design information describing nuclear installations; - accounting reports listing nuclear material inventories, receipts and shipments; - documents amplifying and clarifying reports, as applicable; - notification of international transfers of nuclear material. (b) Collection by the IAEA of information through inspection activities such as - verification of design information - examination of records and repo ts - measurement of nuclear material - examination of containment and surveillance measures - follow-up activities in case of unusual findings. (c) Evaluation of the information provided by the State and of that collected by inspectors to determine the completeness, accuracy and validity of the information provided by the State and to resolve any anomalies and discrepancies. To design an effective verification system, one must identify possible ways and means by which nuclear material could be diverted from peaceful uses, including means to conceal such diversions. These theoretical ways and means, which have become known as diversion strategies, are used as one of the basic inputs for the development of safeguards procedures, equipment and instrumentation. For analysis of implementation strategy purposes, it is assumed that non-compliance cannot be excluded a priori and that consequently there is a low but non-zero probability that a diversion could be attempted in all safeguards ituations. An important element of diversion strategies is the identification of various possible diversion paths; the amount, type and location of nuclear material involved, the physical route and conversion of the material that may take place, rate of removal and concealment methods, as appropriate. With regard to the physical route and conversion of nuclear material the following main categories may be considered: - unreported removal of nuclear material from an installation or during transit - unreported introduction of nuclear material into an installation - unreported transfer of nuclear material from one material balance area to another - unreported production of nuclear material, e. g. enrichment of uranium or production of plutonium - undeclared uses of the material within the installation. With respect to the amount of nuclear material that might be diverted in a given time (the diversion rate), the continuum between the following two limiting cases is cons dered: - one significant quantity or more in a short time, often known as abrupt diversion; and - one significant quantity or more per year, for example, by accumulation of smaller amounts each time to add up to a significant quantity over a period of one year, often called protracted diversion. Concealment methods may include: - restriction of access of inspectors - falsification of records, reports and other material balance areas - replacement of nuclear material, e. g. use of dummy objects - falsification of measurements or of their evaluation - interference with IAEA installed equipment.As a result of diversion and its concealment or other actions, anomalies will occur. All reasonable diversion routes, scenarios/strategies and concealment methods have to be taken into account in designing safeguards implementation strategies so as to provide sufficient opportunities for the IAEA to observe such anomalies. The safeguards approach for each facility will make a different use of these procedures, equipment and instrumentation according to the various diversion strategies which could be applicable to that facility and according to the detection and inspection goals which are applied. Postulated pathways sets of scenarios comprise those elements of diversion strategies which might be carried out at a facility or across a State's fuel cycle with declared or undeclared activities. All such factors, however, contain a degree of fuzziness that need a human judgment to make the ultimate conclusion that all material is being used for peaceful purposes. Safeguards has been traditionally based on verification of declared material and facilities using material accountancy as a fundamental measure. The strength of material accountancy is based on the fact that it allows to detect any diversion independent of the diversion route taken. Material accountancy detects a diversion after it actually happened and thus is powerless to physically prevent it and can only deter by the risk of early detection any contemplation by State authorities to carry out a diversion. Recently the IAEA has been faced with new challenges. To deal with these, various measures are being reconsidered to strengthen the safeguards system such as enhanced assessment of the completeness of the State's initial declaration of nuclear material and installations under its jurisdiction enhanced monitoring and analysis of open information and analysis of open information that may indicate inconsistencies with the State's safeguards obligations. Precise information vital for such enhanced assessments and analyses is normally not available or, if available, difficult and expensive collection of information would be necessary. Above all, realistic appraisal of truth needs sound human judgment.

  • PDF