• Title/Summary/Keyword: Internet Use

Search Result 6,016, Processing Time 0.251 seconds

Investment Benefit Analysis of Safety Assessment and Inspection Technologies of Hydrogen Bus Fuel System Using Contingent Valuation Methods (조건부가치측정법을 이용한 수소버스 연료장치 안전성 평가 및 검사기술에 대한 투자 편익 분석)

  • Seohyun, Lim;Jeong Ah, Jang
    • Journal of Auto-vehicle Safety Association
    • /
    • v.14 no.4
    • /
    • pp.43-52
    • /
    • 2022
  • Recently, the government has been expanding the supply of hydrogen vehicles according to the roadmap for vitalizing the hydrogen economy, but is developing safety assessment and inspection technology for the relevant vehicles. This study analyzed the prevention of hydrogen bus accidents' economic effect that arises from the application and development of large-capacity CHSS oil pressure repetition-test assessment technology, hydrogen bus internal chamber pressure transmission and emission volume inspection technology, among various technologies capable of assessing the safety of a hydrogen bus fuel system. To this end, the contingent valuation method (CVM), one of the value evaluation methods of non-market goods, was applied to investigate users' willingness to pay for each inspection technology. The survey for users' willingness to pay was conducted by attaching posters to promote surveys on the internet and within buses to the entire public. As a result of the analysis, the average WTP of the hydrogen bus internal chamber pressure transmission volume inspection technology was 25.3 KRW, the average WTP of the hydrogen bus internal chamber pressure emission volume inspection technology was 18.6 KRW, and the average WTP of the large-capacity CHSS oil pressure repetition-test assessment technology was measured at 16.7 KRW. In addition, the costs and benefits of the introduction of the relevant inspection technology were defined through the interviewing of experts at related research institutions and businesses. As a result of conducting an economic analysis (4.5% discount rate) according to the development of each inspection technology, economic feasibility was seen in all assessment and inspection technologies. As much as the technology is indispensable for the safe use of hydrogen buses, it shows that investment in related technology is very necessary in the future. However, because it was decided that the relevant analysis will differ according to the distribution rate of hydrogen buses, further analysis following this future distribution rate of hydrogen buses is needed, and future users should be made clearly aware of the safety and environmental nature of the technology.

A Study on the Improvement for Bidet Product-Service Design for Seniors by PSS-based 4D Double Diamond Design Process Model (PSS 기반 4D 더블 다이아몬드 모델을 활용한 시니어를 위한 비데 제품-서비스디자인 개선방안 연구)

  • Seo, Hong-Seok
    • Science of Emotion and Sensibility
    • /
    • v.25 no.1
    • /
    • pp.29-40
    • /
    • 2022
  • This study uses the bidet 4D double diamond design process model to propose an improvement for "senior-oriented bidet product service design" that reflects the characteristics and needs of seniors. This study was based on the product service system concept. To this end, qualitative research on seniors was conducted to derive user value factors, and, based on this, product service ideas were discovered, and a prototype reflecting the usefulness review of a working-level expert group was proposed. First, a "smart application service for user-customized function setting guide" was proposed. A bidet incorporating Internet of Things technology and a smart phone are linked to provide an app service that automatically interprets user characteristic information and information on bidet products to guide customized functions. Second, a control panel and remote control user interface to "user-oriented product service interface" was proposed. In consideration of the usability and cognitive ability of seniors, a simple and intuitive physical user interface such as a configuration centered on main functions, button arrangement according to task sequence, and a touch screen remote control was presented. Third, we proposed a "bidet care service linked with products and health/hygiene care" that provides a wide range of services such as user health and hygiene, cleanliness, entertainment, etc., in addition to regular bidet product service. This study proposed a product-based service design methodology that can improve user experience and relationship quality by discovering and improving the pain points and needs of users (seniors) in the process of using bidet products (before, during, and after use).

A Study on the Gaze Flow of Internet Portal Sites Utilizing Eye Tracking (아이트래킹을 활용한 인터넷 포털사이트의 시선 흐름에 관한 연구)

  • Hwang, Mi-Kyung;Kwon, Mahn-Woo;Lee, Sang-Ho;Kim, Chee-Yong
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.2
    • /
    • pp.177-183
    • /
    • 2022
  • This study investigated through eye tracking what gaze path the audience searches through portal sites (Naver, Daum, Zoom, and Nate). As a result of the layout analysis according to the gaze path of the search engine, the four main pages, which can be called to be the gateway to information search, appeared in the form of a Z-shaped layout. The news and search pages of each site use an F-shape, which means that when people's eyes move from top to right in an F-shape, they read while moving their eyes from left to right(LTR), which sequentially moves to the bottom. As a result of analyzing through the heat map, gaze plot, and cluster, which are the visual analysis indicators of eye tracking, the concentration of eyes on the photo and head copy was found the most in the heat map, and it can be said to be of high interest in the information. The flow of gaze flows downward from the top left to the right, and it can be seen that the cluster is most concentrated at the top of the portal site. The website designer should focus on improving the accessibility and readability of the information desired by the user in the layout design, and periodic interface changes are required by investigating and analyzing the tendencies and behavioral patterns of the main users.

Development of an IoT Smart Sensor for Detecting Gaseous Materials (사물인터넷 기술을 이용한 가스상 물질 측정용 스마트센서 개발과 향후과제)

  • Kim, Wook;Kim, Yongkyo;You, Yunsun;Jung, Kihyo;Choi, Won-Jun;Lee, Wanhyung;Kang, Seong-Kyu;Ham, Seunghon
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.32 no.1
    • /
    • pp.78-88
    • /
    • 2022
  • Objectives: To develop the smart sensor to protect worker's health from chemical exposure by adopting ICT (Information and Communications Technology) technologies. Methods: To develope real-time chemical exposure monitoring system, IoT (Internet of Things) sensor technology and regulations were reviewed. We developed and produced smart sensor. A smart sensor is a system consisting of a sensor unit, a communication unit, and a platform. To verify the performance of smart sensors, each sensor has been certified by the Korea Laboratory Accreditation Scheme (KOLAS). Results: Chemicals (TVOC; Total Volatile Organic Compounds, Cl2: Chlorine, HF: Hydrogen fluoride and HCN: Hydrogen cyanide) were selected according to a priority logic (KOSHA Alert, acute poisoning statistics, literature review). Notifications were set according to OEL (occupational exposure limit). Sensors were selected based on OEL and the capabilities of the sensors. Communication is designed to use LTE (Long Term Evolution) and Wi-Fi at the same time for convenience. Electronic platform were applied to build this monitoring system. Conclusions: Real-time monitoring system for OEL of hazardous chemicals in workplace was developed. Smart sensor can detect chemicals to complement monitoring of traditional workplace environmental monitoring such as short term and peak exposure. Further research is needed to expand the scope of application, improve reliability, and systematically application.

Efficient Privacy-Preserving Duplicate Elimination in Edge Computing Environment Based on Trusted Execution Environment (신뢰실행환경기반 엣지컴퓨팅 환경에서의 암호문에 대한 효율적 프라이버시 보존 데이터 중복제거)

  • Koo, Dongyoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.9
    • /
    • pp.305-316
    • /
    • 2022
  • With the flood of digital data owing to the Internet of Things and big data, cloud service providers that process and store vast amount of data from multiple users can apply duplicate data elimination technique for efficient data management. The user experience can be improved as the notion of edge computing paradigm is introduced as an extension of the cloud computing to improve problems such as network congestion to a central cloud server and reduced computational efficiency. However, the addition of a new edge device that is not entirely reliable in the edge computing may cause increase in the computational complexity for additional cryptographic operations to preserve data privacy in duplicate identification and elimination process. In this paper, we propose an efficiency-improved duplicate data elimination protocol while preserving data privacy with an optimized user-edge-cloud communication framework by utilizing a trusted execution environment. Direct sharing of secret information between the user and the central cloud server can minimize the computational complexity in edge devices and enables the use of efficient encryption algorithms at the side of cloud service providers. Users also improve the user experience by offloading data to edge devices, enabling duplicate elimination and independent activity. Through experiments, efficiency of the proposed scheme has been analyzed such as up to 78x improvements in computation during data outsourcing process compared to the previous study which does not exploit trusted execution environment in edge computing architecture.

Improvement Mechanism for Automatic Web Vulnerability Diagnosis (웹취약점 자동진단 개선방안)

  • Kim, Tae-Seop;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.2
    • /
    • pp.125-134
    • /
    • 2022
  • Due to the development of smartphone technology, as of 2020, 91.9% of people use the Internet[1] to frequently acquire information through websites and mobile apps. As the number of homepages in charge of providing information is increasing every year, the number of applications for web vulnerability diagnosis, which diagnoses the safety of homepages, is also increasing. In the existing web vulnerability check, the number of diagnostic personnel should increase in proportion to the number of homepages that need diagnosis because the diagnosticians manually test the homepages for vulnerabilities. In reality, however, there is a limit to securing a web vulnerability diagnosis manpower, and if the number of diagnosis manpower is increased, a lot of costs are incurred. To solve these problems, an automatic diagnosis tool is used to replace a part of the manual diagnosis. This paper explores a new method to expand the current automatic diagnosis range. In other words, automatic diagnosis possible items were derived by analyzing the impact of web vulnerability diagnosis items. Furthermore, automatic diagnosis identified possible items through comparative analysis of diagnosis results by performing manual and automatic diagnosis on the website in operation. In addition, it is possible to replace manual diagnosis for possible items, but not all vulnerability items, through the improvement of automatic diagnosis tools. This paper will explore some suggestions that can help improve plans to support and implement automatic diagnosis. Through this, it will be possible to contribute to the creation of a safe website operating environment by focusing on the parts that require precise diagnosis.

A study on deep neural speech enhancement in drone noise environment (드론 소음 환경에서 심층 신경망 기반 음성 향상 기법 적용에 관한 연구)

  • Kim, Jimin;Jung, Jaehee;Yeo, Chaneun;Kim, Wooil
    • The Journal of the Acoustical Society of Korea
    • /
    • v.41 no.3
    • /
    • pp.342-350
    • /
    • 2022
  • In this paper, actual drone noise samples are collected for speech processing in disaster environments to build noise-corrupted speech database, and speech enhancement performance is evaluated by applying spectrum subtraction and mask-based speech enhancement techniques. To improve the performance of VoiceFilter (VF), an existing deep neural network-based speech enhancement model, we apply the Self-Attention operation and use the estimated noise information as input to the Attention model. Compared to existing VF model techniques, the experimental results show 3.77%, 1.66% and 0.32% improvements for Source to Distortion Ratio (SDR), Perceptual Evaluation of Speech Quality (PESQ), and Short-Time Objective Intelligence (STOI), respectively. When trained with a 75% mix of speech data with drone sounds collected from the Internet, the relative performance drop rates for SDR, PESQ, and STOI are 3.18%, 2.79% and 0.96%, respectively, compared to using only actual drone noise. This confirms that data similar to real data can be collected and effectively used for model training for speech enhancement in environments where real data is difficult to obtain.

The Role of Innovative Activities in Training Students Using Computer Technologies

  • Minenok, Antonina;Donets, Ihor;Telychko, Tetiana;Hud, Hanna;Smoliak, Pavlo;Kurchatova, Angelika;Kuchai, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.105-112
    • /
    • 2022
  • Innovation is considered as an implemented innovation in education - in the content, methods, techniques and forms of educational activity and personality education (methods, technologies), in the content and forms of organizing the management of the educational system, as well as in the organizational structure of educational institutions, in the means of training and education and in approaches to social services in education, distance and multimedia learning, which significantly increases the quality, efficiency and effectiveness of the educational process. The classification of currently known pedagogical technologies that are most often used in practice is shown. The basis of the innovative activity of a modern teacher is the formation of an innovative program-methodical complex in the discipline. Along with programmatic and content provision of disciplines, the use of informational tools and their didactic properties comes first. It combines technical capabilities - computer and video technology with live communication between the lecturer and the audience. In pedagogical innovation, the principles reflecting specific laws and regularities of the implementation of innovative processes are singled out. All principles are elements of a complex system of organization and management of innovative activities in the field of education and training. They closely interact with each other, which enhances the effect of each of them due to the synergistic effect. To improve innovative activities in the training of students, today computer technologies are widely used in pedagogy as a science, as well as directly in the practice of the pedagogical process. They have gained the most popularity in such activities as distance learning, online learning, assistance in the education management system, development of programs and virtual textbooks in various subjects, searching for information on the network for the educational process, computer testing of students' knowledge, creation of electronic libraries, formation of a unified scientific electronic environment, publication of virtual magazines and newspapers on pedagogical topics, teleconferences, expansion of international cooperation in the field of Internet education. The article considers computer technologies as the main building material for the entire society. In the modern world, there is a need to prepare a person for life in a multimedia environment. This process should be started as early as possible, because the child's contact with the media is present almost from the moment of his birth.

Research on Cross-border Practice and Communication of Dance Art in the New Media Environment (뉴미디어 환경에서 무용예술의 크로스오버 실현과 전파에 대한 연구)

  • Zhang, Mengni;Zhang, Yi
    • Journal of Korea Entertainment Industry Association
    • /
    • v.13 no.1
    • /
    • pp.47-57
    • /
    • 2019
  • The end of the 20th century, along with the popularity of new media technology and the rise of new media art, dance as a visual art, and body language art, has the features of more and more rich and changeful. In today's Internet booming new media environment, many different fields, such as film and theater, computer technology, digital art, etc.) with its commonness and characteristics of all kinds of interaction between the creation, produced a new interdisciplinary research with theoretical model. When cross-border interactions between various areas become a hot topic at the same time, the traditional form of dance performances are also seeking new breakthrough. Canada's famous social psychologist McLuhan believes that modern is retrieving lost over a long period of time "overall" feel, return to a feeling of equilibrium. The audience how to have the characteristics of focus on details of visual art back to the "overall" feel worthy of study. At the same time, the new media in today's digital dance teaching in colleges and universities dancing education remains to be perfect and popular, if continue to use the precept of the traditional teaching way blindly, so it is difficult to get from the development of the current domestic dance overall demand. In this paper, the main body is divided into two parts, the first chapter is the study of image device dance performance art, the second chapter is the research of digital dance teaching application system, thus further perspective of media technology to explore dance art crossover practice under the new media environment and mode of transmission.

Design and Forensic Analysis of a Zero Trust Model for Amazon S3 (Amazon S3 제로 트러스트 모델 설계 및 포렌식 분석)

  • Kyeong-Hyun Cho;Jae-Han Cho;Hyeon-Woo Lee;Jiyeon Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.295-303
    • /
    • 2023
  • As the cloud computing market grows, a variety of cloud services are now reliably delivered. Administrative agencies and public institutions of South Korea are transferring all their information systems to cloud systems. It is essential to develop security solutions in advance in order to safely operate cloud services, as protecting cloud services from misuse and malicious access by insiders and outsiders over the Internet is challenging. In this paper, we propose a zero trust model for cloud storage services that store sensitive data. We then verify the effectiveness of the proposed model by operating a cloud storage service. Memory, web, and network forensics are also performed to track access and usage of cloud users depending on the adoption of the zero trust model. As a cloud storage service, we use Amazon S3(Simple Storage Service) and deploy zero trust techniques such as access control lists and key management systems. In order to consider the different types of access to S3, furthermore, we generate service requests inside and outside AWS(Amazon Web Services) and then analyze the results of the zero trust techniques depending on the location of the service request.