• Title/Summary/Keyword: Location system

Search Result 7,362, Processing Time 0.052 seconds

Electronic Roll Book using Electronic Bracelet.Child Safe-Guarding Device System (전자 팔찌를 이용한 전자 출석부.어린이 보호 장치 시스템)

  • Moon, Seung-Jin;Kim, Tae-Nam;Kim, Pan-Su
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.143-155
    • /
    • 2011
  • Lately electronic tagging policy for the sexual offenders was introduced in order to reduce and prevent sexual offences. However, most sexual offences against children happening these days are committed by the tagged offenders whose identities have been released. So, for the crime prevention, we need measures with which we could minimize the suffers more promptly and actively. This paper suggests a new system to relieve the sexual abuse related anxiety of the children and solve the problems that electronic bracelet has. Existing bracelets are only worn by serious criminals, and it's only for risk management and positioning, there is no way to protect the children who are the potential victims of sexual abuse and there actually happened some cases. So we suggest also letting the students(children) wear the LBS(Location Based Service) and USN(Ubiquitous Sensor Network) technology based electronic bracelets to monitor and figure out dangerous situations intelligently, so that we could prevent sexual offences against children beforehand, and while a crime is happening, we could judge the situation of the crime intelligently and take swift action to minimize the suffer. And by checking students' attendance and position, guardians could know where their children are in real time and could protect the children from not only sexual offences but also violent crimes against children like kidnapping. The overall system is like follows : RFID Tag for children monitors the approach of offenders. While an offender's RFID tag is approaching, it will transmit the situation and position as the first warning message to the control center and the guardians. When the offender is going far away, it turns to monitoring mode, and if the tag of the child or the offender is taken off or the child and offender stay at one position for 3~5 minutes or longer, then it will consider this as a dangerous situation, then transmit the emergency situations and position as the second warning message to the control center and the guardians, and ask for the dispatch of police to prevent the crime at the initial stage. The RFID module of criminals' electronic bracelets is RFID TAG, and the RFID module for the children is RFID receiver(reader), so wherever the offenders are, if an offender is at a place within 20m from a child, RFID module for children will transmit the situation every certain periods to the control center by the automatic response of the receiver. As for the positioning module, outdoors GPS or mobile communications module(CELL module)is used and UWB, WI-FI based module is used indoors. The sensor is set under the purpose of making it possible to measure the position coordinates even indoors, so that one could send his real time situation and position to the server of central control center. By using the RFID electronic roll book system of educational institutions and safety system installed at home, children's position and situation can be checked. When the child leaves for school, attendance can be checked through the electronic roll book, and when school is over the information is sent to the guardians. And using RFID access control turnstiles installed at the apartment or entrance of the house, the arrival of the children could be checked and the information is transmitted to the guardians. If the student is absent or didn't arrive at home, the information of the child is sent to the central control center from the electronic roll book or access control turnstiles, and look for the position of the child's electronic bracelet using GPS or mobile communications module, then send the information to the guardians and teacher so that they could report to the police immediately if necessary. Central management and control system is built under the purpose of monitoring dangerous situations and guardians' checking. It saves the warning and pattern data to figure out the areas with dangerous situation, and could help introduce crime prevention systems like CCTV with the highest priority. And by DB establishment personal data could be saved, the frequency of first and second warnings made, the terminal ID of the specific child and offender, warning made position, situation (like approaching, taken off of the electronic bracelet, same position for a certain time) and so on could be recorded, and the data is going to be used for preventing crimes. Even though we've already introduced electronic tagging to prevent recurrence of child sexual offences, but the crimes continuously occur. So I suggest this system to prevent crimes beforehand concerning the children's safety. If we make electronic bracelets easy to use and carry, and set the price reasonably so that many children can use, then lots of criminals could be prevented and we can protect the children easily. By preventing criminals before happening, it is going to be a helpful system for our safe life.

A Study on The Enhancement of Aviation Safety in Airport Planning & Construction from a Legal Perspective (공항개발계획과 사업에서의 항공안전성 제고에 대한 법률적 소고)

  • Kim, Tae-Han
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.27 no.2
    • /
    • pp.67-106
    • /
    • 2012
  • Today air traffic at the airport is complicated including a significant increase in the volume of air transport, so aviation accidents are constantly occurring. Therefore, we should newly recognize importance of the Air Traffic Safety, the core values of the Air Traffic. The location of airport that is the basic infrastructure of the air traffic and the security of safety for facilities and equipments are more important than what you can. From this dimension, I analyze the step-by-step safety factors that are taken into account in the airport development projects from the construction or improvement of the airport within the current laws and institutions and give my opinion on the enhancement of safety in the design and construction of airport. The safety of air traffic, as well as airport, depends on location, development, design, construction, inspection and management of the airport including airport facilities because we have to carry out the national responsibility that prevents the risk of large social overhead capital for many and unspecified persons in modern society through legislation regarding intervention of specialists and locational criteria for aviation safety from the planning stage of airport development. In addition, well-defined installation standards of airports and air navigation facilities, the key points of the airport development phase, can ensure the safety of the airport and airport facilities. Of course, the installation standards of airport and air navigation facilities are based on the global standard due to the nature of air traffic. However, to prevent the chaos for the safety standards in design, construction, inspection of them and to ensure the aviation safety, the safety standards must be further subdivided in the course of domestic legislation. The criteria for installation of the Air Navigation facilities is regulated most specifically. However, to ensure the safety of the operation for Air Navigation Facilities, performance system proved suitable for the Safety of Air Navigation Facilities must change over from arbitrary restrictions to mandatory restrictions and be applied for foreign producers as well as domestic producers. Of course, negligence of pilots and defective aircraft maintenance lead to a large portion of the aviation accidents. However, I think that air traffic accidents can be reduced if the airport or airport facility is perfect enough to ensure the safety. Therefore, legal and institutional supplement to prioritize the aviation safety from the stage of airport development may be necessary.

  • PDF

Exploring the Temporal Relationship Between Traffic Information Web/Mobile Application Access and Actual Traffic Volume on Expressways (웹/모바일-어플리케이션 접속 지표와 TCS 교통량의 상관관계 연구)

  • RYU, Ingon;LEE, Jaeyoung;CHOI, Keechoo;KIM, Junghwa;AHN, Soonwook
    • Journal of Korean Society of Transportation
    • /
    • v.34 no.1
    • /
    • pp.1-14
    • /
    • 2016
  • In the recent years, the internet has become accessible without limitation of time and location to anyone with smartphones. It resulted in more convenient travel information access both on the pre-trip and en-route phase. The main objective of this study is to conduct a stationary test for traffic information web/mobile application access indexes from TCS (Toll Collection System); and analyzing the relationship between the web/mobile application access indexes and actual traffic volume on expressways, in order to analyze searching behavior of expressway related travel information. The key findings of this study are as follows: first, the results of ADF-test and PP-test confirm that the web/mobile application access indexes by time periods satisfy stationary conditions even without log or differential transformation. Second, the Pearson correlation test showed that there is a strong and positive correlation between the web/mobile application access indexes and expressway entry and exit traffic volume. In contrast, truck entry traffic volume from TCS has no significant correlation with the web/mobile application access indexes. Third, the time gap relationship between time-series variables (i.e., concurrent, leading and lagging) was analyzed by cross-correlation tests. The results indicated that the mobile application access leads web access, and the number of mobile application execution is concurrent with all web access indexes. Lastly, there was no web/mobile application access indexes leading expressway entry traffic volumes on expressways, and the highest correlation was observed between webpage view/visitor/new visitor/repeat visitor/application execution counts and expressway entry volume with a lag of one hour. It is expected that specific individual travel behavior can be predicted such as route conversion time and ratio if the data are subdivided by time periods and areas and utilizing traffic information users' location.

A Study on Strategy for developing LBS Entertainment content based on local tourist information (지역 관광 정보를 활용한 LBS 엔터테인먼트 컨텐츠 개발 방안에 관한 연구)

  • Kim, Hyun-Jeong
    • Archives of design research
    • /
    • v.20 no.3 s.71
    • /
    • pp.151-162
    • /
    • 2007
  • How can new media devices and networks provide an effective response to the world's growing sector of cultural and historically-minded travelers? This study emerged from the question of how mobile handsets can change the nature of cultural and historical tourism in ubiquitous city environments. As wireless network and mobile IT have rapidly developed, it becomes possible to deliver cultural and historical information on the site through mobile handset as a tour guidance system. The paper describes the development of a new type of mobile tourism platform for site-specific cultural and historical information. The central objective of the project was to organize this cultural and historical walking tour around the mobile handset and its unique advantages (i.e. portability, multi-media capacity, access to wireless internet, and location-awareness potential) and then integrate the tour with a historical story and role-playing game that would deepen the mobile user's interest in the sites being visited, and enhance his or her overall experience of the area. The project was based on twelve locations that were culturally and historically significant to Korean War era in Busan. After the mobile tour game prototype was developed for this route, it was evaluated at the 10th PIFF (Pusan International Film Festival). After use test, some new strategies for developing mobile "edutainment content" to deliver cultural historical contents of the location were discussed. Combining 'edutainment' with a cultural and historical mobile walking tour brings a new dimension to existing approaches of the tourism and mobile content industry.

  • PDF

The Effect of the Axial Plane on Measurement of Available Bone Height for Dental Implant in Computed Tomography of the Mandible (하악의 전산화 단층사진에서 횡단면이 임플랜트를 위한 가용골 높이의 결정에 미치는 영향)

  • Jhin, Min-Ju
    • Journal of Periodontal and Implant Science
    • /
    • v.32 no.2
    • /
    • pp.379-388
    • /
    • 2002
  • For the success of dental implant, accurate radiographic evaluation is prerequisite for planning the location of the osseointegrated implants and avoiding injury to vital structures. CT/MPR(computed tomography/multiplanar reformation) shows improved visualization of inferior alveolar canal. In order to obtain cross-sectional images parallel to the teeth, the occlusal plane is used to orientate for the axial plane. If the direction of axial plane is not parallel to the occlusal plane, the reformatted cross-sectional scans will be oblique to the planned fixture direction and will not show the actual dimension of the planned fixture's location. If the available bone height which measured in the cross-sectional view is much greater than the actual available bone height, penetration of canal may occur. The aim of this study is to assess the effect of the axial plane to measurement of available bone height for dental implant in computed tomography of the mandible. 40 patients who had made radiographic stents and had taken CT were selected. The sites that were included in the study were 45 molar regions. In the central panoramic scan, the length from alveolar crest to superior border of inferior alveolar canal(available bone height, ABH) was measured in direction of reformatted cross-sectional plane(uncorrected ABH). Then, length from alveolar crest to superior border of canal was measured in direction of stent(corrected ABH). The angle between uncorrected ABH and corrected ABH was measured. From each ABH, available fixture length was decided by $Br{{\aa}}nemark$ system. The results were following ; the difference between two ABHs was statistically significant in both first and second molar(p< 0.01). The percentage of difference more than 1 mm was 8.7% in first molar and 15.5% in second molar. The percentage of difference more than 2 mm was 2.0% in first molar and 6.6% in second molar. The maximum value of difference was 2.5 mm in first molar and 2.2 mm in second molar. The correlations between difference of 2 ABHs and angle was positive correlations in both first and second molar. The correlation coefficient was 0.534 in first molar and 0.728 in second molar. The second molar has a stronger positive correlation. The percentage of disagreement between 2 fixture lengths from two ABHs was 24.4% in first molar and 28.9% in second molar.

Determinants of Successful Percutaneous Transluminal Coronary Angioplasty (경피적 관상동맥 성형술의 성공율에 영향을 미치는 인자에 대한 고찰)

  • Choi, Kyo-Won;Kweon, Jun-Young;Kim, Young-Jin;Lee, Tae-Il;Shin, Dong-Gu;Kim, Young-Jo;Shim, Bong-Seup;Lee, Hyun-Woo;Lee, Sam-Beom
    • Journal of Yeungnam Medical Science
    • /
    • v.11 no.2
    • /
    • pp.230-239
    • /
    • 1994
  • In Order to evaluate determinants of successful percutaneous transluminal coronary angioplasty (PTCA), PTCA was performed for 172 coronary arterial lesions in 120 patients (89 male, 31 female) at Yeungnam university hospital from Sep. 1992 to Aug. 1993. The corinary artery luminal diameter at the site of the original stenosis was eveluated from end-diastolic frames of identical projections of the preangioplasty and immediate post angioplasty. The coronary luminal and balloon diameters were measured with using of computer measuring system. Overall success rate of 172 attempted lesions was 87.2%. Success rate of female patients was 93.5% and higher than those of male patients. According to the clinical diagnosis, success rate in stable angina was 93.7% and higher than those of post myocardial infarction angina, unstable angina and acute myocardial infarcrion. Success rate of American Heart Association type C lesion was 65.5% and lower those of type A (95.7%), type B (89.5%). There was signfifcantly difference in preangioplasty luminal stenosis, elastic recoil and length of lesion between successful PTCA group and failed PTCA group. Success rate of lesion location at a bend > $45^{\circ}$ and presence of intracoronary thrombus were lower than than those of other angiographic findings. In coclusion, primary angioplasty success was affected by specific angiographic factors. Stenosis severity, thrombus, lesion location at a bend > $45^{\circ}$, elastic recoil, and length of lesion were the principle of determinants of coronary angioplasty success rate.

  • PDF

Fusion of Gamma and Realistic Imaging (감마영상과 실사영상의 Fusion)

  • Kim, Yun-Cheol;Yu, Yeon-Uk;Seo, Young-Deok;Moon, Jong-Woon;Kim, Yeong-Seok;Won, Woo-Jae;Kim, Seok-Ki
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.14 no.1
    • /
    • pp.78-82
    • /
    • 2010
  • Purpose: Recently, South Korea has seen a rapidly increased incidence of both breast and thyroid cancers. As a result, the I-131 scan and lymphoscintigraphy have been performed more frequently. Although this type of diagnostic imaging is prominent in that visualizes pathological conditions, which is similar to previous nuclear diagnostic imaging techniques, there is not much anatomical information obtained. Accordingly, it has been used in different ways to help find anatomical locations by transmission scan, however the results were unsatisfactory. Therefore, this study aims to realize an imaging technique which shows more anatomical information through the fusion of gamma and realistic imaging. Materials and Methods: We analyzed the data from patients who were examined by the lymphoscintigraphy and I-131 additional scan by Symbia Gamma camera (SIEMENS) in the nuclear medicine department of the National Cancer Center from April to July of 2009. First, we scanned the same location in patients by using a miniature camera (R-2000) in hyVISION. Afterwards, we scanned by gamma camera. The data we obtained was evaluated based on the scanning that measures an agreement of gamma and realistic imaging by the Gamma Ray Tool fusion program. Results: The amount of radiation technicians and patients were exposed was generated during the production process of flood source and applied transmission scan. During this time, the radiation exposure dose of technicians was an average of 14.1743 ${\mu}Sv$, while the radiation exposure dose of patients averaged 0.9037 ${\mu}Sv$. We also confirmed this to matching gamma and realistic markers in fusion imaging. Conclusion: Therefore, we found that we could provide imaging with more anatomical information to clinical doctors by fusion of system of gamma and realistic imaging. This has allowed us to perform an easier method in which to reduce the work process. In addition, we found that the radiation exposure can be reduced from the flood source. Eventually, we hope that this will be applicable in other nuclear medicine studies. Therefore, in order to respect the privacy of patients, this procedure will be performed only after the patient has agreed to the procedure after being given a detailed explanation about the process itself and its advantages.

  • PDF

Study on the Consequence Effect Analysis & Process Hazard Review at Gas Release from Hydrogen Fluoride Storage Tank (최근 불산 저장탱크에서의 가스 누출시 공정위험 및 결과영향 분석)

  • Ko, JaeSun
    • Journal of the Society of Disaster Information
    • /
    • v.9 no.4
    • /
    • pp.449-461
    • /
    • 2013
  • As the hydrofluoric acid leak in Gumi-si, Gyeongsangbuk-do or hydrochloric acid leak in Ulsan, Gyeongsangnam-do demonstrated, chemical related accidents are mostly caused by large amounts of volatile toxic substances leaking due to the damages of storage tank or pipe lines of transporter. Safety assessment is the most important concern because such toxic material accidents cause human and material damages to the environment and atmosphere of the surrounding area. Therefore, in this study, a hydrofluoric acid leaked from a storage tank was selected as the study example to simulate the leaked substance diffusing into the atmosphere and result analysis was performed through the numerical Analysis and diffusion simulation of ALOHA(Areal Location of Hazardous Atmospheres). the results of a qualitative evaluation of HAZOP (Hazard Operability)was looked at to find that the flange leak, operation delay due to leakage of the valve and the hose, and toxic gas leak were danger factors. Possibility of fire from temperature, pressure and corrosion, nitrogen supply overpressure and toxic leak from internal corrosion of tank or pipe joints were also found to be high. ALOHA resulting effects were a little different depending on the input data of Dense Gas Model, however, the wind direction and speed, rather than atmospheric stability, played bigger role. Higher wind speed affected the diffusion of contaminant. In term of the diffusion concentration, both liquid and gas leaks resulted in almost the same $LC_{50}$ and ALOHA AEGL-3(Acute Exposure Guidline Level) values. Each scenarios showed almost identical results in ALOHA model. Therefore, a buffer distance of toxic gas can be determined by comparing the numerical analysis and the diffusion concentration to the IDLH(Immediately Dangerous to Life and Health). Such study will help perform the risk assessment of toxic leak more efficiently and be utilized in establishing community emergency response system properly.

A Mutual P3P Methodology for Privacy Preserving Context-Aware Systems Development (프라이버시 보호 상황인식 시스템 개발을 위한 쌍방향 P3P 방법론)

  • Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.18 no.1
    • /
    • pp.145-162
    • /
    • 2008
  • One of the big concerns in e-society is privacy issue. In special, in developing robust ubiquitous smart space and corresponding services, user profile and preference are collected by the service providers. Privacy issue would be more critical in context-aware services simply because most of the context data themselves are private information: user's current location, current schedule, friends nearby and even her/his health data. To realize the potential of ubiquitous smart space, the systems embedded in the space should corporate personal privacy preferences. When the users invoke a set of services, they are asked to allow the service providers or smart space to make use of personal information which is related to privacy concerns. For this reason, the users unhappily provide the personal information or even deny to get served. On the other side, service provider needs personal information as rich as possible with minimal personal information to discern royal and trustworthy customers and those who are not. It would be desirable to enlarge the allowable personal information complying with the service provider's request, whereas minimizing service provider's requiring personal information which is not allowed to be submitted and user's submitting information which is of no value to the service provider. In special, if any personal information required by the service provider is not allowed, service will not be provided to the user. P3P (Platform for Privacy Preferences) has been regarded as one of the promising alternatives to preserve the personal information in the course of electronic transactions. However, P3P mainly focuses on preserving the buyers' personal information. From time to time, the service provider's business data should be protected from the unintended usage from the buyers. Moreover, even though the user's privacy preference could depend on the context happened to the user, legacy P3P does not handle the contextual change of privacy preferences. Hence, the purpose of this paper is to propose a mutual P3P-based negotiation mechanism. To do so, service provider's privacy concern is considered as well as the users'. User's privacy policy on the service provider's information also should be informed to the service providers before the service begins. Second, privacy policy is contextually designed according to the user's current context because the nomadic user's privacy concern structure may be altered contextually. Hence, the methodology includes mutual privacy policy and personalization. Overall framework of the mechanism and new code of ethics is described in section 2. Pervasive platform for mutual P3P considers user type and context field, which involves current activity, location, social context, objects nearby and physical environments. Our mutual P3P includes the privacy preference not only for the buyers but also the sellers, that is, service providers. Negotiation methodology for mutual P3P is proposed in section 3. Based on the fact that privacy concern occurs when there are needs for information access and at the same time those for information hiding. Our mechanism was implemented based on an actual shopping mall to increase the feasibility of the idea proposed in this paper. A shopping service is assumed as a context-aware service, and data groups for the service are enumerated. The privacy policy for each data group is represented as APPEL format. To examine the performance of the example service, in section 4, simulation approach is adopted in this paper. For the simulation, five data elements are considered: $\cdot$ UserID $\cdot$ User preference $\cdot$ Phone number $\cdot$ Home address $\cdot$ Product information $\cdot$ Service profile. For the negotiation, reputation is selected as a strategic value. Then the following cases are compared: $\cdot$ Legacy P3P is considered $\cdot$ Mutual P3P is considered without strategic value $\cdot$ Mutual P3P is considered with strategic value. The simulation results show that mutual P3P outperforms legacy P3P. Moreover, we could conclude that when mutual P3P is considered with strategic value, performance was better than that of mutual P3P is considered without strategic value in terms of service safety.

Nodal Status of the Head and Neck Cancer Patients (두경부 암 환자의 경부 림프절 전이 분석)

  • Yang, Dae-Sik;Choi, Myung-Sun;Choi, Jong-Ouck
    • Radiation Oncology Journal
    • /
    • v.15 no.4
    • /
    • pp.321-329
    • /
    • 1997
  • Purpose : It is well known that the risk of lymph nodes metastases to head and neck cancers are influenced by the location and size of the Primary tumor. as well as the degree and types of histological differentiation. However, data on the statistical analyses of lymph node metastases from the head and neck cancers among Korean Population are not available at present. In order to obtain current status of such data, we have analyzed cancer patients at the department of radiation oncology, korea universityhospital for radiation treatment. Materials and Methods : We have evaluated nine-hundred and ninetyseven (997) head and neck cancer Patients who visited to the Department of radiation oncology, between November 1981 to December 1995. After careful physical examinations and CAT scan, Patients were divided into two groups, those with positive lymph node metastases and with negative lymph node metastases. The nodal status were classified according to the TNM system of American Joint Committee on Cancer (AJCC) Besults : Four-hundred and sixteen Patients out of the 997 patients were lymph node positive $(42\%)$ and 581 patients were lymph node negative $(58\%)$ when they were first presented at the department of radiation oncelogy. According to the AJCC classification, the distribution of positive lymph node is as follow: Nl:106 $(25.5\%),\;N2a:100\;(24\%),\;N2b:68\;(16.4\%),\;N2c:69\;(16.6\%),\;3:73\;(15\%).$ respectively. The frequency of lymph node metastases according to the primary sites is as follow : larynx 283 $(28.5\%)$, paranasal sinuses: 182 $(18\%),\;oropharynx:144\;(14.5\%)\;nasopharynx:122(12\%),\;oral\;cavity\;92\;(9\%),\;hypopharynx:71\;(7\%),\;falivary\;gland:58\;(6\%)$ unknown primary:31 $(3\%),\;skin:\;14(2\%)$,. The most frequent Primary site for the positive Iymph node metastases was nasopharynx $(71\%)$ followed by hypopharynx $(69\%),\;oropharynx\;(64\%),\;oral\;cavity\;(39\%)$ The most common histologic type was squamous cell carcinoma (652/997: $65.4\%$). followed by malignant lymphoma $(109/997:11\%)$. Conclusion : Statistical results of lymph node metastases from head and neck cancer at our department were very similar to those obtained from other countries. It is concluded that the location of Primary cancer influences sites of metastases on head and neck, and stage of the primary cancer also influences the development of metastatic lesions. Since the present study is limited on the data collected from one institute. further statistical analyses on Korean cancer Patients are warrented.

  • PDF