• 제목/요약/키워드: Machine-to-Machine(M2M)

Search Result 1,080, Processing Time 0.024 seconds

Diagnostic reference levels in intraoral dental radiography in Korea

  • Kim, Eun-Kyung;Han, Won-Jeong;Choi, Jin-Woo;Jung, Yun-Hoa;Yoon, Suk-Ja;Lee, Jae-Seo
    • Imaging Science in Dentistry
    • /
    • v.42 no.4
    • /
    • pp.237-242
    • /
    • 2012
  • Purpose: The objectives of this study were to survey the radiographic exposure parameters, to measure the patient doses for intraoral dental radiography nationwide, and thus to establish the diagnostic reference levels (DRLs) in intraoral dental X-ray examination in Korea. Materials and Methods: One hundred two intraoral dental radiographic machines from all regions of South Korea were selected for this study. Radiographic exposure parameters, size of hospital, type of image receptor system, installation duration of machine, and type of dental X-ray machine were documented. Patient entrance doses (PED) and dose-area products (DAP) were measured three times at the end of the exit cone of the X-ray unit with a DAP meter (DIAMENTOR M4-KDK, PTW, Freiburg, Germany) for adult mandibular molar intraoral dental radiography, and corrections were made for room temperature and pressure. Measured PED and DAP were averaged and compared according to the size of hospital, type of image receptor system, installation duration, and type of dental X-ray machine. Results: The mean exposure parameters were 62.6 kVp, 7.9 mA, and 0.5 second for adult mandibular molar intraoral dental radiography. The mean patient dose was 2.11 mGy (PED) and 59.4 $mGycm^2$ (DAP) and the third quartile one 3.07 mGy (PED) and 87.4 $mGycm^2$ (DAP). Doses at university dental hospitals were lower than those at dental clinics (p<0.05). Doses of digital radiography (DR) type were lower than those of film-based type (p<0.05). Conclusion: We recommend 3.1 mGy (PED), 87.4 $mGycm^2$ (DAP) as the DRLs in adult mandibular molar intraoral dental radiography in Korea.

Hybrid Trust Computational Model for M2M Application Services (M2M 애플리케이션 서비스를 위한 하이브리드형 신뢰 평가 모델)

  • Kim, Yukyong
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.53-62
    • /
    • 2020
  • In the end-user domain of an IoT environment, there are more and more intelligent M2M devices that provide resources to create and share application services. Therefore, it can be very useful to manage trust by transferring the role of the existing centralized service provider to end users in a P2P environment. However, in a decentralized M2M computing environment where end users independently provide or consume services, mutual trust building is the most important factor. This is because malicious users trying to build malfunctioning services can cause security problems in M2M computing environments such as IoT. In this paper, we provide an integrated analysis and approach for trust evaluation of M2M application services, and an optimized trust evaluation model that can guarantee reliability among users of the M2M community.

Efficient Congestion Control Technique of Random Access and Grouping for M2M according to User Type on 3GPP LTE-A s (3GPP LTE-A 시스템 기반 사용자 특성에 따른 효율적 Random Access 과부하 제어 기술 및 M2M 그룹화)

  • Kim, Junghyun;Ji, Soonbae;You, Cheolwoo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.3
    • /
    • pp.48-55
    • /
    • 2015
  • This paper studies how to solve a problem caused by M2M terminals sending a few data based on $3^{rd}$ Generation Partnership Project(3GPP) Long Term Evolution-Advanced(LTE-A) system and then it is analyzed, proposed, and introduced into the techniques. Especially, it is introduced solution for the lack of Random Access Channel and an increasing number of latency caused by countless M2M devices. It is proposed the technology for M2M grouping as well as allowable access probability according to user type. As it decreases the number of terminal by grouping M2M devices to try random access at PRACH, it can be reduced collision between Cellular users and M2M devices. So, it is proved that the proposed mechanism can solve the increasing average latency of random access on system coexisting Cellular users and M2M devices through simulations.

The Beacon Frame-Based Node Grouping Algorithm for Improving the Performance between MCT devices in the Home Wireless Network (가정 무선 네트워크 내 MCT 디바이스 간 성능 향상을 위한 Beacon frame 기반 노드 그룹화 알고리즘)

  • Kim, Gyu-Do;Kown, Young-Ho;Rhee, Byung-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.787-790
    • /
    • 2015
  • Recently, M2M (Machine to Machine) communication is possible the development of MTC (Machine Type Communication) devices becomes active. MCT devices in the form of home appliances have a low power consumption, low cost, short-range wireless communication in wireless home network. For purpose, MTC devices based on IEEE 802.15.4/Zigbee are composed in the form of cluster-tree topology, which consists of one PAN (Personal Area Network), one or other router and end of nodes. It happens that transmission delay, packet drop, and lacking data resulted from collision originated by a competition for allocating channels among MTC devices that greatly increased. At last performance of entire network can be degradated. This paper proposes that the beacon frame-based grouping algorithm using multiple channels in a MTC devices in the presence of wireless home network interference. The proposed algorithm decreases the transmission delay, dropped packet and throughput is more increase, so the proposal algorithm is more efficient than the IEEE 802.15.4/ Zigbee standard.

  • PDF

Context-Aware Security System for the Smart Phone-based M2M Service Environment

  • Lee, Hyun-Dong;Chung, Mok-Dong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.64-83
    • /
    • 2012
  • The number of smart phone users is rapidly growing due to recent increase in wireless Internet usage, development of a wide variety of applications, and activation of M2M (Machine to machine) services. Although the smart phone offers benefits of mobility and convenience, it also has serious security problems. To utilize M2M services in the smart phone, a flexible integrated authentication and access control facility is an essential requirement. To solve these problems, we propose a context-aware single sign-on and access control system that uses context-awareness, integrated authentication, access control, and an OSGi service platform in the smart phone environment. In addition, we recommend Fuzzy Logic and MAUT (Multi-Attribute Utility Theory) in handling diverse contexts properly as well as in determining the appropriate security level. We also propose a security system whose properties are flexible and convenient through a typical scenario in the smart phone environment. The proposed context-aware security system can provide a flexible, secure and seamless security service by adopting diverse contexts in the smart phone environment.

Design and Implementation of M2M Platform based on PWW (PWW 기반 사물통신 플랫폼의 설계 및 구현)

  • Choi, Bokdong;Eun, Seong Bae;Kim, Byungho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.3
    • /
    • pp.740-746
    • /
    • 2013
  • Machine to machine (M2M) communication is a converged ICT(Information and Communications Technology) platform which can utilize communications services among people and things anytime, any place in realtime. The M2M platform consists of three components; M2M area networks sensing and generating data of things by various sensors and devices; public networks transporting those data; and M2M applications utilizing the aggregated data. There exist however two practical obstacles to realize the M2M communications in terms of interoperability between the WCDMA-based public network and the local networks based on W-Fi or ZigBee; one is the cost problem required to access the public network, and the other is the lack of a cost-effective modem or gateway to connect two different networks. In this paper, we proposed and implemented a novel M2M platform based on PWW (Person Area Network) which can resolve those two issues by using a proposed gateway connecting the local network and smartphones as application devices without access the WCDMA-based public network. We have shown that the proposed platform is very practical to adopt to the real environment by actual testing with the own developed smartphone applications.

Application of Big Data and Machine-learning (ML) Technology to Mitigate Contractor's Design Risks for Engineering, Procurement, and Construction (EPC) Projects

  • Choi, Seong-Jun;Choi, So-Won;Park, Min-Ji;Lee, Eul-Bum
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.823-830
    • /
    • 2022
  • The risk of project execution increases due to the enlargement and complexity of Engineering, Procurement, and Construction (EPC) plant projects. In the fourth industrial revolution era, there is an increasing need to utilize a large amount of data generated during project execution. The design is a key element for the success of the EPC plant project. Although the design cost is about 5% of the total EPC project cost, it is a critical process that affects the entire subsequent process, such as construction, installation, and operation & maintenance (O&M). This study aims to develop a system using machine-learning (ML) techniques to predict risks and support decision-making based on big data generated in an EPC project's design and construction stages. As a result, three main modules were developed: (M1) the design cost estimation module, (M2) the design error check module, and (M3) the change order forecasting module. M1 estimated design cost based on project data such as contract amount, construction period, total design cost, and man-hour (M/H). M2 and M3 are applications for predicting the severity of schedule delay and cost over-run due to design errors and change orders through unstructured text data extracted from engineering documents. A validation test was performed through a case study to verify the model applied to each module. It is expected to improve the risk response capability of EPC contractors in the design and construction stage through this study.

  • PDF

Parallel Implementation of A Neural Network Ensemble on the Connection Machine CM-2 (Connection Machine CM-2상에서 신경망군(群)의 병렬 구현)

  • 김대진
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.34C no.1
    • /
    • pp.28-41
    • /
    • 1997
  • This paper describes a parallel implementation of a neurla network ensemble developed for object recognition on the connection machine CM-2. The implementation ensures that multiple networks are implemented simultaneously starting from different initial weights and all training samples are applied to each network by one sample per a copy of each network. When compared with a sequential implementation, this accelerates the computation speed by O(N.m.n) where N, m, and n are the network, respectively. The speedup in the computation time and the convergence characteristics of sthe modified backpropagation learning precedure were evaluated by two-dimensional object recognition problem.

  • PDF

Dynamic Model for Electrode Expansion in Resistance Spot Welding Machines (저항점 용접에서 전극팽창에 관한 동적모델)

  • Shah, Syed Asad Ullah;Chang, Hee-Seok
    • Journal of Welding and Joining
    • /
    • v.29 no.2
    • /
    • pp.94-101
    • /
    • 2011
  • A lumped mass damped vibratory model was proposed for quantitative understanding of welding machine characteristics. An experimental setup was developed to determine the mechanical parameters (moving mass m, equivalent stiffness k and damping c) which govern the dynamic mechanical response of the resistance spot welding machine. During the test, acceleration of the electrodes for each level of applied load was measured by accelerometer, filtered and numerically integrated to find the corresponding velocity and displacement. The machine dynamic parameters were determined by finding the unknowns of the proposed model with experimental data. A Simulink model was proposed to investigate the influence of these mechanical parameters on the welding process. The electrode response was simulated by changing values of stiffness and damping. It was observed that both of the machine parameters(c, k) have significant effect on the response of electrode head.

A Study on Logistics Distribution Industry's IoT Situation and Development Direction (국내외 물류산업의 사물인터넷(IoT) 현황과 발전방향에 관한 연구)

  • Park, Young-Tae
    • Management & Information Systems Review
    • /
    • v.34 no.3
    • /
    • pp.141-160
    • /
    • 2015
  • IoT(Internet of Things) has become a major issue as new type of convergence technology, expending existing of USNs(Ubiquitous Sensor Networks), NFC(Near Field Communication), and M2M(Machine to Machine). The IoT technology defines as a networking for things, which can establish intelligent links collaboratively for sensing networking and processing between each other without human intervention. The purpose of this study is to investigate to forecast the future distribution changes and orientation of contribution of distribution industry on IoT and to provide the implication of distribution changes. To become a global market leader, IoT requires much more development of core technology of IoT for distribution industry, new service creation and try to use a market-based demand side strategy to create markets. So, to become a global leader in distribution industry, this study results show that first of all establishment of standardization of IoT, privacy safeguards, security issues, stability and value were more important than others. The research findings suggest that the development goals of IoT should strive to boost the creation of a global leader in distribution industry and convenience to consider consumers' demands as the most important thing.

  • PDF