• Title/Summary/Keyword: Mobile Operating System

Search Result 397, Processing Time 0.024 seconds

A Study on the Activation·Specification of 119 Rescue & Care in JeJu (제주도 119구조·구급대의 활성화 및 전문화 방안)

  • Koh, Jae-Moon;Kim, Tae-Min;Kim, Hyo-Sik;Lee, Young-A
    • The Korean Journal of Emergency Medical Services
    • /
    • v.6 no.1
    • /
    • pp.153-168
    • /
    • 2002
  • Since 1992, conventional fire fighting businesses have been converted into a metropolitan autonomous fire fighting system to be ready for a variety of disasters. However, the corresponding investment has been overlapped due to the non-integration of businesses to prevent any potential disasters, and a series of collaborative systems have been not functioning so well. In the meantime, our fire fighting sector has been trying to set up its own clean and faithful position by abolishing any inconvenient system or outsourcing private sectors, and expanded its work scope from conventional fire fighting even to rescue and emergency works. While focusing on handling disaster, the fire fighting sector has been widely trusted and reliable throughtout our nation. Moreover, our fire fighting sector has secured nation wide mobile organizations, technical personnel by field, special equipments and independent communication network. In addition, the fire fighting sector has knowledges, expertise and capabilities required for managing disasters, while in charge of almost every disaster management works including fire, explosion, collapse, disaster and flood. It becomes an organization for comprehensive disaster management under an absolute national trust, which is based on the system for prevention, preparation and countermeasure against a variety of disasters. Thus, our fire fighting sector must make many efforts and try to modernize conventional education and training. The ways to facilitate rescue and emergency works may include the nurture of technical fire fighting personnel along with modernized equipments, the reinforcement of rescue and emergency education, the facilitation of operating civil defense corps, the facilitation of operating volunteer fire fighting corps, the better arrangement of 119 briefing room for public healthcare in provincial offices, the sterilization of rescue instruments and equipments the better repair education for emergency rescue member, the establishment of regional emergency assistant system and the expansion of fire fighting personnel and equipments. In terms of reinforcing the functions and services of rescue 119 and emergency corps, we must review the following considerations: Building up security system along with operational expansion, building up a system for emergency medical treatment, building up a comprehensive information management system for rescue and emergency, constructing a provincial safety museum and so forth. For the ways to better the works of rescue 119 we can review the following considerations : Improving the education for fire fighting training corps under Jeju Provincial Fire and Disaster Management Department, providing rescue members with more opportunities for clinical practices, enhancing the morale of rescue members, installing a comprehensive briefing room for emergency rescue members, building up medical networks along with reasonable policies for information service, operating the consulting system for rescue 119 and so on. If these requirements are met, it is expected that the fire fighting departments in Jeju province can cope with every accident and disaster a little more rapidly and quickly in compliance with local needs, so that they can keep their own position as a public fire fighting organization which may be trusted by the public.

  • PDF

Role-Based Network Access Control System on Open Network Two-Factor Authentication (네트워크 이중 인증을 통한 역할 기반 개방형 네트워크 접근 통제 시스템의 구현)

  • Lee, Chun-Jae;Cho, Ki-Ryang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.8B
    • /
    • pp.502-508
    • /
    • 2007
  • This paper proposes a method to shut out all of the not certified network access packet by embodying the two-factor(MAC ADDRESS, ID/PASSWORD) authentication system. The Authenticating Gateway System takes over central server's policy and permit or hold up the packet by inherited policy. And checks the whether or not patched the OS version and getting influenced from computer virus. And takes the information about client's resources(H/W, S/W) without Agent in the client. That makes more stability of network operating circumstance and fast facing the attack from hackers. In the fixed mobile network circumstance, This method provides more simplicity and less expenses than IEEE802.1x authentication system(cisco nac).

Home Energy Management System for Interconnecting and Sensing of Electric Appliances

  • Cho, Wei-Ting;Lai, Chin-Feng;Huang, Yueh-Min;Lee, Wei-Tsong;Huang, Sing-Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.7
    • /
    • pp.1274-1292
    • /
    • 2011
  • Due to the variety of household electric devices and different power consumption habits of consumers at present, general home energy management (HEM) systems suffer from the lack of dynamic identification of various household appliances and a unidirectional information display. This study presented a set of intelligent interconnection network systems for electric appliances, which can measure the power consumption of household appliances through a current sensing device based on OSGi platform. The system establishes the characteristics and categories of related electric appliances, and searches the corresponding cluster data and eliminates noise for recognition functionality and error detection mechanism of electric appliances by applying the clustering algorithm. The system also integrates household appliance control network services so as to control them according to users' power consumption plans or through mobile devices, thus realizing a bidirectional monitoring service. When the system detects an abnormal operating state, it can automatically shut off electric appliances to avoid accidents. In practical tests, the system reached a recognition rate of 95%, and could successfully control general household appliances through the ZigBee network.

A Study on Convergence Video System through Step Squencer (스텝시켄서를 통한 융복합 영상시스템 연구)

  • Oh, Seung-Hwan
    • Journal of Digital Convergence
    • /
    • v.17 no.11
    • /
    • pp.435-440
    • /
    • 2019
  • Recently, many musical instrument mobile apps have been released targeting normal people who can't play musical instrument at all. The reason of developing video system based on step sequencer are as follows; first, users can freely play the musical instruments; second, induce multiple users to play; and third, develop and suggest new step sequencer fused with the video. To resolve issue in video synchronization caused by sync issues when operating multiple step sequencers, the Pocket Operator of Teenage Engineering was used to realize multiply-connected step sequencer and also, the ultimate video system was developed through Mira-Web for multiple participation. In addition, it's required to make the Pocket Operator as software and receive various feedbacks to continue and complement study in order to develop the better video system.

Development of Portable Boiler Tube Health Evaluation System (휴대용 보일러튜브 건전성 평가시스템 개발)

  • Chang Min Lee;Han Sang Lee;Bum Shin Kim
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.46 no.3
    • /
    • pp.101-108
    • /
    • 2023
  • Although the proportion of coal-fired power generation is decreasing, efficient operating technology is needed to continuously invest in facilities and reduce maintenance costs until it is abolished. Boilers, one of the main facilities of power plants, operate for a long time in harsh environments of high temperature and high pressure. In addition, damage due to deterioration is likely to occur depending on the fuel and tube material used. It is very important to judge soundness because damage caused by deterioration adversely affects facility operation. Previously, replication method was used to analyze the progress of deterioration. In the replication method, pre-treatment such as chemical treatment is performed on the boiler tube in the field, the area is reproduced by attaching a film, and the replicated film is determined by an expert in the laboratory with an expensive microscope. However, this method involves substantial costs and time requirements, as well as the possibility of human errors. To address these issues, we developed a mobile health assessment system in this research. Since it is detachable and takes images in real time, this system enables swift evaluations across a broad range and facilitates the assessment of preprocessing quality. In addition, it was intended to reduce existing human mistakes by developing a degradation classification algorithm using the merger cluster method.

Unified Radio Resource Management for Hybrid Division Duplex System (Hybrid Division Duplex 시스템을 위한 통합 무선 자원관리 기법)

  • Kim, Pil-Geun;Kang, Chang-Gu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.11A
    • /
    • pp.1076-1084
    • /
    • 2006
  • In this paper, we first review a concept of hybrid division duplexing (HDD) scheme, which has been proposed as a new type of duplexing scheme useful for a next generation mobile communication system and its implementation issues, including the unified radio resource management for HDD scheme. The HDD scheme maintains the advantages of both TDD and FDD at the same time while providing a useful structure to control the inter-cell interference, caused by an asymmetric traffic load of multimedia services over uplink and downlink in the TDD scheme. Employing two frequency bands, one for TDD scheme and the other for FDD scheme, uplink is operating under the TDD scheme only, while downlink is operating under the TDD or FDD scheme, depending on the location of mobile station. In the HDD scheme, therefore, it must determine a type of duplexing scheme to employ in the downlink and futhermore, a ratio of uplink and downlink duration to meet a given traffic load of asymmetric service, which requires some unified radio resource management for handling the subsequent inter-cell interference. In this paper, we propose a distributed adaptive control approach as a means of unified radio resource management for a HDD system that maximizes the overall system efficiency by fully utilizing the resource in TDD band, while minimizing the inter-cell interference.

Development of S-63 electronic nautical system using mobile (모바일을 활용한 S-63 전자해도 시스템 개발)

  • Kim, Gyu-Hyun;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.205-208
    • /
    • 2015
  • Large vessels are currently operating by using an ECDIS, a system enabling automatic navigation and checking marine conditions. In the past, the ECDIS was used for vessels but in these days, it has been used as a method for collecting and verifying marine information, etc. from land by using a computer, instead of taking a boat out. The ECDIS on sale is generally used by companies which operate marine workers. However, this system has caused inconvenience to marine workers, in terms of tasks, services, or operations. Marine workers move out to the sea after checking the status of the system at the office. Due to the weather such as waves and winds, marine devices are not often found on the relevant coordinates. In such a case, the workers onerously need to come back to the land and track the marine devices again. In order to solve such a problem, this thesis purposes to develop a system which can check the locations of marine devices and verify a marine chart even on the sea by using a mobile. The proposed system can integrate and support a variety of protocols of relevant devices in the system itself and check data via mobile through the data transmission and streaming functions.

  • PDF

The Study on Forensic Methodology of Firefox OS (Firefox OS 포렌식 기법에 관한 연구)

  • Kim, Do-Su;Choi, Jong-hyun;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1167-1174
    • /
    • 2015
  • As the market share of smartphone exponentially increases in mobile market, a number of manufacturers have developed their own operating system. Firefox OS is an open source operating system for the smartphone and tablet which is being developed by the Mozilla Foundation. This OS is designed using JavaScript and operated based on HTML5. Even though the number of manufacturers which release the Firefox OS smartphone is consistently increasing, However it is difficult to analyze artifacts in a smartphone in terms of investigation since existing researches on Firefox OS focused on imaging velocity according to abstract forensic process and block size. In this paper, we propose how to collect data in Firefox OS while minimizing data loss and forensic analysis framework based on analysis results on system and user data leaving in a smartphone.

A Study on Treatment Way of a Malicious Code to injected in Windows System File (Windows 시스템 파일에 기생하는 악성코드의 치료 방법 연구)

  • Park, Hee-Hwan;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.255-262
    • /
    • 2006
  • A Malicious code is used to SMiShing disguised as finance mobile Vishing, using Phishing, Pharming mail, VoIP service etc. to capture of personal information. A Malicious code deletes in Anti-Virus Spyware removal programs. or to cure use. By the way, the Malicious cord which is parasitic as use a DLL Injection technique, and operate are Isass.exe, winlogon.exe. csrss.exe of the window operating system. Be connected to the process that you shall be certainly performed of an exe back, and a treatment does not work. A user forces voluntarily a process, and rebooting occurs, or a blue screen occurs, and Compulsory end, operating system everyone does. Propose a treatment way like a bird curing a bad voice code to use a DLL Injection technique to occur in these fatal results. Click KILL DLL since insert voluntarily an end function to Thread for a new treatment, and Injection did again the Thread which finish an action of DLL, and an end function has as control Thread, and delete. The cornerstone that the treatment way that experimented on at these papers and a plan to solve will become a researcher or the revolutionary dimension that faced of a computer virus, and strengthen economic financial company meeting Ubiquitous Security will become.

  • PDF

Sensor Network Implementation of using Embedded Web Sever

  • Lee Jeong Gi;Shin Myung Souk;Park Do Joon;Lee Cheol Seung;Kim Choong Woon;Lee Joon
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.532-535
    • /
    • 2004
  • Architecture generation is the first step in the design of software systems. Most of the qualities that the final software system possesses are usually decided at the architecture development stage itself. Thus, if the final system should be usable, testable, secure, high performance, mobile and adaptable, then these qualities or non­functional requirements should be engineered into the architecture itself. In particular, adaptability is emerging as an important attribute required by almost all software systems. The machinery and tools in the remote site surveillance and connects intelligence information machinery and tools at Internet. We need the server which uses different embedded operating system to become private use. With the progress of information-oriented society, many device with advanced technologies invented by many companies. However, the current firmware technologies have many problems to meet such high level of new technologies. In this paper, we have successfully ported linux on an embedded system, which is based on intel StrongARM SA-1 1 10 processor, then written several network modules for internet-based network devices.

  • PDF