• Title/Summary/Keyword: Money Tracking

Search Result 14, Processing Time 0.023 seconds

Monitoring and Tracking Model of Logistics Based on ICT network

  • Cho, Sokpal;Chung, Heechang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.489-492
    • /
    • 2016
  • Transportation in the logistics, many business organizations are engaged in monitoring and tracking the vehicles in order to improve logistics services, reduce expenses and secure security in cargo transportation. It is saving time and money by tracking and monitoring vehicles which transport cargo in supply chain of logistics. Therefore the main issue of delivery flow is to improve services, and ensure the safety in transportation system. This article suggests the tracking and monitoring model to keep safety transports on ICT network. It focuses on precise delivery control by monitoring and tracking vehicles to save time and costs. The status of product movement is analyzed for proper decision making. The vehicle embedded with RFID is automatically tracked in the movement process by tracking and monitoring model. The main role keeps safety tracking to reduce costs and to deliver products at proper time and location.

  • PDF

A Study on Ways to Relieve User's Anxiety Caused by Simplification of Easy Money Transfer Service (간편송금 서비스 간소화에 따른 사용자의 불안감 해소방안 연구)

  • Kim, So-Young;Kim, Seung-In
    • Journal of Digital Convergence
    • /
    • v.20 no.1
    • /
    • pp.293-299
    • /
    • 2022
  • The purpose of study is to relieve the users' anxiety caused by the simplification of the easy money transfer service. With the development of technology, financial services are being simplified, but on the contrary, the chasm occurs. The study was conducted in two rounds. First, based on UTAUT, the perception of the service and the willingness to accept the technology were investigated through a questionnaire. Second, after presenting the tracking function of the remittance situation derived through the heuristic method, in-depth interviews were conducted on reliability and intention to continue using it. As the result, it was found that the clear feedback had a positive effect on relieving users' anxiety. It is expected that studies approaching the chasm from the point of view of design will be actively conducted.

A Study on the Development of the Wheel Tracking Test and Evaluation Method on Blind Type of Waterproofing Layer (비노출 방수층의 윤하중 시험 및 평가방법 개발에 관한 실험적 연구)

  • Song Je-Young;Eom Deok-Jun;Kwak Kyu-Sung;Oh Sang-Keun
    • Journal of the Korea Institute of Building Construction
    • /
    • v.6 no.1 s.19
    • /
    • pp.67-72
    • /
    • 2006
  • There are a lot of problem about waterproofing membrane coating for concrete deck of bridge and waterproofing sheets for concrete of deck of bridge because it couldn't confirm waterproofing's defeat after construction. These problems make a waterproofing material damage and condrete deck of bridge damage. So It needs a lot of money for repair work and reinforcement work. Therefor the structure slab of using waterproofing material protect invasion of water. Also, Concrete deck of bridge need a endurance permeability for the reduction repair payment. In this study, An experimental study on the quality standardization test method waterproofing layer on working of live load.

A Study on the Blind Type of Waterproofing Layer of Wheel Tracking of Test Method and Valuation on Working of Live Load (이동하중이 작용하는 비노출 방수층의 윤하중 시험방법 및 평가에 관한 연구)

  • Eom Deok-Jun;Seon Yun-Suk;Kwon Si-Won;Oh Sang-Keun
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2005.11a
    • /
    • pp.1-5
    • /
    • 2005
  • There are a lot of problem about waterproofing membrane coating for concrete deck of bridge and waterproofing sheets for concrete of deck of bridge because it couldn't confirm waterproofing's defeat after construction. These problems make a waterproofing material damage and concrete deck of bridge damage. So It needs a lot of money for repair work and reinforcement work. Therefor the structure slab of using waterproofing material protect invasion of water. Also, Concrete deck of bridge need a endurance permeability for the reduction repair payment. In this study, An experimental study on the quality standardization test method waterproofing layer on working of live load

  • PDF

TRACKING LIFT-PATHS OF A ROBOTIC TOWERCRANE WITH ENCODER SENSORS

  • Suyeul Park;Ghang, Lee;Joonbeom cho;Sungil Hham;Ahram Han;Taekwan Lee
    • International conference on construction engineering and project management
    • /
    • 2009.05a
    • /
    • pp.250-256
    • /
    • 2009
  • This paper presents a robotic tower-crane system using encoder and gyroscope sensors as path tracking devices. Tower crane work is often associated with falling accidents and industrial disasters. Such problems often incur a loss of time and money for the contractor. For this reason, many studies have been done on an automatic tower crane. As a part of 5-year 23-million-dollar research project in Korea, we are developing a robotic tower crane which aims to improve the safety level and productivity. We selected a luffing tower crane, which is commonly used in urban construction projects today, as a platform for the robotic tower crane system. This system comprises two modules: the automated path planning module and the path tracking module. The automated path planning system uses the 3D Cartesian coordinates. When the robotic tower crane lifts construction material, the algorithm creates a line, which represents a lifting path, in virtual space. This algorithm seeks and generates the best route to lift construction material while avoiding known obstacles from real construction site. The path tracking system detects the location of a lifted material in terms of the 3D coordinate values using various types of sensors including adopts encoder and gyroscope sensors. We are testing various sensors as a candidate for the path tracking device. This specific study focuses on how to employ encoder and gyroscope sensors in the robotic crane These sensors measure a movement and rotary motion of the robotic tower crane. Finally, the movement of the robotic tower crane is displayed in a virtual space that synthesizes the data from two modules: the automatically planned path and the tracked paths. We are currently field-testing the feasibility of the proposed system using an actual tower crane. In the next step, the robotic tower crane will be applied to actual construction sites with a following analysis of the crane's productivity in order to ascertain its economic efficiency.

  • PDF

Tracking of cryptocurrency moved through blockchain Bridge (블록체인 브릿지를 통해 이동한 가상자산의 추적 및 검증)

  • Donghyun Ha;Taeshik Shon
    • Journal of Platform Technology
    • /
    • v.11 no.3
    • /
    • pp.32-44
    • /
    • 2023
  • A blockchain bridge (hereinafter referred to as "bridge") is a service that enables the transfer of assets between blockchains. A bridge accepts virtual assets from users and delivers the same virtual assets to users on other blockchains. Users use bridges because they cannot transfer assets to other blockchains in the usual way because each blockchain environment is independent. Therefore, the movement of assets through bridges is not traceable in the usual way. If a malicious actor moves funds through a bridge, existing asset tracking tools are limited in their ability to trace it. Therefore, this paper proposes a method to obtain information on bridge usage by identifying the structure of the bridge and analyzing the event logs of bridge requests. First, to understand the structure of bridges, we analyzed bridges operating on Ethereum Virtual Machine(EVM) based blockchains. Based on the analysis, we applied the method to arbitrary bridge events. Furthermore, we created an automated tool that continuously collects and stores bridge usage information so that it can be used for actual tracking. We also validated the automated tool and tracking method based on an asset transfer scenario. By extracting the usage information through the tool after using the bridge, we were able to check important information for tracking, such as the sending blockchain, the receiving blockchain, the receiving wallet address, and the type and quantity of tokens transferred. This showed that it is possible to overcome the limitations of tracking asset movements using blockchain bridges.

  • PDF

SURF based Hair Matching and VR Hair Cutting

  • Sung, Changjo;Park, Kyoungsoo;Chin, Seongah
    • International journal of advanced smart convergence
    • /
    • v.11 no.3
    • /
    • pp.49-55
    • /
    • 2022
  • Hair styling has a significant influence on human social perception. An increasing number of people are learning hair styling and obtaining hair designer licenses. However, it takes a considerable amount of money and time to learn professional hairstyle and beauty techniques for hair styling. Since COVID-19, there has been a growing need for offline and video lectures due to the decline in onsite training opportunities. This study provides a field practice environment in which real hair beauty is performed in a virtual space. Further, the hairstyle that is most similar to the user's hair taken with a webcam or mobile phone is determined through an image matching system using the speeded up robust features (SURF) method. The matching hairstyle was created into a three-dimensional (3D) hair model. The created 3D hair model uses a head-mounted display (HMD) and a controller that enables finger tracking through mapping to reproduce the haircutting scissors' motion while providing a feeling of real hair beauty.

A Study on the Countermeasures for Prevention of Opening a Fraud Account (사기이용계좌 개설 방지를 위한 대응방안 연구)

  • Kim, Chang Woo;Yoon, Ji Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.173-179
    • /
    • 2015
  • Financial fraud such as phishing have passed several years from the occurrence, in spite of the widely known through the media, regardless of the social status or age, financial fraud has occurred on an ongoing basis, the damage is not reduced. The fraud account, the person who made the account, the user is different, it is possible to avoid tracking financial channel, and is used as a receiving means for fraud money of various crimes. Efforts of financial institutions and financial supervisory institutions, it has been promoted by preparing various measures for the eradication of fraud account so far been used as a means of financial crime, the proliferation of financial fraud, opening and distribution of fraud account is a receiving means for fraud money are also increasing continuously, it is necessary to take countermeasures. In spite of the continuous crackdown of financial institutions and financial supervisory institutions, it is causing serious damage to society, analyzes the current situation of fraud account, to present an effective and aggressive countermeasure of financial institutions in this paper.

A Study of Privacy Protection for Users of Electronic Money Using Blockchain Technology (블록체인 기법을 사용하는 전자화폐 사용자의 프라이버시 보호에 대한 연구)

  • Kang, Yong-Hyeog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.571-572
    • /
    • 2017
  • The blockchain technology that implements electronic money uses decentralized computing and all transactions in a blockchain are open to everyone. This technique seems to guarantee anonymity by performing the transaction on the address instead of the user, but by using direction acyclic graph based on the transaction graph, the privacy problem is caused by tracking the addresses. In this paper, we analyze various techniques for centralized processing which makes it difficult to find the relevance on the graph in order to protect the privacy in the block chain technology. We also analyze the techniques of anonymizing in a distributed way to enhance privacy. Using the zero knowledge proof scheme guarantees full distributed anonymity but requires more computation and storage space, and various techniques to make this efficient are proposed. In this paper, we propose a privacy protection scheme of blockchain technology to integrate existing privacy protection techniques into a blockchain technology and perform it more efficiently with a centralized or decentralized technique.

  • PDF

The detachable smart wearable device (탈부착 가능 스마트 웨어러블 디바이스 개발)

  • Kim, Bonam;Lee, Seong-Min;Lee, Soo-Uk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.845-847
    • /
    • 2015
  • In this paper, we develope a detachable wearable device consisting of two parts: main module and accessary module including battery. The main module can display any tracking information and alarms related to the smart phone. In addition, it has small sensors such as heart rate sensor, NFC, T-money, and GPS that can be selected by user's requirement. The accessary module includes battery. The suggested wearable device can also solve the problems faced with today's many other wearable devices: 1) limited battery life 2) the lack of compatibility and expandability due to run on internal components designed for smart phone 3) the design has always been a crucial factor in determining the success of main stream consumer wearable devices.

  • PDF