• Title/Summary/Keyword: Safety Message

Search Result 246, Processing Time 0.022 seconds

Design and Implementation of The Vehicle Tracking Applications using Geospatial Query (공간 정보 질의를 이용한 차량 추적 애플리케이션의 설계 및 구현)

  • Ilham, Anugrah Moch;Jung, Jin-uk;Jin, Kyo-Hong;Hwang, Min-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.6
    • /
    • pp.637-644
    • /
    • 2019
  • In recent years, many public safety systems in the smart city are developed. These systems are taking responsibility to make a safe and comfortable city. In this paper, we propose vehicle tracking systems include a public safety system that enables the policeman to track the stolen vehicles more efficiently by providing the vehicle information in real time. When a vehicle is stolen, the vehicle owner can send a user emergency request. Then, the public safety server which supported by a geospatial query technique will give information such as time, distance, and routes to a policeman who is closest to the location of the vehicle to catch the thief. 300 simulations were performed to evaluate the performance of the system. We found that the average of times required when vehicle owner send a user emergency message on user application until policeman obtain a vehicle tracking request on police application below 1.2 seconds.

A New Arm Swing Walking Pattern-based Walking Safety System (새로운 팔 스윙 보행 패턴 기반 보행 안전 시스템)

  • Lee, Kyung-Min;Lin, Chi-Ho
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.19 no.6
    • /
    • pp.88-95
    • /
    • 2020
  • In this paper, we propose a new arm swing walking pattern-based walking safety system for safe walking of elderly pedestrians. The proposed system is a walking safety system for elderly pedestrians using haptic-based devices such as smart bands and smart watches, and arm swing-based walking patterns to solve the problem that it is difficult to recognize the fall situation of pedestrians with the existing walking patterns of lower limb movements. Use. The arm swing-based walking pattern recognizes the number of steps and the fall situation of pedestrians through the swing of the arm using the acceleration sensor of the device, and creates a database of the location of the fall situation to warn elderly pedestrians when walking near the expected fall location. It delivers a message to provide pedestrian safety to the elderly. This system is expected to improve the safe walking rights and environment of the elderly.

Obliteration of alterity and death as the limit of it in Don DeLillo's White Noise (돈 드릴로의 "백색 소음"에 나타난 타자성의 소멸과 그 한계로서의 죽음)

  • Lee, Bok-Ki
    • English Language & Literature Teaching
    • /
    • v.12 no.3
    • /
    • pp.227-242
    • /
    • 2006
  • In a post-modern society where things exist and events happen in the form of Baudrillardian simulation, alterity of the other is erased and transcendence is denied. Don DeLillo's White Noise depicts what may happen in a society where alterity and transcendence are experienced in the neutral and safe forms. It will be argued in this paper that such phenomena reflect the desire of the self to conquer the others and neutralize the existence of them for the self's enduring safety and accomplishment. However, the attempt must fail due to inevitable death. The invincibility of death reminds one of the limit of his ability and the existence of uncontrollable part of the other. This paper will focus on DeLillo's critique of such a society, the affect of the existence of death as an invincible force, and his message about the way to live under these conditions.

  • PDF

Studying Business Strategies in a Total Payment Service Market through Mobilians Case (모바일 결제 서비스 시장의 성공요인 분석과 나아갈 방향 모색: [주]모빌리언스[Total Payment Service Provider]사례 중심으로)

  • An, Ji-Hyeon;Yun, Sang-Won;Lee, Mi-Yeong
    • Journal of Digital Convergence
    • /
    • v.4 no.2
    • /
    • pp.127-142
    • /
    • 2006
  • This paper uses a Mobilans case based on software system to derive the results of our study. Recently, the mobile phone payment entered its matured stage and became most frequently used payment method in all internet sites. And, in order to prepare for the future ubiquitous market, every mobile phone payment methods has different speed of development, market status and target segments in the market. This paper also discusses about the background and current status of Korean mobile phone payment market using SMS(Short Message Service) to purchase items on internet which is growing sharply every year. Also, we try find the key factors to succeed in this growing market. In addition to safety, delayed payment and the immediateness for use of mobile phone, we also suggest that a highly developed hardware system is an additional factor under the increased demands for the convenience with various applications.

  • PDF

A Study on Warning Messages of Child Toy for Product Liability (제조물책임을 대비한 어린이 완구의 경고문안에 대한 설문조사)

  • Kim, Yu-Chang;Moon, Chan-Sik
    • IE interfaces
    • /
    • v.15 no.2
    • /
    • pp.107-113
    • /
    • 2002
  • Recent reports studied that injuries or deaths frequently occurred in consumer product accidents by product defects. Broadly speaking, product liability is liability which is imposed upon a manufacturer or other seller for personal injury, death, property damage and/or commercial loss arising with respect to a product or service provided by it. In this study, we want to search a method of prevention against appling PL laws. The way was researching on the level of appreciation of PL law, warning messages's means and design criteria for seller or consumer of child toys. As a result, most people didn't understand PL laws. Although they read them before purchasing child toy, many consumers didn't differentiate means of "Notice", "Warning", and "Danger" in warning messages. In addition, they considered important factors in warning messages as notice warning, safety mark(UL, etc), age recommendation and color in order. This study will be effective to search a method of prevention against PL laws.

Implementation of Henhouse Monitoring System Based on Ubiquitous Sensor Network (USN 기반의 계사 모니터링 시스템 구축)

  • Park, DongGook;Yoe, Hyun;Rhyu, KyeongTaek;Shin, ChangSun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.3
    • /
    • pp.9-18
    • /
    • 2009
  • This paper proposes a Ubiquitous Henhouse Monitoring System (UHMS) that can not only monitor henhouse's conditions and raising environments, but also control the henhouse remotely by using sensor network technology. The system consists of three layers. The physical layer connects sensors with facilities. The middleware layer processes and manages data collected from the physical layer. And the application layer provides the user with the user requested services. The system provides a real-time monitoring service, a facility controlling service, an expert service, a consumer safety service, and a mobile message service via interacting with components of each layer. Finally, a henhouse model is defined and the relevant system components and the application GUIs are implemented.

A Study on AIS-PPWC Development and AIS Message Processing for Vessel Safety Monitoring System Based on Smart Device (스마트기기 기반 선박 안전 모니터링 시스템을 위한 AIS-PPWC 개발 및 AIS 메시지 처리에 관한 연구)

  • Hong, Seok-Keun;Lee, Jae-In;Cho, Seok-Je
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.109-110
    • /
    • 2017
  • 본 논문은 스마트기기용 선박 안전 모니터링 시스템을 위한 AIS(Automatic Identification System) 메시지 처리 방법과 AIS-PPWC(Pilot Plug to Wi-fi Converter) 개발에 대한 내용을 다룬다. 해상 접안 모니터링 서비스를 제공하는 스마트기기 기반의 앱은 레저용 요트와 같은 non-solas 선박에 최적화되어 있는 class B만을 다루기 때문에 AIS class A를 사용하는 solas 선박에서 사용할 경우 자선위치 정보가 나타나지 않는 문제점이 있다. 이러한 문제를 해결하기 위해 본 논문에서는 class A 신호 체계를 따르는 solas 선박에서도 기존 해상 모니터링 스마트앱에서 자선 정보를 확인할 수 있는 AIS 메시지 처리 기법과 이러한 기능을 포함한 PPWC 개발에 대한 내용을 제안한다.

Proposal of new GSM Authentication protocol (새로운 GSM의 인증프로토콜 제안)

  • Choi, Hyun;Song, Yun-Kyung;Park, Dong-Sun
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.113-116
    • /
    • 2003
  • Mobile communication network because information through radio channel is passed, information may be eavesdropped and need information security countermeasure in communication network dimension for safe information exchange because there is possibility that is manufactured. This paper used Public Key Cryptography for protection and authentication connected with user authentication. Use public key and private key that is asymmetry encryption key to quote that is used at encryption, decryption of Public key. Encrypt IMSI and authentication message that is transmitted MS, VLR and HLR interval to public key, wish to embody transmitted authentication protocol safety.

  • PDF

A Fault-tolerant Mutual Exclusion Algorithm in Asynchronous Distributed Systems

  • Kim, Yoon
    • International Journal of Contents
    • /
    • v.8 no.4
    • /
    • pp.1-6
    • /
    • 2012
  • Mutual Exclusion is one of the most studied topics in distributed systems where processes communicate by asynchronous message passing. It is often necessary for multiple processes at different sites to access a shared resource or data called a critical section (CS) in distributed systems. A number of algorithms have been proposed to solve the mutual exclusion problem in distributed systems. In this paper, we propose the new algorithm which is modified from Garg's algorithm[1] thus works properly in a fault-tolerant system. In our algorithm, after electing the token generator, the elected process generates a new token based on the information of the myreqlist which is kept by every process and the reqdone which is received during election. Consequently, proposed algorithm tolerates any number of process failures and also does even when only one process is alive.

An Encryption Key Distribution System in LAN Environment Using Time Quantum (Time Quantum을 이용한 LAN에서의 암호화 키이 분배방식)

  • 류황빈;이재광
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.6
    • /
    • pp.629-639
    • /
    • 1992
  • This paper examines the security vulnerability, demanded service, layering consideration for local area networks(LANs), and proposes a new key distribution system suitable to local area networks. the new key distribution system Is applicable to time quantum in encrytion key and then the time used arid the quantity of encryption message using the encryption key are limited. A system suggested in this paper can achive some higher concurrency of key and authentication of the opposite party. Even through a encryption key expose by reason of wiretapping of a frame unit, It has achived some more security and safety, because the contens of all traffic messages are not known.

  • PDF