• Title/Summary/Keyword: Sending Message

Search Result 162, Processing Time 0.025 seconds

Factors Influencing Cell Phone Addiction in Adolescents (청소년의 휴대전화 중독에 영향을 미치는 요인)

  • Koo, Hyun-Young;Park, Hyun-Sook
    • Child Health Nursing Research
    • /
    • v.16 no.1
    • /
    • pp.56-65
    • /
    • 2010
  • Purpose: This study was done to identify factors influencing cell phone addiction in adolescents. Methods: The participants were 548 adolescents in two middle schools and four high schools. Data were collected through self-report questionnaires which were constructed to include a cell phone addiction scale, an impulsiveness scale, media specific factors, and cell phone use. The data were analyzed using the SPSS program. Results: Of the adolescents, 88.7% reported being average users, 8.4%, heavy users, and 2.9%, cell phone addicted. Cell phone addiction was significantly correlated with impulsiveness and media specific factors. Significant factors influencing cell phone addiction were gender, sending and receiving text messages on weekends, monthly call charges, impulsiveness, recreational reasons, and cultural reasons. Conclusion: The above findings indicate that cell phone addiction in adolescents is influenced by gender, text message use, call charges, impulsiveness and media specific factors. Therefore the development of prevention and management programs for cell phone addiction in adolescents should be based on these factors which influence cell phone addiction.

A Study on Message Transmission Using API and LBS in SNS Environment (SNS 환경에서 API와 LBS를 활용한 메시지 전송에 관한 연구)

  • Kim, Seung-Jae;Lee, Jung-Jae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.145-149
    • /
    • 2018
  • This paper introduces a method of sending and registering SMS using mobile LBS (Local Based Service) in social network service environment. This method acquires the location of the target person and object through the API and LBS, constructs the SMS based on the obtained information, and transmits and registers the SMS in the mobile environment. The composition of the SMS is the personal information of the object to be searched, the current position and the position of the object. Therefore, the user can quickly and accurately grasp the brief items and locations of objects to be searched through SMS. Also, Today we will improve the quality of life by providing upgraded service for shortening of appointment time and delivery.

Designing a Remote Electronic Irrigation and Soil Fertility Managing System Using Mobile and Soil Moisture Measuring Sensor

  • Asim Seedahmed Ali, Osman;Eman Galaleldin Ahmed, Kalil
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.71-78
    • /
    • 2022
  • Electronic measuring devices have an important role in agricultural projects and in various fields. Electronic measuring devices play a vital role in controlling and saving soil information. They are designed to measure the temperature, acidity and moisture of the soil. In this paper, a new methodology to manage irrigation and soil fertility using an electronic system is proposed. This is designed to operate the electronic irrigation and adds inorganic fertilizers automatically. This paper also explains the concept of remote management and control of agricultural projects using electronic soil measurement devices. The proposed methodology is aimed at managing the electronic irrigation process, reading the moisture percentage, elements of soil and controlling the addition of inorganic fertilizers. The system also helps in sending alert messages to the user when an error occurs in measuring the percentage of soil moisture specified for crop and a warning message when change happens to the fertility of soil as many workers find difficulty in daily checking of soil and operating agricultural machines such as irrigation machine and soil fertilizing machine, especially in large projects.

IoT based Electronic Irrigation and Soil Fertility Managing System

  • Mohammed Ateeq Alanezi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.146-150
    • /
    • 2023
  • In areas where water is scarce, water management is critical. This has an impact on agriculture, as a significant amount of water is used for that purpose. Electronic measurement equipment are essential for regulating and storing soil data. As a result, research has been conducted to manage water usage in the irrigation process. Many equipment for managing soil fertility systems are extremely expensive, making this type of system unaffordable for small farmers. These soil fertility control systems are simple to implement because to recent improvements in IoT technology. The goal of this project is to develop a new methodology for smart irrigation systems. The parameters required to maintain water amount and quality, soil properties, and weather conditions are determined by this IoT-based Smart irrigation System. The system also assists in sending warning signals to the consumer when an error occurs in determining the percentage of moisture in the soil specified for the crop, as well as an alert message when the fertility of the soil changes, since many workers, particularly in big projects, find it extremely difficult to check the soil on a daily basis and operate agricultural devices such as sprinkler and soil fertilizing devices.

Control software for temperature sensors in astronomical devices using GMT SDK 1.6.0

  • Kim, Changgon;Han, Jimin;Pi, Marti;Filgueira, Josema;Cox, Marianne;Roman, Alfonso;Molgo, Jordi;Schoenell, William;Kurkdjian, Pierre;Ji, Tae-Geun;Lee, Hye-In;Pak, Soojong
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.44 no.2
    • /
    • pp.78.2-78.2
    • /
    • 2019
  • The temperature control of a scientific device is essential because extreme temperature conditions can cause hazard issues for the operation. We developed a software which can interact with the temperature sensor using the GMT SDK(Giant Magellan Telescope Software Development Kit) version 1.6.0. The temperature sensor interacts with the EtherCAT(Ethernet for Control Automation Technology) slave via the hardware adapter, sending and receiving data by a packet. The PDO(Process Data Object) and SDO(Service Data Object), which are the packet interacts with each EtherCAT slave, are defined on the TwinCAT program that enables the real-time control of the devices. The user can receive data from the device via grs(GMT Runtime System) tools and log service. Besides, we programmed the software to print an alert message on the log when the temperature condition changes to certain conditions.

  • PDF

Intelligent Shoes for Detecting Blind Falls Using the Internet of Things

  • Ahmad Abusukhon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.9
    • /
    • pp.2377-2398
    • /
    • 2023
  • In our daily lives, we engage in a variety of tasks that rely on our senses, such as seeing. Blindness is the absence of the sense of vision. According to the World Health Organization, 2.2 billion people worldwide suffer from various forms of vision impairment. Unfortunately, blind people face a variety of indoor and outdoor challenges on a daily basis, limiting their mobility and preventing them from engaging in other activities. Blind people are very vulnerable to a variety of hazards, including falls. Various barriers, such as stairs, can cause a fall. The Internet of Things (IoT) is used to track falls and send a warning message to the blind caretakers. One of the gaps in the previous works is that they were unable to differentiate between falls true and false. Treating false falls as true falls results in many false alarms being sent to the blind caretakers and thus, they may reject the IoT system. As a means of bridging this chasm, this paper proposes an intelligent shoe that is able to precisely distinguish between false and true falls based on three sensors, namely, the load scale sensor, the light sensor, and the Flex sensor. The proposed IoT system is tested in an indoor environment for various scenarios of falls using four models of machine learning. The results from our system showed an accuracy of 0.96%. Compared to the state-of-the-art, our system is simpler and more accurate since it avoids sending false alarms to the blind caretakers.

Monitoring-Based Secure Data Aggregation Protocol against a Compromised Aggregator in Wireless Sensor Networks (무선 센서 네트워크에서 Compromised Aggregator에 대응을 위한 모니터링 기반 시큐어 데이터 병합 프로토콜)

  • Anuparp, Boonsongsrikul;Lhee, Kyung-Suk;Park, Seung-Kyu
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.303-316
    • /
    • 2011
  • Data aggregation is important in wireless sensor networks. However, it also introduces many security problems, one of which is that a compromised node may inject false data or drop a message during data aggregation. Most existing solutions rely on encryption, which however requires high computation and communication cost. But they can only detect the occurrence of an attack without finding the attacking node. This makes sensor nodes waste their energy in sending false data if attacks occur repeatedly. Even an existing work can identify the location of a false data injection attack but it has a limitation that at most 50% of total sensor nodes can participate in data transmission. Therefore, a novel approach is required such that it can identify an attacker and also increase the number of nodes which participate in data transmission. In this paper, we propose a monitoring-based secure data aggregation protocol to prevent against a compromised aggregator which injects false data or drops a message. The proposed protocol consists of aggregation tree construction and secure data aggregation. In secure data aggregation, we use integration of abnormal data detection with monitoring and a minimal cryptographic technique. The simulation results show the proposed protocol increases the number of participating nodes in data transmission to 95% of the total nodes. The proposed protocol also can identify the location of a compromised node which injects false data or drops a message. A communication overhead for tracing back a location of a compromised node is O(n) where n is the total number of nodes and the cost is the same or better than other existing solutions.

Minimizing non-optimal paths in multi-hop ad hoc network adopted IEEE 802.11 PSM (IEEE 802.11 PSM을 적용한 다중 홉애드 혹 네트워크에서 우회경로의 최소화)

  • Whang, Do-Hyeon;Lee, Jang-Su;Kim, Sung-Chun
    • The KIPS Transactions:PartC
    • /
    • v.14C no.7
    • /
    • pp.583-588
    • /
    • 2007
  • It is easy to implement a temporary network with a mobile ad-hoc network in which mobile nodes have without using a infrastructure network. They depend on their limited power. Recently, it is a hot issue to save the energy in a mobile ad-hoc network because a mobile nodes have a limited energy. Research of IEEE 802.11 PSM was proposed in a single hop ad-hoc assumption. If IEEE 802.11 PSM is applied to multi hop ad-hoc network, non-optimal paths will be generated by the mobile nodes which didn't receive a message of routing request. Non-optimal paths increase not only a network latency but also energy consumption of mobile nodes. Reconfiguring algorithm of non-optimal paths caused by the mobile nodes which didn't receive a message of routing request is proposed in this paper. A mobile node can overhear the data in his range. A wireless medium is shared by all mobile nodes using the same bandwidth. All mobile nodes lookout the non-optimal paths with these properties of a medium, if non-optimal path is generated, optimal reconfiguring will be accomplished by modifying routing table of itself or sending a request message of routing update to nearby nodes. By reconfiguring the non-optimal paths to optimized ones, network latency and energy consumption was decreased. It is confirmed to ignore the overhead caused by a algorithm presented in this paper through the result of the simulation.

Design of Dynamic Buffer Assignment and Message model for Large-scale Process Monitoring of Personalized Health Data (개인화된 건강 데이터의 대량 처리 모니터링을 위한 메시지 모델 및 동적 버퍼 할당 설계)

  • Jeon, Young-Jun;Hwang, Hee-Joung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.187-193
    • /
    • 2015
  • The ICT healing platform sets a couple of goals including preventing chronic diseases and sending out early disease warnings based on personal information such as bio-signals and life habits. The 2-step open system(TOS) had a relay designed between the healing platform and the storage of personal health data. It also took into account a publish/subscribe(pub/sub) service based on large-scale connections to transmit(monitor) the data processing process in real time. In the early design of TOS pub/sub, however, the same buffers were allocated regardless of connection idling and type of message in order to encode connection messages into a deflate algorithm. Proposed in this study, the dynamic buffer allocation was performed as follows: the message transmission type of each connection was first put to queuing; each queue was extracted for its feature, computed, and converted into vector through tf-idf, then being entered into a k-means cluster and forming a cluster; connections categorized under a certain cluster would re-allocate the resources according to the resource table of the cluster; the centroid of each cluster would select a queuing pattern to represent the cluster in advance and present it as a resource reference table(encoding efficiency by the buffer sizes); and the proposed design would perform trade-off between the calculation resources and the network bandwidth for cluster and feature calculations to efficiently allocate the encoding buffer resources of TOS to the network connections, thus contributing to the increased tps(number of real-time data processing and monitoring connections per unit hour) of TOS.

A Study on Architecture of Test Program based UML (UML 기반 점검 프로그램 설계 방법에 관한 연구)

  • Kim, ByoungYong;Jang, JungSu;Ban, ChangBong;Lee, HyoJong;Yang, SeungYul
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.10
    • /
    • pp.217-230
    • /
    • 2012
  • This paper propose interacting test programming methods between test equipment and hardware unit to verify function and performance of the hardware unit under test. Proposed test program can minimizes the risk of failures when the unit is mounted on the aircraft by testing and verifying the unit under the worst stress condition. Also, Object oriented design using UML make it easy to apply in other equipments. Test program consists of architecture package and hardware package. Architecture package is in a role for system management, log analysis, message receiving and message analysis. Messages that are used by system management define messages for testing and defined messages is sent and received to test equipment through Ethernet. Hardware package is in a role for hardware management that is needed to be tested and is related to a system. Hardware to be tested is divided into internal test and transmission test. Internal test inspects hardware itself and reports the test results to the test equipment. Transmission test inspects communication device by sending or receiving data. All kinds of test is done in the worst condition of the test unit executing in parallel. Each device is tested at least 482 times and at most 15,003 times about one hour. Test program is utilized in hardware reliability test like as environmental test or EMI test.