• Title/Summary/Keyword: Smart Home Service

Search Result 285, Processing Time 0.034 seconds

Non-face-to-face online home training application study using deep learning-based image processing technique and standard exercise program (딥러닝 기반 영상처리 기법 및 표준 운동 프로그램을 활용한 비대면 온라인 홈트레이닝 어플리케이션 연구)

  • Shin, Youn-ji;Lee, Hyun-ju;Kim, Jun-hee;Kwon, Da-young;Lee, Seon-ae;Choo, Yun-jin;Park, Ji-hye;Jung, Ja-hyun;Lee, Hyoung-suk;Kim, Joon-ho
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.3
    • /
    • pp.577-582
    • /
    • 2021
  • Recently, with the development of AR, VR, and smart device technologies, the demand for services based on non-face-to-face environments is also increasing in the fitness industry. The non-face-to-face online home training service has the advantage of not being limited by time and place compared to the existing offline service. However, there are disadvantages including the absence of exercise equipment, difficulty in measuring the amount of exercise and chekcing whether the user maintains an accurate exercise posture or not. In this study, we develop a standard exercise program that can compensate for these shortcomings and propose a new non-face-to-face home training application by using a deep learning-based body posture estimation image processing algorithm. This application allows the user to directly watch and follow the trainer of the standard exercise program video, correct the user's own posture, and perform an accurate exercise. Furthermore, if the results of this study are customized according to their purpose, it will be possible to apply them to performances, films, club activities, and conferences

Greedy Heuristic Algorithm for the Optimal Location Allocation of Pickup Points: Application to the Metropolitan Seoul Subway System (Pickup Point 최적입지선정을 위한 Greedy Heuristic Algorithm 개발 및 적용: 서울 대도시권 지하철 시스템을 대상으로)

  • Park, Jong-Soo;Lee, Keum-Sook
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.14 no.2
    • /
    • pp.116-128
    • /
    • 2011
  • Some subway passengers may want to have their fresh vegetables purchased through internet at a service facility within the subway station of the Metropolitan Seoul subway system on the way to home, which raises further questions about which stations are chosen to locate service facilities and how many passengers can use the facilities. This problem is well known as the pickup problem, and it can be solved on a traffic network with traffic flows which should be identified from origin stations to destination stations. Since flows of the subway passengers can be found from the smart card transaction database of the Metropolitan Seoul smart card system, the pickup problem in the Metropolitan Seoul subway system is to select subway stations for the service facilities such that captured passenger flows are maximized. In this paper, we have formulated a model of the pickup problem on the Metropolitan Seoul subway system with subway passenger flows, and have proposed a fast heuristic algorithm to select pickup stations which can capture the most passenger flows in each step from an origin-destination matrix which represents the passenger flows. We have applied the heuristic algorithm to select the pickup stations from a large volume of traffic network, the Metropolitan Seoul subway system, with about 400 subway stations and five millions passenger transactions daily. We have obtained not only the experimental results in fast response time, but also displayed the top 10 pickup stations in a subway guide map. In addition, we have shown that the resulting solution is nearly optimal by a few more supplementary experiments.

  • PDF

A Study of Pervasive Roaming Services with Security Management Framework (퍼베이시브 로밍 서비스를 위한 보안 관리 프레임워크)

  • Kim, Gwan-Yeon;Hwang, Zi-On;Kim, Yong;Uhm, Yoon-Sik;Park, Se-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.115-129
    • /
    • 2007
  • The ubiquitous and autonomic computing environments is open and dynamic providing the universal wireless access through seamless integration of software and system architectures. The ubiquitous computing have to offer the user-centric pervasive services according to the wireless access. Therefore the roaming services with the predefined security associations among all of the mobile devices in various networks is especially complex and difficult. Furthermore, there has been little study of security coordination for realistic autonomic system capable of authenticating users with different kinds of user interfaces, efficient context modeling with user profiles on Smart Cards, and providing pervasive access service by setting roaming agreements with a variety of wireless network operators. This paper proposes a Roaming Coordinator-based security management framework that supports the capability of interoperator roaming with the pervasive security services among the push service based network domains. Compared to traditional mobile systems in which a Universal Subscriber Identity Module(USIM) is dedicated to one service domain only, our proposed system with Roaming Coordinator is more open, secure, and easy to update for security services throughout the different network domains such as public wireless local area networks(PWLANs), 3G cellular networks and wireless metropolitan area networks(WMANs).

Attack Scenarios and Countermeasures using CoAP in IoT Environment (IoT기기에서 SSDP 증폭 공격을 이용한 공격기법 및 대응 방안)

  • Oh, Ju-Hye;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.4
    • /
    • pp.33-38
    • /
    • 2016
  • DDoS attack has been continuously utilized that caused the excessively large amount of traffic that network bandwidth or server was unable to deal with paralyzing the service. Most of the people regard NTP as the biggest cause of DDoS. However, according to recently executed DDoS attack, there have been many SSDP attack in the use of amplified technique. According to characteristics of SSDP, there is no connection for making a forgery of source IP address and amplified resources feasible. Therefore, it is frequently used for attack. Especially, as it is mostly used as a protocol for causing DDoS attack on IoT devices that constitute smart home including a wireless router, media server, webcam, smart TV, and network printer. Hereupon, it is anticipated for servers of attacks to gradually increase. This might cause a serious threat to major information of human lives, major government bodies, and company system as well as on IoT devices. This study is intended to identify DDoS attack techniques in the use of weakness of SSDP protocol occurring in IoT devices and attacking scenario and counter-measures on them.

IoT based User Remote Control Analysis Algorithm (IoT 기반 사용자 원격 제어 분석 알고리즘)

  • Jeong, Dohyeong;Yu, Donggyun;Lee, Kyouhwan;Kim, Hosung;Jung, Hoekyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.725-726
    • /
    • 2017
  • Recently, IoT (Internet of Things) has been applied to various fields, not limited to places, through continuous research. However, the existing IoT system is based on the surrounding environment rather than the user-oriented operation of the device. therefore, there is a problem in that the efficiency and accuracy of the work are low. In this paper, we propose a user remote control analysis algorithm to solve these problems. When the user performs the remote control, the command is collected and the data is sorted according to the device and time. Analyze time-dependent behavior of devices based on sorted data. based on the results of the analysis, the environment is controlled by operating the device inside the home. Therefore, it is expected that the accuracy and convenience of device operation will be increased by providing customized service to users.

  • PDF

Crime Prevention by Using CPTED and Improvement (CPTED를 활용한 범죄예방 및 개선방안)

  • Park, Kwang-Hyun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.07a
    • /
    • pp.157-159
    • /
    • 2016
  • 최근 학교폭력 및 묻지마 범죄가 꾸준히 증가추세에 있다. 2011년 12월 학교폭력에 의한 대구중학생 자살사건, 2010년 2월 김길태 사건과 6월 김수철 사건, 2016년 5월 강남역 노래방 살인사건과 6월 섬마을 여교사 사건 등 사회적 약자인 소년, 여성 대상범죄 및 묻지마 범죄가 사회문제로 대두되고 있다. 이에 따라 범죄예방 도구이자 전략으로써 CPTED가 하나의 대안으로 부각되고 있다. 국토교통부는 건축물, 건축설비 및 대지에 관한 범죄예방 기준인 '범죄예방 건축기준 고시'를 2015년부터 시행하고 있는데 적용대상 건물 등은 이 기준에 따라 설계하고 건축해야 한다. 현대 위험사회에서 강력범죄 및 경범죄의 사전예방을 위해서는 사회 안전시스템 구축이 요구되며 그 대안으로 환경설계를 통해 범행기회를 심리적, 물리적으로 차단하는 정책을 모색함으로써 환경범죄학 입장에서 범죄예방에 접근할 필요가 있다.

  • PDF

A Study on Consumer Complaint Behavior Caused by Dissatisfaction with the Service of Smartphone Applications: The Moderating Effect of a Complaint Handling Process and Consumer's Attribution (스마트폰 애플리케이션 불만족 수준에 따른 소비자 불평행동의도에 관한 연구: 불만처리과정 및 귀인성향의 조절효과를 중점으로)

  • Bae, Yoon Shin;Lee, Seung Sin
    • Human Ecology Research
    • /
    • v.52 no.4
    • /
    • pp.429-441
    • /
    • 2014
  • The use of smartphones has grown rapidly over a short period of time, particularly for commuting news search, smart banking, and social networking services, and has had a significant impact on the pattern of contemporary life. Further, a wide range of applications are downloaded on to smartphones. This has also led a considerable number of complaints regarding these applications. In this study, we focus on the levels of dissatisfaction that users experience with smartphone applications and their effects on consumer complaint behavior along with the moderating effects of the complaint handling process and attribution. The aim of this study is to verify whether the following hypothesis--2 (low/high dissatisfaction level of smartphone applications)${\times}2$ (poor/excellent complaint handling process)${\times}2$ (internal/external consumer attribution)--is in accordance with the betweengroup design to build a factorial design experiment. The results of this study are as follows. First, the consumer's tendency to complain significantly influenced their dissatisfaction level. Second, consumer complaint behavior is modulated by the complaint handling process. Third, the external-attribution tendency of consumers was found to lead to more dissatisfaction than the tendency for internal attribution.

System Design of High-Definition Media Transceiver based on Power Line Communication and Its Performance Analysis (전력선 통신 기반 HD급 미디어 전송 시스템 설계 및 성능 분석)

  • Kim, Ji-Hyoung;Kim, Kwan-Woong;Kim, Yong-K.
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.59 no.1
    • /
    • pp.192-196
    • /
    • 2010
  • Due to a development of a modem technology as Power Line Communication(PLC) over 200 Mbps, the high-speed multi-media data trasmission could be currently possible. The strength of the PLC has no more additional wiring work. PLC has also possible to high quality data transmission with currently electrical cable. It has a various strong point campare with existing wire and wireless communication technologies. In This paper we develop a high quality media transmitter-receiver based on merging the HomePlug AV, which is 200 Mbps class PLC technology and HDMI Interface technology. The video function was used for the VEDEO TEST GENERATOR in order to a property valuation. Smart Live 6 software were used for the assessment of audio property. As the result of measurement of the HD class images by capturing from the receiver of the PLC, the quality of images couldn't be confirm any deterioration, which has compared with original reflections. In case of audio part as the result of confirmation of the Phase, Magnitude, it has been confirmed that over 90% of nomal transmition and receiving of acoustic signal. It can be possible to have HD class Media service through the PLC.

Authentication Technology Analysis and Service Model Proposal in Smart Home (스마트홈의 인증 기술 분석 및 서비스 모델제안)

  • Kang, Won Min;Moon, Seo Yeon;Lee, Jae Dong;Park, Jong Hyuk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.238-241
    • /
    • 2017
  • 최근 스마트폰 및 스마트 디바이스 및 가전제품의 폭발적인 보급으로 현대인의 삶이 편리하게 바뀌고 있다. 스마트폰을 기점으로 다양한 형태의 테블릿, 스마트 TV, 스마트 냉장고, 에어컨 등 새로운 기기의 출연으로 가정에서의 삶이 변화되고 있으며 이러한 디바이스를 이용해 새로운 스마트 홈 서비스를 제공하고 하고 있다. 하지만, 이러한 서비스는 스마트 홈 보안이 적용되지 않기 때문에 개인정보의 유출이나 가전제품 해킹으로 인한 금전적 손실 등의 피해를 입을 수 있다. 따라서 주변 환경이 스마트 홈에 적용될 경우 스마트 디바이스와 같이 보안에 대한 고려가 필요하다. 스마트 홈에서 발생할 수 있는 보안 요구사항에 대해 살펴보고 보안 요구사항 중 인증에 초점을 맞추어 연구동향을 분석하고 고찰한다.

An Implementation of a u-Health Service Space Based on Sensor Network (센서 네트워크 기술에 기반한 유헬스 서비스 공간 구현)

  • Ahn, Si-Young;Lee, Tae-Young;Kim, Do-Won;Oh, Ha-Ryoung;Seong, Yeong-Rak;Park, Jun-Seok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2B
    • /
    • pp.225-231
    • /
    • 2010
  • In this paper, a sensor network system for providing u-health services is suggested and is implemented. It steadily collects biological data of resident people and automatically detects emergency situations. LEID (Lighting Embedded Information Device) nodes are the most essential component of the sensor network. They embed sensor network technology into lightening devices which are indispensable to most living spaces. To verify practicality of the proposed u-health system, a prototypical system is realized in the Smart Home Industrialization Support Center at Kookmin University, and is tested within many practical circumstances. The proposed u-health system can be used at various places where many patients are continuously cared.