• Title/Summary/Keyword: Smart Network

Search Result 2,927, Processing Time 0.032 seconds

Proposal of Establishment "Control Tower of IT and Cultural Content" for the next Government (차기정부의 "정보기술(IT) 및 콘텐츠 융합을 위한 IT 컨트롤타워" 구축 제안)

  • Park, Sang-Jung;Koh, Chan;Kim, Chun-Ho
    • Journal of Digital Convergence
    • /
    • v.10 no.1
    • /
    • pp.113-123
    • /
    • 2012
  • This Study analyzes effects of establishment and dis-establishment of Ministry of Information and Communication(MIC) to provide a recommendation to the next government. This study compares its background, accomplishments and failures between a MIC establishment by the Civilian Government and a MIC dis-establishment by the current Government. Results of the analysis indicate MIC dis-establishment had negative effects: plunge of IT national competition due to the absence of IT control tower and organizational inefficiency due to poor communication and duplicate investment among inter-governments. This study is significant in that it recommends "Ministry of IT and Media Smart Convergence" establishment to be totally governing IT control tower and cultural content as a new trend for the next government.

A design of embedded PC-Fi system with interactive remote control (인터렉티브 원격제어 기능을 갖는 임베디드 PC-Fi 시스템 설계)

  • Bae, Min-Eui;Shin, Ok-Keun
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.40 no.1
    • /
    • pp.55-61
    • /
    • 2016
  • As the price-performance ratio of embedded PCs improves, the benefits of the PC-Fi can be maximized by designing an embedded PC-Fi system. In this paper presents the design of an embedded PC-Fi that can be manipulated by a remote controller based on mobile devices such as smart phones or tablets. Additionally, an interactive control system and its GUI, through which the user can select and play music as they like at ease, are presented. The case that a large amount of music is stored in the PC-Fi system requires a function allowing the user to easily select the music they want to listen to. In order to implement this function, a DB containing detailed information of each track can be used to find the location of the desired music with keywords provided by the user. In this proposed system, the embedded PC-Fi system and remote controller are mutually connected via a WiFi network, and more than one user can remotely control the embedded system with their own mobile device.

Design and Development of Electronic Attendance-absence Recording System Using Binary XML (Binary XML을 이용한 전자출결시스템 설계 및 개발)

  • Lee, Jaekun;Yeom, Saehun;Bang, Hyeja
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.3
    • /
    • pp.11-19
    • /
    • 2015
  • Due to recent development in mobile devices, the mobile device utilization and many related applications have been increasing. Most of initial applications on mobile devices just showed simple information, but now they processes huge data. However, smart devices have certain limitations in processing massive data. Especially, if the size of data increases, the speed of data processing adversely decreases, so the performance of programs also decreases. If hardware specification of the mobile devices is not enough to handle it, response time will be drastically delayed. To overcome these drawbacks, most of application running on mobile devices communicate with their servers to manage data. XML is a proper language for data communication to send and receive data between servers and mobile devices, because it defines rules of document's format and it is a textual data format and small-sized language. However, mobile devices have limitation such as memory, CPU and wireless network to process huge data and XML also takes a lot of time to communicate with servers and devices and handle data, so it could be overhead in service time. Binary XML is an alternative of performance improvement in data processing, which has XML's benefits and minimizes the XML size by binary coding. However, most of binaryXML which are used on applications don't fit on mobile applications. In this paper, we surveyed many kinds of binaryXML, compared merits and demerits to find a binaryXML for mobile applications. We propose how to use binary XML and implemented an electronic attendance system using binary XML to overcome the limitation of XML and to reduce the load of data communications between servers and devices.

Redundancy operation method for a distributed public address system (분산형 전관방송 시스템의 이중화 운영 방법)

  • Ryu, Taeha;Kim, Seungcheon
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.8
    • /
    • pp.47-53
    • /
    • 2020
  • In the case of a failure due to equipment deterioration in the public address system or a worker's mistake during construction, broadcasting becomes impossible. In this situation, we have designed a more advanced management broadcast system that can broadcast. The broadcasting service is operated using main broadcasting device, and local broadcasting device operates separately only in the local area. If the main broadcasting device becomes inoperable, the procedure for transferring the control activates the device with the local broadcasting devices based on data backed up by the main controller. This paper proposes an improved method of the conventional emergency broadcasting device duplication method. The existing method could not use the standby equipment in the normal state, but in the proposed method, the standby equipment can be used as local broadcasting equipment in usually. This method enables stable system operation while minimizing resource waste due to redundant configuration of expensive devices.

CNN Based 2D and 2.5D Face Recognition For Home Security System (홈보안 시스템을 위한 CNN 기반 2D와 2.5D 얼굴 인식)

  • MaYing, MaYing;Kim, Kang-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.6
    • /
    • pp.1207-1214
    • /
    • 2019
  • Technologies of the 4th industrial revolution have been unknowingly seeping into our lives. Many IoT based home security systems are using the convolutional neural network(CNN) as good biometrics to recognize a face and protect home and family from intruders since CNN has demonstrated its excellent ability in image recognition. In this paper, three layouts of CNN for 2D and 2.5D image of small dataset with various input image size and filter size are explored. The simulation results show that the layout of CNN with 50*50 input size of 2.5D image, 2 convolution and max pooling layer, and 3*3 filter size for small dataset of 2.5D image is optimal for a home security system with recognition accuracy of 0.966. In addition, the longest CPU time consumption for one input image is 0.057S. The proposed layout of CNN for a face recognition is suitable to control the actuators in the home security system because a home security system requires good face recognition and short recognition time.

Design and Implementation of The Ubiquitous Computing Environment-Based on Dynamic Smart on / off-line Learner Tracking System (유비쿼터스 환경 기반의 동적인 스마트 온/오프라인 학습자 추적 시스템 설계 및 구현)

  • Lim, Hyung-Min;Lee, Sang-Hun;Kim, Byung-Gi
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.1
    • /
    • pp.24-32
    • /
    • 2011
  • In ubiquitous environment, the analysis for student's learning behaviour is essential to provide students with personalized education. SCORM(Sharable Contents Object Reference Model), IMS LD (Instructional Management System Learning Design) standards provide the support function of learning design such as checking the progress. However, in case of applying these standards contain many problem to add or modify the contents. In this paper, We implement the system that manages the learner behaviour by hooking the event of web browser. Through all of this, HTML-based content can be recycled without any additional works and the problems by applying the standard can be improved because the store and analysis of the learning result is possible. It also supports the ubiquitous learning environment because of keeping track of the learning result in case of network disconnected.

A Study on the Efficient Power Consumption of Next Generation Mobile Communication Systems (차세대 이동통신 시스템의 효율적인 전력 소모에 관한 연구)

  • Roh, Jae-Sung;Kim, Wan-Tae
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.1
    • /
    • pp.56-62
    • /
    • 2013
  • Recently with smart phones and tablets, next generation mobile communication systems have supported various multimedia contents services. Thus, multimedia communication systems have been gradually increased compared to voice communication systems. Since the growth of multimedia services has increased users' duration on systems and decreased systems' effectiveness on power, a study on effective usage of power needs to be researched. Furthermore, radio shadow areas under heavy urban environments have generated unnecessary power consumption which reduces the usage duration of power on next generation mobile communication systems. This paper has reviewed the communication network architecture on next generation mobile communication systems and the unnecessary power consumption in radio shadow areas. This paper has also proposed the method of the effective power usage and analyzed the effective power usage on next generation mobile communication systems with simulation.

Technique for Indentifying Cyber Crime Using Clue (수사단서를 이용한 동일 사이버범죄 판단기법)

  • Kim, Ju Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.767-780
    • /
    • 2015
  • In recent years, as smart phone penetration rate is growing explosively, new forms of cyber crime data is poured out beyond the limits of management system for cyber crime investigation. These new forms of data are collected and stored in police station but, some of data are not systematically managed. As a result, investigators sometimes miss the hidden data which can be critical for a case. Crime data is usually generated by computer which produces complex and huge data and records many logs automatically, so it is necessary to simplify a collected data and cluster by crime pattern. In this paper, we categorize all kinds of cyber crime and simplify crime database and extract critical clues relative to other cases. Through data mining and network-visualization, we found there is correlation between clues of a case. From this result, we conclude cyber crime data mining helps crime prevention, early blocking and increasing the efficiency of the investigation.

A Design and Implementation of Virtual Grid for Reducing Frequency of Continuous Query on LBSNS (LBSNS에서 연속 질의 빈도 감소를 위한 가상그리드 기법의 설계 및 구현)

  • Lee, Eun-Sik;Cho, Dae-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.4
    • /
    • pp.752-758
    • /
    • 2012
  • SNS(Social Networking Services) is oneline service that enable users to construct human network through their relation on web, such as following relation, friend relation, and etc. Recently, owing to the advent of digital devices (smart phone, tablet PC) which embedded GPS some applications which provide services with spatial relevance and social relevance have been released. Such an online service is called LBSNS. It is required to use spatial filtering so as to build the LBSNS system that enable users to subscribe information of interesting area. For spatial filtering, user and tweet attaches location information which divide into static property presenting fixed area and dynamic property presenting user's area changed along the moving user. In the case of using a location information including dynamic property, Continuous query occurred from the moving user causes the problem in server. In this paper, we propose spatial filtering algorithm using Virtual Grid for reducing frequency of query, and conclude that frequency of query on using Virtual Grid is 93% decreased than frequency of query on not using Virtual Grid.

A Study of Wired and wireless VoIP vulnerability analysis and hacking attacks and security (유무선 VoIP 취약점 분석과 해킹공격 및 보안 연구)

  • Kwon, Se-Hwan;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.4
    • /
    • pp.737-744
    • /
    • 2012
  • Recently VoIP has provided voice(both wired and wireless from IP-based) as well as the transmission of multimedia information. VoIP used All-IP type, Gateway type, mVoIP etc. Wired and wireless VoIP has security vulnerabilities that VoIP call control signals, illegal eavesdropping, service misuse attacks, denial of service attack, as well as wireless vulnerabilities etc. from WiFi Zone. Therefore, the analysis of security vulnerabilities in wired and wireless VoIP and hacking incidents on security measures for research and study is needed. In this paper, VoIP (All-IP type, and for Gateway type) for system and network scanning, and, IP Phone to get the information and analysis of the vulnerability. All-IP type and Gateway type discovered about the vulnerability of VoIP hacking attacks (Denial of Service attacks, VoIP spam attacks) is carried out. And that is a real VoIP system installed and operated in the field of security measures through research and analysis is proposed.