• Title/Summary/Keyword: Smart space

Search Result 1,131, Processing Time 0.028 seconds

Study of Multi-Resident Location Tracking Service Model Based on Context Information (상황정보 기반의 다중 거주자 위치 추적 서비스에 관한 연구)

  • Won, Jeong Chang;Man, Ko Kwang;Chong, Joo Su
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.5
    • /
    • pp.141-150
    • /
    • 2014
  • In recent years, because of the development of ubiquitous technology in healthcare research is actively progress. Especially, healthcare service area is change to home for the elderly or patients from hospital. The technology to identify residents in a home is crucial for smart home application services. However, existing researches for resident identification have several problems. In this case, residents are needed to attach of various sensors on their body. Also relating private life, it is difficult to apply to resident's environment. In this paper, we used constraint-free sensor and unconscious sensor to solve these problems and we limited using of sensor and indoor environment in the way of working economical price systems. The way of multi-resident identification using only these limited sensors, we selected elements of personal identifications and suggested the methods in giving the weight to apply these elements to systems. And we designed the SABA mechanism to tract their location and identify the residents. It mechanism can distinguish residents through the sensors located each space and can finally identify them by using the records of their behaviors occurred before. And we applied the mechanism designed for applications to approve this location tracking system. We verified to the location tracking system performance according to the scenario.

Wearable Technology with Future Fabrics (웨어러블 테크놀로지와 미래 소재)

  • Park, Hye-Sook;Lee, Jae-Jung
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.30 no.12 s.159
    • /
    • pp.1800-1809
    • /
    • 2006
  • The wearable technology takes the concept of clothing over its limits -integrating software, communication devices, and sensors into the garments to enable them to 'think' for the wearer. A dress is no longer just a dress, but a dress as well as a wearable computer interface. This wearable computer network transports the data power and control signals within the wearer's personal space. The purpose of this thesis is to explore the wearable technology from a commercial perspective. On this theme I made a survey and interviewed 20 men and 20 women in London to find out if many people are familiar with the concept of the wearable technology. The main results of this study include: Firstly, according to the survey, people are not familiar with the concept of the wearable technology, and further people thought negatively about the wearable computer rather than positively they worried about hish prices, inappropriate technology and side effects. Secondly, people are especially interested in items related to health and security, so in this area there are huge potential opportunities for the wearable technology, Finally, wearable technology needs to be a simplified set of interactive devices, which are in a user friendly format for marketability because convenience was one of the biggest concern for consumers. Therefore, development of the wearable computer should be promoted not only through computer engineering but also through the connection with human lift.

Frequency-to-time Transformation by a Diffusion Expansion Method (분산 전개법에 의한 주파수-시간 영역 변환)

  • Cho, In-Ky;Kim, Rae-Yeong;Ko, Kwang-Beom;You, Young-June
    • Geophysics and Geophysical Exploration
    • /
    • v.17 no.3
    • /
    • pp.129-136
    • /
    • 2014
  • Electromagnetic (EM) methods are generally divided into frequency-domain EM (FDEM) and time-domain EM (TDEM) methods, depending on the source waveform. The FDEM and TDEM fields are mathematically related by the Fourier transformation, and the TDEM field can thus be obtained as the Fourier transformation of FDEM data. For modeling in time-domain, we can use fast frequency-domain modeling codes and then convert the results to the time domain with a suitable numerical method. Thus, frequency-to-time transformations are of interest to EM methods, which is generally attained through fast Fourier transform. However, faster frequency-to-time transformation is required for the 3D inversion of TDEM data or for the processing of vast air-borne TDEM data. The diffusion expansion method (DEM) is one of smart frequency-to-time transformation methods. In DEM, the EM field is expanded into a sequence of diffusion functions with a known frequency dependence, but with unknown diffusion-times that must be chosen based on the data to be transformed. Especially, accuracy of DEM is sensitive to the diffusion-time. In this study, we developed a method to determine the optimum range of diffusion-time values, minimizing the RMS error of the frequency-domain data approximated by the diffusion expansion. We confirmed that this method produces accurate results over a wider time range for a homogeneous half-space and two-layered model.

Remote Control of Network-Based Modular Robot (네트웍 기반 모듈라 로봇의 원격 제어)

  • Yeom, Dong-Joo;Lee, Bo-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.77-83
    • /
    • 2018
  • A modular robot that memorizes motion can be easily created and operated because it expresses by hand. However, since there is not enough storage space in the module to store the user-created operation, it is impossible to reuse the created operation, and when the modular robot again memorizes the operation, it changes to another operation. There is no main controller capable of operating a plurality of modular robots at the same time, and thus there is a disadvantage that the user must input directly to the modular robot. To overcome these disadvantages, a remote controller has been proposed that can be operated in the surrounding smart devices by designing web server and component based software using wired and wireless network. In the proposed method, various types of structures are created by connecting to a modular robot, and the reconstructed operation is performed again after storing, and the usefulness is confirmed by regenerating the stored operation effectively. In addition, the reliability of the downloaded trajectory data is verified by analyzing the difference between the trajectory data and the actual trajectory. In the future, the trajectory stored in the remote controller will be standardized using the artificial intelligence technique, so that the operation of the modular robot will be easily implemented.

A Study on the Effects of Urban Public Transportation Retrofitting for Sustainability (지속가능성을 위한 도시 대중교통 레트로핏(Retrofitting) 효과분석)

  • KIM, Seunghyun;NA, Sungyoung;KIM, Jooyoung;LEE, Seungjae
    • Journal of Korean Society of Transportation
    • /
    • v.36 no.1
    • /
    • pp.23-37
    • /
    • 2018
  • In recent years, it is very difficult to construct and expand new infrastructures in a city center because of long-term low growth and lack of space due to urban overcrowding. So, there is a need to study a variety of Retrofitting techniques and urban applications that can lead to sustainable development while efficiently utilizing existing facilities. 'Retrofit' means a sustainable urban retrofitting as a directed alteration of the structures, formations and systems of existing facilities to improve energy, water and waste efficiencies. In this study, we applied a hierarchical network design technique that can reflect the structural hierarchy of a city to study how to retrofit public transportation routes in Seoul. The hierarchical network design means dividing the hierarchy according to the functions of hubs and connecting different hierarchies to form a hierarchical network. As a result of comparing the application results of various retrofitting scenarios of public transport, the differences of daily PKT and PHT by about 2.6~3.2% less than before the improvement address that the convenience of passengers is increased. Therefore, it is expected that if the route planning is established according to the proposed method, it will increase the number of passengers and the operational efficiency by the improved convenience of public transit passengers.

A research on remote X-ray detector design development for marketing in field diagnosis service (현장 진단 서비스 시장 공략을 위한 '무선 X-ray 디텍터' 디자인개발에 관한 연구)

  • Song, Seong Il
    • Journal of the Korean Crystal Growth and Crystal Technology
    • /
    • v.27 no.4
    • /
    • pp.196-205
    • /
    • 2017
  • In recent years, the service design in the medical sector evolves through practical service research and development that can visualize both intangible and intangible service elements in an integrative way and derive innovative solutions to help customers feel the service more important value. With the improvement of personal income, interest in medical welfare and well-being is increasing day by day, and the focus of the medical sector shifts from the concept of treatment of diseases and illness to preventive medicine. In response to this trend, research and development of home health care system, which greatly reduces the time and space constraint of health checkup and health care by combining ubiquitous concept with medical welfare, are being actively conducted, and the needs for improving products and medical environment based on user-centered medical service and user needs in accordance with the Health Care 3.0 Era, it becomes necessary to develop on-site medical diagnostic products that reflect user-centered needs and needs. This study is intended to research and develop a product that sufficiently reflects the needs of users by applying suitable materials and shape for on-site diagnostic product in researching and developing Wireless X-ray Detector.

A Design of Information Security Education training Databank System for Preventing Computer Security incident (침해사고 예방을 위한 정보보안 교육훈련 문제은행 시스템)

  • Mo, Eun-Su;Lee, Jae-Pil;Lee, Jae-Gwang;Lee, Jun-Hyeon;Lee, Jae-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.277-280
    • /
    • 2015
  • Smishing, Phishing personal privacy caused by Incident accidents such as Phishing information security has become a hot topic. Such incidents have privacy in personal information management occurs due to a lack of user awareness. This paper is based on the existing structure of the XML Tag question bank used a different Key-Value Structure-based JSON. JSON is an advantage that does not depend on the language in the text-based interchange format. The proposed system is divided into information security sector High, Middle and Low grade. and Provides service to the user through the free space and the smart device and the PC to the constraints of time. The use of open source Apache Load Balancing technology for reliable service. It also handles the user's web page without any training sessions Require server verification result of the training(training server). The result is sent to the training server using jQuery Ajax. and The resulting data are stored in the database based on the user ID. Also to be used as a training statistical indicators. In this paper, we design a level training system to enhance the user's information security awareness.

  • PDF

Interaction Contents for Reconsidering Visually Disabled Parents

  • Hong, Joo-Bong;Lee, Chan-Kyu;Lim, Chan
    • International journal of advanced smart convergence
    • /
    • v.9 no.1
    • /
    • pp.54-62
    • /
    • 2020
  • According to the Ministry of Health and Welfare, "Status of Registered Persons with Disabilities", the number of people with disabilities is 2,494,460 as of 2015. The lowest rates of children with disabilities were intellectual disabilities (23%) and mental disorders (33.3%). The highest rates of screening were blindness (97%), heart failure (94.4%), and hearing impairment (92.7%). 65.2% of visually impaired people who have already had a disability at the time of marriage, and the remaining 34.8% can be thought to be the cause of high incidence of disability after marriage. 'SID (Seed in the Dark)' project was designed to recapture the visually impaired parent's desire for attachment and the space difficulties of the blind who want to be a normal parent to their children through a visual impairment of a father with 7-year-old daughter. Using Gear VR(Virtual Reality), the general public was able to feel the surroundings as if they had no vision and focused on the hearing. Especially, We expressed the sound wave visually and added the hilarious game element which grasps the terrain of the maze by sound wave like a 'blind person who perceives the surroundings by sound' and catches up with daughter. People with disabilities who are far from mental illness often have a form of family with children. The fact that the rate of childbirth is high means that there is relatively little problem in daily life. It is wondered that the rate of blindness among the visually impaired, which accounts for 10% of the total disabled, is the highest at 97%. This is because, in the case of the visually impaired, the obstacle is often caused by aging, accidents, or diseases due to inherited causes rather than the visual disorder. In particular, However, the fact that there is an obstacle in vision that accounts for 83% of the body's sensory organs causes other difficulties in the nursing process of children who are non-disabled. Parents do not know the face of child when their visual impairment is severe. Parents are extremely anxious about worry that they will be lost or abducted if their children are not by their side. And that the child recognizes the disability of his or her parents other than the other parents easily and takes it as a deficiency. Since visually impaired parents are mentally mature parents with non-disabled people, they may want their children not to feel deprived of their disability. The number of people with visual impairments has been increasing since 2001, and people with impairments often become disabled. In addition, there is much research on the problem of nondisabled parents who have children with disabilities, while there is relatively little interest and research on the problem of nondisabled child rearing of parents with disabilities.

Development of unified communication for marine VoIP service (해상 VoIP 서비스를 위한 통합 커뮤니케이션 기술 개발)

  • Kang, Nam-seon;Yim, Geun-wan;Lee, Seong-haeng;Kim, Sang-yong
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.39 no.7
    • /
    • pp.744-753
    • /
    • 2015
  • This paper presents the results of research on developing marine unified communications to provide VoIP service based on marine satellites. With the recent popularity of smart-phones and other mobile devices, the demand for Internet-based wired and wireless unified technology has been growing in marine environments, and increasing interest is being directed to VoIP products and service models with high price competitiveness and the ability to deliver a variety of services. In this regard, this research designed three instruments, developed their unit modules, and verified their performances. These three instruments included the following: (1) a marine VoIP module equipped with an analogue gateway that can be linked to the existing devices used in vessels, which is more than 80% smaller than that of a land system; (2) a text/voice/video engine for marine satellite communications that runs on technology that minimizes communication data usage, which is a core technology for a marine VoIP service; and (3) a unified communication service that can support multilateral cloud-based message conversations, telephone number-based call functions, and voice/video calling between a private space in a ship and shore.

Effects that Faith Factor of Social Bonds Have on Cyber Bullying Phenomenon (사회유대의 신념요인이 사이버 불링 가해 현상에 미치는 영향)

  • Lee, Young-Sik
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.1
    • /
    • pp.256-262
    • /
    • 2016
  • A cyber crime has been evolving, as other crimes have. Beyond physical damages such as financial crimes in the cyber world, it has evolved into psychological forms like cyber-bullying. In today's crimes, measures that consider psychological effects of crimes are highly regarded in that fear of crime is considered as well as visible crimes. Accordingly, cyber bullying, which causes psychological damages, needs to be treated very importantly. Because the characteristics of cyber crime is caused by different circumstances from the real world, measures should be taken in different aspects. Rather than physical damages, which can be found in the conventional crimes, cyber crimes cause psychological damages, so the effect that has on inflicting should be specified. Especially, in the environment that virtual reality is ubiquitous through smart phones, it is very difficult to establish measures by considering all the causes of general cyber crimes. Therefore, this study estimated what affects cyber bullying by focusing on personalized faith factor among social bond theory, which can control cyber crimes. As a result, self-controling faith was verified to have a negative effect on cyber bullying, so faith is a very important factor in personalized environment. Thus, it is suggested that the characteristics of cyber space and education of humanism, which can affect individuals' faith should be emphasized.