• Title/Summary/Keyword: Store environment

Search Result 737, Processing Time 0.023 seconds

Monitoring System for Optimized Power Management with Indoor Sensor (실내 전력관리 시스템을 위한 환경데이터 인터페이스 설계)

  • Kim, Do-Hyeun;Lee, Kyu-Tae
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.127-133
    • /
    • 2020
  • As the usages of artificial intelligence is increased, the demand to algorithms for small portable devices increases. Also as the embedded system becomes high-performance, it is possible to implement algorithms for high-speed computation and machine learning as well as operating systems. As the machine learning algorithms process repetitive calculations, it depend on the cloud environment by network connection. For an stand alone system, low power consumption and fast execution by optimized algorithm are required. In this study, for the purpose of smart control, an energy measurement sensor is connected to an embedded system, and a real-time monitoring system is implemented to store measurement information as a database. Continuously measured and stored data is applied to a learning algorithm, which can be utilized for optimal power control, and a system interfacing various sensors required for energy measurement was constructed.

Metaverse App Market and Leisure: Analysis on Oculus Apps (메타버스 앱 시장과 여가: 오큘러스 앱 분석)

  • Kim, Taekyung;Kim, Seongsu
    • Knowledge Management Research
    • /
    • v.23 no.2
    • /
    • pp.37-60
    • /
    • 2022
  • The growth of virtual reality games and the popularization of blockchain technology are bringing significant changes to the formation of the metaverse industry ecosystem. Especially, after Meta acquired Oculus, a VR device and application company, the growth of VR-based metaverse services is accelerating. In this study, the concept that supports leisure activities in the metaverse environment is explored realting to game-like features in VR apps, which differentiates traditional mobile apps based on a smart phone device. Using exploratory text mining methods and network analysis approches, 241 apps registed in the Oculus Quest 2 App Store were analyzed. Analysis results from a quasi-network show that a leisure concept is closely related to various genre features including a game and tourism. Additionally, the anlaysis results of G & F model indicate that the leisure concept is distictive in the view of gateway brokerage role. Those results were also confirmed in LDA topic modeling analysis.

Microbial Contamination according to the Numbers of Mask Worn in the Community

  • Eun Ju Lee;Heechul Park;Min-A Je;Songhee Jung;Gahee Myoung;Su Bin Jo;Hyun Min Hwang;Ryeong Si;Hyunwoo Jin;Kyung-Eun Lee;Jungho Kim
    • Biomedical Science Letters
    • /
    • v.28 no.4
    • /
    • pp.317-321
    • /
    • 2022
  • Due to COVID-19 pandemic, wearing face masks is obligatory to prevent respiratory virus transmissions in the community. However, there are few studies of the desirable number of wearing a face mask, and how to store them for reuse. Therefore, in this study, a survey was conducted among 208 healthy adults, and 27 kf-94 masks worn for 1, 2, and 3 days were collected. To estimate the risk of bacterial contamination, we analyzed the extent of bacterial contamination of the BHI medium and 16S rRNA gene sequencing. With an increase in the number of days of using the mask, the degree of bacterial contamination of the used mask gradually increased. As a result of 16S rRNA PCR performed for strain identification, Staphylococcus, known as a pathogenic bacterium, was identified the most. In conclusion, we found that wearing a cotton KF mask provides an optimal environment for microbes, which are related to the skin and respiratory system, to thrive. Therefore, it is also important to reduce the risk of bacterial infection of the face mask with appropriate sterilization methods.

Optical Spectroscopic Analysis Techniques to Detect Elemental Profile of Human Teeth Dentine

  • Saifullah Jamali;Muhammad Aslam Khoso;Irfan Ali Sanjrani;Hussain Saleem;Tariq Ali Siyal;Muhammad Ashraf;Mansoor Ahmed Memon;Ghulam Murtaza;Zahid Hussain Arain;Zaheer Ahmed Ujjan;Muhammad Niaz Laghari;Samina Saleem;Nek M. Shaikh;Waseem A. Bhutto;Abdul Majid Soomro;Altaf H. Nizamani
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.193-202
    • /
    • 2023
  • Numerous articles under the study and the examination of heavy metals in human teeth have been published in recent years. The heavy metal poisoning is a widespread issue emerged in toxicology area these days. It has been discovered that long-term exposure to heavy metals typically present in traces, in our everyday meals, drinking water, and in the environment as pollution causes heavy metal poisoning in human beings. Industrial effluents, Coal and Oil, as well as a variety of consumer items, such as cosmetics, can all cause this type of exposure. Teeth, which are often thought of as exoskeleton parts, store heavy metals with a high affinity and represent long-term exposure information. In this study, we have chosen and examined the sections of dentine instead, then examined the entire tooth. We have combined the work done on the examination of heavy metals in human teeth using several instrumental approaches e.g. "Optical Spectroscopic Techniques" to detect elemental profile of human teeth in the current study.

A Study on the Charpy Impact Performance of Structural Steel Considering the Leakage of Cryogenic Liquefied Gas (극저온 액화가스 누출에 의한 선체 구조용 강재의 샤르피 충격성능에 관한 연구)

  • Dong Hyuk Kang;Jeong-Hyeon Kim;Seul-Kee Kim;Tae-Wook Kim;Doo-Hwan Park;Ki-Beom Park;Jae-Myung Lee
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.26 no.2_2
    • /
    • pp.333-340
    • /
    • 2023
  • Environmental regulations are being strengthened worldwide to solve global warming. For this reason, interest in eco-friendly gas fuels such as LNG and hydrogen is continuously increasing. However, when adopting eco-friendly gas fuel, liquefying at a cryogenic temperature is essential to ensure economic feasibility in storage and transportation. Although austenitic stainless steel is typically applied to store cryogenic liquefied gas, structural steel can experience sudden heat shrinkage in the case of leakage in the loading and unloading process of LNG. In severe cases, the phase of the steel may change, so care is required. This study conducted Charpy impact tests on steel material in nine different temperature ranges, from room to cryogenic temperatures, to analyze the effects of cryogenic liquefied gas leaks. As a result of the study, it was not easy to find variations in ductile to brittle transition temperature (DBTT) due to the leakage of cryogenic liquefied gas. Still, the overall impact toughness tended to decrease, and these results were verified through fracture surface analysis. In summary, brittle fracture of the steel plate may occur when a secondary load is applied to steel for hull structural use exposed to a cryogenic environment of -40 ℃ or lower. Therefore, it needs to be considered in the ship design and operating conditions.

Services Quality Improvement through Control Management Cloud-Based SLA

  • Abel Adane
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.89-94
    • /
    • 2023
  • Cloud-based technology is used in different organizations around the world for various purposes. Using this technology, the service providers provide the service mainly SaaS, PaaS and while the cloud service consumer consumes the services by paying for the service they used or accessed by the principle of "pay per use". The customer of the services can get any services being at different places or locations using different machines or electronic devices. Under the conditions of being well organized and having all necessary infrastructures, the services can be accessed suitably. The identified problem in this study is that cloud providers control and monitor the system or tools by ignoring the calculation and consideration of various faults made from the cloud provider side during service delivery. There are currently problems with ignoring the consumer or client during the monitoring and mentoring system for cloud services consumed at the customer or client level by SLA provisions. The new framework was developed to address the above-mentioned problems. The framework was developed as a unified modeling language. Eight basic components are used to develop the framework. For this research, the researcher developed a prototype by using a selected cloud tool to simulate and java programming language to write a code as well as MySQL to store data during SLA. The researcher used different criteria to validate the developed framework i.e. to validate SLA that is concerned with a cloud service provider, validate what happened when the request from the client-side is less than what is specified in SLA and above what is specified in SLA as well as implementing the monitoring mechanism using the developed Monitoring component. The researcher observed that with the 1st and 3rd criteria the service level agreement was violated and this indicated that if the Service level agreement is monitored or managed only by cloud service prover, there is a violation of LSA. Therefore, the researcher recommended that the service level agreement be managed by both cloud service providers and service consumers in the cloud computing environment.

Implementation of Vehicle Location Identification and Image Verification System in Port (항만내 차량 위치인식 및 영상 확인 시스템 구현)

  • Lee, Ki-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.201-208
    • /
    • 2009
  • As the ubiquitous environment is created, the latest ports introduce U-Port services in managing ports generally and embody container's location identification system, port terminal management system, and advanced information exchange system etc. In particular, the location identification system for freight cars and containers provide in real time the information on the location and condition for them, and enables them to cope with an efficient vehicle operation management and its related problems immediately. However, such a system is insufficient in effectively handling with the troubles in a large-scale port including freight car's disorderly driving, parking, stop, theft, damage, accident, trespassing and controlling. In order to solve these problems, this study structures the vehicle positioning system and the image verification system unsing high resolution image compression and AVE/H.264 store and transmission technology, able to mark and identify the vehicle location on the digital map while a freight car has stayed in a port since the entry of an automatic gate, or able to identify the place of accident through image remotely.

Construction and basic performance test of an ICT-based irrigation monitoring system for rice cultivation in UAE desert soil

  • Mohammod, Ali;Md Nasim, Reza;Shafik, Kiraga;Md Nafiul, Islam;Milon, Chowdhury;Jae-Hyeok, Jeong;Sun-Ok, Chung
    • Korean Journal of Agricultural Science
    • /
    • v.48 no.4
    • /
    • pp.703-718
    • /
    • 2021
  • An irrigation monitoring system is an efficient approach to save water and to provide effective irrigation scheduling for rice cultivation in desert soils. This research aimed to design, fabricate, and evaluate the basic performance of an irrigation monitoring system based on information and communication technology (ICT) for rice cultivation under drip and micro-sprinkler irrigation in desert soils using a Raspberry Pi. A data acquisition system was installed and tested inside a rice cultivating net house at the United Arab Emirates University, Al-Foah, Al-Ain. The Raspberry Pi operating system was used to control the irrigation and to monitor the soil water content, ambient temperature, humidity, and light intensity inside the net house. Soil water content sensors were placed in the desert soil at depths of 10, 20, 30, 40, and 50 cm. A sensor-based automatic irrigation logic circuit was used to control the actuators and to manage the crop irrigation operations depending on the soil water content requirements. A developed webserver was used to store the sensor data and update the actuator status by communicating via the Pi-embedded Wi-Fi network. The maximum and minimum average soil water contents, ambient temperatures, humidity levels, and light intensity values were monitored as 33.91 ± 2 to 26.95 ± 1%, 45 ± 3 to 24 ± 3℃, 58 ± 2 to 50 ± 4%, and 7160-90 lx, respectively, during the experimental period. The ICT-based monitoring system ensured precise irrigation scheduling and better performance to provide an adequate water supply and information about the ambient environment.

Impacts of Perceived Risk on Satisfaction, Trust, and Loyalty in Food-Service Franchise Context (외식 프랜차이즈 기업에 대한 지각된 위험이 만족, 신뢰, 그리고 충성도에 미치는 영향)

  • Park, Sang-Eon;Woo, Sung-Keun;Choi, Myeong-Soo
    • The Korean Journal of Franchise Management
    • /
    • v.9 no.4
    • /
    • pp.45-56
    • /
    • 2018
  • Purpose - Consumers perceive various risks while using food service franchise stores. Food service franchise stores offer consumers not just menus, but services, physical environment, and prices, which can be perceived as risk to consumers. This means that consumer behavior in foos service franchise stores needs to be studied based on perceived risk theory. Perceived risk consists of performance risk, financial risk, social risk, psychological risk, and time risk. The purpose of this study is to investigate the effects of perceived risk on satisfaction and trust, and in turn affect loyalty. The results of this study will provide guidelines for marketers to develop strategies to reduce the perceived risk of consumers. Research design, data, methodology - In order to achieve research purposes, the authors developed several hypotheses. Data were through online survey through an online survey firm. A questionnaire survey was distributed to customers who have visited the restaurant in the past three months. The survey was conducted from March 5, 2017 to October 14, 2017. A total of 1,500 people were e-mailed and 260 were returned. A total of 245 items were used in the analysis except 15 of the questionnaire. Data was analyzed by using SPSS 21.0 and AMOS 21.0. Results - The findings of this study are as follows: First, performance risk, economic risk, and psychological risk had negative effects on satisfaction. Social and time risks did not affect on satisfaction. Performance risk and time risk had negative impact on trust. Second, economic, social, and psychological risks did not affect trust, but satisfaction had significant positive effect on trust and loyalty. Third, satisfaction had positive effect on loyalty. Conclusions - The implications of this study are as follows. First, food service franchise marketers should increase their customer loyalty by establishing a risk reduction strategy. Second, there are various risks to customers visiting the store. Therefore, marketers need to analyze the perceived risks of customers. Third, it is also necessary to eliminate the perceived risks of customers. In addition, a restaurant franchise company needs to find a reasonable way to reduce the material cost and present a reasonable menu price.

A User Authentication Scheme using Blockchain in Smart Grid-based Edge Computing Environments (스마트 그리드 기반 엣지 컴퓨팅 환경에서 블록체인을 이용한 사용자 인증 기법)

  • Hakjun Lee;Youngsook Lee
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.71-79
    • /
    • 2022
  • The smart grid system has emerged to maximize energy efficiency through real-time information exchange between power providers and consumers by combining information technology and power supply systems. The authentication schemes using blockchain in a smart grid system have been proposed, which utilize an edge server's architecture to collect and store electric power-related information and process data between a central cloud server and smart grid-IoT devices. Although authentication schemes are being proposed to enhance security in the smart grid environment, many vulnerabilities are still reported. This paper presents a new mutual authentication scheme to guarantee users' privacy and anonymity in a smart grid based on edge computing using blockchain. In the proposed scheme, we use the smart contract for the key management's efficiency, such as updating and discarding key materials. Finally, we prove that the proposed scheme not only securely establishes a session key between the smart grid-IoT device of the user and the edge server but also guarantees anonymity.