• Title/Summary/Keyword: Ubiquitous IT techniques

Search Result 110, Processing Time 0.026 seconds

The Development of Exposure Assessment Tools for Risk Assessment of Volatile Organic Compounds (VOCs의 위해성 평가를 위한 노출분석 방법 연구)

  • Jo, Seong-Joon;Shin, Dong-Chun;Chung, Yong;Lee, Duck-Hee;Breysse, Patrick N.
    • Environmental Analysis Health and Toxicology
    • /
    • v.17 no.2
    • /
    • pp.147-160
    • /
    • 2002
  • Volatile organic compounds (VOCs) are an important public health issue in Korea and many important questions remain to be addressed with respect to assessing exposure to these compounds. Because they are ubiquitous and highly volatile, special techniques must be applied in their analytic determination Valid Personal exposure assessment methods are needed to evaluate exposure frequency, duration and intensity, as well as their relationship to personal exposure characteristics. Biological monitoring is also important since it may contribute significantly in risk assessment by allowing the estimation of effective absorbed doses. This study was on ducted to establish the environmental measurement, personal dosimetry and biological monitoring methods for VOCs. These methods are needed to compare blood, urinary and exhalation breath VOC levels and to provide tools for risk assessment of VOC exposure. Passive monitors (badge type) and a active samplers (trap) for the VOCs collection were used for air sampling. Methods development included determining the minimum detectable amounts of VOCs in each media, as well as evaluating collection methods and developing analytical procedures. Method reliability was assessed by determining breakthrough volumes and comparing results between laboratories and with other methods. A total capacity of trap used in this study was 60ι. Although variable by compound, the average breakthrough was 20%. Also, there was no loss of compounds in trap even if keep for 45 day in -7$0^{\circ}C$. The recovery of active and passive methods was 69% ~ 126% and method detection limit was 0.24 $\mu\textrm{g}$/trap and 0.07 $\mu\textrm{g}$/badge. There was no statistical difference (P > 0.05) between active and passive methods.

Design and Implementation of adaptive traffic signal simulator system for U-Traffic (U-Traffic의 적응형 교통 신호 시뮬레이터 구축에 대한 연구)

  • Jang, Won-Tae;Kang, Woo-Suk
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.3
    • /
    • pp.480-487
    • /
    • 2012
  • In Busan, the structural limitations of the road, is causing severe traffic congestion and low speed of the vehicle. So the existing traffic control system needs improvements to its structure. A study on Optimal Traffic Signal System and Improvement for User Oriented Public Transit Service are required. U-city is a city or region with ubiquitous information technology. All information systems are linked, and virtually everything is linked to an information technologies. U-Traffic goal is to maximize of traffic information services based on advanced information technology to integrate of transportation infrastructure. The objectives of this research are : a vehicle detection method through a variety of sensors, an algorithm of the traffic signal system, a design and implementation a simulator to compare between the fixed traffic signal and adaptive traffic signal system. This simulator will have allowed analysis techniques for the study of traffic control. Results of simulator test shows that traffic congestion can be some reduce.

Efficient Flooding in Ad hoc Networks using Cluster Formation based on Link Density (애드 혹 네트워크에서 링크밀도기반 클러스터 구축을 이용한 효율적인 플러딩)

  • Lee, Jae-Hyun;Kwon, Kyung-Hee
    • The KIPS Transactions:PartC
    • /
    • v.14C no.7
    • /
    • pp.589-596
    • /
    • 2007
  • Although flooding has the disadvantages like a transmission of duplicated packets and a packet collision, it has been used frequently to find a path between a source and a sink node in a wireless ad hoc network. Clustering is one of the techniques that have been proposed to overcome those disadvantages. In this paper, we propose a new flooding mechanism in ad hoc networks using cluster formation based on the link density which means the number of neighbors within a node's radio reach. To reduce traffic overhead in the cluster is to make the number of non-flooding nodes as large as possible. Therefore, a node with the most links in a cluster will be elected as cluster header. This method will reduce the network traffic overhead with a reliable network performance. Simulation results using NS2 show that cluster formation based on the link density can reduce redundant flooding without loss of network performance.

Performance Test of the Ultralow Background Gamma-Ray Measurement System (극저준위 백그라운드 감마선 측정시스템의 성능시험)

  • Na, Won-Woo;Lee, Young-Gil
    • Journal of Radiation Protection and Research
    • /
    • v.22 no.3
    • /
    • pp.219-226
    • /
    • 1997
  • Ultralow background gamma-ray measurement system was installed to measure and analyze gamma-rays emitted from environmental and swipe samples. The background reduction techniques applied on this system are the passive shielding to surround the HPGe detector, an active external anticosmic shield to shield cosmic-rays and the nitrogen gas supply to minimize the introduction of ubiquitous radon decay nuclei. The performance test result showed that the system background at energies between 50 keV and 2 MeV is reduced about $10^{-2}$ order and the MDA is so low as to be suitable for the environmental sample analysis. But it is appeared that the neutron produced by cosmic-ray increases the background at low energy region.

  • PDF

Syntax-based Accessibility for 3D Indoor Spaces (3차원 내부공간에서의Syntax기반의 접근성 산출)

  • Kim, Hye-Young;Jun, Chul-Min;Kwon, Jay-Hyoun
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.15 no.3
    • /
    • pp.11-18
    • /
    • 2007
  • Recently 3D GIS and its applications are getting attention increasingly as various ubiquitous-related techniques for 3D spaces are being developed. Although they call for quantitative measures such as accessibility, most accessibilityrelated studies are limited to 2D networks, not 3D indoor space levels. In this paper, we develop an accessibility index applicable to 3D models. We first examine the theory of Space Syntax which has been developed and used to measure the connectivity or relationships between spatial segments in urban or architectural environments. Then, we expand the principle to a more general form so it can be applied to both street and indoor space levels. We incorporate different types of impedances in moving between places including distances, turns and transfers between floors into the traditional Space Syntax that measures the spatial depths solely based on the structural forms. Finally, we illustrate the use of the proposed measure comparatively using a campus building.

  • PDF

A Study of the Back-tracking Techniques against Hacker's Mobile Station on WiBro (WiBro에서 공격 이동단말에 대한 역추적기법 연구)

  • Park, Dea-Woo;Lim, Seung-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.3
    • /
    • pp.185-194
    • /
    • 2007
  • WiBro has become intentionally standardize as IEEE 802.16e. This WiBro service has been started by a portable internet at home as well as abroad. In this paper, an offender hacker do not direct attack on system on system that It marched an attack directly in damage system because a place oneself in mobile station of portable internet WiBro and avoid to attack hacker's system. At this time, a mobile make use of network inspection policy for back-tracking based on log data. Used network log audit, and presented TCP/IP bases at log bases as used algorithm, the SWT technique that used Thumbprint Algorithm. Timing based Algorithm, TCP Sequence number. Study of this paper applies algorithm to have been progressed more that have a speed to be fast so that is physical logical complexity of configuration of present Internet network supplements a large disadvantage, and confirm an effective back-tracking system. result of research of this paper contribute to realize a back-tracking technique in ubiquitous in WiBro internet network.

  • PDF

Development and Effect Verification of U-learning based Leveled Reading Education Support System (U-러닝 기반 수준별 독서교육지원 시스템 개발 및 효과검증)

  • Kim, Jeong-Rang;Ma, DaI-Sung;Cheon, Kyung-Rok;Choi, Hyun-Ho;Ko, Yoon-Mi
    • Journal of The Korean Association of Information Education
    • /
    • v.13 no.1
    • /
    • pp.41-49
    • /
    • 2009
  • It's going to be ubiquitous environment which is able to use web pages independent of time and a place by recent development of mobile techniques. On this, we improved the leveled reading supporting system according to U-learning environment and make student to read on both Off-line and On-line through connecting to E-book service. So we developed the reading supporting system which can improve the interests in reading and reading skill and proved the effects. U-learning based leveled reading education support system could be helped develop the reading ability by raising the interest in the activities reading and after reading.

  • PDF

Offline Based Ransomware Detection and Analysis Method using Dynamic API Calls Flow Graph (다이나믹 API 호출 흐름 그래프를 이용한 오프라인 기반 랜섬웨어 탐지 및 분석 기술 개발)

  • Kang, Ho-Seok;Kim, Sung-Ryul
    • Journal of Digital Contents Society
    • /
    • v.19 no.2
    • /
    • pp.363-370
    • /
    • 2018
  • Ransomware detection has become a hot topic in computer security for protecting digital contents. Unfortunately, current signature-based and static detection models are often easily evadable by compress, and encryption. For overcoming the lack of these detection approach, we have proposed the dynamic ransomware detection system using data mining techniques such as RF, SVM, SL and NB algorithms. We monitor the actual behaviors of software to generate API calls flow graphs. Thereafter, data normalization and feature selection were applied to select informative features. We improved this analysis process. Finally, the data mining algorithms were used for building the detection model for judging whether the software is benign software or ransomware. We conduct our experiment using more suitable real ransomware samples. and it's results show that our proposed system can be more effective to improve the performance for ransomware detection.

A Study on the Efficient TICC(Time Interval Clustering Control) Algorithm using Attribute of Node (노드의 속성을 고려한 효율적인 TICC(Time Interval Clustering Control) 알고리즘에 관한 연구)

  • Kim, Young-Sam;Doo, Kyoung-Min;Lee, Kang-Whan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.9
    • /
    • pp.1696-1702
    • /
    • 2008
  • A MANET(Mobile Ad-hoc Network) is a multi-hop routing protocol formed by a collection without the intervention of infrastructure. So the MANET also depended on the property as like variable energy, high degree of mobility, location environments of nodes etc. Generally the various clustering technique and routing algorithm would have proposed for improving the energy efficiency. One of the popular approach methods is a cluster-based routing algorithm using in MANET. In this paper, we propose an algorithm techniques which is TICC (Time Interval Clustering Control) based on energy value in property of each node for solving cluster problem. It provides improving cluster energy efficiency how can being node manage to order each node's energy level. TICC could be able to manage the clustering, re-configuration, maintenance and detection of Node in MANET. Furthermore, the results of modeling shown that Node's energy efficiency and lifetime are improved in MANET.

A Research on types of DMB advertising according to features of DMB Media (DMB의 미디어와 기술 특성에 따른 DMB광고 유형과 종류에 관한 연구)

  • Ahn, Jong-Bae
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.3 no.4
    • /
    • pp.59-88
    • /
    • 2008
  • For the success of the DMB market to meet consumers' demands for Ubiquitous Media and strengthen the nation's competitiveness, it's inevitable for us to activate DMB advertising as of main profit source for DMB Media, and to develop various types of DMB advertising which are linked to the profit model. So I'd like to look over the various types of DMB advertising which are suitable for DMB features as one of the efforts to activate DMB advertising. First of all, I've figured out what kinds of advertising are available for new media and which related technologies are required for DMB media. Through this research, I could find out what features of new media such as cable broadcasting, Internet and Mobile have become the source of developing various types of advertising and how to a great part to activate new media advertising markets by making the best use of their media features. This research also shows that DMB advertising has the high potential to be developed in various and effective types and kinds of advertising with its media feature and technological feature. This research observing DMB advertising cases showed that DMB advertising can be divided into 6 types such as forms, purposes, techniques, advertising positions, the use of LBS(Location Based Service), coupons and it could be developed into various kinds of DMB advertising dependent on each type. On the other hands, it would be great to have continual researches and follow-ups for various types of DMB advertising and the verification of the effectiveness for DMB advertising by performing potential DMB advertising.

  • PDF