• Title/Summary/Keyword: Ubiquitous-Safety

Search Result 277, Processing Time 0.029 seconds

Providing Efficient Secured Mobile IPv6 by SAG and Robust Header Compression

  • Wu, Tin-Yu;Chao, Han-Chieh;Lo, Chi-Hsiang
    • Journal of Information Processing Systems
    • /
    • v.5 no.3
    • /
    • pp.117-130
    • /
    • 2009
  • By providing ubiquitous Internet connectivity, wireless networks offer more convenient ways for users to surf the Internet. However, wireless networks encounter more technological challenges than wired networks, such as bandwidth, security problems, and handoff latency. Thus, this paper proposes new technologies to solve these problems. First, a Security Access Gateway (SAG) is proposed to solve the security issue. Originally, mobile terminals were unable to process high security calculations because of their low calculating power. SAG not only offers high calculating power to encrypt the encryption demand of SAG's domain, but also helps mobile terminals to establish a multiple safety tunnel to maintain a secure domain. Second, Robust Header Compression (RoHC) technology is adopted to increase the utilization of bandwidth. Instead of Access Point (AP), Access Gateway (AG) is used to deal with the packet header compression and de-compression from the wireless end. AG's high calculating power is able to reduce the load on AP. In the original architecture, AP has to deal with a large number of demands by header compression/de-compression from mobile terminals. Eventually, wireless networks must offer users "Mobility" and "Roaming". For wireless networks to achieve "Mobility" and "Roaming," we can use Mobile IPv6 (MIPv6) technology. Nevertheless, such technology might cause latency. Furthermore, how the security tunnel and header compression established before the handoff can be used by mobile terminals handoff will be another great challenge. Thus, this paper proposes to solve the problem by using Early Binding Updates (EBU) and Security Access Gateway (SAG) to offer a complete mechanism with low latency, low handoff mechanism calculation, and high security.

Rapid Identification of Staphylococcus Species Isolated from Food Samples by Matrix-Assisted Laser Desorption/Ionization Time-of-Flight Mass Spectrometry

  • Kim, Eiseul;Kim, Hyun-Joong;Yang, Seung-Min;Kim, Chang-Gyeom;Choo, Dong-Won;Kim, Hae-Yeong
    • Journal of Microbiology and Biotechnology
    • /
    • v.29 no.4
    • /
    • pp.548-557
    • /
    • 2019
  • Staphylococcus species have a ubiquitous habitat in a wide range of foods, thus the ability to identify staphylococci at the species level is critical in the food industry. In this study, we performed rapid identification of Staphylococcus species using Matrix-Assisted Laser Desorption/Ionization Time-of-Flight mass spectrometry (MALDI-TOF MS). MALDI-TOF MS was evaluated for the identification of Staphylococcus reference strains (n = 19) and isolates (n = 96) from various foods with consideration for the impact of sample preparation methods and incubation period. Additionally, the spectra of isolated Staphylococcus strains were analyzed using principal component analysis (PCA) and a main spectra profile (MSP)-based dendrogram. MALDI-TOF MS accurately identified Staphylococcus reference strains and isolated strains: the highest performance was by the EX method (83.3~89.5% accuracy) at species level identification (EDT, 70.3~78.9% accuracy; DT, less than 46.3~63.2% accuracy) of 24-h cultured colonies. Identification results at the genus level were 100% accurate at EDT, EX sample preparation and 24-h incubation time. On the other hand, the DT method showed relatively low identification accuracy in all extraction methods and incubation times. The analyzed spectra and MSP-based dendrogram showed that the isolated Staphylococcus strains were characterized at the species level. The performance analysis of MALDI-TOF MS shows the method has the potential ability to discriminate between Staphylococcus species from foods in Korea. This study provides valuable information that MALDI-TOF MS can be applied to monitor microbial populations and pathogenic bacteria in the food industry thereby contributing to food safety.

Complementary IT for Elderly Care Activities: From Family Caregivers' Perspectives (노인부양활동에 있어 Information Technology의 보완 역할에 관한 탐색적 연구: 노인부양자의 욕구를 중심으로)

  • Lee, Eue Hun;Han, Sae Mee
    • 한국노년학
    • /
    • v.30 no.1
    • /
    • pp.159-177
    • /
    • 2010
  • This study focused on elderly caring issues and proposes Information Technology (IT) as the complementary tool of care activities, and it was aimed to identify application and feasibility of complementary IT for elderly care activities. Focus Group Interview (FGI) was conducted with current and potential caregivers respondents to explore caregivers' opinions and needs of care activities, and to suggest roles of IT which are helpful for elderly caregiving. The results showed that caregivers desire to check elderly care receivers' health, safety, and location whenever and wherever they want, and these caregivers' needs can be satisfied with IT by supporting caring ubiquitously. Moreover, this article provided more specific guidelines of IT applications for elderly caring services, so it expected positive roles of IT for elderly caring activities. However, this paper consequently emphasized IT must focus on only supporting and complementary roles of caregiving activities rather than alternative roles to enhance caregivers' caring efficiency and reduce their caring burden.

The Improvement of Disaster Safety Network using ICT Devices (ICT 기기를 활용한 재난안전통신망 강화 방안)

  • Hong, Sung-Hwa
    • Journal of Advanced Navigation Technology
    • /
    • v.23 no.2
    • /
    • pp.194-199
    • /
    • 2019
  • Natural disasters destroy decades of human effort and investments, thereby placing new demands on society for reconstruction and rehabilitation. In most case, the natural phenomena triggering the disasters are beyond human control. In order to solve the problems that the information resources can not be shared among disaster management sectors and their work is hard to be coordinated in city, an idea of application of ubiquitous sense network and ICT technology to model the architecture of the disaster prevention system based on the analysis of characteristics of disasters. The proposed algorithm simulated that it is possible to locate the terminal by linking the direction angle and the estimated position that can be confirmed at the time of stopping, even if the movement direction of the terminal does not move in a certain direction with only a smaller number of mobile base stations. We also confirmed that the proposed algorithms analyzed through simulation are more efficient than existing algorithms.

Automated detection of corrosion in used nuclear fuel dry storage canisters using residual neural networks

  • Papamarkou, Theodore;Guy, Hayley;Kroencke, Bryce;Miller, Jordan;Robinette, Preston;Schultz, Daniel;Hinkle, Jacob;Pullum, Laura;Schuman, Catherine;Renshaw, Jeremy;Chatzidakis, Stylianos
    • Nuclear Engineering and Technology
    • /
    • v.53 no.2
    • /
    • pp.657-665
    • /
    • 2021
  • Nondestructive evaluation methods play an important role in ensuring component integrity and safety in many industries. Operator fatigue can play a critical role in the reliability of such methods. This is important for inspecting high value assets or assets with a high consequence of failure, such as aerospace and nuclear components. Recent advances in convolution neural networks can support and automate these inspection efforts. This paper proposes using residual neural networks (ResNets) for real-time detection of corrosion, including iron oxide discoloration, pitting and stress corrosion cracking, in dry storage stainless steel canisters housing used nuclear fuel. The proposed approach crops nuclear canister images into smaller tiles, trains a ResNet on these tiles, and classifies images as corroded or intact using the per-image count of tiles predicted as corroded by the ResNet. The results demonstrate that such a deep learning approach allows to detect the locus of corrosion via smaller tiles, and at the same time to infer with high accuracy whether an image comes from a corroded canister. Thereby, the proposed approach holds promise to automate and speed up nuclear fuel canister inspections, to minimize inspection costs, and to partially replace human-conducted onsite inspections, thus reducing radiation doses to personnel.

A Study on U-Service for Security in U-City Newtown Planning (신도시계획의 계획지표를 반영한 U-City의 U-방범서비스 개선방안 연구)

  • Yoon, Hyo Jin
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.29 no.5D
    • /
    • pp.645-654
    • /
    • 2009
  • This study started with necessity of historical spatial planning skills in U-city planning. Though U-city technology and information are very important, U-city development should be considered on the base of various experience of spatial planning. This study explored spatial planning indexes change in the recent newtown plans. In particular, safety and security were intensively analyzed. In addition, many theories on safe urban space, ubiquitous technology, traditional defensible space, and CPTED (Crime Prevention through Environmental Design) are compared. The findings are as follows. First, each planning is not integrated and there is lack of network among each planning. Specifically, from the crime prevention perspective, there is only mechanical monitoring such as CCTV without architectural approach. Even though CCTV is social needs, it is necessary to adopt it with architectural environment in order to improve the synergy effect of spatial planning and non-spatial planning.

A Mutual P3P Methodology for Privacy Preserving Context-Aware Systems Development (프라이버시 보호 상황인식 시스템 개발을 위한 쌍방향 P3P 방법론)

  • Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.18 no.1
    • /
    • pp.145-162
    • /
    • 2008
  • One of the big concerns in e-society is privacy issue. In special, in developing robust ubiquitous smart space and corresponding services, user profile and preference are collected by the service providers. Privacy issue would be more critical in context-aware services simply because most of the context data themselves are private information: user's current location, current schedule, friends nearby and even her/his health data. To realize the potential of ubiquitous smart space, the systems embedded in the space should corporate personal privacy preferences. When the users invoke a set of services, they are asked to allow the service providers or smart space to make use of personal information which is related to privacy concerns. For this reason, the users unhappily provide the personal information or even deny to get served. On the other side, service provider needs personal information as rich as possible with minimal personal information to discern royal and trustworthy customers and those who are not. It would be desirable to enlarge the allowable personal information complying with the service provider's request, whereas minimizing service provider's requiring personal information which is not allowed to be submitted and user's submitting information which is of no value to the service provider. In special, if any personal information required by the service provider is not allowed, service will not be provided to the user. P3P (Platform for Privacy Preferences) has been regarded as one of the promising alternatives to preserve the personal information in the course of electronic transactions. However, P3P mainly focuses on preserving the buyers' personal information. From time to time, the service provider's business data should be protected from the unintended usage from the buyers. Moreover, even though the user's privacy preference could depend on the context happened to the user, legacy P3P does not handle the contextual change of privacy preferences. Hence, the purpose of this paper is to propose a mutual P3P-based negotiation mechanism. To do so, service provider's privacy concern is considered as well as the users'. User's privacy policy on the service provider's information also should be informed to the service providers before the service begins. Second, privacy policy is contextually designed according to the user's current context because the nomadic user's privacy concern structure may be altered contextually. Hence, the methodology includes mutual privacy policy and personalization. Overall framework of the mechanism and new code of ethics is described in section 2. Pervasive platform for mutual P3P considers user type and context field, which involves current activity, location, social context, objects nearby and physical environments. Our mutual P3P includes the privacy preference not only for the buyers but also the sellers, that is, service providers. Negotiation methodology for mutual P3P is proposed in section 3. Based on the fact that privacy concern occurs when there are needs for information access and at the same time those for information hiding. Our mechanism was implemented based on an actual shopping mall to increase the feasibility of the idea proposed in this paper. A shopping service is assumed as a context-aware service, and data groups for the service are enumerated. The privacy policy for each data group is represented as APPEL format. To examine the performance of the example service, in section 4, simulation approach is adopted in this paper. For the simulation, five data elements are considered: $\cdot$ UserID $\cdot$ User preference $\cdot$ Phone number $\cdot$ Home address $\cdot$ Product information $\cdot$ Service profile. For the negotiation, reputation is selected as a strategic value. Then the following cases are compared: $\cdot$ Legacy P3P is considered $\cdot$ Mutual P3P is considered without strategic value $\cdot$ Mutual P3P is considered with strategic value. The simulation results show that mutual P3P outperforms legacy P3P. Moreover, we could conclude that when mutual P3P is considered with strategic value, performance was better than that of mutual P3P is considered without strategic value in terms of service safety.

Biology and Health Aspects of Molds in Foods and the Environment

  • Bullerman, Lloyd-B.
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.22 no.3
    • /
    • pp.359-366
    • /
    • 1993
  • Molds are eucaryotic, multicellular, multinucleate, filamentous organisms that reproduce by forming asexual and sexual spores. The spores are readily spread through the air and because they are very light-weight and tend to behave like dust particles, they are easily disseminated on air currents. Molds therefore are ubiquitous organisms that are found everywhere, throughout the environment. The natural habitat of most molds is the soil where they grow on and break down decaying vegetable matter. Thus, where there is decaying organic matter in an area, there are often high numbers of mold spores in the atmosphere of the environment. Molds are common contaminants of plant materials, including grains and seeds, and therefore readily contaminate human foods and animal feeds. Molds can tolerate relatively harsh environments and adapt to more severe stresses than most microorganisms. They require less available moisture for growth than bacteria and yeasts and can grow on substrates containing concentrations of sugar or salt that bacteria can not tolerate. Most molds are highly aerobic, requiring oxygen for growth. Molds grow over a wide temperature range, but few can grow at extremely high temperatures. Molds have simple nutritional requirements, requiring primarily a source of carbon and simple organic nitrogen. Because of this, molds can grow on many foods and feed materials and cause spoilage and deterioration. Some molds ran produce toxic substances known as mycotoxins, which are toxic to humans and animals. Mold growth in foods can be controlled by manipulating factors such as atmosphere, moisture content, water activity, relative humidity and temperature. The presence of other microorganisms tends to restrict mold growth, especially if conditions are favorable for growth of bacteria or yeasts. Certain chemicals in the substrate may also inhibit mold growth. These may be naturally occurring or added for the purpose of preservation. Only a relatively few of the approximately 100,000 different species of fungi are involved in the deterioration of food and agricultural commodities and production of mycotoxins. Deteriorative and toxic mold species are found primarily in the genera Aspergillus, Penicillium, Fusarium, Alternaria, Trichothecium, Trichoderma, Rhizopus, Mucor and Cladosporium. While many molds can be observed as surface growth on foods, they also often occur as internal contaminants of nuts, seeds and grains. Mold deterioration of foods and agricultural commodities is a serious problem world-wide. However, molds also pose hazards to human and animal health in the form of mycotoxins, as infectious agents and as respiratory irritants and allergens. Thus, molds are involved in a number of human and animal diseases with serious implication for health.

  • PDF

The Use of the Movie 'The Island' for Nursing Informatics in Nursing Students (간호정보학 이해를 위한 영화 'The Island' 활용)

  • Oh, Jina;Shin, Hyewon;De Gagne, Jennie C.
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.4
    • /
    • pp.330-341
    • /
    • 2015
  • The purpose of this study was to examine the effect of the film 'The Island' on 2nd year nursing students' nursing informatics (NI) competency. The participants were sixty-eight students in a baccalaureate nursing program of a private university, taking the course, 'Nursing & Informatics' in the 2012 fall semester. Over the 15 weeks, the film was used for five weeks as introduction to NI, peer-to-group discussions, and self-reflection on lessons learned regarding NI. A qualitative content analysis was used to explore the students' experiences and perceptions on their NI competency. As a result, students signified the NI concept as the assessment of biometrics data, promotion of optimal health with the support of various technologies, and integration of patient-centered care into routine practice. They also highlighted the importance of security and safety measures as well as high quality health technology including the ubiquitous health monitoring system. Overall, the lesson outcomes of the course were met. As a supportive, instructional strategy, the use of the movie, 'The Island', was effective for nursing students in achieving NI competencies. Further study is warranted to determine if movies can be used as a means of continuing education to improve informatics competences in healthcare professionals.

Development of a Mountainous Area Monitoring System based on IoT Technology (IoT 기술 기반의 산악지 모니터링 시스템 개발)

  • Kim, Kyoon-Tai
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.437-446
    • /
    • 2017
  • 70 percent of Korea's territory is covered with mountains, whose difficult conditions can cause damage to facilities. Recently, the demand for facilities related to outdoor activities including monorails has been on the rise, and such facilities are much more likely to become damaged. For this reason, a monitoring system applying IoT to mountainous areas was developed and its applicability is evaluated in this study. The current status of the existing mountainous facilities and monitoring systems were reviewed, and the current wired monitoring technology was analyzed. A scenario for IoT-based monitoring was developed, and then sensor nodes were developed, which include an RF-communication module and interface, power-supply and solar-cell. A testbed was set up at K University. The same data was collected by the wireless system as had been collected by the wired one. The study findings are as follows. Firstly, by using the wireless system, it is estimated that the construction duration can be reduced by about 25 percent, while the construction costs can be reduced by about 3~52 percent. Secondly, the safety of the construction workers can be improved by making the working conditions less dangerous, such as by eliminating the need to transport cables.