• Title/Summary/Keyword: User Life

Search Result 1,407, Processing Time 0.033 seconds

Energy Efficiency & Sustainability the Cleanliness Management Role of Components and System in Automotive and Hydraulics

  • Hong, J.H.;Day, Mike
    • Journal of Drive and Control
    • /
    • v.9 no.4
    • /
    • pp.19-25
    • /
    • 2012
  • This paper explains how eliminating contamination from the manufacturing processes will lead to better product quality and hence the need for reworking, a trouble free commissioning period and greatly improved production efficiency. All of these will reduce costs and energy usage. It will also ensure that the product is delivered to the customer in a condition that will ensure improved reliability and longer life, again reducing both energy and other operating costs. Correctly designing the contamination control measures will achieve and maintain the level of fluid cleanliness that is required by the end user. The filter is critical to cleanliness management and should be selected with the same degree of thought and consideration as for other major components. This paper explains the role that Cleanliness Management plays in the reducing the carbon footprint of systems and processes by making them perform more efficiently for longer periods. It also examines two differing ways of selecting filters to incorporate the features of newer designs, and shows how significant savings in the costs of ownership can be achieved using these approaches.

Analysis of Network Neutrality in Two-sided Markets Using Game Theory (게임이론에 의한 양면시장에서의 망중립성 분석)

  • Oh, Hyung Sool;Lee, Jae Ha
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.41 no.3
    • /
    • pp.162-169
    • /
    • 2018
  • Net neutrality, which has not been a problem, has recently become a problem for ISPs (Internet Service Providers), and their complaints have been paid by domestic platform companies, but overseas global IT companies such as Google and YouTube, generate huge revenues from domestic markets. In this situation, domestic IT companies claim that it is natural to impose more expensive charges or restrict speed on users who generate huge traffic. On the other side, however, the telecommunication network has become an essential public good that is essential to our everyday life, and because it has been given a monopoly position by a private company to efficiently respond to the explosive demand for telecommunication services, It is necessary to provide equal and universal service and fulfill public duty. In this paper, we deal with the network neutrality problem, focusing on the price elasticity between the CP (Contents Provider) and the ISP, rather than the user who is one side of the two-sided market for the already saturated satellites communication market. We present a game model that determines the optimal price for each platform by Nash equilibrium and analyze how the net neutrality affects CP according to the change of exogenous variables through the proposed game model.

Implementation of cost-effective wireless photovoltaic monitoring module at panel level

  • Jeong, Jin-Doo;Han, Jinsoo;Lee, Il-Woo;Chong, Jong-Wha
    • ETRI Journal
    • /
    • v.40 no.5
    • /
    • pp.664-676
    • /
    • 2018
  • Given the rapidly increasing market penetration of photovoltaic (PV) systems in many fields, including construction and housing, the effective maintenance of PV systems through remote monitoring at the panel level has attracted attention to quickly detect faults that cause reductions in yearly PV energy production, and which can reduce the whole-life cost. A key point of PV monitoring at the panel level is cost-effectiveness, as the installation of the massive PV panels that comprise PV systems is showing rapid growth in the market. This paper proposes an implementation method that involves the use of a panel-level wireless PV monitoring module (WPMM), and which assesses the cost-effectiveness of this approach. To maximize the cost-effectiveness, the designed WPMM uses a voltage-divider scheme for voltage metering and a shunt-resistor scheme for current metering. In addition, the proposed method offsets the effect of element errors by extracting calibration parameters. Furthermore, a design method is presented for portable and user-friendly PV monitoring, and demonstration results using a commercial 30-kW PV system are described.

From wearing desires to the power of gazing hidden wearable technology algorithm (Based on system design) (웨어러블 기술 알고리즘에 숨겨진 입는 욕망에서부터 시선의 권력까지(시스템 설계 관점에서))

  • Kang, Jangmook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.4
    • /
    • pp.205-210
    • /
    • 2018
  • This paper examines the wearable technology in two aspects. First, it is the desire that permeates the clothes that smart technology is embroidered. Second, it is a reflection on the gaze that looks at the user wearing clothes. This article is a study on clothes that will be newly appeared with wearable technology. But this is not just a technical issue. Rather, it is a system design that takes human instinct into clothes. Therefore, this study encompasses social scientific boundaries. This article does not refer to data collected from wearables as simple sensing based data. Rather, wearable technology reveals human life activities and emotions. This paper is an attempt to combine or combine humanities and technology.

Development of Detour Route and Evacuation Route Guidance System Using Disaster Information (재해정보를 이용한 우회경로 및 대피경로 안내시스템 개발)

  • Kwon, Won-Seok;Kim, Chang-Soo;Kim, Young-Seup
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.15 no.1
    • /
    • pp.34-42
    • /
    • 2012
  • Life and Property damage has increased during traffic congestion and isolation because natural disasters such as flood and landslide have occurred every year. When disaster occurs, if there is insufficient information in advance when entering the flooding areas which subsequently cause confusion. In this paper, we developed the system that could provide display of detour route using disaster information and evacuation route in disaster areas. User will receive result of analysis using smart phone application to prevent additional damages when disaster areas were entered by manager.

A STUDY ON IMPLEMENTATION OF OUTWARD AGING AND HEALTH-STATE MONITORING SYSTEM BASED ON IMAGE PROCESSING (영상처리에 기반한 노인 대상 외양적 노화 및 건강 상태 모니터링 시스템에 관한 연구)

  • Hwang, Kun-Su;Kil, Se-Kee;Shen, Dong-Fan;Min, Hong-Ki;Lee, Eung-Hyuk;Hong, Seung-Hong
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.881-882
    • /
    • 2006
  • According as society looks graying trend gradually, more shaped system that can achieve measuring health-state of old people more harmoniously construction required in field of old people's welfare and medical treatment. Health-state is measured by two methods of contact and non-contact. The first, for example measurement of blood pressure or electrocardiogram, requires that measuring equipments are attached on human body but the second, for example X-Ray or MRI, is not. But both of methods are have some of defect, for example attaching equipments, needing of the special equipments or the necessary time, etc. Therefore desirable method of monitoring system must have minimum interrupt about daily life. This study suggest the system that can monitor the user, especially old people's outward aging and health-state by use the PAN TILTER and CCD camera.

  • PDF

Analysis of Cosmetics App Smart UI convergence Design in Mobile Environments (모바일 환경에서의 화장품 앱 스마트 UI 융합 디자인 분석)

  • Yeom, Mi-Ryeong;Park, Ju-Ok;Jung, Doo-Yong
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.2
    • /
    • pp.13-17
    • /
    • 2016
  • omputer and the Internet (online) services have rapidly been developed and evolved over the last 10 years. They also reduce time and costs in many parts of human life. Yet, a range of adoption and expression has been segmented as a piece of information is diversified. Particularly, while this segmentized information can be integrated according to fields, it is hard for users to aware it at a glance. Therefore, this study aims to improve and analyze programs that have been developed in a variety of ways from the existing unified design of GUI as the UIs of the Internet and programs have become accentuated recently so that it could suggest the importance of user-oriented UI designs.

Factors influencing Information Privacy Concern on the Intention to Use in E-commerce Environment (전자상거래 환경에서 정보 프라이버시 침해 우려가 사용의도에 미치는 영향)

  • Kim, Do-Goan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.149-150
    • /
    • 2015
  • Today, rapid evolution of information communication technology occurring in Korea has extensive influence on our daily life, and increasing awareness about the user experience. As the connected Internet information systems increases, one of the problems happening between users and information systems such as Internet shopping-malls, portal sites, and corporate web sites is related with the information privacy concerns issues. In this research, we aim to analyze factors influencing of the invasion of privacy on intention to use in e-commerce environment. Based on these findings, several theoretical and practical implications were suggested and discussed. Thus, we have reviewed extensive previous studies on information privacy in local and foreign information systems, marketing and other fields. The purpose of this study is to provide future directions of studies on information privacy concerns by analyzing past and recent trends of the studies.

  • PDF

Trends and methods of preventing router attacks using network vulnerability (네트워크 취약점을 통한 공유기 공격동향 및 예방방법)

  • Lee, Young-Hyeon;Kim, Ki-Hwan;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.262-265
    • /
    • 2015
  • In modern society, the spread of computers and smart phones, the Internet has become part of life. Therefore, the most places, wired/wireless router is installed. Crackers can attack the user to use the router by exploiting network vulnerabilities. therefore, the administrator is able to try cracker variety of attacks sloppy router, vaccine is installed also computer and smartphone users, appearance and address of the usual Internet is not deer medium and similar. In this paper, we look at a method for preventing in each attack seen for typical network attacks.

  • PDF

A Factor Analysis for the Successful Implementation of Digital Manufacturing Using Extended Technology Acceptance Model (ETAM) (확장기술수용모형(ETAM)을 이용한 디지털 매뉴팩처링의 성공적 도입에 영향을 주는 요인 분석)

  • Jeong, Sei-Hyun;Moon, Dug-Hee;Park, Hee-Chang
    • IE interfaces
    • /
    • v.19 no.3
    • /
    • pp.255-269
    • /
    • 2006
  • Digital manufacturing(DM) is the ability to describe every aspect of the design-to-manufacture process digitally-using tools that include digital design, CAD, office documents, PLM(Product Life-cycle Management) systems, analysis software, simulation, CAM software and so on. The major automotive companies are already deeply invested in DM with almost every process being digital rather than paper-based. But it has taken a long time for the digital process to mature into something usable and there have been some major barriers that have prevented from the DM becoming a reality. Thus many companies hesitate to make a decision of implementing the DM. This paper deals with a study investigating which factors are important for implementing the DM to industries successfully. The extended technology acceptance model (ETAM) is used as the relation model of cause and effect. The quality of hardware, the quality of software, the range of collaboration among companies and the preference of the user are defined as the external factors. Interview method is used for gathering input data, and the results are analyzed with SPSS. The results indicate that four external factors are effective on the successful implementation of DM, and the perceived usefulness is most important.