• Title/Summary/Keyword: Wireless System

Search Result 7,315, Processing Time 0.034 seconds

Immersive Smart Balance Board with Multiple Feedback (다중 피드백을 지원하는 몰입형 스마트 밸런스 보드)

  • Seung-Yong Lee;Seonho Lee;Junesung Park;Min-Chul Shin;Seung-Hyun Yoon
    • Journal of the Korea Computer Graphics Society
    • /
    • v.30 no.3
    • /
    • pp.171-178
    • /
    • 2024
  • Exercises using a Balance Board (BB) are effective in developing balance, strengthening core muscles, and improving physical fitness and concentration. In particular, the Smart Balance Board (SBB), which integrates with various digital content, provides appropriate feedback compared to traditional balance boards, maximizing the effectiveness of the exercise. However, most systems only offer visual and auditory feedback, failing to evaluate the impact on user engagement, interest, and the accuracy of exercise postures. This study proposes an Immersive Smart Balance Board (I-SBB) that utilizes multiple sensors to enable training with various feedback mechanisms and precise postures. The proposed system, based on Arduino, consists of a gyro sensor for measuring the board's posture, a communication module for wired/wireless communication, an infrared sensor to guide the user's foot placement, and a vibration motor for tactile feedback. The board's posture measurements are smoothly corrected using a Kalman Filter, and the multi-sensor data is processed in real-time using FreeRTOS. The proposed I-SBB is shown to be effective in enhancing user concentration and engagement, as well as generating interest, by integrating with diverse content.

A Study on Automatic Bridge Lantern Support for Safe Bridge Lantern Inspection (안전한 교량등 점검을 위한 자동 교량등 지지대에 관한 연구)

  • Min-Yong Lim;Seung-Gi Gug
    • Journal of Navigation and Port Research
    • /
    • v.48 no.4
    • /
    • pp.267-273
    • /
    • 2024
  • Bridge lanterns are installed on bridges or piers to signal the presence of these structures on navigational routes and navigable waters, and they fall under the category of light wave signals in Aids to Navigation. In Korea, medium to large bridges installed over major rivers and seas are equipped with bridge lanterns, which are necessary for routes frequented by ships and require periodic inspections on a monthly or multi-month basis. However, most bridge lanterns are mounted externally on bridge railings as fixed or manual rotary supports, posing a high risk of fatal falls during inspections. Furthermore, high -traffic bridges demand quick maintenance works due to complaints about traffic disruption, thus increasing work hazards. Consequently, this study introduced a tailored automatic bridge lantern support concept based on different types of bridge lantern installations, aiming for safe and rapid inspections. Additionally, the study sought to achieve full automation of the bridge lighting system by integrating it with a management program for monitoring and controlling bridge lanterns, utilizing both wired and wireless communication technologies. These findings provide foundational design data for new and refurbished bridges that will be installed in the future.

Study on Battery Power based IoT Device Lightweight Authentication Protocol (베터리 전력 환경 IoT 디바이스 경량 인증 프로토콜 연구)

  • Sung-Hwa Han
    • Convergence Security Journal
    • /
    • v.24 no.3
    • /
    • pp.165-171
    • /
    • 2024
  • Due to the IT convergence trend, many industrial domains are developing their own IoT services. With batteries and lightweight devices, IoT could expand into various fields including smart farms, smart environments, and smart energy. Many battery-powered IoT devices are passive in enforcing security techniques to maintain service time. This is because security technologies such as cryptographic operations consume a lot of power, so applying them reduces service maintenance time. This vulnerable IoT device security environment is not stable. In order to provide safe IoT services, security techniques considering battery power consumption are required. In this study, we propose an IoT device authentication technology that minimizes power consumption. The proposed technology is a device authentication function based on the Diffie-Hell man algorithm, and has the advantage that malicious attackers cannot masquerade the device even if salt is leaked during the transmission section. The battery power consumption of the authentication technology proposed in this study and the ID/PW-based authentication technology was compared. As a result, it was confirmed that the authentication technique proposed in this study consumes relatively little power. If the authentication technique proposed in this study is applied to IoT devices, it is expected that a safer IoT security environment can be secured.

A Study on Optimal Site Selection for Automatic Mountain Meteorology Observation System (AMOS): the Case of Honam and Jeju Areas (최적의 산악기상관측망 적정위치 선정 연구 - 호남·제주 권역을 대상으로)

  • Yoon, Sukhee;Won, Myoungsoo;Jang, Keunchang
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.18 no.4
    • /
    • pp.208-220
    • /
    • 2016
  • Automatic Mountain Meteorology Observation System (AMOS) is an important ingredient for several climatological and forest disaster prediction studies. In this study, we select the optimal sites for AMOS in the mountain areas of Honam and Jeju in order to prevent forest disasters such as forest fires and landslides. So, this study used spatial dataset such as national forest map, forest roads, hiking trails and 30m DEM(Digital Elevation Model) as well as forest risk map(forest fire and landslide), national AWS information to extract optimal site selection of AMOS. Technical methods for optimal site selection of the AMOS was the firstly used multifractal model, IDW interpolation, spatial redundancy for 2.5km AWS buffering analysis, and 200m buffering analysis by using ArcGIS. Secondly, optimal sites selected by spatial analysis were estimated site accessibility, observatory environment of solar power and wireless communication through field survey. The threshold score for the final selection of the sites have to be higher than 70 points in the field assessment. In the result, a total of 159 polygons in national forest map were extracted by the spatial analysis and a total of 64 secondary candidate sites were selected for the ridge and the top of the area using Google Earth. Finally, a total of 26 optimal sites were selected by quantitative assessment based on field survey. Our selection criteria will serve for the establishment of the AMOS network for the best observations of weather conditions in the national forests. The effective observation network may enhance the mountain weather observations, which leads to accurate prediction of forest disasters.

Self-optimizing feature selection algorithm for enhancing campaign effectiveness (캠페인 효과 제고를 위한 자기 최적화 변수 선택 알고리즘)

  • Seo, Jeoung-soo;Ahn, Hyunchul
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.4
    • /
    • pp.173-198
    • /
    • 2020
  • For a long time, many studies have been conducted on predicting the success of campaigns for customers in academia, and prediction models applying various techniques are still being studied. Recently, as campaign channels have been expanded in various ways due to the rapid revitalization of online, various types of campaigns are being carried out by companies at a level that cannot be compared to the past. However, customers tend to perceive it as spam as the fatigue of campaigns due to duplicate exposure increases. Also, from a corporate standpoint, there is a problem that the effectiveness of the campaign itself is decreasing, such as increasing the cost of investing in the campaign, which leads to the low actual campaign success rate. Accordingly, various studies are ongoing to improve the effectiveness of the campaign in practice. This campaign system has the ultimate purpose to increase the success rate of various campaigns by collecting and analyzing various data related to customers and using them for campaigns. In particular, recent attempts to make various predictions related to the response of campaigns using machine learning have been made. It is very important to select appropriate features due to the various features of campaign data. If all of the input data are used in the process of classifying a large amount of data, it takes a lot of learning time as the classification class expands, so the minimum input data set must be extracted and used from the entire data. In addition, when a trained model is generated by using too many features, prediction accuracy may be degraded due to overfitting or correlation between features. Therefore, in order to improve accuracy, a feature selection technique that removes features close to noise should be applied, and feature selection is a necessary process in order to analyze a high-dimensional data set. Among the greedy algorithms, SFS (Sequential Forward Selection), SBS (Sequential Backward Selection), SFFS (Sequential Floating Forward Selection), etc. are widely used as traditional feature selection techniques. It is also true that if there are many risks and many features, there is a limitation in that the performance for classification prediction is poor and it takes a lot of learning time. Therefore, in this study, we propose an improved feature selection algorithm to enhance the effectiveness of the existing campaign. The purpose of this study is to improve the existing SFFS sequential method in the process of searching for feature subsets that are the basis for improving machine learning model performance using statistical characteristics of the data to be processed in the campaign system. Through this, features that have a lot of influence on performance are first derived, features that have a negative effect are removed, and then the sequential method is applied to increase the efficiency for search performance and to apply an improved algorithm to enable generalized prediction. Through this, it was confirmed that the proposed model showed better search and prediction performance than the traditional greed algorithm. Compared with the original data set, greed algorithm, genetic algorithm (GA), and recursive feature elimination (RFE), the campaign success prediction was higher. In addition, when performing campaign success prediction, the improved feature selection algorithm was found to be helpful in analyzing and interpreting the prediction results by providing the importance of the derived features. This is important features such as age, customer rating, and sales, which were previously known statistically. Unlike the previous campaign planners, features such as the combined product name, average 3-month data consumption rate, and the last 3-month wireless data usage were unexpectedly selected as important features for the campaign response, which they rarely used to select campaign targets. It was confirmed that base attributes can also be very important features depending on the type of campaign. Through this, it is possible to analyze and understand the important characteristics of each campaign type.

Compression Sensing Technique for Efficient Structural Health Monitoring - Focusing on Optimization of CAFB and Shaking Table Test Using Kobe Seismic Waveforms (효율적인 SHM을 위한 압축센싱 기술 - Kobe 지진파형을 이용한 CAFB의 최적화 및 지진응답실험 중심으로)

  • Heo, Gwang-Hee;Lee, Chin-Ok;Seo, Sang-Gu;Jeong, Yu-Seung;Jeon, Joon-Ryong
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.24 no.2
    • /
    • pp.23-32
    • /
    • 2020
  • The compression sensing technology, CAFB, was developed to obtain the raw signal of the target structure by compressing it into a signal of the intended frequency range. At this point, for compression sensing, the CAFB can be optimized for various reference signals depending on the desired frequency range of the target structure. In addition, optimized CAFB should be able to efficiently compress the effective structural answers of the target structure even in sudden/dangerous conditions such as earthquakes. In this paper, the targeted frequency range for efficient structural integrity monitoring of relatively flexible structures was set below 10Hz, and the optimization method of CAFB for this purpose and the seismic response performance of CAFB in seismic conditions were evaluated experimentally. To this end, in this paper, CAFB was first optimized using Kobe seismic waveform, and embedded it in its own wireless IDAQ system. In addition, seismic response tests were conducted on two span bridges using Kobe seismic waveform. Finally, using an IDAQ system with built-in CAFB, the seismic response of the two-span bridge was wirelessly obtained, and the compression signal obtained was cross-referenced with the raw signal. From the results of the experiment, the compression signal showed excellent response performance and data compression effects in relation to the raw signal, and CAFB was able to effectively compress and sensitize the effective structural response of the structure even in seismic situations. Finally, in this paper, the optimization method of CAFB was presented to suit the intended frequency range (less than 10Hz), and CAFB proved to be an economical and efficient data compression sensing technology for instrumentation-monitoring of seismic conditions.

Critical Success Factor of Noble Payment System: Multiple Case Studies (새로운 결제서비스의 성공요인: 다중사례연구)

  • Park, Arum;Lee, Kyoung Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.4
    • /
    • pp.59-87
    • /
    • 2014
  • In MIS field, the researches on payment services are focused on adoption factors of payment service using behavior theories such as TRA(Theory of Reasoned Action), TAM(Technology Acceptance Model), and TPB (Theory of Planned Behavior). The previous researches presented various adoption factors according to types of payment service, nations, culture and so on even though adoption factors of identical payment service were presented differently by researchers. The payment service industry relatively has strong path dependency to the existing payment methods so that the research results on the identical payment service are different due to payment culture of nation. This paper aims to suggest a successful adoption factor of noble payment service regardless of nation's culture and characteristics of payment and prove it. In previous researches, common adoption factors of payment service are convenience, ease of use, security, convenience, speed etc. But real cases prove the fact that adoption factors that the previous researches present are not always critical to success to penetrate a market. For example, PayByPhone, NFC based parking payment service, successfully has penetrated to early market and grown. In contrast, Google Wallet service failed to be adopted to users despite NFC based payment method which provides convenience, security, ease of use. As shown in upper case, there remains an unexplained aspect. Therefore, the present research question emerged from the question: "What is the more essential and fundamental factor that should takes precedence over factors such as provides convenience, security, ease of use for successful penetration to market". With these cases, this paper analyzes four cases predicted on the following hypothesis and demonstrates it. "To successfully penetrate a market and sustainably grow, new payment service should find non-customer of the existing payment service and provide noble payment method so that they can use payment method". We give plausible explanations for the hypothesis using multiple case studies. Diners club, Danal, PayPal, Square were selected as a typical and successful cases in each category of payment service. The discussion on cases is primarily non-customer analysis that noble payment service targets on to find the most crucial factor in the early market, we does not attempt to consider factors for business growth. We clarified three-tier non-customer of the payment method that new payment service targets on and elaborated how new payment service satisfy them. In case of credit card, this payment service target first tier of non-customer who can't pay for because they don't have any cash temporarily but they have regular income. So credit card provides an opportunity which they can do economic activities by delaying the date of payment. In a result of wireless phone payment's case study, this service targets on second of non-customer who can't use online payment because they concern about security or have to take a complex process and learn how to use online payment method. Therefore, wireless phone payment provides very convenient payment method. Especially, it made group of young pay for a little money without a credit card. Case study result of PayPal, online payment service, shows that it targets on second tier of non-customer who reject to use online payment service because of concern about sensitive information leaks such as passwords and credit card details. Accordingly, PayPal service allows users to pay online without a provision of sensitive information. Final Square case result, Mobile POS -based payment service, also shows that it targets on second tier of non-customer who can't individually transact offline because of cash's shortness. Hence, Square provides dongle which function as POS by putting dongle in earphone terminal. As a result, four cases made non-customer their customer so that they could penetrate early market and had been extended their market share. Consequently, all cases supported the hypothesis and it is highly probable according to 'analytic generation' that case study methodology suggests. We present for judging the quality of research designs the following. Construct validity, internal validity, external validity, reliability are common to all social science methods, these have been summarized in numerous textbooks(Yin, 2014). In case study methodology, these also have served as a framework for assessing a large group of case studies (Gibbert, Ruigrok & Wicki, 2008). Construct validity is to identify correct operational measures for the concepts being studied. To satisfy construct validity, we use multiple sources of evidence such as the academic journals, magazine and articles etc. Internal validity is to seek to establish a causal relationship, whereby certain conditions are believed to lead to other conditions, as distinguished from spurious relationships. To satisfy internal validity, we do explanation building through four cases analysis. External validity is to define the domain to which a study's findings can be generalized. To satisfy this, replication logic in multiple case studies is used. Reliability is to demonstrate that the operations of a study -such as the data collection procedures- can be repeated, with the same results. To satisfy this, we use case study protocol. In Korea, the competition among stakeholders over mobile payment industry is intensifying. Not only main three Telecom Companies but also Smartphone companies and service provider like KakaoTalk announced that they would enter into mobile payment industry. Mobile payment industry is getting competitive. But it doesn't still have momentum effect notwithstanding positive presumptions that will grow very fast. Mobile payment services are categorized into various technology based payment service such as IC mobile card and Application payment service of cloud based, NFC, sound wave, BLE(Bluetooth Low Energy), Biometric recognition technology etc. Especially, mobile payment service is discontinuous innovations that users should change their behavior and noble infrastructure should be installed. These require users to learn how to use it and cause infra-installation cost to shopkeepers. Additionally, payment industry has the strong path dependency. In spite of these obstacles, mobile payment service which should provide dramatically improved value as a products and service of discontinuous innovations is focusing on convenience and security, convenience and so on. We suggest the following to success mobile payment service. First, non-customers of the existing payment service need to be identified. Second, needs of them should be taken. Then, noble payment service provides non-customer who can't pay by the previous payment method to payment method. In conclusion, mobile payment service can create new market and will result in extension of payment market.

E-Commerce in the Historical Approach to Usage and Practice of International Trade ("무역상무(貿易商務)에의 역사적(歷史的) 어프로치와 무역취인(貿易取引)의 전자화(電子化)")

  • Tsubaki, Koji
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.19
    • /
    • pp.224-242
    • /
    • 2003
  • The author believes that the main task of study in international trade usage and practice is the management of transactional risks involved in international sale of goods. They are foreign exchange risks, transportation risks, credit risk, risk of miscommunication, etc. In most cases, these risks are more serious and enormous than those involved in domestic sales. Historically, the merchant adventurers organized the voyage abroad, secured trade finance, and went around the ocean with their own or consigned cargo until around the $mid-19^{th}$ century. They did business faceto-face at the trade fair or the open port where they maintained the local offices, so-called "Trading House"(商館). Thererfore, the transactional risks might have been one-sided either with the seller or the buyer. The bottomry seemed a typical arrangement for risk sharing among the interested parties to the adventure. In this way, such organizational arrangements coped with or bore the transactional risks. With the advent of ocean liner services and wireless communication across the national border in the $19^{th}$ century, the business of merchant adventurers developed toward the clear division of labor; sales by mercantile agents, and ocean transportation by the steam ship companies. The international banking helped the process to be accelerated. Then, bills of lading backed up by the statute made it possible to conduct documentary sales with a foreign partner in different country. Thus, FOB terms including ocean freight and CIF terms emerged gradually as standard trade terms in which transactional risks were allocated through negotiation between the seller and the buyer located in different countries. Both of them did not have to go abroad with their cargo. Instead, documentation in compliance with the terms of the contract(plus an L/C in some cases) must by 'strictly' fulfilled. In other words, the set of contractual documents must be tendered in advance of the arrival of the goods at port of discharge. Trust or reliance is placed on such contractual paper documents. However, the container transport services introduced as international intermodal transport since the late 1960s frequently caused the earlier arrival of the goods at the destination before the presentation of the set of paper documents, which may take 5 to 10% of the amount of transaction. In addition, the size of the container vessel required the speedy transport documentation before sailing from the port of loading. In these circumstances, computerized processing of transport related documents became essential for inexpensive transaction cost and uninterrupted distribution of the goods. Such computerization does not stop at the phase of transportation but extends to cover the whole process of international trade, transforming the documentary sales into less-paper trade and further into paperless trade, i.e., EDI or E-Commerce. Now we face the other side of the coin, which is data security and paperless transfer of legal rights and obligations. Unfortunately, these issues are not effectively covered by a set of contracts only. Obviously, EDI or E-Commerce is based on the common business process and harmonized system of various data codes as well as the standard message formats. This essential feature of E-Commerce needs effective coordination of different divisions of business and tight control over credit arrangements in addition to the standard contract of sales. In a few word, information does not alway invite "trust". Credit flows from people, or close organizational tie-ups. It is our common understanding that, without well-orchestrated organizational arrangements made by leading companies, E-Commerce does not work well for paperless trade. With such arrangements well in place, participating E-business members do not need to seriously care for credit risk. Finally, it is also clear that E-International Commerce must be linked up with a set of government EDIs such as NACCS, Port EDI, JETRAS, etc, in Japan. Therefore, there is still a long way before us to go for E-Commerce in practice, not on the top of information manager's desk.

  • PDF

The Analysis of Estrus Behavior and the Evaluation of Conditions Required for Improving Reproductive Efficiency in Holstein Dairy Cows using a Heat Detector (발정탐색기를 이용한 Holstein 젖소의 발정행동 분석 및 번식효율 향상을 위한 조건의 평가)

  • Baek, Kwang-Soo;Lee, Wang-Shik;Son, Jun-Kyu;Lim, Hyun-Joo;Yoon, Ho-Beak;Kim, Tae-Il;Hur, Tai-Young;Choe, Chang-Yong;Jung, Young-Hun;Kwon, Eung-Gi;Jung, Yeon-Sub;Kim, Sun-Kyu;Won, Jeong-Il
    • Journal of Embryo Transfer
    • /
    • v.28 no.3
    • /
    • pp.177-184
    • /
    • 2013
  • The objective of this study was to analyze the accuracy of estrus detection of heat detector and analysis of estrus behavior (mounting and mounted), and the evaluation of conditions required for improving reproductive efficiency in Holstein dairy cows fitted with a estrous detector. The heat detection system consists of estrous detector based on wireless sensor and an electric bulletin board displayed estrus behavior data. When cow mounting other cows, the accuracy of estrus behavior displayed an electric bulletin board were 87.5% (mounting other cows only), 100% (mounting other cows but not standing), 80.0% (mounting other cows with standing for 1~4 seconds), 90.0% (mounting other cows but not standing for 1~4 seconds), 80% (mounting other cows with standing for more than 5 seconds) and 90.0% (mounting other cows but not standing for more than 5 seconds). When cow mounted other cows, the accuracy of estrus behavior displayed an electric bulletin board were 100% (mounted other cows but not standing), 100% (mounted other cows with standing for 1~4 seconds), 100% (mounted other cows but not standing for 1~4 seconds) and 100% (mounted other cows with standing for more than 5 seconds). Circadian distribution of first observed in estrus were 59.1% (am 8~pm 6) and 40.9% (pm 6~am 8). Distribution for the number of estrus behavior were 40.9% (less than 3 times), 36.4% (4~6 times) and 22.7% (more than 4 times). The conception rates relative to interval from first estrus behavior to insemination for estrus periods were 23.1% (less than 11 hours) and 55.6% (12~20 hours).

Ubiquitous Sensor Network Application Strategy of Security Companies (시큐리티업체의 유비쿼터스 센서네트워크(USN) 응용전략)

  • Jang, Ye-Jin;An, Byeong-Su;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.75-94
    • /
    • 2009
  • Since mechanical security systems are mostly composed of electronic, information and communication devices, they have effects in the aspects of overall social environment and crime-oriented environment. Also, the importance is increasing for wireless recognition of RFID and tracing function, which will be usefully utilized in controlling the incomings and outgoings of people/vehicles or allowance, surveillance and control. This is resulting from the increase in the care for the elderly according to the overall social environment, namely, the aging society, and the number of women entering, as well as the increase in the number of heinous crimes. The purpose of this study is to examine the theoretical considerations on ubiquitous sensor network and present a direction for securities companies for their development by focusing on the technological and application areas. To present strategies of response to a new environment for security companies, First, a diversification strategy is needed for security companies. The survival of only high level of security companies in accordance with the principle of liberal market competition will bring forth qualitative growth and competitiveness of security market. Second, active promotion by security companies is needed. It is no exaggeration to say that we are living in the modern society in the sea of advertisements and propaganda. The promotional activities that emphasize the areas of activity or importance of security need to be actively carried out using the mass media to change the aware of people regarding security companies, and they need to come up with a plan to simultaneously carry out the promotional activities that emphasize the public aspect of security by well utilizing the recent trend that the activities of security agents are being used as a topic in movies or TV dramas. Third, technically complementary establishment of ubiquitous sensor network and electronic tag is needed. Since they are used in mobile electronic tag services such as U-Home and U-Health Care, they are used throughout our lives by forming electronic tag environment within safe ubiquitous sensor network based on the existing privacy guideline for the support of mobile electronic tag terminal commercialization, reduction in communication and information usage costs, continuous technical development and strengthening of privacy protection, and the system of cooperation of academic-industrial-research needs to be established among the academic world and private research institutes for these parts.

  • PDF