• Title/Summary/Keyword: community computing

Search Result 192, Processing Time 0.027 seconds

Requirement Analysis for Agricultural Meteorology Information Service Systems based on the Fourth Industrial Revolution Technologies (4차 산업혁명 기술에 기반한 농업 기상 정보 시스템의 요구도 분석)

  • Kim, Kwang Soo;Yoo, Byoung Hyun;Hyun, Shinwoo;Kang, DaeGyoon
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.21 no.3
    • /
    • pp.175-186
    • /
    • 2019
  • Efforts have been made to introduce the climate smart agriculture (CSA) for adaptation to future climate conditions, which would require collection and management of site specific meteorological data. The objectives of this study were to identify requirements for construction of agricultural meteorology information service system (AMISS) using technologies that lead to the fourth industrial revolution, e.g., internet of things (IoT), artificial intelligence, and cloud computing. The IoT sensors that require low cost and low operating current would be useful to organize wireless sensor network (WSN) for collection and analysis of weather measurement data, which would help assessment of productivity for an agricultural ecosystem. It would be recommended to extend the spatial extent of the WSN to a rural community, which would benefit a greater number of farms. It is preferred to create the big data for agricultural meteorology in order to produce and evaluate the site specific data in rural areas. The digital climate map can be improved using artificial intelligence such as deep neural networks. Furthermore, cloud computing and fog computing would help reduce costs and enhance the user experience of the AMISS. In addition, it would be advantageous to combine environmental data and farm management data, e.g., price data for the produce of interest. It would also be needed to develop a mobile application whose user interface could meet the needs of stakeholders. These fourth industrial revolution technologies would facilitate the development of the AMISS and wide application of the CSA.

A Study of User Interface Design Method on Ubiquitous Computing Environments for the Aged (유비쿼터스 컴퓨팅 환경에서 노인을 위한 유저 인터페이스 디자인방법 연구)

  • Lee, Joong-Yeub
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.6
    • /
    • pp.245-251
    • /
    • 2009
  • Recently, human life and the low birth rate and aging population has increased exponentially. Entry into an aged society in the present case and the different policy alternatives, and is a reality. Resolution of one of these older active community participation and production activities to foster a rich life, infants need to be able to build a ubiquitous environment can be damaging. Latest IT technology in the development of intelligent life on all human life even more convenient by combining the computer and try to build a productive environment is. You simply connect your computer to the elderly rather than older users to use, efficient and productive way to improve efforts to follow. Emerging as an alternative to the more efficient interfaces for ubiquitous computing, user interface design criteria, albeit a little uncomfortable by suggesting improvements of the elderly and their participation in production activities helped to improve the quality of life. Ubiquitous environment, as well as means to improve the living environment of older people live independent lives, as given us is that you can get the premise of this study was in progress.Thus, by analyzing the characteristics of the elderly for the elderly by offering more efficient way to interface design for a new era of ubiquitous pushing back the boundaries of the elderly have been instruments to achieve social vitality.

  • PDF

Numerical analysis of dam breaking problem using SPH (제체의 갑작스런 붕괴로 인한 충격파 수치해석 - SPH (Smoothed Particle Hydrodynamics)를 중심으로)

  • Cho, Yong Jun;Kim, Gweon Su
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.28 no.3B
    • /
    • pp.261-270
    • /
    • 2008
  • Even though there is a great deal of progress in a numerical method of high caliber like SPH, it is very rarely deployed in a water resources community. Despite the great stride in computing environment, depth averaged approach like a nonlinear shallow equation is still efficient tool for flood routing in large watershed, but it can give some misleading information like the inundation height of flood. In this rationale, we numerically simulate the flow into the dry channel, dry channel with an obstacle triggered by the collapse of a two dimensional water column using SPH (Smoothed Particle Hydrodynamics) in order to boost the application of numerical method of high caliber like SPH in a water resources community. As a most severe test of the robustness of SPH, we also carry out the simulation of the flow through a clearance into the wet channel driven by the rapid removal of a water gate. As a hydrodynamic model, we used the Navier-Stokes equation, a numerical integration of which was carried out using SPH. To verify the validity of newly proposed numerical model, we compare the numerically simulated flow with the others in the literature mainly from VOF and MAC, and hydraulic experiments by Martin and Moyce (1952), Koshizuka et al. (1995) and Janosi et al. (2004). It was shown that agreements between the numerical results in this study and hydraulic experiments are remarkable.

Research on Military SNS Protection Profile for National defense (국방정보보호를 위한 군(軍) SNS 보호프로파일(PP) 개발에 관한 연구)

  • Yu, DeokHoon;Kim, SeungJoo
    • Journal of Internet Computing and Services
    • /
    • v.14 no.1
    • /
    • pp.41-52
    • /
    • 2013
  • Social Network Service(SNS) have become very popular during the past few years. Also SNS, an current communication platform, greatly contributes to transmit the information rapidly and strengthen a sense of community and fellowship in military service. however it has vulnerable factors. For example, invasion of privacy, exposure of personal information and military data. In this particular case, it is a deathblow to the military service. Military Social Network Service require to protect the military security threats and disclosure of defense secrets. For such reasons we need the secure SNS that protects from any attacks or vulnerable factors. We present classification of functional type and analysis the SNS architecture. The goal of this work is propose military SNS security functional requirements for practical use safely.

Findings from the Survey Responses by Cambodian Doctors and Patients for Telemedicine (캄보디아 환자와 의사의 원격 의료에 대한 반응 조사)

  • Yoo, Sun-gil;Oh, Dongik;Min, Sedong;Shin, Wonhan
    • Journal of Internet Computing and Services
    • /
    • v.16 no.4
    • /
    • pp.13-23
    • /
    • 2015
  • In order to reduce public medical expenses as well as to provide effective medical services, telemedicine between doctors and patients is considered as an alternative to the conventional hospital visit. But the medical community has been protesting the introduction of telemedicine for the efficacy and safety reasons. Korean government has been conducting a number of pilot projects to demonstrate the efficacy and safety of telemedicine for more than 10 years. However, still the system is not yet legalized. In this study, we have conducted a telemedicine pilot project in Cambodia for one year, where telemedicine can be more freely exercised. After the project, we conducted a survey based on the 'Rogers diffusion' theory. Survey results show that both physicians and patients are positive about the relative advantage of the telemedicine. However, the complexity and high cost of the equipment used in telemedicine has been found to be a possible obstacle. In addition, we found that there is no problem for providing telemedicine services under challenged environment, such as in Cambodia.

Effects of Nitrate Addition on Rumen Fermentation, Bacterial Biodiversity and Abundance

  • Zhao, Liping;Meng, Qingxiang;Ren, Liping;Liu, Wei;Zhang, Xinzhuang;Huo, Yunlong;Zhou, Zhenming
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.28 no.10
    • /
    • pp.1433-1441
    • /
    • 2015
  • This study examined changes of rumen fermentation, ruminal bacteria biodiversity and abundance caused by nitrate addition with Ion Torrent sequencing and real-time polymerase chain reaction. Three rumen-fistulated steers were fed diets supplemented with 0%, 1%, and 2% nitrate (dry matter %) in succession. Nitrate supplementation linearly increased total volatile fatty acids and acetate concentration obviously (p = 0.02; p = 0.02; p<0.01), butyrate and isovalerate concentration numerically (p = 0.07). The alpha (p>0.05) and beta biodiversityof ruminal bacteria were not affected by nitrate. Nitrate increased typical efficient cellulolytic bacteria species (Ruminococcus flavefaciens, Ruminococcus ablus, and Fibrobacter succinogenes) (p<0.01; p = 0.06; p = 0.02). Ruminobactr, Sphaerochaeta, CF231, and BF311 genus were increased by 1% nitrate. Campylobacter fetus, Selenomonas ruminantium, and Mannheimia succiniciproducens were core nitrate reducing bacteria in steers and their abundance increased linearly along with nitrate addition level (p<0.01; p = 0.02; p = 0.04). Potential nitrate reducers in the rumen, Campylobacter genus and Cyanobacteria phyla were significantly increased by nitrate (p<0.01; p = 0.01).To the best of our knowledge, this was the first detailed view of changes in ruminal microbiota by nitrate. This finding would provide useful information on nitrate utilization and nitrate reducer exploration in the rumen.

A Strong Anonymity Scheme for Wireless Sensor Networks (무선 센서 네트워크를 위한 강한 익명성 지원 구조)

  • Lee, Jung-Hyun;Kim, Tae-Yeon;Cho, Gi-Hwan
    • Journal of Internet Computing and Services
    • /
    • v.11 no.3
    • /
    • pp.139-148
    • /
    • 2010
  • In the sensor network security area, previous works were mainly concentrated on achieving authentication, confidentiality, integrity and availability. But the ID exposure issue is recently an increasing concern in research community. To protect the ID exposure from various attacks, the most common approach is to make use of a dynamic pseudonym rather than the real ID. However, if a node's secret key (or hash key) and the current pseudonym (such as a random number) are exposed, the attacker can easily generate the previous/next pseudonyms. In this paper, we propose a security infra-structure scheme for enabling strong anonymity of sensor nodes. Our scheme ensures that the probability being able to generate a pseudonym is very low even if a sensor node has been compromised with an attacker. Security analyses have proven that our scheme is suitable for sensor network environments in terms of preserving of forward anonymity as well as backward anonymity.

Context-based Social Network Configuration Method between Users (컨텍스트 기반 사용자 간 소셜 네트워크 구성 방법)

  • Han, Jong-Hyun;Woo, Woon-Tack
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.11-14
    • /
    • 2009
  • In this paper, we propose the method configuring social networks among users based on users' context and profile. Recently, many researchers are concerned about social networks related with collaborative systems. In case of the existing researches, however, it is difficult to configure social networks dynamically because they are based on static data types, such as log and profile of users. The proposed method uses not only user profiles but also context reflecting users' behavior dynamically. It computes the similarity among users' behavior contexts using hierarchical structure of context domain knowledge model. And it calculates relationships between contexts by given weight factors of category of context model. In order to verify usefulness of the method, we conduct an experiment on configuring social network according to change of user context. We expect that it makes dynamic analysis of relationship of users possible.

  • PDF

Variable Geocasting based on Ad Hoc Networks (Ad Hoc 네트워크 기반의 가변 지오캐스팅)

  • Lee Cheol-Seung;Lee Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.8
    • /
    • pp.1401-1406
    • /
    • 2006
  • Mobile Ad-hoc networks have recently attracted a lot of attention in the research community as well as in industry. Although the previous research mainly focused on various of Ad-hoc in routing, we consider, in this paper, how to efficiently support applications such as variable Goocasting basd on Ad-hoc networks. The goal of a geocasting uotocol is deliver data packets to a group of nodes that are located within a specified geocasting region. Previous research that support geocast nice in mobilie computing based on Ad-hoc have the non-optimization problem of data delivery path, overhead by frequent reconstruction of the geocast tree, and service disruption problem. In this paper, we propose the mobility pattern based geocast technique using variable service range according to the nobility of destination node and resource reservation to solve this problem. The experimental results show that our proposed mechanism has improved performance of Connection & Network Overhead than previous research.

A Security Protocol for Swarming Technique in Peer-to-Peer Networks (피어 투 피어 네트워크에서 스워밍 기법을 위한 보안 프로토콜)

  • Lee, Kwan-Seob;Lee, Kwan-Sik;Lee, Jang-Ho;Han, Seung-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.9
    • /
    • pp.1955-1964
    • /
    • 2011
  • With fast deployment of high-speed networks and various online services, the demand for massive content distribution is also growing fast. An approach that is increasingly visible in communication research community and in industry domain is peer-to-peer (P2P) networks. The P2P swarming technique enables a content distribution system to achieve higher throughput, avoid server or network overload, and be more resilient to failure and traffic fluctuation. Moreover, as a P2P-based architecture pushed the computing and bandwidth cost toward the network edge, it allows scalability to support a large number of subscribers on a global scale, while imposing little demand for equipment on the content providers. However, the P2P swarming burdens message exchange overheads on the system. In this paper, we propose a new protocol which provides confidentiality, authentication, integrity, and access control to P2P swarming. We implemented a prototype of our protocol on Android smart phone platform. We believe our approach can be straightforwardly adapted to existing commercial P2P content distribution systems with modest modifications to current implementations.