• Title/Summary/Keyword: implementation

Search Result 33,650, Processing Time 0.059 seconds

Analysis and Design of Cattle Management System based on IoT (사물인터넷 기반 소관리 시스템의 분석 및 설계)

  • Cho, Byung-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.2
    • /
    • pp.125-130
    • /
    • 2021
  • Implementation of livestock smart-farm can be done more effectively with IoT technology developing. An build of useful stock management system can be possibile if push messages of these judgement are notified on smart-phone after cattle's illness and estrus are judged using IoT technology. These judgement method of cattle's illness and estrus can be done with gathering living stock data using temperature sensor and 3 axis acceleration sensor and sending these data using IoT and internet network into server, and studying AI machine learning using these data. In this paper, to build this cattle management system based on IoT, effective system of the whole architecture is showed. Also an effective analysis and design method to develop this system software will be presented by showing user requirement analysis using object-oriented method, flowchart and screen design.

Design and implementation of improved authentication mechanism base on mobile DRM using blockchain (블록체인을 이용한 모바일 DRM 기반 개선된 인증 메커니즘 설계 및 구현)

  • Jeon, Jinl-Oh;Seo, Byeong-Min
    • Journal of Digital Convergence
    • /
    • v.19 no.4
    • /
    • pp.133-139
    • /
    • 2021
  • Due to the rapid progress in network technology, many research on content security technologies is also being conducted in the mobile digital content sector. In the meantime, content protection has been immersed in preventing illegal copying, certifying, and issuance/management certificates, but still have many vulnerabilities in managing or authenticating confidential information. This study aims to strengthen confidential information about content based on dual management of content download rights through mobile phone numbers or device numbers. It also protect replay-attack by building a secure mobile DRM system where digital content is safely distributed based on a three-stage user authentication process. In addition, blockchain-based content security enhancements were studied during the primary/secondary process for user authentication for the prevention of piracy and copyright protection. In addition, the client authentication process was further improved through three final stages of authorization in the use of illegal content, considering that legitimate users redistributed their content to third-party.

Analysis of Gender Chapters in Five Free Trade Agreements and Its Lessons for Korea

  • Ko, Bomin
    • Journal of Korea Trade
    • /
    • v.24 no.6
    • /
    • pp.82-100
    • /
    • 2020
  • Purpose - This paper attempts to compare five free trade agreements with gender chapters ratified by Chile and Canada and derives lessons for Korea in terms of gender-aware trade policy. While Chile and Canada have three and two FTAs with gender chapter respectively, Korea has none so far, although it has already ratified an FTA with the two countries. Design/methodology - This study first investigates all the gender-provisions with the gender chapters, conducts a comparative analysis on the five chapters as well as a case study of one target FTA's implementation and achievements, and finally suggests policy implications for Korea's trade administration as well as trade-related agencies. Findings - According to the analysis, there are three phases in terms of advancement in gender-related trade policy. As Chile is in phase two and Canada is in phase three, Korea remains in phase one. It has a ministry related to gender within the government, but not within the OMT. It has statistics on female business, but not of women traders. It has a few gender-related provisions in its FTAs, but not a gender chapter. In this sense, new mandates related to gender-aware trade policy for OMT, KITA, and KOTRA should be provided to realize the concrete economic benefits resulting from empowering women traders and policies promoting them. Originality/value - Existing studies only focus on introducing gender-related international commitments and Korea's participation in them. This paper is the first attempt to compare actual gender chapters of five FTAs ratified by two countries with the most advanced gender chapters in the world. To gain benefits from the positive gender impact of trade agreements, negotiating and signing gender responsive FTA with future partners is one of the most efficient, as well as inclusive, trade policies urgently needed for Korea.

Machine Learning Language Model Implementation Using Literary Texts (문학 텍스트를 활용한 머신러닝 언어모델 구현)

  • Jeon, Hyeongu;Jung, Kichul;Kwon, Kyoungah;Lee, Insung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.2
    • /
    • pp.427-436
    • /
    • 2021
  • The purpose of this study is to implement a machine learning language model that learns literary texts. Literary texts have an important characteristic that pairs of question-and-answer are not frequently clearly distinguished. Also, literary texts consist of pronouns, figurative expressions, soliloquies, etc. They hinder the necessity of machine learning using literary texts by making it difficult to learn algorithms. Algorithms that learn literary texts can show more human-friendly interactions than algorithms that learn general sentences. For this goal, this paper proposes three text correction tasks that must be preceded in researches using literary texts for machine learning language model: pronoun processing, dialogue pair expansion, and data amplification. Learning data for artificial intelligence should have clear meanings to facilitate machine learning and to ensure high effectiveness. The introduction of special genres of texts such as literature into natural language processing research is expected not only to expand the learning area of machine learning, but to show a new language learning method.

Analytical study of composite steel-concrete beams with external prestressing

  • Turini, Thiago T.;Calenzani, Adenilcia F.G.
    • Structural Engineering and Mechanics
    • /
    • v.82 no.5
    • /
    • pp.595-609
    • /
    • 2022
  • Prestressed composite steel-concrete beams are still a technology restricted to repair sites of large-scale structures and spans. One of the reasons for that is the absence of standard frameworks and publications regarding their design and implementation. In addition, the primary normative codes do not address this subject directly, which might be related to a scarcity of papers indicating methods of design that would align the two technics, composite beams and external prestressing. In this context, this paper proposes methods to analyze the sizing of prestressed composite beams submitted to pre-tension and post-tension with a straight or polynomial layout cable. This inquiry inspected a hundred and twenty models of prestressed composite beams according to its prestressing technology and the eccentricity and value of the prestressing force. The evaluation also included the ratio between span and height of the steel profile, thickness and typology of the concrete slab, and layout of the prestressing cables. As for the results, it was observed that the eccentricity of the prestressing force doesn't significantly influence the bending resistance. In prestressed composite beams subjected to a sagging moment, the ratio L/d can reach 35 and 30 for steel-concrete composite slabs and solid concrete slabs, respectively. Considering the negative bending moment resistance, the value of the L/d ratio must be less than or equal to 25, regardless of the type of slab. When it comes to the value of the prestressing force, a variation greater than 10% causes a 2.6% increase in the positive bending moment resistance and a 4% decrease in the negative bending moment resistance. The pre-tensioned composite beams showed a superior response to flexural-compression and excessive compression limit states than the post-tensioned ones.

Fuzzy neural network controller of interconnected method for civil structures

  • Chen, Z.Y.;Meng, Yahui;Wang, Ruei-yuan;Chen, Timothy
    • Advances in concrete construction
    • /
    • v.13 no.5
    • /
    • pp.385-394
    • /
    • 2022
  • Recently, an increasing number of cutting-edged studies have shown that designing a smart active control for real-time implementation requires piles of hard-work criteria in the design process, including performance controllers to reduce the tracking errors and tolerance to external interference and measure system disturbed perturbations. This article proposes an effective artificial-intelligence method using these rigorous criteria, which can be translated into general control plants for the management of civil engineering installations. To facilitate the calculation, an efficient solution process based on linear matrix (LMI) inequality has been introduced to verify the relevance of the proposed method, and extensive simulators have been carried out for the numerical constructive model in the seismic stimulation of the active rigidity. Additionally, a fuzzy model of the neural network based system (NN) is developed using an interconnected method for LDI (linear differential) representation determined for arbitrary dynamics. This expression is constructed with a nonlinear sector which converts the nonlinear model into a multiple linear deformation of the linear model and a new state sufficient to guarantee the asymptomatic stability of the Lyapunov function of the linear matrix inequality. In the control design, we incorporated H Infinity optimized development algorithm and performance analysis stability. Finally, there is a numerical practical example with simulations to show the results. The implication results in the RMS response with as well as without tuned mass damper (TMD) of the benchmark building under the external excitation, the El-Centro Earthquake, in which it also showed the simulation using evolved bat algorithmic LMI fuzzy controllers in term of RMS in acceleration and displacement of the building.

Water consumption prediction based on machine learning methods and public data

  • Kesornsit, Witwisit;Sirisathitkul, Yaowarat
    • Advances in Computational Design
    • /
    • v.7 no.2
    • /
    • pp.113-128
    • /
    • 2022
  • Water consumption is strongly affected by numerous factors, such as population, climatic, geographic, and socio-economic factors. Therefore, the implementation of a reliable predictive model of water consumption pattern is challenging task. This study investigates the performance of predictive models based on multi-layer perceptron (MLP), multiple linear regression (MLR), and support vector regression (SVR). To understand the significant factors affecting water consumption, the stepwise regression (SW) procedure is used in MLR to obtain suitable variables. Then, this study also implements three predictive models based on these significant variables (e.g., SWMLR, SWMLP, and SWSVR). Annual data of water consumption in Thailand during 2006 - 2015 were compiled and categorized by provinces and distributors. By comparing the predictive performance of models with all variables, the results demonstrate that the MLP models outperformed the MLR and SVR models. As compared to the models with selected variables, the predictive capability of SWMLP was superior to SWMLR and SWSVR. Therefore, the SWMLP still provided satisfactory results with the minimum number of explanatory variables which in turn reduced the computation time and other resources required while performing the predictive task. It can be concluded that the MLP exhibited the best result and can be utilized as a reliable water demand predictive model for both of all variables and selected variables cases. These findings support important implications and serve as a feasible water consumption predictive model and can be used for water resources management to produce sufficient tap water to meet the demand in each province of Thailand.

Corruption as a Threat to Economic Security of the Country

  • Samiilenko, Halyna;Ivanova, Nataliia;Shaposhnykova, Iryna;Vasylchenko, Lidiia;Solomakha, Iryna;Povna, Svitlana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.316-322
    • /
    • 2021
  • The problem of corruption and the spread of corruption crime today is not only one of the main social problems, but also an obstacle to the implementation of reforms in Ukraine. Given the complexity, scale and diversity of the impact of corruption, it is an undisputed threat to national security. At the state level, corruption threatens, firstly, state security as a result of its spread in public authorities and the combination of political and business spheres; secondly, in the domestic political sphere as a result of non-compliance and violation by officials of public authorities and local governments of the laws of Ukraine; thirdly, in the economic sphere as a result of the dominance of personal interests of civil servants over national ones; fourthly, in other spheres, namely, military, social, ecological, informational, foreign policy, etc. The origins of corruption are diverse and are formed not only in the country but also abroad. The current corruption threat is the result of the country's ineffective domestic and foreign anticorruption policies. Acceleration of the spread and manifestation of external corruption threats is associated with a number of unresolved foreign policy issues against the background of the development of globalization and integration processes, in particular: economic and financial dependence of the country on international financial institutions and organizations; as well as from foreign countries that pose a potential threat due to their ambitious plans to expand our country; unresolved issues regarding the international legal consolidation of borders, etc. It is noted that the current conditions for the development of state security, due to new challenges and threats, need to improve and implement new measures to prevent corruption as a negative impact of the main threats to national economic security. As a result of the study, the main measures to counter the main threats to the economic security of the state were identified.

Implementation and Utilization of Decentralized Identity-Based Mobile Student ID (분산 ID 기반 모바일 학생증 구현과 활용)

  • Cho, Seung-Hyun;Kang, Min-Jeong;Kang, Ji-Yun;Lee, Ji-Eun;Rhee, Kyung-Hyune
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1115-1126
    • /
    • 2021
  • In this paper, we developed a mobile student ID providing a self sovereignty identity (SSI) which replaces the conventional plastic-type student ID that includes private information of a student such as a name, a student number, a facial photo, etc. The implemented mobile student ID solves the problem of exposing student's identity due to a loss or a theft of a plastic-type student ID, and it has a structure and process of FRANCHISE model which is developed by a concept of a decentralized Identity(DID) of a Blockchain, in which specialized for convenience as an electronic student ID through an application on a smart phone device. In addition, it protects student's privacy by controlling personal information on oneself. By using a smartphone, not only it easily identifies the student but also it expands to several services such as participation in school events, online authentication, and a student's exchange program among colleges.

Implementation of Barrier-free Content by using Virtual Reality and Geospatial Information (가상현실과 공간정보를 이용한 배리어 프리 콘텐츠 개발에 관한 연구)

  • Kim, Byeongsun;Jeon, Haechan
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.11
    • /
    • pp.193-202
    • /
    • 2021
  • Barrier-free is defined as inclusive design of built environments such as building and its facilities that can be approached, entered and used by persons with disabilities. The purpose of this paper develops the content that can identify the physical barriers in the way of movement and provide information associated with barrier-free by using both Geospatial Information and Virtual Reality technology. For this, we conducted literature reviews to find the tackling barriers in terms of barrier-free access and extracted main functions to construct the content. Then, the prototype model which composed of VR engine and 3D geospatial data was implemented, and finally the utilization of the prototype was checked in accordance with barrier-free scenario. The developed prototype model of this study would be contributed to design the barrier-free of public places and access to public buildings for the mobility-disabled people.