• Title/Summary/Keyword: internet of Everything

Search Result 67, Processing Time 0.026 seconds

A Study on the Optimization of Edutainment Website design For Juvenile Users (에듀테인먼트 기반의 어린이 웹사이트 디자인에 관한 연구)

  • 손은미;임은정;이현주
    • Archives of design research
    • /
    • v.15 no.1
    • /
    • pp.143-152
    • /
    • 2002
  • As the Internet has been a daily instrument of our lives, the numbers of Internet users are increasing rapidly. Especially, we have to pay special attention to about rapid increasing of juvenile users. In the 1990's, Kids are growing up literally surrounded by new technologies and mu1timedia experiences. For these kids, most of the techno1ologies that we adults find surprising or even incredible are a part of their everyday landscape, a fact of life. Currently, only few of research and discussion has gone into understanding this field. And most of these web sites, set importance on furnishing information only. So educational characters of web are not manifested fully as well as children soon get board with learning with Internet so that feel difficulties in searching and accepting information. At this point, we must try to develop educational sites Not only to show information but also to offer a rich and entertaining time for kids while providing playful teaming and increased technological fluency. Fer this purpose, Web site should be all about combining play with learning. Site navigation should be easy and the pages load quickly. The page download time is also being considerable, which could send kids withy mouse-fingers looking for entertainment elsewhere. Everything about the site must have a familiar feel, uses adequate colors to be satisfied with the juveniles. Multimedia can help the communications in the websites. To maximize the educational effect, technological research and continues invest are need, in addition to usability test.

  • PDF

The Character of Ethnic Make up by Observation of 21's Century Fashion Trend (21 세기 패션에 표현된 에스닉 메이크업의 특징에 관한 고찰)

  • Kim, Mi-Jung;Kim, Mi-Hyun
    • Korean Journal of Human Ecology
    • /
    • v.16 no.5
    • /
    • pp.1061-1068
    • /
    • 2007
  • The study has sought to explore how fashion emerges as a comprehensive tool of dress for increasing its brand appeal and express one's artistic sense and fashion by using everything from make-up to hair to trappings. Therefore, when it comes to fashion trends reflected in collections, the study is designed to improve understanding of make-up as one of the elements of total fashion and to help create diverse ideas in expressing creative and free make-up that can help perfect fashion concept in harmony with all the other elements. The study has pondered upon collection, trends and fashion make-up through literature study, and has gathered image data via the Internet. It also has conducted analysis of Ethnic style reconstructed combining past and the future, East and the West, and futurism style using asymmetrical forms without no defined patterns and hi-tech textures, which emerges as a result of post-modernism. The results of the study are as follows. Ethnic fashion that pursues strange and exotic beauty is characterized by its simple and idyllic images of traditional costume in Asia or primitive clothes in Africa. Make-up represent images of matt and pale skin, tanned yellow, glossy and thickly powered squeaky white skin. Point make-up highlighted eye lines, red chick, small and voluptuous red lips. Hair and accessory seeks diversity combining various ethnic styles together such as oriental, Indian, Islam and Africa. In addition, future-oriented fashion of the 21st century, twists in texture, various kinds of materials and changes in technique help give impressions of freedom and bizarreness.

Quality Management on the 4th Industrial Revolution (4차 산업혁명시대의 품질경영)

  • Chong, Hye Ran;Hong, Sung Hoon;Lee, Min Koo;Kwon, Hyuck Moo
    • Journal of Korean Society for Quality Management
    • /
    • v.45 no.4
    • /
    • pp.629-648
    • /
    • 2017
  • Purpose: The world faces a great turning point fundamentally rebuilding the future, and human lives, by embracing the 4th industrial revolution era. This paper aims to seek new and various business models in the 4th industrial revolution era, and to examine the evolution of quality management in the changing of the industrial ecosystem. Methods: This paper examines the various strategies of approaching the 4th industrial revolution in Germany, the USA, Japan, China, and Korea. This paper also draws detailed items by classifying the six major items of Malcolm Baldridge into large, medium, and small scale classifications, researches items from the technical perspective by applied fields, and the four major factor perspectives of quality management, as well as analyzes the relevant items in a multidimensional method. After a questionnaire survey targeting 200 quality experts was conducted, the important quality management factors were selected by applying the Analytic Hierarchy Process (AHP) method. Results: The importance of the general criteria was analyzed in the order of customers, MAKM (measurement, analysis, and knowledge management), workforce, strategy, operations, and leadership. As for the importance analysis results of the secondary subcriteria, the following items are highly analyzed: senior leadership, searching business model's innovation opportunity, customer satisfaction improvement, big data utilization, systematic management of workforce, and, planning and design quality. Conclusion: In the era of the Internet of everything, when complexity increases, this study presented a quality management direction suitable for new business methods challenging existing orders by drawing on quality management priorities.

The Development of RFID Smart Tag Reader using AVR (AVR을 이용한 RFID 스마트 태그 리더 개발)

  • Eum, Sang-hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.10
    • /
    • pp.1319-1324
    • /
    • 2020
  • A smart tag complements various problems caused by the expansion of the use of existing magnet cards. This emerged as a result of the need for alternative means to perform safer and more diverse functions. RFID tags are becoming increasingly ubiquitous sensor networks and Internet of Things technologies as they give everything an ID, enabling automatic recognition of objects and forming a communication network between them. In this paper, a contactless RFID smart tag reader composed of RFID tags and readers using AVR processor was developed. The system has a low frequency band of 13.56MHz and is designed by PWM method of communication velocity 26.48kbps. The developed RFID smart tag board showed a faster response rate than the typical RFID system as a result of the simulation, and the actual experiment also showed an improvement in response rate.

Proposal of Network Security Solution based on Software Definition Perimeter for Secure Cloud Environment (안전한 클라우드 환경을 위한 소프트웨어 정의 경계 기반의 네트워크 보안 솔루션 제안)

  • Cha, Wuk-Jae;Shin, Jae-In;Lee, Dong-Bum;Kim, Hyeob;Lee, Dae-Hyo
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.12
    • /
    • pp.61-68
    • /
    • 2018
  • As the smartphone and mobile environment develop, the time and space constraints for individual work performance are disappearing. Companies can reduce costs and expand their business quickly through cloud computing. As the use of various cloud expands, the boundaries of users, data, and applications are disappearing. Traditional security approaches based on boundaries (Perimeter) are losing their utility in the cloud environment. This paper describes the limitations of existing network access control (NAC) in a cloud environment and suggests network security technology that complements it. The study explains the SDP and combines SDP(Software Defined Perimeter) to overcome the limitations of NAC, while at the same time explaining its role as a new framework for supporting the cloud environment. The new framework proposed in this paper suggests a software-based network security solution that supports physical and software parts, providing identity-based access control, encrypted segment management, and dynamic policy management, not IP-based.

Development of an AI Education Program Converging with Korean Language Subject (국어 교과 융합 AI 교육 프로그램 개발)

  • Shin, Jineson;Jo, Miheon
    • 한국정보교육학회:학술대회논문집
    • /
    • 2021.08a
    • /
    • pp.289-294
    • /
    • 2021
  • With the development of artificial intelligence, a wave of the 4th industrial revolution is taking place around the world. With the technologies such as big data and Internet of Things-based artificial intelligence, we are heading to a hyper-connected society where everything converges into one. Accordingly as educational talents in the era of artificial intelligence, we are pursuing the cultivation of creative convergence-type talents and emotional creative talents. With human creativity and emotion at the center, we should be able to collaborate with artificial intelligence and create new things by converging knowledge in various fields. By developing a program that combines humanities-oriented Korean language with engineering-oriented artificial intelligence, this research attempted to help students experience solving problems creatively by combining humanistic knowledge with engineering thinking skills. The educational program consists of two kinds of contents(i.e., "Books with AI" and "A Play with AI") and 15 classes that provide students with opportunities to solve humanities problems with artificial intelligence.

  • PDF

The Technology of Connected Car (커넥티드 카의 기술)

  • Shim, Hyun-Bo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.3
    • /
    • pp.590-598
    • /
    • 2016
  • It comes into the spotlight as the new Blue Ocean in which the connected car industry in which the car and mobile communication technology is convergence. All sorts of infortainments services connecting with the portable electronic device(Smart phone, tablet PC, and MP3 player) and car are rapidly grown. The Connected car emphasizes the vehicle connectivity with the concept that the car has communication with the around on a real time basis and it provides the safety and expedience to the operator and using the thing of Internet (IoT) in the car and supports the application, presently, the entertainment service including the real-time Navigation, parking assistant function, not only the remote vehicle control and management service but also Email, multimedia streaming service, SNS and with the platform. Intelligent vehicle network is studied as the kind according to MANET(Mobile Ad Hoc Network) for the safety operation of the cars of the road and improving the efficiency of the driving.

An Automated Technique for Illegal Site Detection using the Sequence of HTML Tags (HTML 태그 순서를 이용한 불법 사이트 탐지 자동화 기술)

  • Lee, Kiryong;Lee, Heejo
    • Journal of KIISE
    • /
    • v.43 no.10
    • /
    • pp.1173-1178
    • /
    • 2016
  • Since the introduction of BitTorrent protocol in 2001, everything can be downloaded through file sharing, including music, movies and software. As a result, the copyright holder suffers from illegal sharing of copyright content. In order to solve this problem, countries have enacted illegal share related law; and internet service providers block pirate sites. However, illegal sites such as pirate bay easily reopen the site by changing the domain name. Thus, we propose a technique to easily detect pirate sites that are reopened. This automated technique collects the domain names using the google search engine, and measures similarity using Longest Common Subsequence (LCS) algorithm by comparing the tag structure of the source web page and reopened web page. For evaluation, we colledted 2,383 domains from google search. Experimental results indicated detection of a total of 44 pirate sites for collected domains when applying LCS algorithm. In addition, this technique detected 23 pirate sites for 805 domains when applied to foreign pirate sites. This experiment facilitated easy detection of the reopened pirate sites using an automated detection system.

A Study on LED Energy Efficiency in Buildings through Cloud-based User Authentication in IoT Network Environment (IoT 네트워크 환경에서 클라우드 기반의 사용자 인증을 통한 건물 내의 LED에너지 효율화 연구)

  • Ahn, Ye-Chan;Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.15 no.5
    • /
    • pp.235-240
    • /
    • 2017
  • Recently, Internet of things have been applied to various fields and are becoming common in our everyday life. Everything in our daily lives is networked, interacting with each other and giving us more useful effects. In this paper, we implemented an algorithm that can illuminate the LED lighting to the authorized person 's place in the network environment connected with the authentication device only once with the user authentication. User authentication in one building User authenticated through a single user search for the location of the user's lab stored in the database using the certified information and LED lights up to the lab where the user works. Through this, unnecessary energy is generated because people do not pass frequently.

Smart Home Service System Considering Indoor and Outdoor Environment and User Behavior (실내외 환경과 사용자의 행동을 고려한 스마트 홈 서비스 시스템)

  • Kim, Jae-Jung;Kim, Chang-Bok
    • Journal of Advanced Navigation Technology
    • /
    • v.23 no.5
    • /
    • pp.473-480
    • /
    • 2019
  • The smart home is a technology that can monitor and control by connecting everything to a communication network in various fields such as home appliances, energy consumers, and security devices. The Smart home is developing not only automatic control but also learning situation and user's taste and providing the result accordingly. This paper proposes a model that can provide a comfortable indoor environment control service for the user's characteristics by detecting the user's behavior as well as the automatic remote control service. The whole system consists of ESP 8266 with sensor and Wi-Fi, Firebase as a real-time database, and a smartphone application. This model is divided into functions such as learning mode when the home appliance is operated, learning control through learning results, and automatic ventilation using indoor and outdoor sensor values. The study used moving averages for temperature and humidity in the control of home appliances such as air conditioners, humidifiers and air purifiers. This system can provide higher quality service by analyzing and predicting user's characteristics through various machine learning and deep learning.