• Title/Summary/Keyword: personal network

Search Result 1,441, Processing Time 0.034 seconds

Step size determination method using neural network for personal navigation system (개인휴대 추측항법 시스템을 위한 신경망을 이용한 보폭 결정 방법)

  • 윤선일;홍진석;지규인
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.80-80
    • /
    • 2000
  • The GPS can provide accurate position information on the earth. But GPS receiver can't give position information inside buildings. DR(Dead-Reckoning) or INS(Inertial Navigation System) gives position information continuously indoors as well as outdoors, because they do not depend on the external navigation information. But in general, the inertial sensors severely suffer from their drift errors, the error of these navigation system increases with time. GPS and DR sensors can be integrated together with Kalman filter to overcome these problems. In this paper, we developed a personal navigation system which can be carried by person, using GPS and electronic pedometer. The person's footstep is detected by an accelerometer installed in vertical direction and the direction of movement is sensed by gyroscope and magnetic compass. In this case the step size is varying with person and changing with circumstance, so determining step size is the problem. In order to calculate the step size of detected footstep, the neural network method is used. The teaming pattern of the neural network is determined by human walking pattern data provided by 3-axis accelerometer and gyroscope. We can calculate person's location with displacement and heading from this information. And this neural network method that calculates step size gives more improved position information better than fixed step size.

  • PDF

A Study on the semantic network system of the line of flow appearing on the residential space of super high-rise apartments (초고층아파트 주거공간에 나타난 동선의 의미적 네트워크 체계에 관한 연구)

  • Yoon, Jae-Eun;Kim, Joo-Hee
    • Korean Institute of Interior Design Journal
    • /
    • v.16 no.3 s.62
    • /
    • pp.58-65
    • /
    • 2007
  • The residential space of super high-rise buildings, having a form of a huge three-dimensional vertical city, affect the residents psychologically and qualitatively according to the line of flow. Because of these affects, the system of the line of flows is a very important factor. In this study, we recognize the super high-rise apartment's line of flow as a semantic network system based on case studies. And we also understand the mutual relationship by analyzing each space to recognize what effect it does on the residential environment. Furthermore, to bring up a better semantic network system for super high-rise apartment's line of flows is our goal. According to the case studies, the semantic network of the line of flow consists of 3 parts: the functional network, economical network and unit network. The functional network is composed of the 'need' and 'has', while the economical network includes variable walls that can be changed following the user's taste and eccentric positioned living rooms that protect personal privacy. Therefore the economical network started to appear while the personal value changed according to the improvement of the social condition. Finally, the unit network is a network that effects each unit that has ambiguous boundaries due to the appropriate arrangement between transitional spaces. And the unit network is based on the functional network.

The Personal Branding Strategy for Effective Construction of Personal Image (효과적인 퍼스널 이미지 구축을 위한 브랜딩 전략)

  • Kim, Mi-Kyung
    • Journal of Fashion Business
    • /
    • v.15 no.5
    • /
    • pp.87-102
    • /
    • 2011
  • The research intends to exploit a strategy method of personal branding improving a personal value for construction of a personal image. As an assessment, the model of construction strategy of personal branding is developed in four steps of a model, construction of personal branding, by using elements of personal image and researching about personal branding strategy of scholars. In order to substantiate a validity of presented model, the case analyses of Martha Stewart. The strategy of four steps for construction of effective personal image is explained below. First step is an analysis of personal brand equity, deciding a direction of the concept of a personal branding through analyzing into a core value and core competence of one. Second step is a personal brand identity, constructing personal specification and identity with elements of personal image by using effective strategy, being able to be perceived to population. Third step is a personal brand positioning, constructing competitive brand image by using analysis of SWOT and strategy STP. Fourth step is a promotion of personal brand, advertising and extending a brand image of one by using a public activity and communication methods such as publication, mass media, and social network. By using the four kinds of processes, constructed strategy of a personal brand will be significant for construction of an effective personal image by having increment of a value and power of the brand.

Study of how to expand the wireless personal area network of a home using ZigBee binding (Home Network에서 ZigBee Binding 기술을 이용한 댁내.외 망의 연계방법에 대한 연구)

  • Lee Jae-Hyun;Kwon Kyung-Hee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.1127-1130
    • /
    • 2006
  • ZigBee기술은 Home Automation, Building Automation 그리고 Sensor Network 분야까지 다양한 분야에서 기술적인 가능성을 가지고 있다. 그러나 ZigBee기술은 WPAN(Personal Area Network) 영역으로 그 범위를 제한하고 있어 Home Automation에 적용할 수 있는 분야가 제한될 수 밖에 없다. 본 논문에서는 ZigBee의 binding기술을 확장하여 home network에 도입하기 위한 방안을 제시하고, 댁외 device들이 home server를 통하여 ZigBee의 device들과 어떻게 binding될 수 있는지를 보이고자 한다. 또한 위의 내용을 기반으로 home network의 automation을 댁외 망으로 확장할 수 있음을 보이고자 한다.

  • PDF

Design and Implementation of WPAN Middle-ware for Combination between CDMA and Bluetooth

  • Na Seung-Won;Jeong Gu-Min;Lee Yang-Sun
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.6
    • /
    • pp.836-843
    • /
    • 2005
  • The Wireless Internet services widely spread out with the developments of CDMA(Code Division Multiple Access) networks and wireless units. In contrast to the telecommunication network, WPAN (Wireless Personal Area Network) enables to transmit data and voice in personal area. Although WPAN technologies are commercially utilized, the combined services with COMA network are not so poplar up to now. Various services can be provided using the combination between COMA and WPAN. This paper presents the practical and united model between COMA and WPAN. Specially, the main focus of this research lies on the design of the Middle-ware system of a handset which could be managing both COMA and WPAN. This system used Bluethooth by WPAN. For the devices with the proposed WPAN Middle-ware, service areas of the COMA network can be expanded to WPAN, various services can be realized by the transmission of data and voice, and consequently, the user computing environment could be improved.

  • PDF

A Study of Virtual Home Environment Implementation Scenario for Subscriber Privacy (가입자 정보보호를 위한 Virtual Home Environment 시나리오 보안 취약점 분석)

  • Jeong, Jong-Min;Lee, Goo-Yeon;Lee, Yong
    • Journal of Industrial Technology
    • /
    • v.21 no.A
    • /
    • pp.117-122
    • /
    • 2001
  • Currently, the VHE (suggested for global roaming user to provide personal service environment) implementation scenario is being proposed to realize 3G network requirements. However, developing VHE scenarios are focused on signal flow between node and network, and network and network. this case may result in weakness to protect subscriber's privacy in 3G network which commonly uses visited network. In this paper, we reanalyze a several VHE implementation scenarios for user profile protection, indicate a problem concerning user privacy, and finally, design a procedure to cope with vulnerability in VHE implementation scenario.

  • PDF

Service Profile Replication Scheme with Local Anchor for Next Generation Personal Communication Networks

  • Jinkyung Hwang;Bae, Eun-Shil;Park, Myong-Soon
    • Journal of Communications and Networks
    • /
    • v.5 no.3
    • /
    • pp.215-221
    • /
    • 2003
  • It is expected that per-user customized services are widely used in next generation Personal Communication Network. To provide personalized services for each call, per-user service profiles are frequently referenced and signaling traffic is considerably large. Since the service calls are requested from the places where user stays, we can expect that the traffic is localized. In this paper, we propose a new service profile replication scheme, named Follow-Me Replication with local Anchor (FMRA). By replicating user's service profile in a user-specific location area, local anchor of each region, the signaling traffic for call and mobility can be distributed to local network. We compared the performance of the FMRA with two typical schemes: Intelligent Network-based !Central scheme and IMT-2000 based full replication scheme, as we refer it to Follow-Me Replication Unconditional (FMRU). Performance results indicate that FMRA lies between Central and FMRU schemes according to call to mobility ratio, and we identified the efficient ranges of CMR for FMRA depending on the various network parameters.

Seamless and Secure Service Framework using Multiple Network Interlaces Terminal in Heterogeneous Environment (이종 네트워크 환경에서 다중 인터페이스 단말을 활용한 끊김 없이 안전한 서비스 프레임워크)

  • Yoon, Sung-Hun;Lee, Soon-Seok;Kim, Sang-Ha
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.4
    • /
    • pp.53-65
    • /
    • 2011
  • As the Information and Communication Technologies continue to advance, some sensitive services (e.g. e-commerce, on-line financial service, and etc.) have spread rapidly. Accordingly, ensuring the safety of the sensitive service itself using personal Information as well as the protection of personal Information Is becoming very important. In addition, with the popularization of smart phone and the universalized use of wireless Internet, many services that have been provided on the basis of the conventional wired network are increasingly propagating to wired and wireless converged network environment. These changes in the network environment requires new paradigm for the pursuit of safe and stable communication. In this paper, we propose seamless and secure service framework that can facilitate a sustainable secure connection between the user terminal and the sensitive service system by using both the personal and network Information. The proposed service framework is capable of isolating the source of authorized use by a third party of the personal Information as far as the user terminal is not lost, although some personal Information is disclosed. Besides, it can provide a seamless and safe service environment even if the access network is changed by relocation of terminals in the heterogeneous mobile network environment.

Toward the Personal Robot Software Framework

  • Kim, Hong-Ryeol;Kim, Dae-Won;Kim, Hong-Seok;Lee, Ho-Gil
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2002.10a
    • /
    • pp.117.2-117
    • /
    • 2002
  • In this paper, a software framework is proposed for the personal robot located on home network. The proposed software framework is divided into four layers-a transparency layer, a behavior layer, a distributed task layer, and a mission scenario layer. The transparency layer consists of a virtual machine for platform transparency, and a communication broker for communication transparency among behavior modules. The communication architecture includes both server/client communication and publisher/subscriber communication. A mission scenario is assumed to be a composition of sequentially planned distributed tasks. In addition to the software framework, a new concept, personal robot design cent...

  • PDF

Keywords Analysis on the Personal Information Protection Act: Focusing on South Korea, the European Union and the United States

  • Park, Sung-Uk;Park, Moon-Soo;Park, Soo-Hyun;Yun, Young-Mi
    • Asian Journal of Innovation and Policy
    • /
    • v.9 no.3
    • /
    • pp.339-359
    • /
    • 2020
  • The policy change in the Data 3 Act is one of the issues that should be noted at a time when non-face-to-face business strategies become important after COVID-19. The Data 3 Act was implemented in South Korea on August 5, 2020, calling 'Big Data 3 Act' and 'Data Economy 3 Act,' and so personal information that was not able to identify a particular individual could be utilized without the consent of the individual. With the implementation of the Data 3 Act, it is possible to establish a fair economic ecosystem by ensuring fair access to data and various uses. In this paper, the law on the protection of personal information, which is the core of the Data 3 Act, was compared around Korea, the European Union and the United States, and the implications were derived through network analysis of keywords.