• Title/Summary/Keyword: smart radio

Search Result 267, Processing Time 0.02 seconds

Recognition and Consumption for the Health Functional Food of College Students in the Northern Gyeonggi-do Area (경기북부지역 대학생의 건강기능식품 인식 및 섭취 실태 조사)

  • Kim, Young-Soon;Choi, Byung Bum
    • The Korean Journal of Food And Nutrition
    • /
    • v.29 no.2
    • /
    • pp.206-217
    • /
    • 2016
  • This study was conducted to assess the recognition and consumption of health functional food (HFF) of the college students in the Northern Gyeonggi-do area (Republic of Korea). To accomplish this, a survey was conducted to investigate 360 college students (183 males and 177 females) regarding their general characteristics, as well as the recognition, knowledge, considerations, purchases and consumption of HFF. Most male and female students (68.9% and 61.6%, respectively) were unaware of the HFF certification mark, however, more females(58.8%) were aware of the legal HFF definition compared to males (36.6%). The HFF advertising routes for males and females were 'TV radio' (43.2% and 43.5%, respectively) and 'internet smart phones' (19.7% and 27.1%, respectively). The main factor considered for selection and the most serious problem concerning HFF by males and females were 'effectiveness' (36.1% and 43.6%, respectively) and 'hype (exaggerated advertisement)' (35.0% and 55.9%, respectively). The main purchase route by males and females was 'pharmacy' (35.2% and 27.8%, respectively). The main reason for HFF product purchase by males and females was 'health promotion' (38.8% and 29.4%, respectively) and the main reason for not purchasing an HFF product was 'no health problem'(34.8% and 36.7%, respectively). The percentage of HFF consumption was 46.0% in males and 69.8% in females. The main HFF product consumed by males and females was 'vitamin mineral' (36.9% and 43.5%, respectively). The main reason for HFF consumption by males was 'health promotion' (31.0%) and females was 'recovery from fatigue' (21.8%). The main reason for not consuming HFF by males and females was 'no health problem' (38.4% and 41.5%, respectively). These results suggest the need to provide correct information concerning HFF to college students. Based on these results, greater efforts should be made to provide meaningful information regarding factors affecting purchase and consumption patterns for college students related to the research and development of HFF in the Northern Gyeonggi-do area.

Enhanced Energy Harvester Based on Vibration Analysis of Bicycle Riding (자전거 주행의 진동 분석에 기반한 에너지 수확 증진 기술 개발)

  • Yeo, Jung-Jin;Ryu, Mun-Ho;Kim, Jung-Ja;Yang, Yoon-Seok
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.49 no.1
    • /
    • pp.47-56
    • /
    • 2012
  • Bicycle has a large amount of kinetic energy available for energy harvesting technology in its speedy and balanced riding movement. Systematic and realistic analysis of its dynamic property is essential to improve the efficiency of energy harvester. However, there has not been enough researches about precise measurement or analysis of bicycle dynamics on real roads. This study aims to investigate the characteristics of vibrational movement of bicycle using MEMS-based accelerometer and to develop a prototype of electromagnetic energy harvester with nonlinear behavior which is proper to the random vibrations accompanied in bicycle riding. The vibrational components have average magnitude of 1 g and turn out to be independent of riding speed. The developed prototype of energy harvester was installed on a front port of a bicycle to use this ambient vibration and generated an average electrical power of 1.5 mW which is enough to support power for most of portable sensors and short range radio-frequency communication. Further study about isolation of vibration from a rider and conversion efficiency is ongoing. The developed energy harvester is expected to be a platform technology for sustainable portable power supply for various smart IT devices and applications.

Development of Ubiquitous Sensor Network Intelligent Bridge System (유비쿼터스 센서 네트워크 기반 지능형 교량 시스템 개발)

  • Jo, Byung Wan;Park, Jung Hoon;Yoon, Kwang Won;Kim, Heoun
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.16 no.1
    • /
    • pp.120-130
    • /
    • 2012
  • As long span and complex bridges are constructed often recently, safety estimation became a big issue. Various types of measuring instruments are installed in case of long span bridge. New wireless technologies for long span bridges such as sending information through a gateway at the field or sending it through cables by signal processing the sensing data are applied these days. However, The case of occurred accidents related to bridge in the world have been reported that serious accidents occur due to lack of real-time proactive, intelligent action based on recognition accidents. To solve this problem in this study, the idea of "communication among things", which is the basic method of RFID/USN technology, is applied to the bridge monitoring system. A sensor node module for USN based intelligent bridge system in which sensor are utilized on the bridge and communicates interactively to prevent accidents when it captures the alert signals and urgent events, sends RF wireless signal to the nearest traffic signal to block the traffic and prevent massive accidents, is designed and tested by performing TinyOS based middleware design and sensor test free Space trans-receiving distance.

A Block-based Uniformly Distributed Random Node Arrangement Method Enabling to Wirelessly Link Neighbor Nodes within the Communication Range in Free 3-Dimensional Network Spaces (장애물이 없는 3차원 네트워크 공간에서 통신 범위 내에 무선 링크가 가능한 블록 기반의 균등 분포 무작위 노드 배치 방법)

  • Lim, DongHyun;Kim, Changhwa
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.10
    • /
    • pp.1404-1415
    • /
    • 2022
  • The 2-dimensional arrangement method of nodes has been used in most of RF (Radio Frequency) based communication network simulations. However, this method is not useful for the an none-obstacle 3-dimensional space networks in which the propagation delay speed in communication is very slow and, moreover, the values of performance factors such as the communication speed and the error rate change on the depth of node. Such a typical example is an underwater communication network. The 2-dimensional arrangement method is also not useful for the RF based network like some WSNs (Wireless Sensor Networks), IBSs (Intelligent Building Systems), or smart homes, in which the distance between nodes is short or some of nodes can be arranged overlapping with their different heights in similar planar location. In such cases, the 2-dimensional network simulation results are highly inaccurate and unbelievable so that they lead to user's erroneous predictions and judgments. For these reasons, in this paper, we propose a method to place uniformly and randomly communication nodes in 3-dimensional network space, making the wireless link with neighbor node possible. In this method, based on the communication rage of the node, blocks are generated to construct the 3-dimensional network and a node per one block is generated and placed within a block area. In this paper, we also introduce an algorithm based on this method and we show the performance results and evaluations on the average time in a node generation and arrangement, and the arrangement time and scatter-plotted visualization time of all nodes according to the number of them. In addition, comparison with previous studies is conducted. As a result of evaluating the performance of the algorithm, it was found that the processing time of the algorithm was proportional to the number of nodes to be created, and the average generation time of one node was between 0.238 and 0.28 us. ultimately, There is no problem even if a simulation network with a large number of nodes is created, so it can be sufficiently introduced at the time of simulation.

A Study on the RFID's Application Environment and Application Measure for Security (RFID의 보안업무 적용환경과 적용방안에 관한 연구)

  • Chung, Tae-Hwang
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.155-175
    • /
    • 2009
  • RFID that provide automatic identification by reading a tag attached to material through radio frequency without direct touch has some specification, such as rapid identification, long distance identification and penetration, so it is being used for distribution, transportation and safety by using the frequency of 125KHz, 134KHz, 13.56MHz, 433.92MHz, 900MHz, and 2.45GHz. Also it is one of main part of Ubiquitous that means connecting to net-work any time and any place they want. RFID is expected to be new growth industry worldwide, so Korean government think it as prospective field and promote research project and exhibition business program to linked with industry effectively. RFID could be used for access control of person and vehicle according to section and for personal certify with password. RFID can provide more confident security than magnetic card, so it could be used to prevent forgery of register card, passport and the others. Active RFID could be used for protecting operation service using it's long distance date transmission by application with positioning system. And RFID's identification and tracking function can provide effective visitor management through visitor's register, personal identification, position check and can control visitor's movement in the secure area without their approval. Also RFID can make possible of the efficient management and prevention of loss of carrying equipments and others. RFID could be applied to copying machine to manager and control it's user, copying quantity and It could provide some function such as observation of copy content, access control of user. RFID tag adhered to small storage device prevent carrying out of item using the position tracking function and control carrying-in and carrying-out of material efficiently. magnetic card and smart card have been doing good job in identification and control of person, but RFID can do above functions. RFID is very useful device but we should consider the prevention of privacy during its application.

  • PDF

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

Mobile Contents Transformation System Research for Personalization Service (개인화 서비스를 위한 모바일 콘텐츠 변환 시스템 연구)

  • Bae, Jong-Hwan;Cho, Young-Hee;Lee, Jung-Jae;Kim, Nam-Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.119-128
    • /
    • 2011
  • The Sensor technology and portable device capability able to collect recent user information and the information about the surrounding environment haven been highly developed. A user can be made use of various contents and the option is also extending with this technology development. In particular, the initial portable device had simply a call function, but now that has evolved into 'the 4th screen' which including movie, television, PC ability. also, in the past, a portable device to provided only the services of a SMS, in recent years, it provided to interactive video service, and it include technology which providing various contents. Also, it is rising as media which leading the consumption of contents, because it can be used anytime, anywhere. However, the contents available for the nature of user's handheld devices are limited. because it is very difficult for making the contents separately according to various device specification. To find a solution to this problem, the study on one contents from several device has been progressing. The contents conversion technology making use of the profile of device out of this study comes to the force and profile study has been progressing for this. Furthermore, Demand for a user is also increased and the study on the technology collecting, analyzing demands has been making active progress. And what is more, Grasping user's demands by making use of this technology and the study on the technology analyzing, providing contents has been making active progress as well. First of all, there is a method making good use of ZigBee, Bluetooth technology about the sensor for gathering user's information. ZigBee uses low-power digital radio for wireless headphone, wireless communication network, and being utilized for smart energy, automatic home system, wireless communication application and wireless sensor application. Bluetooth, as industry standards of PAN(Personal Area Networks), is being made of use of low power wireless device for the technology supporting data transmission such as drawing file, video file among Bluetooth device. With analyzing the collected information making use of this technology, it utilizes personalized service based on network knowledge developed by ETRI to service contents tailor-made for a user. Now that personalized service builds up network knowledge about user's various environments, the technology provides context friendly service constructed dynamically on the basis of this. The contents to service dynamically like this offer the contents that it converses with utilizing device profile to working well. Therefore, this paper suggests the system as follow. It collects the information, for example of user's sensitivity, context and location by using sensor technology, and generates the profile as a means of collected information as sensor. It collects the user's propensity to the information by user's input and event and generates profile in the same way besides the gathered information by sensor. Device transmits a generated profile and the profile about a device specification to proxy server. And proxy server transmits a profile to each profile management server. It analyzes profile in proxy server so that it selects the contents user demand and requests in contents server. Contents server receives a profile of user portable device from device profile server and converses the contents by using this. Original source code of contents convert into XML code using the device profile and XML code convert into source code available in user portable device. Thus, contents conversion process is terminated and user friendly system is completed as the user transmits optimal contents for user portable device.