• Title/Summary/Keyword: software system

Search Result 12,099, Processing Time 0.049 seconds

Design and Implementation of Ultra-Long-Range LoRa Communication Module (초장거리 LoRa 통신 모듈 설계 및 구현)

  • Kim, Dong-Hyun;Huh, Jun-Hwan;Lee, Chang-Hong;Kim, Kwang-Deok;Kim, Jong-Deok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.2
    • /
    • pp.230-238
    • /
    • 2022
  • Internet of Things(IoT) is a communication technology that collects information of object remotely and controls the function of object by adding a communication function to object that does not have a communication function. For the IoT, various communication technologies such as Wi-Fi, 3GPP, and Bluetooth are available, and Long Range(LoRa) is communication technologies specialized in the IoT concept. LoRa is a communication technology that support long-distance, low-power, and low-speed communication, and is suitable for collecting information generated form object in remote equipment and controlling equipment. Because of these characteristics, it is used in many application field, and various performance improvement studies are in progress. This paper intends to propose an ultra-long-range LoRa communication module that can be used in a wider range of applications. We design and implement hardware, firmware, and application software for testing to develop ultra-long-range LoRa communication modules. The implemented module will be tested in a real environment to verify its performance and to check its utilization.

Experience of Disaster Response Team in Jecheon Sports Center Fire

  • Ha, Jeongmin;Kim, Hyun-Jung;Kim, Jin-Hwa;Park, Dahye
    • Journal of The Korean Society of Integrative Medicine
    • /
    • v.10 no.1
    • /
    • pp.39-48
    • /
    • 2022
  • Purpose : This study aimed to determine the experiences of the disaster response team 9 participants who participated in the disaster after the fire incident occurred in Jecheon Sports Center and their meaning and essence. Methods : Nine disaster response teams were the subjects of the study, and Individual in-depth interviews were conducted. Data were collected online between January 6 and April 30, 2021, from the software ZoomTM. This study was conducted as a qualitative study by applying Giorgi's phenomenological experiential research method, which has an advantage in revealing the essential structure and meaning of experience. Results : Three major themes were derived from the study results: the stimulus through unfamiliar experiences, the grievances due to work environment and regional characteristics, and dullness resulting from hiding and enduring. The following 17 sub-themes were identified: learning through unfamiliar experiences, frustration due to unexpected circumstances, shock from unfamiliar experiences, doing my best in the present, confidence due to increased experience, disunified system, intervention of various interests, the atmosphere that puts responsibility on others, inactive help, unforgettable regional characteristics, working without time to settle, tolerating it in my own way, memories left in the unconsciousness, sudden suffering from memories that come to mind, movement in anxiety and tension, dullness, work with colleagues in the same situation. Conclusion : This study is meaningful in that it attempted to provide basic data in preparing a long-term strategy for effective policy direction and institutional protection based on the systematic mental health management of the disaster response team. Additionally, this study's results can be used as primary data for future research among Disaster Response Team.

Learning Source Code Context with Feature-Wise Linear Modulation to Support Online Judge System (온라인 저지 시스템 지원을 위한 Feature-Wise Linear Modulation 기반 소스코드 문맥 학습 모델 설계)

  • Hyun, Kyeong-Seok;Choi, Woosung;Chung, Jaehwa
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.11 no.11
    • /
    • pp.473-478
    • /
    • 2022
  • Evaluation learning based on code testing is becoming a popular solution in programming education via Online judge(OJ). In the recent past, many papers have been published on how to detect plagiarism through source code similarity analysis to support OJ. However, deep learning-based research to support automated tutoring is insufficient. In this paper, we propose Input & Output side FiLM models to predict whether the input code will pass or fail. By applying Feature-wise Linear Modulation(FiLM) technique to GRU, our model can learn combined information of Java byte codes and problem information that it tries to solve. On experimental design, a balanced sampling technique was applied to evenly distribute the data due to the occurrence of asymmetry in data collected by OJ. Among the proposed models, the Input Side FiLM model showed the highest performance of 73.63%. Based on result, it has been shown that students can check whether their codes will pass or fail before receiving the OJ evaluation which could provide basic feedback for improvements.

The Effects of Maintained Muscle Contraction of Abdominal and Pelvic Floor Muscles on 3D Pelvic Stability in Individuals with Chronic Low Back Pain During Gait

  • Yu, Min;Choi, Yu-Ri;Choi, Jeong-Eun;Jeon, Seong-Yeon;Kim, Yong-Wook
    • Journal of the Korean Society of Physical Medicine
    • /
    • v.17 no.3
    • /
    • pp.23-30
    • /
    • 2022
  • PURPOSE: This study was designed to investigate the effects of keeping contraction of abdominal and pelvic floor muscles on 3D pelvic stability in individuals with nonspecific chronic low back pain (CLBP) during normal speed walking. METHODS: The subjects were 20 adults with CLBP deformity and had moderate pain intensity of the visual analog scale. A three-dimensional camera capture system was used to collect kinematic pelvic motion data with and without contraction of the abdominal and pelvic floor muscles during gait. The subjects were asked to walk on a walkway in the lab room and they were attached 40 reflective markers to their pelvic segment and lower extremities. A Visual3D Professional V6 program and Vicon Nexus software were used to analyze 3D pelvic kinematic data. RESULTS: There were significant differences between with and without contraction of the abdominal and pelvic floor muscles of the pelvic depression and the total pelvic motion in coronal plane during gait (p < .05). However, there were no significant differences in any of the maximal motion of the pelvic segment in sagittal and transverse motion plane according to the different muscle contraction conditions (p > .05). CONCLUSION: The results of this study suggest that maintaining co-contraction of the abdominal and pelvic floor muscles in individuals with CLBP increased pelvic stability and contributed to preventing excessive pelvic movements during gait.

Efficient Graph Construction and User Movement Path for Fast Inspection of Virus and Stable Management System

  • Kim, Jong-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.8
    • /
    • pp.135-142
    • /
    • 2022
  • In this paper, we propose a graph-based user route control for rapidly conducting virus inspections in emergency situations (eg, COVID-19) and a framework that can simulate this on a city map. A* and navigation mesh data structures, which are widely used pathfinding algorithms in virtual environments, are effective when applied to CS(Computer science) problems that control Agents in virtual environments because they guide only a fixed static movement path. However, it is not enough to solve the problem by applying it to the real COVID-19 environment. In particular, there are many situations to consider, such as the actual road traffic situation, the size of the hospital, the number of patients moved, and the patient processing time, rather than using only a short distance to receive a fast virus inspection.

A Method for Effective Mobile Electronic Notification Service of Private Institutions

  • Kim, JongBae
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.194-200
    • /
    • 2022
  • Traditionally, postal services that produce and deliver paper-based notices have been the mainstream. The reason is that it has the function of distribution and proof of delivery in the postal delivery system as well as the advantage of information delivery through postal delivery. After all, for the purpose of distribution and proof of delivery, many organizations use paper-based postal notices. However, in recent years, it has been in the spotlight to produce a paper-based postal notice as an electronic notice and deliver information to a mobile device through the Internet. In this paper, we propose a safe interworking method for user identification information required for private institutions to transmit mobile electronic notices. In order for a private institution to accurately deliver an electronic notice to a mobile service subscriber, a means to confirm whether the private institution and the mobile device subscriber are the same person is required. In the mobile electronic notification service, the connecting information provided by the personal identity proofing agency is used as a means of user identification. Connecting information is called a resident registration number on the Internet and is one-way hash information that can only be created by the personal identity proofing agency designated by the government. In order to transmit a mobile electronic notice, it is necessary to share connecting information for the same user identification between the institution that requests the sending of the electronic notice and the institution that processes the sending of the electronic notice. Connecting information is personal information that can uniquely identify a user, and if it is disclosed, damage such as personal information infringement may occur. As such, it is necessary to prevent problems that may arise from misuse and abuse of connecting information as well as increase in the benefits of sending the mobile electronic notice. In this paper, a safe and effective mobile electronic notification service can be performed by suggesting a method for safe interworking of information related to the mobile electronic notification service.

Integrating Resilient Tier N+1 Networks with Distributed Non-Recursive Cloud Model for Cyber-Physical Applications

  • Okafor, Kennedy Chinedu;Longe, Omowunmi Mary
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.7
    • /
    • pp.2257-2285
    • /
    • 2022
  • Cyber-physical systems (CPS) have been growing exponentially due to improved cloud-datacenter infrastructure-as-a-service (CDIaaS). Incremental expandability (scalability), Quality of Service (QoS) performance, and reliability are currently the automation focus on healthy Tier 4 CDIaaS. However, stable QoS is yet to be fully addressed in Cyber-physical data centers (CP-DCS). Also, balanced agility and flexibility for the application workloads need urgent attention. There is a need for a resilient and fault-tolerance scheme in terms of CPS routing service including Pod cluster reliability analytics that meets QoS requirements. Motivated by these concerns, our contributions are fourfold. First, a Distributed Non-Recursive Cloud Model (DNRCM) is proposed to support cyber-physical workloads for remote lab activities. Second, an efficient QoS stability model with Routh-Hurwitz criteria is established. Third, an evaluation of the CDIaaS DCN topology is validated for handling large-scale, traffic workloads. Network Function Virtualization (NFV) with Floodlight SDN controllers was adopted for the implementation of DNRCM with embedded rule-base in Open vSwitch engines. Fourth, QoS evaluation is carried out experimentally. Considering the non-recursive queuing delays with SDN isolation (logical), a lower queuing delay (19.65%) is observed. Without logical isolation, the average queuing delay is 80.34%. Without logical resource isolation, the fault tolerance yields 33.55%, while with logical isolation, it yields 66.44%. In terms of throughput, DNRCM, recursive BCube, and DCell offered 38.30%, 36.37%, and 25.53% respectively. Similarly, the DNRCM had an improved incremental scalability profile of 40.00%, while BCube and Recursive DCell had 33.33%, and 26.67% respectively. In terms of service availability, the DNRCM offered 52.10% compared with recursive BCube and DCell which yielded 34.72% and 13.18% respectively. The average delays obtained for DNRCM, recursive BCube, and DCell are 32.81%, 33.44%, and 33.75% respectively. Finally, workload utilization for DNRCM, recursive BCube, and DCell yielded 50.28%, 27.93%, and 21.79% respectively.

Contact Tracking Development Trend Using Bibliometric Analysis

  • Li, Chaoqun;Chen, Zhigang;Yu, Tongrui;Song, Xinxia
    • Journal of Information Processing Systems
    • /
    • v.18 no.3
    • /
    • pp.359-373
    • /
    • 2022
  • The new crown pneumonia (COVID-19) has become a global epidemic. The disease has spread to most countries and poses a challenge to the healthcare system. Contact tracing technology is an effective way for public health to deal with diseases. Many experts have studied traditional contact tracing and developed digital contact tracking. In order to better understand the field of contact tracking, it is necessary to analyze the development of contact tracking in the field of computer science by bibliometrics. The purpose of this research is to use literature statistics and topic analysis to characterize the research literature of contact tracking in the field of computer science, to gain an in-depth understanding of the literature development status of contact tracking and the trend of hot topics over the past decade. In order to achieve the aforementioned goals, we conducted a bibliometric study in this paper. The study uses data collected from the Scopus database. Which contains more than 10,000 articles, including more than 2,000 in the field of computer science. For popular trends, we use VOSviewer for visual analysis. The number of contact tracking documents published annually in the computer field is increasing. At present, there are 200 to 300 papers published in the field of computer science each year, and the number of uncited papers is relatively small. Through the visual analysis of the paper, we found that the hot topic of contact tracking has changed from the past "mathematical model," "biological model," and "algorithm" to the current "digital contact tracking," "privacy," and "mobile application" and other topics. Contact tracking is currently a hot research topic. By selecting the most cited papers, we can display high-quality literature in contact tracking and characterize the development trend of the entire field through topic analysis. This is useful for students and researchers new to field of contact tracking ai well as for presenting our results to other subjects. Especially when comprehensive research cannot be conducted due to time constraints or lack of precise research questions, our research analysis can provide value for it.

Examining Driver Compliance Behaviour at Signalised Intersection for Developing Conceptual Model of Driving Simulation

  • Osman, Aznoora;Wahab, Nadia Abdul;Fauzi, Haryati Ahmad;Ibrahim, Norfiza;Ilyas, Siti Sarah Md;Seman, Azmi Abu
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.163-171
    • /
    • 2022
  • A conceptual model represents an understanding of a system that is going to be developed, which in this research, a driving simulation software to study driver behavior at signalised intersections. Therefore, video observation was conducted to examine driver compliance behaviour within the dilemma zone at signalised intersection, pertaining to driver's distance from the stop line during yellow light interval. The video was analysed using Thematic Analysis and the data extracted from it was analysed using Chi-Square Independent Test. The Thematic Analysis revealed two major themes which were traffic situation and driver compliance behaviour. Traffic situation is defined as traffic surrounding the driver, such as no car in front and behind, car in front, and car behind. Meanwhile, the Chi-Square Test result indicates that within the dilemma zone, there was a significant relationship between driver compliance behaviour and driver's distance from the stop line during yellow light interval. The closer the drivers were to the stop line, the more likely they were going to comply. In contrast, drivers showed higher noncompliant behavior when further away from stop line. This finding could help us in the development of conceptual model of driving simulation with purpose of studying driver behavior.

The algorithm design and the test bed construction method of processing for periodic delayed data (주기적 지연 데이터 처리를 위한 알고리즘 설계 및 테스트 베드 구축 방법)

  • Sang-hoon Koh;Ho-jin Song;Nam-ho Keum;Pil-joong Yoo;Se-kwon Oh;Young-sung Kim
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.1
    • /
    • pp.102-110
    • /
    • 2023
  • The MATS(Missile Assembly Test Set) is manufactured and used to check the function of the missile during the period of development for the guided missile system, and the requirements for power and communication are managed for equipment production. The MATS developer implements software according to the proposed communication standard to guarantee the reliability of the data that communicates with the guided missile. The test bed is built and self-performance evaluation is performed after implementation. And the verification process is performed using the standard equipment. The characteristics of periodic delay for data transmission must be reflected when building a test bed. This paper describes a test bed construction method for data processing with periodic delay. Also This paper compares and evaluates the performance by changing the previously designed algorithm.