• Title/Summary/Keyword: university revolution

Search Result 2,170, Processing Time 0.033 seconds

Development of Proportional Valve Actuator Controller for Industrial Site (산업용 밸브 액추에이터 비례제어 컨트롤러 개발)

  • Park, Han Young;Kim, Jin Young;Ahn, Sung Soo;Kang, Joonhee
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.5
    • /
    • pp.269-274
    • /
    • 2013
  • To proportionally control the electronic valve position of the actuator, we designed and fabricated PCU, CPT, and rotary absolute optical encoder for the detection of absolute angular position in the actuator. We also designed and constructed the test system by using DAQ hardware and Labview. We designed PCU to convert 1-5 V, 0-5 V, 0-10 V, 2-10 V voltage signals and 4-20 mA current signals to the voltage signals in the common 0.5-2.5 V range. We designed CPT to output 4-20 mA current signals corresponding to the valve positions based on the PWM signal input from the MCU. We also designed 20 bit optical encoder by using infrared LED and infrared transistor and made the serial communication with the main board possible. When we tested PCU and CPT with DAQ hardware and Labview software, they operated correctly with the small errors within ${\pm}0.003$ V and ${\pm}0.01$ mA, respectively, showing that our actuator has the excellent performance to employ as the industrial proportional-valve-actuator. The resolution of the encoder was $11.25^{\circ}$ and the maximum revolution to detect was 32,768.

Effects of FIN-TECH use motivation on User Attitude and Word Of Mouth Intention: Focus on a Innovation Resistance Tendency and Type of Message (Rational, Emotional) (핀테크 이용 동기에 따른 이용자 태도와 구전의도의 관계 - 혁신저항과 메시지 유형의 조절효과 -)

  • Seol, Sang-Cheol;Jung, Sung-Gwang;Choi, Woo-Young
    • Management & Information Systems Review
    • /
    • v.36 no.5
    • /
    • pp.195-222
    • /
    • 2017
  • Today's economy is becoming more and more convergence between different industries as the demarcation of the boundaries of all areas is leading to innovations such as mobile and social network services. So Fin-tech is a new technology that can combine the advantages of mobile and Internet with the technology revolution to easily handle financial and IT tasks. This Fin-tech is a compound word of finance and technology. The purpose of this study is to investigate the overall structural relationship between Fin-Tech use motivation (usefulness, enjoyment) on user attitude and word of mouth intention. In addition, we investigated how FinTech use motivation, user attitude, and word of mouth intention change according to innovation resistance tendency. And, we examined how the motivation, user attitude, and word of mouth intention of FinTech change according to the message type (rational and emotional). The main results of this study are as follows. First, the usefulness and enjoyment of motivation for using FinTech have a positive effect on user attitude, and user attitude also has a positive effect on word of mouse intention. Second, the relationship between FinTech use motivation, user attitude, and word of mouth intention was found to difference according to consumers' innovation resistance. Third, it was found that the relationship between FinTech use motivation, user attitude, and word of mouth intention differs according to type of message (rational, emotional). At the conclusion of the study, the summary of the research results, implications and limitations, and future research direction are described.

Hash-chain-based IoT authentication scheme suitable for small and medium enterprises (중소기업 환경에 적합한 해쉬 체인 기반의 IoT 인증 기법)

  • Jeong, Yoon-Su;Yon, Yong-Ho;Ku, Jin-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.4
    • /
    • pp.105-111
    • /
    • 2017
  • With the emergence of the fourth industrial revolution, more and more attempts have been made to apply IoT technology to the manufacturing process and launch the product. In this paper, we propose IoT authentication scheme based on hash chain which can easily apply IoT device to small and medium enterprises in Korea. In the proposed method, the companies that installed IoT devices suitable for the manufacturing environment are selected to maintain the linkage between IoT devices so that product information and release information can be efficiently collected and managed during the entire manufacturing process. In addition, the proposed scheme is characterized in that it does not require an additional encryption / decryption algorithm because the authentication information of the IoT device is constructed based on a hash chain. As a result of the performance evaluation, the efficiency of the manufacturing process was improved by 18.5% and the processing of the manufacturing process with the IoT device was shortened by 20.1% on the average according to the application of the IoT device. In addition, the labor cost reduction costs in the manufacturing process decreased by an average of 30.7%.

A Study on the Privacy Awareness through Bigdata Analysis (빅데이터 분석을 통한 프라이버시 인식에 관한 연구)

  • Lee, Song-Yi;Kim, Sung-Won;Lee, Hwan-Soo
    • Journal of Digital Convergence
    • /
    • v.17 no.10
    • /
    • pp.49-58
    • /
    • 2019
  • In the era of the 4th industrial revolution, the development of information technology brought various benefits, but it also increased social interest in privacy issues. As the possibility of personal privacy violation by big data increases, academic discussion about privacy management has begun to be active. While the traditional view of privacy has been defined at various levels as the basic human rights, most of the recent research trends are mainly concerned only with the information privacy of online privacy protection. This limited discussion can distort the theoretical concept and the actual perception, making the academic and social consensus of the concept of privacy more difficult. In this study, we analyze the privacy concept that is exposed on the internet based on 12,000 news data of the portal site for the past one year and compare the difference between the theoretical concept and the socially accepted concept. This empirical approach is expected to provide an understanding of the changing concept of privacy and a research direction for the conceptualization of privacy for current situations.

A Study on the Measures to Activate Education Field of Maker Movement in Korea (국내 메이커 운동의 교육 분야 활성화 방안 연구)

  • Oh, Soo-Jin;Baek, Yun-Cheol;Kwon, Ji-Eun
    • Journal of Digital Convergence
    • /
    • v.17 no.11
    • /
    • pp.483-492
    • /
    • 2019
  • The culture and education are very active with the active policy and support to form the government's Maker Movement. The purpose of this study is to grasp the current status of the education sector of the domestic maker movement, which is increasing recently, and to propose a plan for activating maker education for the development of a positive direction. To this end, first, the current status and problems of domestic maker training are derived through in-depth interviews with existing maker training operators and participants. Second, based on the contents of the interview script, keyword analysis and its characteristics through the qualitative survey analysis program (NVIVO) are identified. Third, based on the analysis results, we propose a plan and development direction for domestic maker education. Based on the educators who performed maker training and the students involved, professional maker teachers were required for the professionalism of education, and the expansion of maker channels and professional networking of participating students was required. In addition, there was a need for specialized programs and appropriate policy support that reflected the characteristics of maker training. This study aims at contributing to the activation of maker education, which is a major field of maker movement, by helping to improve concrete support methods, training related educators, and educational environment for maker education.

Transponder and Ground Station Systems for Drones

  • Kim, Ki-Su;Ha, Heon-Seong;Lee, Jong-Chan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.6
    • /
    • pp.9-15
    • /
    • 2020
  • In this paper, we propose a case that drone (unmanned aerial vehicle), one of the representative technologies of the 4th Industrial Revolution, threatens airport safety and privacy infringement, and describes a drone control system proposal to solve the problem. Unmanned aerial vehicle (Drone) is creating a serious problem recently, In Korea, on May 21, 19, according to the Jeju Regional Aviation Administration, drones flew over Jeju Jeongseok Airfield twice in the same month, causing problems in aircraft operation. In overseas cases, two drones near the runway of Gatwick International Airport in the UK There has been a disturbance in which the takeoff and landing of the aircraft flies for a while, and various problems have occurred, such as voyeuring the private life of an individual using a drone. This paper is equipped with an Acess Point transponder mounted on a drone (unmanned aerial vehicle), and unspecified many who want to receive flight information (coordinates, altitude, and obstacles) of the drone access the drone AP, receive and receive the flight information of the drone, and receive unspecified multiple Drone AP flight information is collected and collected to provide the information of the drone currently floating on one user interface screen. In addition, an AP transponder is proposed to operate a safe drone (unmanned aerial vehicle) and the drone's flight information is transmitted., To receive and collect and collect data.

Analysis of the Minimum Distance of Small and Medium-Sized Fishing Vessels near Busan Port (어선 점용면적 기초 연구를 위한 부산항 중·소형 어선의 통항 이격거리 조사 및 분석)

  • Park, Hyungoo;Kim, Hyundong;Park, Young-soo;Kim, Dae-won;Park, Sangwon
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.27 no.6
    • /
    • pp.798-807
    • /
    • 2021
  • In the era of the fourth industrial revolution, Maritime Autonomous Surface Ship(MASS) are expected to emerge in the shipping industry. There has been much active research on collision avoidance systems regarding MASSs, but most of it has focused on merchant ships. A study of collision avoidance systems in fishing vessels is also essential, because Maritime Autonomous Surface Ships will encounter all type of vessels. In this study, the minimum passage distance between small-medium-sized fishing vessels and other vessels was investigated for the Ship's domain analysis. Based on the AIS data of Busan port and the adjacent area, the separation distances of fishing vessels were analyzed. The results indicated that as the speed of fishing vessels increased, the distance increased from 4L to 8L, and as length of the fishing vessels increased, the distance decreased from 10L to 6L. It is believed that the results of this study can be applied in the future to collision avoidance models for MASSs that reflect the domain of fishing vessels.

The Details and Outlook of Three Data Acts Amendment in South Korea: With a Focus on the Changes of Domestic Financial and Data Industry (데이터 3법 개정안의 내용과 전망: 국내 금융 및 데이터 산업계의 변화를 중심으로)

  • Kim, Eun-Chan;Kim, Eun-Young;Lee, Hyo-Chan;Yoo, Byung-Joon
    • Informatization Policy
    • /
    • v.28 no.3
    • /
    • pp.49-72
    • /
    • 2021
  • This study analyzes the major content, significances, and future outlook of Three Data Acts amendment enacted in August 2020 in South Korea, with the focus on their impact on the financial and data industries. It seems that the revision of the Credit Information Act will enable the specification of a business which had previously only been regulated as the business of credit inquiry, and also enable the domestic data industry to activate the MyData industry, data trading and platforms, and specify data pseudonymization and trading procedures. For the rational and efficient implementation of the amendments to the Three Data Acts, the Personal Information Protection Committee must be as transparent and lawful in its activities as possible, and fairness must be guaranteed. Even in the utilization of personal information, the development or complementation of the related data processing technologies is essential, and clear data processing methods and areas must be regulated. Furthermore, the amendments must be supported with guarantees and the systematization of a fair competitive system in the data market, stricter regulations on penalties for illegal acts related to data, establishment and strengthening of the related security systems, and reinforcement of the system of cooperation for data transfer.

Cybersecurity Architecture for Reliable Smart Factory (신뢰성 있는 스마트팩토리를 위한 사이버보안 아키텍처)

  • Kim, HyunJin;Kim, SungJin;Kim, Yesol;Kim, Sinkyu;Shon, TaeShik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.629-643
    • /
    • 2019
  • In the era of the 4th industrial revolution, countries around the world are conducting projects to rapidly expand smart factory to secure competitiveness in manufacturing industries. However, unlike existing factories where the network environment was closed, smart factories can be vulnerable because internal and external objects are interconnected and various ICT technologies are used. And smart factories are likely to be the subject of cyber-attacks that are designed to cause monetary damage to certain targets because economic damage is so serious when an accident occurs. Therefore, it is necessary to study and apply security for smart factories, but there is no specific smart factory system architecture, so there is no establish for smart factory security requirements. In order to solve these problems, this paper derives the smart factory architecture that can extract and reflect the main characteristics of a smart factory based on the domestic and foreign reference model of smart factories. And this paper identifies the security threats based on the derived smart factory architecture and present the security requirements to cope with them for contributing to the improvement of the security of the smart factory.

Understanding the Curation Service in Libraries: Is it a Revolution or an Evolution of Reference Service? (도서관에서 큐레이션 서비스에 대한 이해: 참고서비스의 혁신인가? 진화인가?)

  • Ranasinghe, W.M. Tharanga Dilruk;Chung, Jun Min
    • Journal of Korean Library and Information Science Society
    • /
    • v.50 no.2
    • /
    • pp.215-235
    • /
    • 2019
  • Popularly known to be originated in museums and art galleries, curation is widely applied in many other fields ranging from curation commerce to curated databases by today. Libraries also have started to provide different types of curation services such as data curation, digital curation, content curation, book curation, and social curation. However, the relationship between the curation service and the library service is not adequately studied and documented. The objective of this paper is to address that gap by analyzing the relationship between curation service and the library service. Particularly, this paper pays attention to study the relationship between curation service and library reference service. The research methods used by this study were an extensive literature review followed by some carefully selected real-world examples of curation services in libraries and other fields. The authors have analyzed and documented the origin and the meaning of two concepts, the challenges faced by library reference service, and the applicability of curation as a modest form of library reference service in the $21^{st}$-century. Based on the study findings, this paper concludes that curation service is not a new concept for the library but a natural evolution of the library reference service in response to the changing information environment and user expectations in the digital age.