• Title/Summary/Keyword: users' IT capability

Search Result 160, Processing Time 0.025 seconds

Development of RFID Middleware with Business Process Logic Representation Capability (비즈니스 프로세스 로직 표현을 지원하는 RFID 미들웨어 개발)

  • Park, Chul-Soon;Bae, Sung-Moon;Lu, Gao
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.31 no.3
    • /
    • pp.80-89
    • /
    • 2008
  • Because of different hardware specifications, there are no unified protocol commands to use with various kinds of RFID readers. The current commercial RFID middlewares do not satisfy the various requirements from users to support business process logic representation. The EPCglobal, which is leading organization for the RFID research, suggested a RFID middleware architecture which is called ALE(Application Level Events) standard. However, their architecture also does not provide the application level's interfaces. Therefore, a new RFID middleware architecture is required to provide basic RFID functions, conform to ALE's specification and, additionally, support application level's business logic representation. This paper proposes a ALE-based RFID middleware architecture which provides business process logic representation. At first, the basic RFID control functionalities are identified. Secondly, the business process logic requirements in RFID applications are identified and classified Into six categories. Third, the Middelware architecture is implemented with Java and XML technology so that it can easily extended to support the various RFID hardware's protocols. Finally, an example RFID prototype system is developed to show the proposed architecture's feasibility and validate it. The proposed middleware is expected to be used In various application areas since it is using XML technology for easy adaptation and it also con- forms to ALE interface which is standard specification.

On Multiple ETA-based Test Framework to Enhance Safety Maturity of Live Fire Tests for Weapon Systems (무기체계 실사격 시험의 안전성 강화를 위한 다중 사건나무분석 기반의 시험구조에 관한 연구)

  • Ye, Sung Hyuck;Lee, Jae-Chon
    • Journal of the Korea Safety Management & Science
    • /
    • v.17 no.1
    • /
    • pp.75-84
    • /
    • 2015
  • Successful development of weapon systems requires a stringent verification and validation (V&V) process due to the nature of the weapons in which continual increase of operational capability makes the system requirements more complicated to meet. Thus, test and evaluation (T&E) of weapon systems is becoming more difficult. In such a situation, live fire tests appear to be effective and useful methods in not only carrying out V&V of the weapon systems under development, but also increasing the maturity of the end users operability of the system. However, during the process for live fire tests, a variety of accidents or mishaps can happen due to explosion, pyro, separation, and so on. As such, appropriate means to mitigate mishap possibilities should be provided and applied during the live fire tests. To study a way of how to accomplish it is the objective of this paper. To do so, top-level sources of hazard are first identified. A framework for T&E is also described. Then, to enhance the test range safety, it is discussed how test scenarios can be generated. The proposed method is based on the use of the anticipatory failure determination (AFD) and multiple event tree analysis (ETA) in analyzing range safety. It is intended to identify unexpected hazard components even in the environment with constraints. It is therefore expected to reduce accident possibilities as an alternative to the traditional root-cause analysis.

MITM Attack on Bluetooth Pairing in Passkey Entry Mode and Its Countermeasure (블루투스 Passkey Entry 인증 모드에 대한 MITM 공격과 대응방법)

  • Lee, Jearyong;Choi, Wonsuk;Lee, DongHoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.481-490
    • /
    • 2016
  • Bluetooth utilizes a symmetric key that is exchanged at the first pairing to establish a secure channel. There are four authentication modes which enables device authentication, Just work, Passkey Entry, Out of Band, and Numeric Comparison. Up to now, Just work has been considered as the authentication mode that is vulnerable to Man-In-The-Middle (MITM) Attack. In addition, it is possible to intentionally change any authentication mode to Just work mode, in order to succeed in MITM Attack under Just work mode. However, this kind of attacks have just worked under the assumption that users should not notice that authentication mode was changed. In this paper, We analyze the specification of Secure Simple Pairing, LE Legacy Pairing and LE Secure Connection Pairing. When using Passkey Entry mode on each approach, it seems the MITM attack is possible. Also it offers Passkey Entry MITM attack that does not require assumptions about the user's fault, because it isn't change verification process of the authentication mode unlike traditional attacks. We implement the proposed MITM attacks. Also we presents a scenario in which an attack can be exploited and a countermeasure.

A Comparative Analysis Model of Overcrowded Spaces Considering the Evacuation Behavior of Users in Women's Hospital (여성전문병원에서 이용자의 피난행태를 고려한 과밀화 공간 비교분석모델 연구)

  • Jung, Chaemin;Kweon, Jihoon
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.28 no.1
    • /
    • pp.41-51
    • /
    • 2022
  • Purpose: The purpose of this study is to compare variant analysis results regarding overcrowded spaces and suggest a space analysis model for women's hospitals at the outpatient clinic department, central treatment department, and inpatient ward considering evacuation capability of newborns unable to perform automotive evacuation, pregnant patients and maternal patients with limited mobility. Methods: Firstly, precedent studies on women's hospitals and evacuation in hospitals were reviewed. Secondly, the analysis conditions and necessary set values for simulation were designed after analyzing the design documents of the research target hospital. Thirdly, evacuation simulation was conducted by adjusting the variables related to the evacuation behavior of inpatients and newborns. Fourthly, based on the derived results, overcrowded spaces were compared and analyzed according to evacuation behavior. Result: The study results are as follows: (1) It is necessary to check the main escape routes for occupants and to expand and adjust the size of mainly used entrances. (2) It is necessary to widen the stairs' width to alleviate overcrowding caused by patients with non-autonomous walking. (3) Due to overcrowding of the main escape route, it is necessary to identify the bypass route and adjust the width of the corridor. (4) It is necessary to plan an evacuation route for newborns to escape from the main escape route for occupants. Implications: The study result is expected to be used as primary data for research that considers the evacuation behavior of newborns and pregnant women in women's hospitals.

Distributed Edge Computing for DNA-Based Intelligent Services and Applications: A Review (딥러닝을 사용하는 IoT빅데이터 인프라에 필요한 DNA 기술을 위한 분산 엣지 컴퓨팅기술 리뷰)

  • Alemayehu, Temesgen Seyoum;Cho, We-Duke
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.12
    • /
    • pp.291-306
    • /
    • 2020
  • Nowadays, Data-Network-AI (DNA)-based intelligent services and applications have become a reality to provide a new dimension of services that improve the quality of life and productivity of businesses. Artificial intelligence (AI) can enhance the value of IoT data (data collected by IoT devices). The internet of things (IoT) promotes the learning and intelligence capability of AI. To extract insights from massive volume IoT data in real-time using deep learning, processing capability needs to happen in the IoT end devices where data is generated. However, deep learning requires a significant number of computational resources that may not be available at the IoT end devices. Such problems have been addressed by transporting bulks of data from the IoT end devices to the cloud datacenters for processing. But transferring IoT big data to the cloud incurs prohibitively high transmission delay and privacy issues which are a major concern. Edge computing, where distributed computing nodes are placed close to the IoT end devices, is a viable solution to meet the high computation and low-latency requirements and to preserve the privacy of users. This paper provides a comprehensive review of the current state of leveraging deep learning within edge computing to unleash the potential of IoT big data generated from IoT end devices. We believe that the revision will have a contribution to the development of DNA-based intelligent services and applications. It describes the different distributed training and inference architectures of deep learning models across multiple nodes of the edge computing platform. It also provides the different privacy-preserving approaches of deep learning on the edge computing environment and the various application domains where deep learning on the network edge can be useful. Finally, it discusses open issues and challenges leveraging deep learning within edge computing.

A Hybrid Generation Method of Visual Effects for Mobile Entertainment Applications (모바일 엔터테인먼트 애플리케이션을 위한 혼합적 시각 효과 생성 방법)

  • Kim, Byung-Cheol
    • Journal of Digital Convergence
    • /
    • v.13 no.12
    • /
    • pp.367-380
    • /
    • 2015
  • This paper proposes a hybrid rendering method which combines pre-computed global illumination results and interactive local illumination techniques and thus could interactively produce photo-realistic visual effects for mobile entertainment applications. The proposed method uses the programmable shading capability of OpenGL, a de facto standard for computer graphics library so that it can be deployed in a real-world development environment. Also, it increases the rendering time by a negligible amount compared to normal rendering time since the pre-computed results are used as operands of plain arithmetic operations. Therefore it is expected to be applicable in practice for mobiles games which require real-time responsiveness to users.

Improvement of Handoff-state and QOS in Wireless Environment

  • Jeong, You-Sun;Choe, U-Gin
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.1
    • /
    • pp.1-5
    • /
    • 2010
  • In this paper, we propose for improving QoS in wireless micro cellular network using Cellular-IP/PRC(Paging Route Cache) with Paging Cache and Route Cache in Cellular-IP and propose for performance of realtime and non-real time handoff service using Handoff state machine Paging Route Cache. Although the Cellular-IP/PRC technology is devised for mobile internet communication, it bas its vulnerability in frequent handoff environment. On the other hand, Cellular IP combines the capability of cellular networks to provide high performance handoff and efficient location management of active and idle mobile users with the inherent flexibility, robustness and scalability found in IP networks. Also Cellular-IP/PRC use semi-soft handoff. During semi-soft hand off a mobile host may be in contact with either of the old and new base stations and receive packets from them. Packets intended to the mobile node are sent to both base stations and buffered, so when the mobile host eventually moves to the new location it can continue to receive packets without interruption. It should be suitable for realtime service such as multimedia traffic. But, much waste of resource will occur in this method, especially for non-real time services such as FTP and E-mail. Therefore, a new algorithm that performs different handoff according to characteristic of each traffic by use of reserved field in IP packet is proposed in this thesis. This hand off state machine using differentiated handoff improves quality of services in Cellular-IP/PRC. Suggested algorithm shows better performance than existing technology in wireless mobile internet communication environment. Matlab simulation results are improving QoS, show call drop and call blocking provided to Paging Router Cache during handoff state machine in Cellular-IP/PRC.

Visual Tactility in Web-based Digital Contents (웹기반 디지털 콘텐츠에서의 시각적 촉각성 연구)

  • Kim, Hyo-Joong;Park, Soo-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.4
    • /
    • pp.121-131
    • /
    • 2011
  • Visual tactility implies feelings of touch through sight. To be exact, the eyes are doing the touch rather than the body and the subject concerned will experience the sensation of touch by looking at an object similar to that of physical touch. This is quasi tactility to put it simply and it can be defined as to touch with the eyes. This can not only provide opportunities to experience something close to reality but also another completely different form of modern experience. Experiencing visual tactility through the use of the web permits lavish communication between the user and the designer. This paper has reorganize the concept of visual tactility, characteristic and way to use in digital contents. Visual tactility stimulates the users' emotion as such. If it was to be utilized to develop edutainment contents or web sites will foster children's capability to develope problem solving skills and raise efficiency in creative learning, and prolong the period of concentration in order to encourage revisits to the place and extend the time of stay.

Research of Historic Knowledge Based Traditional Korean Medicine(TKM) Database System (한의학지식정보자원 DB구축에 있어서 지식고고학적 가중치부여의 의의와 실제적용방안 연구)

  • Oh, Jun-Ho;Ahn, Sang-Woo;Kim, Nam-Il;Cha, Wung-Seok
    • Korean Journal of Oriental Medicine
    • /
    • v.16 no.1
    • /
    • pp.69-84
    • /
    • 2010
  • It is the well-known truth that processing of raw information is needed to a certain extent during information search. Especially for Oriental Medical information, it becomes much clearer that even more complex processing is necessary. As a means of reducing such complexity, this study suggests a way to understand effectively the organic relationships among information found on the interface. In this process, 'knowledge-based archaeological' method has been used. A new concept of interface observed by this research is the study of a system which contains realistically considered knowledge-based archaeological and historical specificity. These models are organized so that search results could be materialized in different tree-structured interface models, which can help one understand the relationships among wanted search results at one glance and confirm the details of those results via mouse click. Strength of the vertical tree structure resides in its capability of suggesting its users clear historical relationship between separate Oriental medical information. The horizontal tree structure enables deeper understanding of sectional interrelationship of searched information. The strength of the prescription tree structure is that it helps one understand the lineage of prescriptions, as Oriental medicinal treatment is often summarized into changes in prescriptions.

Electronic-Composit Consumer Sentiment Index(CCSI) development by Social Bigdata Analysis (소셜빅데이터를 이용한 온라인 소비자감성지수(e-CCSI) 개발)

  • Kim, Yoosin;Hong, Sung-Gwan;Kang, Hee-Joo;Jeong, Seung-Ryul
    • Journal of Internet Computing and Services
    • /
    • v.18 no.4
    • /
    • pp.121-131
    • /
    • 2017
  • With emergence of Internet, social media, and mobile service, the consumers have actively presented their opinions and sentiment, and then it is spreading out real time as well. The user-generated text data on the Internet and social media is not only the communication text among the users but also the valuable resource to be analyzed for knowing the users' intent and sentiment. In special, economic participants have strongly asked that the social big data and its' analytics supports to recognize and forecast the economic trend in future. In this regard, the governments and the businesses are trying to apply the social big data into making the social and economic solutions. Therefore, this study aims to reveal the capability of social big data analysis for the economic use. The research proposed a social big data analysis model and an online consumer sentiment index. To test the model and index, the researchers developed an economic survey ontology, defined a sentiment dictionary for sentiment analysis, conducted classification and sentiment analysis, and calculated the online consumer sentiment index. In addition, the online consumer sentiment index was compared and validated with the composite consumer survey index of the Bank of Korea.