• Title/Summary/Keyword: 단말기유형

Search Result 70, Processing Time 0.021 seconds

Design of HSE Management System in a Shipyard using object-oriented Component-Based Development Method (ooCBD방법론을 적용한 조선소의 HSE관리시스템 설계)

  • Oh, Hyun-Soo;Chang, Seong-Rok;Kim, Dong-Joon
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.19 no.1
    • /
    • pp.71-77
    • /
    • 2013
  • Smart work has been gaining more popularity recently. Smart work means that employees perform their works anytime and anywhere as utilizing the information and communication technology. It can be divided into four categories; the mobile office, the home office, the work-at-center and the tele-cooperation. Among them, the mobile office based on tablet personal computers(PCs) or smart phones, employees can exchange information with tablet PCs or smart phones via mobile radio communication networks and portable terminals. Smart devices such as tablet PCs and smart phones help to access intranet system for requests, approvals, information search whenever employees need. This mobile office system for real-time HSE managing can contribute to improve the productivity and work efficiency in a shipyard. In this study, the main goal is to design the specialized mobile application for the HSE management system on the shipbuilding industry. The mobile application including 10 functions is designed based on ooCBD(object-oriented Component Based Development) methodology.

Nscreen Service User Typology Based on Use-Diffusion and Lifestyle (사용확산 및 라이프스타일에 따른 N스크린 서비스 이용자 유형화)

  • Park, Hyun Jung
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.2
    • /
    • pp.444-454
    • /
    • 2015
  • The purpose of this study is to investigate factors related to use-diffusion of Nscreen service as well as consumers' lifestyle and media usage of Nscreen service, which is fundamentally changing both the competitive landscape for business and the daily lives of consumers. The data of 1,524 consumers used in this study were drawn from the first Korea Media Panel Study in 2012 of Korea Information Society Development Institute. This study categorized adopters depending on the usage rate of contents and the variety of media platforms they used. Consumers using various media platforms enjoyed more categories of contents provided by Nscreen services. The variety of media platforms was useful in grouping users to explain the difference between the groups in terms of lifestyle activities. Based on the factor analysis and cluster analysis based on the consumers' lifestyle to find out different characteristics of each clusters, the result elicited some implications.

Information Transfer Method of Dangerous Road Condition (도로 위험 상황의 전송 방법)

  • An, Soo-Jin;Kim, Young-Wook;Han, Min-Hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.189-197
    • /
    • 2007
  • Developed safety system which transfers danger information to rear cars for accident prevention when drivers detect a accident, a dropping or a freezing during driving on the high way. To prevent an accident, each vehicles mount OBU which is made up of a GPS unit and a transmitter-receiver and the trace of road is always renewed and saved in OBU per a regular past distance. When the driver see dangerous situation, transfer a danger pattern and a trace information by pressing button. All cars which receive information compare the received data with the original data. And then, only cars which are located at the rear in a regular distance respond and occur a warning. Performed a road test at the rate of $30{\sim}50$ kilometer a hour using two test cars which saved about 120meter's space between them were mounted OBU which had 447Mhz transceiver. As a result of the experiment, communication between test cars had no problem. Accordingly, it can use a safety driving device because driver can notice a danger situation and set themselves ready for it using this system in advance.

  • PDF

A Study on RFID System for Accessing Multiple Objects Using Encrypted ID (암호화된 ID를 이용한 다중 객체 접근 방식의 RFID 시스템 연구)

  • Jung, Jong-Jin;Kim, Ji-Yeon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.2
    • /
    • pp.80-87
    • /
    • 2008
  • RFID systems are being studied and developed in the area of the industry and marketplace. Recently RFID systems are core element of the ubiquitous technologies in individual life and industry. However, RFID systems often cause some serious problems such as violation of privacy and information security because their contactless devices communicate each other by radio frequency In this paper, we propose multiple objects RFID tag scheme including tag structure and authentication protocol. The proposed RFID tag structure maintains several object IDs of different applications in a tag memory. The tag structure allows those applications to access object IDs simultaneously. The authentication protocol for multiple objects tag is designed ta overcome the problems of security and privacy. The protocol has robustness against various attacks in low cost RFID systems. We evaluate the efficiency of proposed scheme and compare security of our scheme with several traditional schemes.

  • PDF

Analysis on Importance of Information Security Factors for Smart Work using AHP -Based on the Mobile Office for Small Businesses- (AHP를 활용한 스마트워크 정보보호 요소의 중요도 분석 -중소기업의 모바일 오피스를 중심으로-)

  • Kang, Kyung-Hoon;Lim, Chae-Hong;Lim, Jong-In;Park, Tae-Hyoung
    • Journal of Digital Convergence
    • /
    • v.11 no.3
    • /
    • pp.415-426
    • /
    • 2013
  • Smart work has recently introduced as a way to solve problems such as greenhouse gas emissions, low birth rate and aging as well as to improve productivity. Because of development of ICT infrastructure and the proliferation of smart devices, the mobile office has the most commonly used within types of smart work in Korea. But the adoption of the mobile office in small businesses is only half of that of large corporations. The security issue appears to be one of the biggest obstacles to the introduction of smart work in small businesses. Therefore, the purpose of this study is to analyze the information security factors that should be considered when the mobile office is introduced to small businesses. By analyzing the previous studies, the information security factors of the mobile office are classified 5 groups composed of 24 factors. 5 groups are terminals, applications and platforms, networks, servers and users. According to the survey result using AHP, 'User' was drawn to the most important group, and 'Data Encryption', 'Wireless LAN Control' and 'Terminal Recovery When Leaving' were drawn to the important information security factors of the mobile office among 24 factors.

A Study on the Establishment of Quality Control Standards for Accuracy Improvement of DSRC Traffic Information System (DSRC 교통정보 정확도 개선을 위한 품질관리 기준수립 연구)

  • Hwang, Taehyun;Won, Insu;Kwon, Jangwoo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.19 no.1
    • /
    • pp.44-57
    • /
    • 2020
  • A dedicated short-range communications (DSRC) traffic information system is a detection system for a section of road using communication between roadside equipment and on-board High-Pass units to collect road traffic information and provide reliable traffic information to drivers. The Ministry of Land, Infrastructure, and Transport announced that a DSRC system must be supported to pass the performance evaluation of an intelligent transportation system (ITS), and the performance evaluation for DSRC systems installed in expressways and national highways is started. Currently, DSRC traffic information systems are only managed for maintenance and functional-monitoring purposes, which means that detailed criteria for the operation of a DSRC traffic information system, such as communication range, the direction of the antenna, and the power of the radio wave, etc., need to be established. In this paper, the criteria of the performance evaluation of a DSRC traffic information system are presented for different road types and road environments. The proposed performance evaluation criteria included the communication range and communication power of roadside equipment. In addition, installation criteria, such as the direction of the antenna, and the height and angle of the installed system, are presented for different road types and road environments. The criteria presented were evaluated for DSRC roadside equipment and documented to improve system maintenance and quality control of the communication system.

A Study on the Gap Analysis between Expectation and Perceptions of Users for IPTV Services based on N-Screen Technology (N-Screen 기술 기반 IPTV서비스에 대한 이용자의 기대와 인지 간의 GAP분석에 관한 연구)

  • Kim, Jun Soo;Kang, Sang Ug;Lim, Gyoo Gun
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.2
    • /
    • pp.205-222
    • /
    • 2013
  • One of the recent important issues in IT fields is the convergence. It had been simply focused on functional convergence of technologyies. However the convergence in terms of businesses or services also has been made in recent years. The convergence between broadcasting and telecommunication industries can be possible because the e-transformation of broadcasting industry based on digital technology such as multimedia and multi-channel, can be combined with the high speed telecommunication network. It is giving a birth of various convergence services such as IPTV. IPTV is a kind of new service that is combined with the convergence of network, contents, and device. Nevertheless the controversy about the scope and the value of this new convergence service has constantly been raised; for example, what is the difference between IPTV and Internet TV? or what are the benefits that customers can have? This study measured the expectation level and the cognitive level of users before and after using the service and analyzed the gap between the importance and the satisfaction of the service. From this study, we proposed the priority of each function by analysing Importance-Performance Analysis(IPA) method to suggest required functions of IPTV service based on N-Screen technology. This study will identify the gap of awareness level between service providers and end users for the functions of broadcasting and telecommunications convergence service and suggest a solution enhancing user satisfaction.

A Multistage Authentication Strategy for Reliable N-to-N Communication in CGSR based Mobile Ad Hoc Networks (CGSR 기반의 이동 애드 흑 네트워크에서 신뢰성 있는 통신을 위한 노드간 인증 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.659-667
    • /
    • 2005
  • A Mobile Ad Hoc Network(MANET) is a multi hop wireless network with no prepared base stations or centralized administrations, where flocks of peer systems gather and compose a network. Each node operates as a normal end system in public networks. In addition to it, a MANET node is required to work as a router to forward traffic from a source or intermediate node to others. Each node operates as a normal end system in public networks, and further a MANET node work as a router to forward traffic from a source or intermediate node to the next node via routing path. Applications of MANET are extensively wide, such as battle field or any unwired place; however, these are exposed to critical problems related to network management, node's capability, and security because of frequent and dynamic changes in network topology, absence of centralized controls, restricted usage on network resources, and vulnerability oi mobile nodes which results from the special MANET's character, shared wireless media. These problems induce MANET to be weak from security attacks from eavesdropping to DoS. To guarantee secure authentication is the main part of security service In MANET because networks without secure authentication are exposed to exterior attacks. In this paper, a multistage authentication strategy based on CGSR is proposed to guarantee that only genuine and veritable nodes participate in communications. The proposed authentication model is composed of key manager, cluster head and common nodes. The cluster head is elected from secure nodes, and key manager is elected from cluster heads. The cluster head will verify other common nodes within its cluster range in MANET. Especially, ID of each node is used on communication, which allows digital signature and blocks non repudiation. For performance evaluation, attacks against node authentication are analyzed. Based on security parameters, strategies to resolve these attacks are drawn up.

A Study on the Improvements of eBook Services for Children in the Public Library (공공도서관 어린이 전자책 서비스 개선방안에 관한 연구)

  • Baek, Ji-Won
    • Journal of Information Management
    • /
    • v.43 no.1
    • /
    • pp.63-87
    • /
    • 2012
  • This study aims to analyse the actual condition of the ebook services and propose the improvements of ebook services for children in the Korean public library. For this purpose, the current condition of the ebook services in the public libraries were analyzed and categorized by three criteria. Secondly, the ebook use analysis was conducted using PCs and mobile devices in terms of access to ebook library site, searching method, contents type and viewer, lending process, and user help. As a result of the analysis, several issues such as the difficulty in access to ebook site, the complexity of setting and usage depending on the file format, the insufficient user guide, the relatively lower quality service than the commercial's, and the lack of retrieval functions specialized for the ebook were presented. The improvement plan for the ebook services, especially for children in the public library was suggested.

An Implementation of Dynamic Gesture Recognizer Based on WPS and Data Glove (WPS와 장갑 장치 기반의 동적 제스처 인식기의 구현)

  • Kim, Jung-Hyun;Roh, Yong-Wan;Hong, Kwang-Seok
    • The KIPS Transactions:PartB
    • /
    • v.13B no.5 s.108
    • /
    • pp.561-568
    • /
    • 2006
  • WPS(Wearable Personal Station) for next generation PC can define as a core terminal of 'Ubiquitous Computing' that include information processing and network function and overcome spatial limitation in acquisition of new information. As a way to acquire significant dynamic gesture data of user from haptic devices, traditional gesture recognizer based on desktop-PC using wire communication module has several restrictions such as conditionality on space, complexity between transmission mediums(cable elements), limitation of motion and incommodiousness on use. Accordingly, in this paper, in order to overcome these problems, we implement hand gesture recognition system using fuzzy algorithm and neural network for Post PC(the embedded-ubiquitous environment using blue-tooth module and WPS). Also, we propose most efficient and reasonable hand gesture recognition interface for Post PC through evaluation and analysis of performance about each gesture recognition system. The proposed gesture recognition system consists of three modules: 1) gesture input module that processes motion of dynamic hand to input data 2) Relational Database Management System(hereafter, RDBMS) module to segment significant gestures from input data and 3) 2 each different recognition modulo: fuzzy max-min and neural network recognition module to recognize significant gesture of continuous / dynamic gestures. Experimental result shows the average recognition rate of 98.8% in fuzzy min-nin module and 96.7% in neural network recognition module about significantly dynamic gestures.