• Title/Summary/Keyword: 사용자 편의환경

Search Result 542, Processing Time 0.03 seconds

Intelligent Self-Moving Vegetable Cultivator Using Solar Energy (태양광 에너지를 활용한 지능형 자율이동 채소재배기)

  • Lee, Jun-Hui;Kim, Si-Yoon;Kim, Ju-Han;Kim, Hyo-Jin;Lee, Jina;Kim, In-Soo
    • Annual Conference of KIPS
    • /
    • 2022.11a
    • /
    • pp.827-829
    • /
    • 2022
  • 본 논문은 코로나19로 인해 발생하는 우울증을 개선하고 태양광 패널을 이용하여 친환경적으로 재배할 수 있는 "태양광 에너지를 활용한 지능형 자율이동 채소재배기"를 제안한다. 본 논문이 제안하는 주요한 특징은 다음과 같다. 첫째, 태양광 패널을 이용하여 재배기에 전원을 공급한다. 둘째, 카메라와 OpenCV를 이용하여 채소의 상태를 매일 확인 후 LED 색상을 조절하여 최적의 채소 성장 환경을 만든다. 셋째, 수위 센서와 모터 펌프를 이용하여 자동으로 물이 공급될 수 있도록 하고, 수온과 수질을 주기적으로 체크하는 등 Human task를 감소시킨다. 넷째, DC모터를 이용하여 실내·외로 자율이동을 하고, 액추에이터를 이용하여 채소가 햇빛을 최대한 많이 받아 성장할 수 있도록 한다. 제안하는 시스템은 가정에서 채소를 재배하는 방식에 IoT기술을 활용하여 사용자의 편의성을 증가시키고, 녹색식물을 통해 '코로나 블루'를 해소하고자 하는 사람에게 필요한 "태양광 에너지를 활용한 지능형 자율이동 채소재배기"의 개발을 목표로 한다.

Development of Change Detection Technique Using Time Seriate Remotely Sensed Satellite Images with User Friendly GIS Interface (사용자 중심적 GIS 인터페이스를 이용한 시계열적 원격탐사 영상의 변화탐지 기법의 개발)

  • 양인태;한성만;윤희천;김흥규
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.22 no.2
    • /
    • pp.151-159
    • /
    • 2004
  • The diversity, expansion of human activity and rapid urbanization make modem society to faced with problems like damage of nature and drain of natural resources. Under these circumstances rapid and accurate change detection techniques, which can detect wide range utilization changes, are needed for efficient management and utilization plan of national territory. In this study to perform change detection from remote sensing images, space analysis technique contained in Geographic Information System is applied. And from this technique, the software. that can execute new change detection algorithm, query, inquiry and analysis, is produced. This software is on the basis of graphic user interface and has many functions such as format conversion, grid calculation, statistical processing, display and reference. In this study, simultaneously change detection for multi-temporal satellite images can be performed and integrated one change image about four different periods was produced. Further more software user can acquire land cover change information for an specific area through querying and questioning about yearly changes. Finally making of every application module for change detection into one window based visual basic program, can be produced user convenience and automatic performances.

Development of Identity-Provider Discovery System leveraging Geolocation Information (위치정보 기반 식별정보제공자 탐색시스템의 개발)

  • Jo, Jinyong;Jang, Heejin;Kong, JongUk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.9
    • /
    • pp.1777-1787
    • /
    • 2017
  • Federated authentication (FA) is a multi-domain authentication and authorization infrastructure that enables users to access nationwide R&D resources with their home-organizational accounts. An FA-enabled user is redirected to his/her home organization, after selecting the home from an identity-provider (IdP) discovery service, to log in. The discovery service allows a user to search his/her home from all FA-enabled organizations. Users get troubles to find their home as federation size increases. Therefore, a discovery service has to provide an intuitive way to make a fast IdP selection. In this paper, we propose a discovery system which leverages geographical information. The proposed system calculates geographical proximity and text similarity between a user and organizations, which determines the order of organizations shown on the system. We also introduce a server redundancy and a status monitoring method for non-stop service provision and improved federation management. Finally, we deployed the proposed system in a real service environment and verified the feasibility of the system.

Construction of Truss Bridge Database for 3-D Shape and Structural Analysis Information by using ISO10303 Application Protocols (ISO10303 응용프로토콜을 이용한 트러스교의 3차원 형상 및 해석정보 데이터베이스 구축)

  • Lim, Seung-Wan;Kim, Bong-Geun;Kim, Hyo-Jin;Lee, Sang-Ho
    • Journal of Korean Society of societal Security
    • /
    • v.2 no.1
    • /
    • pp.81-89
    • /
    • 2009
  • A web-based information management system to share engineering data of truss bridge is developed through construction of standardized database of truss bridge. 3D shape information is stored in database according to AP 203 of STEP, and 3D visualization on the web is implemented by using the web 3D technology that helps users to understand geometrical shape of structures, directly. AP209 is used to store structural analysis information such as finite elements, material properties, and analysis result into relational database. Based on the developed database, a prototype of integrated information management system for truss bridge is developed, and it provides additional information such as specifications and inspection information related with shape object to end users.

  • PDF

Flexible USIM Authentication System for Next Generation Mobile Radio Communication Systems (차세대 이동통신 시스템에서 유동적 USIM 카드를 이용한 인증 시스템)

  • Choi, Dong-Wook;Hwang, Jae-Young;Chung, Yeon-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.11
    • /
    • pp.2340-2346
    • /
    • 2011
  • This paper presents a user-friendly authentication system using a flexible USIM. In the proposed method and its system, the flexible USIM utilizes personalized data such as Mobile Directory Number(MDN) and social security number as the key to user authentication. The authentication method proposed in this paper permits limited times of use and/or limited duration of use. A simple simulation model shows that the proposed algorithm works well and shows high compatibility with existing authentication methods. In addition, an alternative or more advanced authentication system can be developed with the proposed flexible USIM card. It is seen that this simple alternative method will eventually be able to make wireless communication networks more easily accessible for subscribers, irrespective of user environments.

A Study on a Illegal Copy Protection model using Hidden Agent in Embedded Computing Environment (임베디드 컴퓨팅 환경에서 은닉 에이전트를 이용한 불법복사 방지 모델에 관한 연구)

  • Lee, Deok-Gyu;Kim, Tai-Hoon;Yeo, Sang-Soo;Kim, Seok-Soo;Park, Gil-Cheol;Cho, Seong-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.2
    • /
    • pp.180-190
    • /
    • 2008
  • There have been researches into digital Watermarking technology or Fingerprinting vigorously to safeguard Protective rights for knowledge and poverty for digital contents. DRM(Digital Rights Management) is not only Protective rights for knowledge and poverty, but also management and systems that are necessary to put out, circulate and use for contents. This paper proposes two kinds of ideas. One is protecting contents from illegal acts such as illegal copies when the contents are in the process of circulation. The other is the protocol that can give users convenience. Hidden Agents are used so that contents are protected from illegal copies and illegal use in the contents and cuts off those illegal acts. The Agent will be installed without any special setup. In addition, it can replace roles of Watermarking as a protection. Therefore, this paper shows the solution of illegal copies that happens frequently.

  • PDF

The Interactive Certificate Test Learning System Based on ITS (ITS기반 상호작용 방식의 자격증 시험 학습시스템)

  • Kwun, Jun-A;Kim, Won-Jung;Choi, Won-Ho;Lee, Jung-Keum;Seo, Dong-Ki;Sim, Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.1
    • /
    • pp.163-172
    • /
    • 2017
  • This study is a system that provides a suitable level of the problem, designing the learner certification simulation program based on the ITS(: Intelligent Tutoring System) based on the model and the learning expert model, the model through a buggy (Buggy Model). In the demand survey that reflects the needs of users, convenience, effectiveness, scalability, and reliability were required. In order to reflect this, various problems were developed, problem type analysis, difficulty control, student grades and level management. Users who are preparing for the certification test are expected to use the development system to solve the problems according to their own level and to solve various types of problems in a practical environment to greatly shorten the preparation period for certification.

Communication Module Selection Algorithm for Energy Saving of Smartphone (스마트폰 에너지 절감을 위한 통신모듈 선택 알고리즘)

  • Lee, Chang-Moo;Lee, Seung-Jae;Choi, Deok-Jai
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.5
    • /
    • pp.22-31
    • /
    • 2012
  • A Smartphone is an intelligent device combined mobile phone and pc's support functions, and can perform multiple functions to satisfy the demands of users. It has excellent processing power and communication modules(DMB, Wi-Fi, Bluetooth, NFC etc) to carry out the demands of users. But continuous using of battery power on processor and equipped modules causes acceleration of battery consumption. This means that effective power management in devices like smartphone is important. Therefore, the management of power consumption on system execution and communication module is a serious issue in this field of study. In this paper, we would like to propose a communication module selection algorithm based on energy consumption parameter of each communication module and data transfer time. Our scheme automatically select appropriate communication system to reduce high energy consumption on bluetooth sleep mode so that this scheme is more efficient and effective thus improving user convenience in longer usage time. Experimental results showed the 20% energy saving.

Development of Intuitive Author for 3D Game/Animation Contents (효율적인 3D 게임 및 애니메이션 콘텐츠 제작을 위한 직관적인 저작 기술 개발)

  • Ji, Su-Mi;Lee, Jeong-Joong;Kim, Sung-Gook;Woo, Kyeong-Deok;Baik, Sung-Wook
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.5
    • /
    • pp.780-791
    • /
    • 2010
  • This paper presents a semi-autonomous authoring method which can intuitively create 3D game/ animation contents for unexperienced users. In particular, this method considers their convenience to provide them with easier authoring environments. The 3D game/animation contents created by this method consist of several scene components connected to each other in a logical flow structure. Thus, it is possible to easily understand the overview of 3D content description for its production and manipulate these scene components for efficient management. Four different genres of game/animation contents have been developed by using an authoring tool based on this method. According to results of a survey intended for game developers who created game contents with the authoring tool, this method is shown to save contents development cost/time as well as raise the efficiency and convenience of whole process of contents creation to the expected level.

A Study on a Illegal Copy Protection Model using Hidden Agent in Embedded Computing Environment (임베디드 컴퓨팅 환경에서 은닉 에이전트를 이용한 불법복사 방지 모델에 관한 연구)

  • Lee, Deok-Gyu;Han, Jong-Wook;Chung, Kyo-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.709-712
    • /
    • 2007
  • There have been researches into digital Watermarking technology or Fingerprinting vigorously to safeguard Protective rights for knowledge and poverty for digital contents. DRM(Digital Rights Management) is not only Protective rights for knowledge and poverty, but also management and systems that are necessary to put out, circulate and use for contents. This paper proposes two kinds of ideas. One is protecting contents from illegal acts such as illegal copies when the contents are in the process of circulation. The other is the protocol that can give users convenience. Hidden Agents are used so that contents are protected from illegal copies and illegal use in the contents and cuts off those illegal acts. The Agent will be installed without any special setup. In addition, it can replace roles of Watermarking as a protection. Therefore, this paper shows the solution of illegal copies that happens frequently.

  • PDF