• Title/Summary/Keyword: 환경 확장

Search Result 4,454, Processing Time 0.035 seconds

Effect of Brand Extension on Parent Brand in Mobile Service (모바일 서비스에서 브랜드 확장이 모 브랜드에 미치는 영향)

  • Park, Seong-Joon;Kim, Geon-Ha;Han, Woong-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.1
    • /
    • pp.399-417
    • /
    • 2015
  • The purpose of this research is to investigate the effects of brand extension on original brand in mobile market. TAM (Technology Acceptance Model) was used in current research to verify the 'intention to use of mobile service', and 'perceived usefulness', 'perceived ease of use', and the effect of 'extended brand's intention to use' on continuous 'intention to use in original brand' are verified in the process. According to the results, TAM was found to be appropriate to verify the intention to use of mobile service. Also by verifying the effect of decision factor, it is found that perceived ease of use have positive(+) influence on continuous intention to use of original brand. According th this finding, marketers will be able to understand better in performing strategies in mobile service environment.

Developing an XR based Hyper-realistic Counter-Terrorism, Education, Training, and Evaluation System (확장현실(XR) 기반 초실감 대테러 교육훈련체계 구축 방안 연구)

  • Shin, Kyuyong;Lee, Sehwan
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.65-74
    • /
    • 2020
  • Recently, with the rapid development of eXtended Reality(XR) technology, the development and use of education and training systems using XR technology is increasing significantly. In particular, in areas that involve great risks and high costs such as military training and counter-terrorism training, the use of XR based simulators is preferred because they can improve training performance, reduce training costs, and minimize the risk of safety issues that may occur in actual training, by creating a training environment similar to actual training. In this paper, we propose a plan to build and evaluate an XR based hyper-realistic counter-terrorism education, training, and evaluation system to improve the ROK police's ability to respond to terrorist situations using the 5G and AR based Integrated Command and Control Platform previously developed by the Korea Military Academy. The proposed system is designed to improve counter-terrorism capabilities with virtual training for individual and team units based on hyper-realistic content and training scenarios. Futhermore, it can also be used as a on-site command and control post in connection with a simulation training site and an actual operation site.

Implementation of portable WiFi extender using Raspberry Pi (라즈베리파이를 이용한 이동형 와이파이 확장기 구현)

  • Jung, Bokrae
    • Journal of Industrial Convergence
    • /
    • v.20 no.1
    • /
    • pp.63-68
    • /
    • 2022
  • In schools and corporate buildings, public WiFi Access Points are installed on the ceilings of hallways. In the case of an architectural structure in which a WiFi signal enters through a steel door made of a material with high signal attenuation, Internet connection is frequently cut off or fails when the door is closed. To solve this problem, our research implements an economical and portable WiFi extender using a Raspberry Pi and an auxiliary battery. Commercially available WiFi extenders have limitations in the location where the power plug is located, and WiFi extension using the WiFi hotspot function of an Android smartphone is possible only in some high-end models. However, because the proposed device can be installed at the position where the Wi-Fi reception signal is the best inside the door, the WiFi range can be extended while minimizing the possibility of damage to the original signal. Experimental results show that it is possible to eliminate the shadows of radio waves and to provide Internet services in the office when the door is closed, to the extent that web browsing and real-time video streaming for 720p are possible.

Certificateless Proxy Re-Encryption Scheme and Its Extension to Multiple KGC Environment (무인증서기반 프락시 재암호화 기법 및 다중 KGC 환경으로의 확장)

  • Sur, Chul;Jung, Chae-Duk;Park, Young-Ho;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.4
    • /
    • pp.530-539
    • /
    • 2009
  • In this paper we introduce the notion of certificateless proxy re-encryption which enjoys the advantages of certificateless cryptography while providing the functionalities of proxy re-encryption. We give precise definitions for secure certificateless proxy re-encryption schemes and also present a concrete scheme from bilinear pairing. Our scheme is unidirectional and compatible with current certificateless encryption deployments, In addition, we show that our scheme has chosen ciphertext security in the random oracle model. Finally, we extend the proposed scheme for appling multiple KGC environment.

  • PDF

A Study on the Condensation and Thermal Environment according to Window Systems Types Installed for a Extended-Balcony Apartment (확장형 발코니 공동주택의 창호종류에 따른 결로 및 온열환경에 관한 연구)

  • Yoon, Jong-Ho;An, Young-Sub;Kim, Byoung-Soo
    • KIEAE Journal
    • /
    • v.7 no.5
    • /
    • pp.87-92
    • /
    • 2007
  • As expansion of balconies at apartments has been legalized, the major function of the balconies as a thermal buffer zone is disappearing. This weakens the ability of window to insulate heat and multiplies surface condensation. Thus more and more residents require solutions to increasing surface condensation and aggravation in thermal comfort. This study intends to provide basic data by evaluating performance of triple layered Low-E windows, triple layered clear windows, double layered Low-E windows and double layered clear window used for expanded balconies and marketed within the country in terms of surface condensation and thermal environment through simulation. Results revealed that no surface condensation occurred at double layered Low-E windows and triple layered Low-E windows. Surface condensation took place at double layered clear windows and triple layered clear windows at a relative humidity of 60%. Thermal environment analysis suggested that double layered clear windows showed the most time falling into the range of comfort at $23^{\circ}C$. The figure were $22^{\circ}C$ for triple layered clear windows, $22^{\circ}C$ for double layered Low-E windows and $21^{\circ}C$ for triple layered Low-E windows.

Virtual Machine for Program Testing on the Virtual Network Processor Environment (가상의 네트워크 프로세서 환경에서 프로그램 테스트를 위한 가상머신)

  • Hong, Soonho;Kwak, Donggyu;Ko, BangWon;Yoo, Chae-Woo
    • Annual Conference of KIPS
    • /
    • 2012.04a
    • /
    • pp.514-517
    • /
    • 2012
  • 최근 인터넷 사용자 증가와 네트워크를 기반의 응용 프로그램이 다양하게 개발되고 있다. 또한 스마트 폰과 매블릿 PC 의 대중화로 누구나 쉽게 인터넷을 통해 정보검색 서비스를 이용할 수 있다. 따라서 갈수록 증가하는 패킷에 대한 제]어와 이동, 삭제 등과 같은 처리를 빠르게 하기 위해 네트워크 프로세서 (Network Processor)가 개발되었다. 네트워크 프로세서는 패킷 제어와 이동, 삭제를 수행하는데 최적화되어 있다. 하지만 네트워크 프로세서를 개발한 회사마다 교차개발환경 툴과 개발언어가 서로 다르기 때문에 소스코드 재사용 및 확장이 어렵다. 또한 네트워크 프로세서에서 동작하는 프로그램을 매스트 하기 위해 하드웨어 장비가 필요하고 네트워크 프로세서에 종속적인 개발환경과 언어를 배우는 것은 프로그래머에게 큰 부담을 준다. 본 논문에서는 네트워크 프로세서에 최적화된 기능을 언어 레벨에서 정의한 eFlowC 언어를 사용하고 범용 컴퓨터에서 매스트 및 실행을 할 수 있는 가상머신을 제안한다. 그리고 가상머신 중간언어를 사용하여 가상머신이 설치된 범용 컴퓨터에서 소스코드 재사용 및 확장을 가능하게 한다. 따라서 범용 컴퓨터에서 프로그램 테스트를 통해 신뢰성 높은 프로그램을 작성할 수 있다.

Development of a Voice User Interface for Web Browser using VoiceXML (VoiceXML을 이용한 VUI 지원 웹브라우저 개발)

  • Yea SangHoo;Jang MinSeok
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.2
    • /
    • pp.101-111
    • /
    • 2005
  • The present web informations are mainly described in terms of HTML, which users obtain through input devices such as mouse, keyboard, etc. Thus the existing GUI environment have not supported human's most natural information acquisition means, that is, voice. To solve the problem, several vendors are developing voice user interface. However these products are deficient in man -machine interactivity and their accommodation of existing web environment. This paper presents a VUI(Voice User Interface) supporting web browser by utilizing more and more maturing speech recognition technology and VoiceXML, a markup language derived from XML. It provides users with both interfaces, VUI as well as GUI. In addition, XML Island technology is applied to the bowser in a way that VoiceXML fragments are nested in HTML documents to accommodate the existing web environment. Also for better interactivity, dialogue scenarios for menu, bulletin, and search engine are suggested.

Localization Algorithms for Mobile Robots with Presence of Data Missing in a Wireless Communication Environment (무선통신 환경에서 데이터 손실 시 모바일 로봇의 측위 알고리즘)

  • Sin Kim;Sung Shin;Sung Hyun You
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.4
    • /
    • pp.601-608
    • /
    • 2023
  • Mobile robots are widely used in industries because mobile robots perform tasks in various environments. In order to carry out tasks, determining the precise location of the robot in real-time is important due to the need for path generation and obstacle detection. In particular, when mobile robots autonomously navigate in indoor environments and carry out assigned tasks within pre-determined areas, highly precise positioning performance is required. However, mobile robots frequently experience data missing in wireless communication environments. The robots need to rely on predictive techniques to autonomously determine the mobile robot positions and continue performing mobile robot tasks. In this paper, we propose an extended Kalman filter-based algorithm to enhance the accuracy of mobile robot localization and address the issue of data missing. Trilateration algorithm relies on measurements taken at that moment, resulting in inaccurate localization performance. In contrast, the proposed algorithm uses residual values of predicted measurements in data missing environments, making precise mobile robot position estimation. We conducted simulations in terms of data missing to verify the superior performance of the proposed algorithm.

Fat Client-Based Abstraction Model of Unstructured Data for Context-Aware Service in Edge Computing Environment (에지 컴퓨팅 환경에서의 상황인지 서비스를 위한 팻 클라이언트 기반 비정형 데이터 추상화 방법)

  • Kim, Do Hyung;Mun, Jong Hyeok;Park, Yoo Sang;Choi, Jong Sun;Choi, Jae Young
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.3
    • /
    • pp.59-70
    • /
    • 2021
  • With the recent advancements in the Internet of Things, context-aware system that provides customized services become important to consider. The existing context-aware systems analyze data generated around the user and abstract the context information that expresses the state of situations. However, these datasets is mostly unstructured and have difficulty in processing with simple approaches. Therefore, providing context-aware services using the datasets should be managed in simplified method. One of examples that should be considered as the unstructured datasets is a deep learning application. Processes in deep learning applications have a strong coupling in a way of abstracting dataset from the acquisition to analysis phases, it has less flexible when the target analysis model or applications are modified in functional scalability. Therefore, an abstraction model that separates the phases and process the unstructured dataset for analysis is proposed. The proposed abstraction utilizes a description name Analysis Model Description Language(AMDL) to deploy the analysis phases by each fat client is a specifically designed instance for resource-oriented tasks in edge computing environments how to handle different analysis applications and its factors using the AMDL and Fat client profiles. The experiment shows functional scalability through examples of AMDL and Fat client profiles targeting a vehicle image recognition model for vehicle access control notification service, and conducts process-by-process monitoring for collection-preprocessing-analysis of unstructured data.

Authentication Mechanism for Pervasive Computing Environments (Pervasive Computing 환경을 위한 인증기법에 관한 연구)

  • 정철현;송주석
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.35-38
    • /
    • 2002
  • 시대의 흐름에 따라 컴퓨팅 환경에서도 많은 변화가 이루어져 왔다. 이는 컴퓨팅 환경이 초기 독립적인 환경에서 네트워크를 이용한 분산환경으로, 이이서 무선통신을 이용한 이동통신으로 발전되어 왔음을 의미한다. 이에 따라, 언제/어디에서나 원하는 자원에 접근할 수 있는 환경이 제공되게 되었고, 이동성을 지원하는 Mobile IP, Ad Hoc 등의 개념에 의해 제한된 환경에서의 컴퓨팅이 아닌 이동이 가능한 환경에서의 컴퓨팅으로 확장되기에 이르렀다. 현재에 이르러서는 디바이스의 소형화를 통해 사용자의 이동성을 극대화시키는 개념인 “Pervasive Computing”에 대한 연구가 활발히 진행 중에 있다. 이러한 Pervasive 컴퓨팅 환경에서도 보안기능에 대한 기능이 최근 중요시되고 있다. 특히 pervasive computing 환경은 기존의 컴퓨팅 환경과는 차별화 되는 특징들을 내포하고 있기 때문에 상호 인증의 제공이 필요하다. 본 논문에서는 Pervasive Computing 환경에서 현재 진행중인 인증 기법에 대한 연구들을 알아본 후, 이러한 인증기법들의 취약점을 보완할 수 있는 상호 인증을 고려한 새로운 인증 기법을 제안하고자 한다.

  • PDF