• Title/Summary/Keyword: Address of Things

Search Result 125, Processing Time 0.026 seconds

Designing an Agricultural Data Sharing Platform for Digital Agriculture Data Utilization and Service Delivery (디지털 농업 데이터 활용 및 서비스 제공을 위한 농산업 데이터 공유 플랫폼 설계)

  • Seung-Jae Kim;Meong-Hun Lee;Jin-Gwang Koh
    • The Journal of Bigdata
    • /
    • v.8 no.1
    • /
    • pp.1-10
    • /
    • 2023
  • This paper presents the design process of an agricultural data sharing platform intended to address major challenges faced by the domestic agricultural industry. The platform was designed with a user interface that prioritizes user requirements for ease of use and offers various analysis techniques to provide growth prediction for field environment, growth, management, and control data. Additionally, the platform supports File to DB and DB to DB linkage methods to ensure seamless linkage between the platform and farmhouses. The UI design process utilized HTML/CSS-based languages, JavaScript, and React to provide a comprehensive user experience from platform login to data upload, analysis, and detailed inquiry visualization. The study is expected to contribute to the development of Korean smart farm models and provide reliable data sets to agricultural industry sites and researchers.

A Study on the Dispute of Product Liability in Korean Importers (수입업자의 제조물책임(PL) 분쟁에 관한 연구)

  • Byun Joon-Young
    • Journal of Arbitration Studies
    • /
    • v.13 no.1
    • /
    • pp.245-283
    • /
    • 2003
  • Since enactment of the Product Liability Act(PLA) on July 2002, Enterprises in Korea should be insured the Product Liability under the Act. Therefore they had to make a special team and organize it to match with the Act. However, some enterprises didn't follow and prepare the team for the dispute resolution. For example, in America, many enterprises had been attacked the PLA and in Japan, as well. but Korea is rare for the PLA. Thus, this is to research the PLA for protecting the disputes. Upon this study, 1 would like to suggest some issues and a revision of the PLA. Those are the purpose of my research. In this study, it consists of 5 chapters for achieving the purpose of the research. Introduction of this study is mentioned in Chapter 1, and Chapter 2 is for outline of the PLA in Korea. At Chapter 3, the cases are analyzed in the disputes of importers to address important things we have to check. After the analysis, resolution methods in general on import practices are suggested at Chapter 4. Also, this study is summarized at Chapter 5 including further research. In this research, 1 find out complex of Product Liability insurance and issues related with PLA. For protecting the issues and disputes; importers should prepare a agreement of arbitration during the preparation of contracts. Nothing can be better than prevention on any disputes, but they can be happened sometimes without any intentions or by mistake. Solving these issues, the resolution methods of this research are the most valuable. The mediation and the negotiation do not force any legal matters. So, the dispute through them does not have a positive resolution, and the effectiveness of them is very low. Due to the resolution of issues, arbitration is a desirable resolution. In Korea, most people do not know about the arbitration due to the lack of understanding of arbitration. Currently arbitration related with Product Liability has not been followed up promptly because procedures and judgement from a court take for a long time. In sum, in order to solve the disputes properly, they should be supported by the arbitration system to concrete essential objectives, so to speak, protection of the victim and the improvement of arbitration. In addition, the systematic arrangements would be required to carry out all the methods above mentioned. Those are for manufacturers, importers, and customers for the dispute resolution.

  • PDF

Numerical and Experimental Investigation on the Interaction of Subsurface Vortical Flows with a Free Surface (수면하 보오텍스 유동과 자유표면과의 상호 작용에 관한 연구)

  • Mu-Seok Song
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.30 no.2
    • /
    • pp.76-85
    • /
    • 1993
  • In order to predict the free surface signature of turbulent ship wakes two things are essential; a basic understanding of the mechanism of turbulent vortical flow/free surface interactions and a mathematical model to accurately predict the signature. The goal of the study described here is both to supplement experimental work to obtain basic understanding, as well as to condense this understanding in a model(or models) that captures the essential phenomena and thus allows predictions. To do so we followed two main paths guided by experimental observations. One is full simulations of the flow using the clavier-Stokes equations. The other is a vortex modeling, where the vortical structures of the flows are approximated by idealized structures, an the interaction assumed to be essentially inviscid. These approaches complement each other. Full simulations are only applicable to small scale phenomena, where the system is simple, and the Reynolds number is low. The vortex modeling, on the other hand, cannot represent essentially viscous aspects of the problem such as the effect of contamination gradient. Obviously, the modeling is what may eventually lead to a prediction method; the full simulations-too limited to mimic all but the simplest circumstances-are to aid and support the construction of realistic models. We address two-dimensional aspects of the vortex/free surface interaction first. Secondly we obtain some basic understanding of the interaction process through an experiment and then talk about several three-dimensional problems hoping to develop a successful prediction model.

  • PDF

Frontal Face Region Extraction & Features Extraction for Ocular Inspection (망진을 위한 정면 얼굴 영역 및 특징 요소 추출)

  • Cho Dong-Uk;Kim Sun-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6C
    • /
    • pp.585-592
    • /
    • 2005
  • One of the most important things in the researches on diseases is to attach more importance to prevention of a disease and preservation of health than to treatment of a disease, also to foods rather than to medicines. In this context, the most significant concern in examining a patient is to find the presence of disease, and, if any, to diaguose the type of disease, after which a pharmacotherapy is followed. In this paper, various diagnosis methods of Oriental medicines are discussed. And ocular inspection, the most important method among the 4 disease diagnoses of Oriental medicines, is studied. Observing a person's shape and color has been the major method for ocular inspection, which usually has been dependent upon doctor's intuition as of these days. We are developing an automatic system which provides objective basic data for ocular inspection. As the first stage, we applied the signal processing techniques to automatic feature extraction of faces for ocular inspection. Firstly, facial regions are extracted from the point of frontal view, which was followed by extraction of their features. The experiment applied to 20 persons showed that frontal face regions are perfectly extracted, as well as their features, such as eyes, eyebrows, noses and mouths. Future work will seek to address the issues of morphological operation for a few unfinished extraction results, such as combined hair and eyebrows.

Mobility Management Method for Constrained Sensor Nodes in WoT Environment (WoT 환경에서 제한된 센서 노드의 이동성 관리 방법)

  • Chun, Seung-Man;Ge, Shu-Yuan;Park, Jong-Tae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.9
    • /
    • pp.11-20
    • /
    • 2014
  • For Web-based applications in IoT environment, IETF CoRE WG has standardizing the CoAP. One of limitations of CoAP is that CoAP standard does not consider the mobility management of the CoAP sensor node. In this paper, we propose the mobility management protocol of CoAP sensor node by considering the characteristics of the constrained network. The proposed mobility management protocol supports for Web client to be transmitted the sensing data from CoAP node reliably while the CoAP sensor moves into different wireless networks. To do this, we designed the architecture with the separate IP address management of CoAP sensor node and presented the mobility management protocol, which includes the holding and binding mode, in order to provide the reliable transmission. Finally, the numerical analysis and simulation with NS2 tool have been done for the performance evaluation in terms of the handover latency and packet loss with comparing the proposed mobility management protocol with other the existing mobility management protocols. The performance result shows that the proposed mobility management can provide the transmission of sensing data without the packet loss comparing with the existing mobility management protocol reliably.

A Software Vulnerability Analysis System using Learning for Source Code Weakness History (소스코드의 취약점 이력 학습을 이용한 소프트웨어 보안 취약점 분석 시스템)

  • Lee, Kwang-Hyoung;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.11
    • /
    • pp.46-52
    • /
    • 2017
  • Along with the expansion of areas in which ICT and Internet of Things (IoT) devices are utilized, open source software has recently expanded its scope of applications to include computers, smart phones, and IoT devices. Hence, as the scope of open source software applications has varied, there have been increasing malicious attempts to attack the weaknesses of open source software. In order to address this issue, various secure coding programs have been developed. Nevertheless, numerous vulnerabilities are still left unhandled. This paper provides some methods to handle newly raised weaknesses based on the analysis of histories and patterns of previous open source vulnerabilities. Through this study, we have designed a weaknesses analysis system that utilizes weakness histories and pattern learning, and we tested the performance of the system by implementing a prototype model. For five vulnerability categories, the average vulnerability detection time was shortened by about 1.61 sec, and the average detection accuracy was improved by 44%. This paper can provide help for researchers studying the areas of weaknesses analysis and for developers utilizing secure coding for weaknesses analysis.

A Study on the Expected Effect of Mobile Prepaid Payment for the Activation of Food Waste Volume-Rate System (음식물 종량제 활성화를 위한 모바일 선불결제 적용에 따른 기대효과 연구)

  • Kim, YongIl;Kim, SeungCheon
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.47-54
    • /
    • 2020
  • This study proposes an NFC-based payment system that considers user convenience while expanding the existing payment method for RFID-based individual food and logistics waste equipment. In line with this trend, I proposed to apply NFC to the existing RFID-based food meter to release the food in the meantime and to address the problem of re-carrying due to card loss, card not possessed, and non-filling, and the question that could not be identified by various cumbersome procedures. NFC's function alone has been certified for its convenience, which led to its introduction and research in the period of time. Of course, we need to negotiate fees with the transportation card company, but if we see a market share related to transportation card soon, we think smooth negotiations will take place. NFC method will be expanded to all phones with iPhone NFC opening. Therefore, in the next study, we intend to apply the payment system in NFC by linking with local currency, mobile vouchers, and card companies, which are being paid as respective payment means according to the recent emergency support system for COVID-19.

Advanced Victim Cache with Processor Reuse Information (프로세서의 재사용 정보를 이용하는 개선된 고성능 희생 캐쉬)

  • Kwak Jong Wook;Lee Hyunbae;Jhang Seong Tae;Jhon Chu Shik
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.12
    • /
    • pp.704-715
    • /
    • 2004
  • Recently, a single or multi processor system uses the hierarchical memory structure to reduce the time gap between processor clock rate and memory access time. A cache memory system includes especially two or three levels of caches to reduce this time gap. Moreover, one of the most important things In the hierarchical memory system is the hit rate in level 1 cache, because level 1 cache interfaces directly with the processor. Therefore, the high hit rate in level 1 cache is critical for system performance. A victim cache, another high level cache, is also important to assist level 1 cache by reducing the conflict miss in high level cache. In this paper, we propose the advanced high level cache management scheme based on the processor reuse information. This technique is a kind of cache replacement policy which uses the frequency of processor's memory accesses and makes the higher frequency address of the cache location reside longer in cache than the lower one. With this scheme, we simulate our policy using Augmint, the event-driven simulator, and analyze the simulation results. The simulation results show that the modified processor reuse information scheme(LIVMR) outperforms the level 1 with the simple victim cache(LIV), 6.7% in maximum and 0.5% in average, and performance benefits become larger as the number of processors increases.

Expanding User Types for Utilizing Certified e-Document Authorities (공인전자문서보관소의 이용 활성화를 위한 사용자 유형 확대방안)

  • Song, Byoungho
    • The Korean Journal of Archival Studies
    • /
    • no.30
    • /
    • pp.175-204
    • /
    • 2011
  • Electronic records are generated not only in public sector but also in private sector. Records will be used across the public-private boundary. The Certified e-Document Authorities(CeDAs) may keep electronic documents in private sector for preservation and evidence, like the official Record Management Systems for Public sector. A CeDA is the Trusted Third Party (TTP) as a business to be entrusted and proof interchanging documents between parties. This CeDA system could be sustainable only if the CeDA earn the enough sales through enough uses. And yet, all the eight CeDA companies have not had enough users. How to utilize CeDAs is one of the hot issues in this area. In this paper, We analyze the threat to trustworthiness of CeDA due to payment of only one party among others, and describe the difficulty in use of CeDA for an individual user. These things make CeDAs cannot have enough users. To do address these, We expand the boundary of relevant parties for a document, present a delegate-establishing option under a joint name, show the needs of identifying and notifying minimum relevant parties, and suggest the proxy parties to help the individual users.

An Analysis of Big Video Data with Cloud Computing in Ubiquitous City (클라우드 컴퓨팅을 이용한 유시티 비디오 빅데이터 분석)

  • Lee, Hak Geon;Yun, Chang Ho;Park, Jong Won;Lee, Yong Woo
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.45-52
    • /
    • 2014
  • The Ubiquitous-City (U-City) is a smart or intelligent city to satisfy human beings' desire to enjoy IT services with any device, anytime, anywhere. It is a future city model based on Internet of everything or things (IoE or IoT). It includes a lot of video cameras which are networked together. The networked video cameras support a lot of U-City services as one of the main input data together with sensors. They generate huge amount of video information, real big data for the U-City all the time. It is usually required that the U-City manipulates the big data in real-time. And it is not easy at all. Also, many times, it is required that the accumulated video data are analyzed to detect an event or find a figure among them. It requires a lot of computational power and usually takes a lot of time. Currently we can find researches which try to reduce the processing time of the big video data. Cloud computing can be a good solution to address this matter. There are many cloud computing methodologies which can be used to address the matter. MapReduce is an interesting and attractive methodology for it. It has many advantages and is getting popularity in many areas. Video cameras evolve day by day so that the resolution improves sharply. It leads to the exponential growth of the produced data by the networked video cameras. We are coping with real big data when we have to deal with video image data which are produced by the good quality video cameras. A video surveillance system was not useful until we find the cloud computing. But it is now being widely spread in U-Cities since we find some useful methodologies. Video data are unstructured data thus it is not easy to find a good research result of analyzing the data with MapReduce. This paper presents an analyzing system for the video surveillance system, which is a cloud-computing based video data management system. It is easy to deploy, flexible and reliable. It consists of the video manager, the video monitors, the storage for the video images, the storage client and streaming IN component. The "video monitor" for the video images consists of "video translater" and "protocol manager". The "storage" contains MapReduce analyzer. All components were designed according to the functional requirement of video surveillance system. The "streaming IN" component receives the video data from the networked video cameras and delivers them to the "storage client". It also manages the bottleneck of the network to smooth the data stream. The "storage client" receives the video data from the "streaming IN" component and stores them to the storage. It also helps other components to access the storage. The "video monitor" component transfers the video data by smoothly streaming and manages the protocol. The "video translator" sub-component enables users to manage the resolution, the codec and the frame rate of the video image. The "protocol" sub-component manages the Real Time Streaming Protocol (RTSP) and Real Time Messaging Protocol (RTMP). We use Hadoop Distributed File System(HDFS) for the storage of cloud computing. Hadoop stores the data in HDFS and provides the platform that can process data with simple MapReduce programming model. We suggest our own methodology to analyze the video images using MapReduce in this paper. That is, the workflow of video analysis is presented and detailed explanation is given in this paper. The performance evaluation was experiment and we found that our proposed system worked well. The performance evaluation results are presented in this paper with analysis. With our cluster system, we used compressed $1920{\times}1080(FHD)$ resolution video data, H.264 codec and HDFS as video storage. We measured the processing time according to the number of frame per mapper. Tracing the optimal splitting size of input data and the processing time according to the number of node, we found the linearity of the system performance.