• Title/Summary/Keyword: BEACON

Search Result 770, Processing Time 0.028 seconds

An Analysis of ICT-Retail Convergence(IRC) and Consumer Value Creation (소비자 구매단계별 기술-유통 통합(IRC)과 가치에 대한 연구)

  • Park, Sunny;Cho, Eunsun;Rha, Jong-Youn;Lee, Yuri;Kim, Suyoun
    • Journal of Digital Convergence
    • /
    • v.15 no.7
    • /
    • pp.147-157
    • /
    • 2017
  • Recently, ICT Retail Convergence(IRC) has been rapidly increasing to improve consumer satisfaction and consumer experience. In this paper, we aim to diagnose IRC from consumers' point of view by reviewing the present status and value of IRC according to consumer purchase decision making process. Based on the previous studies in retail industry, we classified IRC into 4 types: Experience-specific tech(Virtual Reality and Augmented Reality); Information-specific tech(Artificial Intelligence and Big Data); Location-based tech(Radio Frequency Identification and Beacon); Payment-related tech(Fin-tech and Biometrics). Next, we found that there is a difference in value provided to consumers according to the type of technology, analysing the value by consumer purchase decision making process. This study can be useful to introduce IRC for improving consumer satisfaction as well as ICT and Retail. Also, it can be basic data for future technology studies with a consumer perspective.

Design and evaluation of a VPRS-based misbehavior detection scheme for VANETs (차량애드혹망을 위한 가변정밀도 러프집합 기반 부정행위 탐지 방법의 설계 및 평가)

  • Kim, Chil-Hwa;Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • v.22 no.6
    • /
    • pp.1153-1166
    • /
    • 2011
  • Detecting misbehavior in vehicular ad-hoc networks is very important problem with wide range of implications including safety related and congestion avoidance applications. Most misbehavior detection schemes are concerned with detection of malicious nodes. In most situations, vehicles would send wrong information because of selfish reasons of their owners. Because of rational behavior, it is more important to detect false information than to identify misbehaving nodes. In this paper, we propose the variable precision rough sets based misbehavior detection scheme which detects false alert message and misbehaving nodes by observing their action after sending out the alert messages. In the proposed scheme, the alert information system, alert profile is constructed from valid actions of moving nodes in vehicular ad-hoc networks. Once a moving vehicle receives an alert message from another vehicle, it finds out the alert type from the alert message. When the vehicle later receives a beacon from alert raised vehicle after an elapse of time, then it computes the relative classification error by using variable precision rough sets from the alert information system. If the relative classification error is lager than the maximum allowable relative classification error of the alert type, the vehicle decides the message as false alert message. Th performance of the proposed scheme is evaluated as two metrics: correct ratio and incorrect ratio through a simulation.

A Secure and Privacy-Aware Route Tracing and Revocation Mechanism in VANET-based Clouds (VANET 기반 클라우드 환경에서 안전과 프라이버시를 고려한 경로추적 및 철회 기법)

  • Hussain, Rasheed;Oh, Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.795-807
    • /
    • 2014
  • Vehicular Ad hoc Network (VANET) has gone through a rich amount of research and currently is making its way towards the deployment. However, surprisingly it evolved to rather more applications and services-rich breed referred to as VANET-based clouds due to the advancements in the automobile and communication technologies. Security and privacy have always been the challenges for the think tanks to deploy this technology on mass scale. It is even worse that some security issues are orthogonally related to each other such as privacy, revocation and route tracing. In this paper, we aim at a specific VANET-based clouds framework proposed by Hussain et al. namely VANET using Clouds (VuC) where VANET and cloud infrastructure cooperate with each other in order to provide VANET users (more precisely subscribers) with services. We specifically target the aforementioned conflicted privacy, route tracing, and revocation problem in VANET-based clouds environment. We propose a multiple pseudonymous approach for privacy reasons and leverage the beacons stored in the cloud infrastructure for both route tracing and revocation. In the proposed scheme, revocation authorities after colluding, can trace the path taken by the target node for a specified timespan and can also revoke the identity if needed. Our proposed scheme is secure, conditional privacy preserved, and is computationally less expensive than the previously proposed schemes.

The Study on the Contexts and Place Names in Old County Maps of Goryeong-hyeon(高靈縣) in Late-Joseon Dynasty (조선 후기 고령현 군현지도의 계열별 특성과 고지명 연구)

  • Kim, Ki-Hyuk
    • Journal of the Korean association of regional geographers
    • /
    • v.15 no.1
    • /
    • pp.16-35
    • /
    • 2009
  • This paper is to compare the contexts and old place names in old county maps of Goryeong-hyeon(高靈縣) according to the four types of maps. 23 maps covering Goryeong-hyeon were collected from the old county-map atlas(郡縣地圖帖) and Eupji(邑誌). The first type(named 'picture county map') included 8 county-maps in which information of military, and administrative contents are mainly mapped. The second type(named '1-ri grid system map') included 4 county maps in which information about beacon routes and road systems were regarded as very important. The third type(named '20-ri grid-system map(方眼地圖)' included 4 county-maps which were drawn as same scale with 20-ri(里) grids. The fourth type(named 'local county-map(地方郡縣地圖)' included 5 county maps which were drawn by local mappers. Types of toponyms which were included in maps are different by the propose of map-drawing. In the picture county maps, place names from military, and administrative contents are written. In the 1-ri grid system county maps, place names especially from military and transportation are fluent. In the 20-ri grid system county maps, generic name from natural environment, such as mountains are very fluent. In the local county maps, city-walls and castles are drawn exaggeratively and detailed generic name from warehouses and villages are written in those maps. This study shows that Daedongyeo-jido was drawn on the basis of 20-ri grid system county maps with the supplementation of geographical information.

  • PDF

Study on Local Wireless Network Data Structure for Sludge Multimeter (슬러지 멀티미터를 위한 근거리무선네트워크 데이터구조 설계 연구)

  • Jung, Soonho;Kim, Younggi;Lee, Sijin;Lee, Sunghwa;Park, Taejun;Byun, Doogyoon;Cha, Jaesang
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.2
    • /
    • pp.96-100
    • /
    • 2014
  • Recently, the management system of wastewater treatment facility has magnified due to the stringent regulations for the protection of the environment, and a sewage treatment plant efficiency and research of the car development are activated in large facilities or industrial park. however, the existing sewerage disposal system and specific water quality monitoring network reliability for real-time transmission of this building is insufficient. In this paper, we proposed a local wireless network design for sludge multi meter data collection and control for measuring the concentration of the sludge efficiently. Also, the collected data over the local wireless network to transmitted to the central monitoring system and accumulate the data in real time to calculate statistics is possible to monitor the status of the sewage treatment facilities. The proposed system uses a short-range wireless networks of IEEE 802.15.4 and configures an IEEE 802.11 network which can monitor real-time status in central system. Also, we install a sludge multimeter and communication network in sewage treatment facilities and confirm the usefulness of the proposed technique by demonstrating its effectiveness.

Offline Friend Recommendation using Mobile Context and Online Friend Network Information based on Tensor Factorization (모바일 상황정보와 온라인 친구네트워크정보 기반 텐서 분해를 통한 오프라인 친구 추천 기법)

  • Kim, Kyungmin;Kim, Taehun;Hyun, Soon. J
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.8
    • /
    • pp.375-380
    • /
    • 2016
  • The proliferation of online social networking services (OSNSs) and smartphones has enabled people to easily make friends with a large number of users in the online communities, and interact with each other. This leads to an increase in the usage rate of OSNSs. However, individuals who have immersed into their digital lives, prioritizing the virtual world against the real one, become more and more isolated in the physical world. Thus, their socialization processes that are undertaken only through lots of face-to-face interactions and trial-and-errors are apt to be neglected via 'Add Friend' kind of functions in OSNSs. In this paper, we present a friend recommendation system based on the on/off-line contextual information for the OSNS users to have more serendipitous offline interactions. In order to accomplish this, we modeled both offline information (i.e., place visit history) collected from a user's smartphone on a 3D tensor, and online social data (i.e., friend relationships) from Facebook on a matrix. We then recommended like-minded people and encouraged their offline interactions. We evaluated the users' satisfaction based on a real-world dataset collected from 43 users (12 on-campus users and 31 users randomly selected from Facebook friends of on-campus users).

Analysis of PRC regeneration algorithm performance in dynamic environment by using Multi-DGPS Signal (다중 DGPS 신호를 이용한 동적 환경에서의 PRC 재생성 알고리즘 성능분석)

  • Song Bok-Sub;Oh Kyung-Ryoon;Kim Jeong-Ho
    • The KIPS Transactions:PartA
    • /
    • v.13A no.4 s.101
    • /
    • pp.335-342
    • /
    • 2006
  • As PRC linear interpolation algorithm is applied after analysed and verified in this paper, the unknown location of a user can be identified by using PRC information of multi-DGPS reference station. The PRC information of each GPS satellite is not varying rapidly, which makes it possible to assume that PRC information of each GPS satellite varies linearly. So, the PRC regeneration algorithm with linear interpolation can be applied to improve the accuracy of finding a user's location by using the various PRC information obtained from multi-DGPS reference station. The desirable PRC is made by the linear combination with the known position of multi-DGPS reference station and PRC values of a satellite using signals from multi-DGPS reference station. The RTK-GPS result was used as the reference. To test the performance of the linearly interpolated PRC regeneration algorithm, multi-channel DGPS beacon receiver was built to get a user's position more exactly by using PRC data of maritime DGPS reference station in RTCM format. At the end of this paper, the result of the quantitative analysis of the developed navigation algorithm performance is presented.

Channel Searching Method of IEEE 802.15.4 Nodes for Avoiding WiFi Traffic Interference (WiFi 트래픽 간섭을 피하기 위한 IEEE 802.15.4 노드의 채널탐색방법)

  • Song, Myong Lyol
    • Journal of Internet Computing and Services
    • /
    • v.15 no.2
    • /
    • pp.19-31
    • /
    • 2014
  • In this paper, a parallel backoff delay procedure on multiple IEEE 802.15.4 channels and a channel searching method considering the frequency spectrum of WiFi traffic are studied for IEEE 802.15.4 nodes to avoid the interference from WiFi traffic. In order to search the channels being occupied by WiFi traffic, we analyzed the methods measuring the powers of adjacent channels simultaneously, checking the duration of measured power levels greater than a threshold, and finding the same periodicity of sampled RSSI data as the beacon frame by signal processing. In an wireless channel overlapped with IEEE 802.11 network, the operation of CSMA-CA algorithm for IEEE 802.15.4 nodes is explained. A method to execute a parallel backoff procedure on multiples IEEE 802.15.4 channels by an IEEE 802.15.4 device is proposed with the description of its algorithm. When we analyze the data measured by the experimental system implemented with the proposed method, it is observed that medium access delay times increase at the same time in the associated IEEE 802.15.4 channels that are adjacent each other during the generation of WiFi traffic. A channel evaluation function to decide the interference from other traffic on an IEEE 802.15.4 channel is defined. A channel searching method considering the channel evaluations on the adjacent channels together is proposed in order to search the IEEE 802.15.4 channels interfered by WiFi, and the experimental results show that it correctly finds the channels interfered by WiFi traffic.

The Work of Mourning of 9/11 in U. S. A (미국의 9/11 애도 작업에 관한 고찰 : 9/11추모관 건립과 테러와의 전쟁을 중심으로)

  • OH, bonghee
    • Cross-Cultural Studies
    • /
    • v.38
    • /
    • pp.89-113
    • /
    • 2015
  • This paper explores the work of mourning of 9/11 in the United States, focusing on the project of building the National September 11 Memorial managed by the Lower Manhattan Development Corporation(LMDC) and the War on Terror declared by the George W. Bush administration in the wake of 9/11. This paper first looks at the project of building the Natioanl September 11 Memorial and considers what was at stake in achieving this project. It also examines the limitations of the project. This paper argues that, in spite of the efforts to mourn the victims in significant and meaningful ways, the work of mourning in the memorial project fails at least in two respects. First, the memorial project "began so soon" right after 9/11 that the victims' families were not given enough time to mourn their loved ones. Second, the project were permeated with American nationalism and patriotism, which made the 316 non-American victims of 9/11 invisible and forgotten. Then, it goes on to examine the War on Terror because the War on Terror epitomized the failure of mourning due to these causes. In his address to the nation delivered on the very day of 9/11, President George W. Bush stated that "America was targeted for the attack because we're the brightest beacon for freedom and opportunity in the world" and that the terrorists failed to threaten America into chaos. He also stated that America is in "the war against terrorism." These statements were a futile reassertion of the illusion of American invulnerability and a prohibition of mourning in favor of violent military responses to 9/11. American nationalism also underlies Bush's official naming of September 11 as "Patriot Day." The victims were sacrificed because they were at the site when terrorists attacked, which implies that their death had nothing to do with American patriotism. Naming September 11 as Patriot Day was an act of imbuing the absurdity of the victims' death with a false meaning and an act of forgetting the non-American victims. The failure of the work of mourning of 9/11 consisted in the inability to recognize human vulnerability and interdependence and the inability to mourn not only American victims but also non-American victims killed in 9/11 and the War on Terror. A meaningful and significant mourning could be possible when we realizes that all human beings are exposed to one another and their lives are interdependent on one another. September Eleventh Families for Peaceful Tomorrows well demonstrated this kind of mourning. When most Americans supported violent retaliations, Peaceful Tomorrows made pleas for nonviolent responses to 9/11. Turning their grief into action for peace, its members work "to create a safer and more peaceful world for everyone," not only for Americans. Their effort to mourn in meaningful and nonviolent ways delivers the message that a disaster like 9/11 should not happen anywhere.

A Vedāntic Perspective on Philosophy for Old Age (노년 철학에 관한 베단따의 전망)

  • Park, Hyo-yeop
    • Journal of Korean Philosophical Society
    • /
    • v.145
    • /
    • pp.245-270
    • /
    • 2018
  • This article aims to examine the possibility of 'philosophy for old age' when humanity begins to reflect on old age in earnest as our country shifts to the aged society. In particular, this article aims to reframe $Ved{\bar{a}}ntic$ philosophy, i.e. a beacon of Hindu philosophy as a model of philosophy for old age, on the assumption that liberation-oriented Hindu philosophies in India can be the most suitable model to frame and apply philosophy for old age mainly at the individual level. First of all, this article identifies that liberation-oriented Hindu philosophies are nothing but a philosophy for the later part of one's life, that is, a philosophy for old age, showing that their common thoughts are very similar to the characteristics of old age. Then, it proves that three points of $Ved{\bar{a}}ntic$ philosophy, i.e. spirit supremacy, the world as an illusion, and freedom from all relations, are fully compatible with philosophy for old age. Finally, it argues that the tradition of Hindu saṃnyāsin (wonderer) embodied to the extreme in $Ved{\bar{a}}ntic$ philosophy is to establish 'old age for philosophy' beyond 'philosophy for old age.' Because $Ved{\bar{a}}ntic$ philosophy establishes saṃnyāsin of old age, which is optimized to strive for the truth as the confident subject of philosophical inquiry, so much that it exists more 'by old age' than 'for old age.' After all, according to $Ved{\bar{a}}ntic$ philosophy, as ontological and practical positivity is maximized in old age, so old age itself can be the best position to overcome not 'negativity of old age', but 'negativity of human condition' or 'negativity of life.'