• Title/Summary/Keyword: Context Information Service

Search Result 955, Processing Time 0.027 seconds

Smart Jewelry System for Health Management based on IoT (사물인터넷 기반 건강관리 스마트 주얼리 시스템)

  • Kang, Yun-Jeong;Yin, Li;Choi, DongOun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1494-1502
    • /
    • 2016
  • With the increasing availability of medical sensors and Internet of Things(IoT) devices for personal use, considering the interaction with users, it is planned to add intelligent function design to the fashionable jewelry, and develop composite multi-function intelligent jewelry through sensors identification. By means of IoT technology, while possessing communication function of intelligent jewelry, the function of intelligent jewelry can be expanded to the linkage network. In order to rapidly manage the mass data produced by intelligent jewelry sensors based on IoT, an intelligent jewelry system for health management is designed and an ontology model of intelligent jewelry system based on IoT is worked out. After the state of the services through the smart phone application is shown. The application provides a personalized service to the user and to determine the risk to show the guide lines according to the disease.

Development of AMI NMS (Network Management System) using SNMP for Network Monitoring of Meter Reading Devices (원격검침 설비의 네트워크 상태감시를 위한 SNMP 기반의 저압 AMI 망관리시스템 개발)

  • Kim, Young-Il;Park, So-Jeong;Kim, Young-Jun;Jung, Nam-Jun;Choi, Moon-Suk;Park, Byung-Seok
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.2 no.2
    • /
    • pp.259-268
    • /
    • 2016
  • KEPCO installed AMI (Advanced Metering Infrastructure) metering system for low-voltage customers from 2008. AMI metering system of KEPCO has operated 2.55 million customers and will plan to operate 22 million customers until 2020. KEPCO developed AMI NMS (Network Management System) to operate the meter reading network efficiently. NMS monitors the network status of DCUs (Data Concentration Unit) and modems. NMS provides functionalities of data collection and analysis. It collects property data of network device, network topology information, communication performance information, fault information, and etc. It analyzes collected data and controls network devices by remote access. AMI NMS collects about 370 MIBs (Mangement Information Bases) using SNMP (Simple Network Management Protocol). This paper introduces main functionalities, designed context, and implemented service screen.

Learning Material Bookmarking Service based on Collective Intelligence (집단지성 기반 학습자료 북마킹 서비스 시스템)

  • Jang, Jincheul;Jung, Sukhwan;Lee, Seulki;Jung, Chihoon;Yoon, Wan Chul;Yi, Mun Yong
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.179-192
    • /
    • 2014
  • Keeping in line with the recent changes in the information technology environment, the online learning environment that supports multiple users' participation such as MOOC (Massive Open Online Courses) has become important. One of the largest professional associations in Information Technology, IEEE Computer Society, announced that "Supporting New Learning Styles" is a crucial trend in 2014. Popular MOOC services, CourseRa and edX, have continued to build active learning environment with a large number of lectures accessible anywhere using smart devices, and have been used by an increasing number of users. In addition, collaborative web services (e.g., blogs and Wikipedia) also support the creation of various user-uploaded learning materials, resulting in a vast amount of new lectures and learning materials being created every day in the online space. However, it is difficult for an online educational system to keep a learner' motivation as learning occurs remotely, with limited capability to share knowledge among the learners. Thus, it is essential to understand which materials are needed for each learner and how to motivate learners to actively participate in online learning system. To overcome these issues, leveraging the constructivism theory and collective intelligence, we have developed a social bookmarking system called WeStudy, which supports learning material sharing among the users and provides personalized learning material recommendations. Constructivism theory argues that knowledge is being constructed while learners interact with the world. Collective intelligence can be separated into two types: (1) collaborative collective intelligence, which can be built on the basis of direct collaboration among the participants (e.g., Wikipedia), and (2) integrative collective intelligence, which produces new forms of knowledge by combining independent and distributed information through highly advanced technologies and algorithms (e.g., Google PageRank, Recommender systems). Recommender system, one of the examples of integrative collective intelligence, is to utilize online activities of the users and recommend what users may be interested in. Our system included both collaborative collective intelligence functions and integrative collective intelligence functions. We analyzed well-known Web services based on collective intelligence such as Wikipedia, Slideshare, and Videolectures to identify main design factors that support collective intelligence. Based on this analysis, in addition to sharing online resources through social bookmarking, we selected three essential functions for our system: 1) multimodal visualization of learning materials through two forms (e.g., list and graph), 2) personalized recommendation of learning materials, and 3) explicit designation of learners of their interest. After developing web-based WeStudy system, we conducted usability testing through the heuristic evaluation method that included seven heuristic indices: features and functionality, cognitive page, navigation, search and filtering, control and feedback, forms, context and text. We recruited 10 experts who majored in Human Computer Interaction and worked in the same field, and requested both quantitative and qualitative evaluation of the system. The evaluation results show that, relative to the other functions evaluated, the list/graph page produced higher scores on all indices except for contexts & text. In case of contexts & text, learning material page produced the best score, compared with the other functions. In general, the explicit designation of learners of their interests, one of the distinctive functions, received lower scores on all usability indices because of its unfamiliar functionality to the users. In summary, the evaluation results show that our system has achieved high usability with good performance with some minor issues, which need to be fully addressed before the public release of the system to large-scale users. The study findings provide practical guidelines for the design and development of various systems that utilize collective intelligence.

Multi-Channel MAC Protocol Based on V2I/V2V Collaboration in VANET (VANET에서 V2I/V2V 협력 기반 멀티채널 MAC 프로토콜)

  • Heo, Sung-Man;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.1
    • /
    • pp.96-107
    • /
    • 2015
  • VANET technologies provide real-time traffic information for mitigating traffic jam and preventing traffic accidents, as well as in-vehicle infotainment service through Telematics/Intelligent Transportation System (ITS). Due to the rapid increasement of various requirements, the vehicle communication with a limited resource and the fixed frame architecture of the conventional techniques is limited to provide an efficient communication service. Therefore, a new flexible operation depending on the surrounding situation information is required that needs an adaptive design of the network architecture and protocol for efficiently predicting, distributing and sharing the context-aware information. In this paper, Vehicle-to-Infrastructure (V2I) based on communication between vehicle and a Road Side Units (RSU) and Vehicle-to-Vehicle (V2V) based on communication between vehicles are effectively combined in a new MAC architecture and V2I and V2V vehicles collaborate in management. As a result, many vehicles and RSU can use more efficiently the resource and send data rapidly. The simulation results show that the proposed method can achieve high resource utilization in accordance. Also we can find out the optimal transmission relay time and 2nd relay vehicle selection probability value to spread out V2V/V2I collaborative schedule message rapidly.

Joint Angles Analysis of Intelligent upper limb and lower extremities Wheelchair Robot System (지능형 상 · 하지 재활 휠체어 로봇 시스템의 관절각도 분석)

  • Song, Byoung-Ho;Kim, Kwang Jin;Lee, Chang Sun;Lim, Chang Gyoon
    • Journal of Internet Computing and Services
    • /
    • v.14 no.6
    • /
    • pp.33-39
    • /
    • 2013
  • When the eldery with limited mobility and disabled use a wheelchairs to move, it can cause decreased exercise ability like decline muscular strength in upper limb and lower extremities. The disabled people suffers with spinal cord injuries or post stroke hemiplegia are easily exposed to secondary problems due to limited mobility. In this paper, We designed intelligent wheelchair robot system for upper limb and lower extremities exercise/rehabilitation considering the characteristics of these severely disabled person. The system consists of an electric wheelchair, biometrics module for Identification characteristics of users, upper limb and lower extremities rehabilitation. In this paper, describes the design and configurations and of developed robot. Also, In order to verify the system function, conduct performance evaluation targeting non-disabled about risk context analysis with biomedical signal change and upper limb and lower extremities rehabilitation over wheelchair robot move. Consequently, it indicate sufficient tracking performance for rehabilitation as at about 86.7% average accuracy for risk context analysis and upper limb angle of 2.5 and lower extremities angle of 2.3 degrees maximum error range of joint angle.

Design and Implementation of a Transparent Security Infrastructure using Filter and Transformer (필터와 트랜스포머를 이용한 투명한 보안기반의 설계 및 구현)

  • Kim, Yong-Min;Lee, Do-Heon;Noh, Bong-Nam;Choi, Rak-Man;Ine, So-Ran
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.4
    • /
    • pp.975-983
    • /
    • 1998
  • In these days, information communication systems are based on both open distributed computing technologies and object-oriented techniques like inheritance, encapsulation and object reuse to support various system configuration and application. As information systems are interconnected through unsecure networks, the need for the secure information exchange is more critical than before. In this paper, we have designed and implemented a transparent CORBA-basce Security infrastructure with authentication, security context association, access control and security information management to support a secure applications in distributed object environment. SESAME Ver. 4 was adopted as an external security service to manage user privilege attributes and to distribute keys for data encryption, decryption and integrity. Using filter and transformer with an interface to Object Request Broker, it provides a transparent security service to applications. The filter objects are special classes that allow additional parameters to be inserted into messages before they are sent and removed just after they are received. The transformer objects are special classes that allow direct access to the byte stream of every messages for encryption and decryption before it is sent and just after it is received. This study is to implement the access control interceptor(ACI) and the secure invocation interceptor(SII) of secure ORB defined in CORBA using filter and transformer.

  • PDF

Heterogeneous Sensor Data Acquisition Model for Providing Healthcare Services in IoT Environments (IoT 환경에서 헬스케어 서비스 제공을 위한 이기종 센서데이터 수집 모델)

  • Park, Yoo Sang;Choi, Jong Sun;Choi, Jae Young
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.2
    • /
    • pp.77-84
    • /
    • 2017
  • In order to provide healthcare services based on context-awareness techniques in IoT environments, a system requires to collect user profile and environmental information. To collect environmental information, accessing sensor device and gathering sensor data should be proceeded. Although this process is necessary to build environmental information, there is no proper sensor data acquisition model. In this paper, we propose sensor data acquisition model that contains schema to connect each device and to collect various kinds of data from sensor device at one point. In experiment, we demonstrate sensor data acquisition procedures with a description following suggested scheme.

Reservoir Tank Wireless Integrated Management using Information Filtering (정보 필터링을 이용한 저수조 무선 통합 관리)

  • Yu, Ki-Youp;Kouh, Hoon-Joon;Chung, Kyung-Yong;Rim, Kee-Wook;Lee, Jung-Hyun
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.787-791
    • /
    • 2009
  • In this paper, we proposed the reservoir tank wireless integrated management using information filtering for improving the water quality and on-line managing efforts of reservoir tanks. Reservoir tank level sensor works the pump sending the data from reservoir tank control to the wireless control on sensing water level. At this time, every kind data which happens in the water tank transmits the line transmission modem. The data to be received from the line transmission modem is stored at the database after we record the logs by each hour. The proposed method defined the context and environment of the reservoir tank and predicted the profited service according to the pump motion, the solar battery, the chemicals, the water level, the line, and the modem using information filtering. we plan to conduct the proposed method to verify the adequacy and the validity of reservoir tank wireless integrated management using the information filtering.

  • PDF

The impact of technology on resource sharing (정보기술이 자원공유에 미치는 영향)

  • 이영자
    • Journal of Korean Library and Information Science Society
    • /
    • v.22
    • /
    • pp.205-244
    • /
    • 1995
  • Originally the concept of the traditional resource sharing has been discussed in the context of bibliographic materials, and has been labor-intensive and high-cost activities. The technology has had a great impact on such pattern of the resource sharing, and has expanded the limited scope of the traditional concept into the sharing of library information in the levels of local, regional and national systems, and expertise, materials, facilities, equipments and personnels of the library system. While the traditional circulation service as a basic method to share library materials by users can provide the resource to a single person at a time, the electronic resource can be shared, by multi-users at a time anytime anywhere. The maximization of the electronic resource sharing requires that publishing process should be fundamentally changed and articles, books, chapters, speech manuscripts, music scores, maps, sound, and other formats of materials should be prepared in machine readable format. This study examined the positive effects of the technology on the resource sharing, but not investigate the concrete and complex problems as to the cost, guidelines, detailed procedures, design details, and intellectual properties and protection involved in the resource sharing. Some findings extracted from the study can be summarized as follows; (1) ILL will lose its meaning as a method to share the materials if they are all in the electronic format and the phrase 'networked information resource' becomes omnipresent. (2) The technology keeps on changing the concept of resource sharing. Today, the scope of resource sharing not only encompasses the sharing of the primary and secondary materials but also the sharing of the processings(eg. cataloging), expertise, user education, special facilities, and the integrated automated library systems. (3) The sharing of the networked resource will be a method to provide better services for library users in the low cost. (4) The a n.0, pplication of the technology to the resource sharing should be focus on the method which allows an end-users to do the direct access to the needed materials, and to be delivered the primary document as soon as possible.

  • PDF

The current situation of Chinese Fourth Party Logistics Industry and Korean Fourth Party Logistics Companies' market entry strategy (중국 제4자 물류산업의 현황과 우리나라 제4자 물류기업의 중국 물류시장 진출전략에 관한 연구)

  • Oh, Moon-Kap
    • International Commerce and Information Review
    • /
    • v.15 no.4
    • /
    • pp.313-339
    • /
    • 2013
  • Logistics industry was changed after China join into the WTO. Compared with other countries, cost of logistics is very high in China. Besides, there are several problems with the demand basis, service and information technology of the third-party logistics. The forth-party logistics was appeared in logistics market in this context. The forth-party logistics was just become to develop in China so there are many problems recent years. Chinese government propose some solutions with the development of the fourth-party logistics such as the adjustment of the logistics industry policy, strengthening of the logistics information system and infrastructure, training logistics expertise. This research pointed out the obstacles in the development of the forth-party logistics in China by analyzing the present situation and the development strategy of some representative companies such as ANDE Logistics Company and Philips Logistics Company. The purpose of this paper is to research the development of the forth-party logistics in China by analyzing the problems with Chinese government and logistics companies, and finally bring up some solutions with these problems.

  • PDF