• Title/Summary/Keyword: External User

Search Result 528, Processing Time 0.023 seconds

Development of Smart ICT-Type Electronic External Short Circuit Tester for Secondary Batteries for Electric Vehicles (전기자동차용 2차전지를 위한 스마트 ICT형 전자식 외부 단락시험기 개발)

  • Jung, Tae-Uk;Shin, Byung-Chul
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.25 no.3
    • /
    • pp.333-340
    • /
    • 2022
  • Recently, the use of large-capacity secondary batteries for electric vehicles is rapidly increasing, and accordingly, the demand for technologies and equipment for battery reliability evaluation is increasing significantly. The existing short circuit test equipment for evaluating the stability of the existing secondary battery consists of relays, MCs, and switches, so when a large current is energized during a short circuit, contact fusion failures occur frequently, resulting in high equipment maintenance and repair costs. There was a disadvantage that repeated testing was impossible. In this paper, we developed an electronic short circuit test device that realizes stable switching operation when a large-capacity power semiconductor switch is energized with a large current, and applied smart ICT technology to this electronic short circuit stability test system to achieve high speed and high precision through communication with the master. It is expected that the inspection history management system based on data measurement, database format and user interface will be utilized as essential inspection process equipment.

Implementation of Sensors Information Alarm Service using an FCM based on Raspberry Pi (FCM을 이용한 라즈베리파이 기반의 센서정보 알림 구현)

  • Oh, Sejin
    • Journal of Industrial Convergence
    • /
    • v.20 no.8
    • /
    • pp.61-67
    • /
    • 2022
  • The Internet of Things(IoT) is one of the key technologies in the Fourth Industrial Revolution. The IoT is a system that acquires information from various sensors and provides meaningful information to users. The method of obtaining information from sensor is using WIFI, Bluetooth and Server. is not accessible to external users because of different type of networks or local area communication. For this reason, there is a problem that external user cannot receive notification in regard to sensor information. In this paper, we want to establish a cloud message environment using Google's FCM(Firebase Cloud Messaging) and find out through experiments how users can receive notifications even if they are outside.

A Deep Learning-based Hand Gesture Recognition Robust to External Environments (외부 환경에 강인한 딥러닝 기반 손 제스처 인식)

  • Oh, Dong-Han;Lee, Byeong-Hee;Kim, Tae-Young
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.14 no.5
    • /
    • pp.31-39
    • /
    • 2018
  • Recently, there has been active studies to provide a user-friendly interface in a virtual reality environment by recognizing user hand gestures based on deep learning. However, most studies use separate sensors to obtain hand information or go through pre-process for efficient learning. It also fails to take into account changes in the external environment, such as changes in lighting or some of its hands being obscured. This paper proposes a hand gesture recognition method based on deep learning that is strong in external environments without the need for pre-process of RGB images obtained from general webcam. In this paper we improve the VGGNet and the GoogLeNet structures and compared the performance of each structure. The VGGNet and the GoogLeNet structures presented in this paper showed a recognition rate of 93.88% and 93.75%, respectively, based on data containing dim, partially obscured, or partially out-of-sight hand images. In terms of memory and speed, the GoogLeNet used about 3 times less memory than the VGGNet, and its processing speed was 10 times better. The results of this paper can be processed in real-time and used as a hand gesture interface in various areas such as games, education, and medical services in a virtual reality environment.

User-centered information service and a n.0, pplication of sense-making theory (이용자 중심 정보서비스와 Sense-making 이론의 적용)

  • ;Noh, Jin-Goo
    • Journal of Korean Library and Information Science Society
    • /
    • v.28
    • /
    • pp.447-475
    • /
    • 1998
  • We are seeing a shift of the focus of information service from system-centered(data-centered or intermediary-centered) a n.0, pproach to user-centered a n.0, pproach. Sense-making theory is one of the user- centered a n.0, pproaches. This study focused on user-centered information service paradigm concepts of Dervin's sense-making theory and interpreting sense-making theory in the practical context of library services. The sense-making theory is basically a cognitive a n.0, pproach to information-seeking, in that it recognizes information as something that involves internal cognitive processes. The user of information becomes the focus in this sense-making model. The sense-making theory sees information as subjective, situational, and cognitive. It focuses on understanding information within specific contexts and on understanding how information needs develop and how they are satisfied. It regards the user not as a passive receive of external information but as the center in a active, ongoing process of change. It related to the information needs of users. Dervin's method for studying information needs employs the 'situation-gap-use' metaphor. All information needs stem from a discontinuity or 'gap! in one's knowledge. Dervin believes that information needs can be addressed by understanding the process that each individual goes through in experiencing a gap, in trying to resolve it, and in gaining something (especially new knowledge) from the experience. Sense-making is a process; 'sense' is the product of this process. Sense includes 'knowledge'. However, it includes a host of other subjective factors that reflect an individual's interpretations of a situation including intuitions, opinions, hunches, effective responses, evaluations, questions, etc. For several reasons, however, difficulties are encountered if one attempts a more substantial assessment of the theory. First, it has not yet crystallized into a well-defined theory. Secondly, though the theory has aroused general interest, e.g. within LIS, detailed discussion of its strong and weak points is still lacking. A third source of difficulty is that the basic assumptions of the theory have been explicated metaphorically. If sense-making theory is to be really useful, it needs to be interpreted for library settings. But we have found no attempt to construct an information service based on the theory. Because the research tradition is still relatively young, there are many unanswered questions connected, e.g. with the design of information systems. In any case, e.g. intermediary access systems would be more efficient and effective it their planning could be founded on the user-centered a n.0, pproach.

  • PDF

A Study on Development of Operational System for Oil Spill Prediction Model (유출유 확산 예측 모델의 상시 운용 체계 개발에 관한 연구)

  • Kim, Hye-Jin;Lee, Moon-Jin;Oh, Se-Woong;Kang, Joon-Mook
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.17 no.4
    • /
    • pp.375-382
    • /
    • 2011
  • There is no system to obtain the basic data and proceed data and user input interface is complex, thus there are some limitation to utilize the oil spill prediction model. It is difficult to build the scientific response strategy in order to respond oil spill accident rapidly because it is impossible to operate the oil spill prediction model any time. In this study, the optimum operational system for oil spil prediction model has been developed considering the present system. External real time data has been linked because of impossibility of building all basic data and minimum database has been build in this study. Through this data system, real time oil spill prediction model can be utilized. And the user interface has been designed to reduce the error of the interface between user and model and the output interface has been proposed to analyze the result of modeling at multidimensional aspect. While the system for oil spill prediction model as the result of this study has some uncertainties because of depending on external data, the thing that we can predict oil spill using operate the model rapidly as soon as the accident occurred can be meaning in the response field.

A Study on the Control Algorithm for Active Walking Aids by Using Torque Estimation (모터 토크 추정을 통한 능동형 보행보조기의 차량 제어 알고리즘 구현)

  • Kong, Jung-Shik;Lee, Bo-Hee;Lee, Eung-Hyuk;Choi, Heung-Ho
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.2
    • /
    • pp.181-188
    • /
    • 2010
  • This paper presents the control algorithm of active walking aids estimating external torque of the wheels from user's will. Nowadays, interest of the walking aids is increased according to the increase in population of elder and handicapped person. Although many walking aids are developed, most of walking aids don't have any actuators for its movement. However, general walking aids have weakness for its movement to upward/download direction of slope. To overcome the weakness of the general walking aids, many researches for active type walking aids are being progressed. Unfortunately it is difficult to precision control of walking will during its movement, because it is not easy to recognize user's walking will. Many kinds of methods are proposed to recognize of user's walking will. In this paper, we propose control algorithm of walking aids by using torque estimation from wheels. First, we measure wheel velocity and voltage at the walking aids. From these data, external forces are extracted. And then walking will that is included by walking velocity and direction is estimated. Finally, walking aids are controlled by these data. Here, all the processes are verified by simulation.

The e-Business Component Construction based on Distributed Component Specification (분산 컴포넌트 명세를 통한 e-비즈니스 컴포넌트 구축)

  • Kim, Haeng-Gon;Choe, Ha-Jeong;Han, Eun-Ju
    • The KIPS Transactions:PartD
    • /
    • v.8D no.6
    • /
    • pp.705-714
    • /
    • 2001
  • The computing systems of today expanded business trade and distributed business process Internet. More and more systems are developed from components with exactly reusability, independency, and portability. Component based development is focused on advanced concepts rater than passive manipulation or source code in class library. The primary component construction in CBD. However, lead to an additional cost for reconstructing the new component with CBD model. It also difficult to serve component information with rapidly and exactly, which normalization model are not established, frequency user logging in Web caused overload. A lot of difficult issues and aspects of Component Based Development have to be investigated to develop good component-based products. There is no established normalization model which will guarantee a proper treatment of components. This paper elaborates on some of those aspects of web application to adapt user requirement with exactly and rapidly. Distributed components in this paper are used in the most tiny size on network and suggest the network-addressable interface based on business domain. We also discuss the internal and external specifications for grasping component internal and external relations of user requirements to be analyzed. The specifications are stored on Servlets after dividing the information between session and entity as an EJB (Enterprise JavaBeans) that are reusable unit size in business domain. The reusable units are used in business component through query to get business component. As a major contribution, we propose a systems model for registration, auto-arrange, search, test, and download component, which covers component reusability and component customization.

  • PDF

A Study on Security Police against Problem of Using Secure USB according to National Assembly Network Separation (국회 네트워크 분리에 따른 보안 USB 메모리의 사용 문제점 및 보안 대책 연구)

  • Nam, Won-Hee;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.471-474
    • /
    • 2012
  • The administration of government agencies and Law enforcement agencies is utilize. that network separation and Establish CERT for network security. However, the legislature has a basic security system. so a lot of relative vulnerability. In this paper, study for security National Assembly and the National Assembly Secretariat, at Library of National Assembly on legislative National Assembly for information security and network configuration, network and external Internet networks is to divide the internal affairs. Network separation in accordance with the movement of materials to use secure USB memory, the user has the uncomfortable issues. Problem analysis and security vulnerabilities on the use of USB memory is study the problem. User efficiency and enhance security.

  • PDF

The Reliability and Validity of Korean Version of the Wheelchair User's Shoulder Pain Index in Wheelchair Users (휠체어 사용자를 위한 한국어판 WUSPI의 신뢰도와 타당도)

  • Park, Ji-Yeon;Cho, Sang-Hyun
    • Journal of the Korean Society of Physical Medicine
    • /
    • v.8 no.4
    • /
    • pp.573-582
    • /
    • 2013
  • PURPOSE: The purpose of this study was to establish the reliability and validity of the Wheelchair User's Shoulder Pain Index (WUSPI), which was translated into Korean for long-term wheelchair users. This index measured 15 functional activities, including transfer, self-care, wheelchair mobility and general activities. METHODS: To assess test-retest reliability, 23 long-term wheelchair users completed this self-administered index twice within the same day. Reliability was determined by the intraclass correlation coefficient (ICC), and Cronbach's alpha was used to measure internal consistency. To examine concurrent validity, 21 long-term wheelchair users completed the questionnaire, and we examined the correlation between the index score and the shoulder range of motion measurements. RESULT: The results showed that the intraclass correlation for test-retest reliability of the total index score ranging from .88 to .99 was good to excellent. Additionally, Cronbach's alpha was .96. The internal consistency indicated excellent. Concurrent validity showed negative correlations of total index score to range of motion measurements of shoulder flexion (rho=-.58), extension (rho=-.09), abduction (rho=-.59), external rotation (rho=-.07) and internal rotation (rho=-.3), suggesting a relationship of total index score to loss of shoulder range of motion. CONCLUSION: The Korean WUSPI shows not only high reliability and internal consistency, but also concurrent validity with loss of shoulder flexion and abduction.

Factors Affecting Continuous Customer Acceptance of Internet Banking (인터넷 뱅킹의 사용자 지식, 서비스 특성, 보안요인이 지속적 고객수용에 미치는 영향)

  • Chae, Young-Il
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.6
    • /
    • pp.372-384
    • /
    • 2011
  • The purpose of this study is empirically analyzing the effects of external factors(user knowledge, service characteristics, security), perceived risk, trust, ease of use, and usefulness on continuous customer acceptance in Internet banking. To achieve the goal, we develop the extended Technology Acceptance Model(Ex-TAM) based in the theoretical backgrounds of the Technology Acceptance Model(TAM). To test the new model(Ex-TAM), path analysis is performed by AMOS 4.0 package as a statistical tool. The finding indicate that 4 factors(service characteristics, ease of use, usefulness, trust) are significant. However, 2 factors(security, perceived risk) are not significant, user knowledge is partly significant.