• Title/Summary/Keyword: ICT Use

Search Result 854, Processing Time 0.025 seconds

A Study on Improvements in the Method of Local Risk Assessment for Natural Disasters (자연재해 지역위험성평가 방법 개선방안 연구)

  • Choi, Sung Jo;Kang, Hwi Jin
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.2
    • /
    • pp.1-12
    • /
    • 2022
  • Based on major safety-related statistics of cities, provinces, counties, and districts across the country, social disasters manage regional safety index ratings in six areas(traffic accidents, fires, crime, life safety, suicide, and infectious diseases), and natural disasters operate a management system. The current application of the regional safety assessment of natural disasters is very insufficient to evaluate the local risk of natural disasters up to the Eup, Myeon, and Dong level, and it is marked too engineering and difficult for the general public to use. The purpose of this study is to present Korea's natural disaster local risk assessment as an improvement model that extends to the sub-unit of Eup, Myeon, and Dong, using the local risk assessment model mixed with natural and social disasters.

Development of Collision Prevention Usage Scenario based on Vehicle-to-Vehicle Communication of Autonomous Vehicles (자율주행 차량의 차량 대 차량 통신에 기반한 충돌방지 활용 시나리오 개발)

  • Seo, HyunDuk;Kwon, Doyoung;Shin, Jaemin;Choi, Eunhyuk;Lim, Huhnkuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.2
    • /
    • pp.251-257
    • /
    • 2022
  • Self-driving vehicles are a type of smart vehicle with the help of ICT technology, which means a vehicle that operates without the intervention of a driver.Vehicles with vehicle safety communication technology (V2X) applied use information detected from various sensors or other vehicles/infrastructures to enable the smart vehicle to accurately and quickly predict the driver's potential danger situation, contributing to more stable autonomous driving. In this paper, among V2X communication technologies, a vehicle-to-vehicle communication (V2V) simulation communication technology is used to present a scenario for preventing collisions in autonomous vehicles. A vehicle collision prevention system based on V2V simulated communication was implemented and the suggested collision prevention application scenario was demonstrated. The suggested collision prevention utilization scenario can be considered as one application case of V2V communication technologies that are currently being developed/applied.

A Study on the Impact of the Leisure Motivation of the Elderly upon Happiness: Focusing on the Mediating Effect on Self-Efficacy (노인의 여가 참여동기가 행복감에 미치는 영향: 자기효능감에 대한 매개효과 연구)

  • Kong, Kyoung Bae
    • Journal of Platform Technology
    • /
    • v.10 no.3
    • /
    • pp.30-43
    • /
    • 2022
  • The purpose of this study is to examine the structural dynamics between the leisure motivation, self-efficacy, and happiness of the elderly to provide a lesson and invigoration strategies for the systematic leisure activities of the elderly. This study was conducted with 366 baby boomers who use the elderly welfare centers located in Seoul and Gyeonggi-do, where the statistical analyses were conducted using SPSS 26.0 and AMOS 26.0. The findings of this study were as follows; First, of the leisure motivations of the elderly, those other than competency motivation, that is, intellectual motivation, social motivation, and recuperative motivation, had a significant impact on happiness. Second, all the motivations for the elderly, that is, intellectual, social, competency, and recuperative motivations, had a positive impact on self-efficacy. Third, the self-efficacy of the elderly had a significant and positive impact on happiness. Fourth, in the relationship between the intellectual, social, competency, and recuperative motivations and happiness, self-efficacy was shown to have a significant mediating effect. The findings of this study indicates that the elderly leisure welfare programs should be expanded in each local community, so that such programs could be used in various aspects to contribute to the enhancement of self-efficacy and happiness.

Design and Implementation of Topology Generator for Sm art Factory Security Endpoint Identification (스마트팩토리 보안 앤드포인트 식별을 위한 토폴로지 제네레이터 설계 및 구현)

  • Yanghoon Kim
    • Journal of Platform Technology
    • /
    • v.11 no.3
    • /
    • pp.76-82
    • /
    • 2023
  • Starting from the 4th industrial revolution, core technologies were applied to industries to build various smart environments. Smart factories in the manufacturing industry produce high-quality products by applying IIoT as a core technology that can collect and control a wide range of data for customized production. However, the network environment of the smart factory converted to open through IIoT was exposed to various security risks. In accordance with security breaches, IIoT has shown degradation in the quality of manufactured products and production processes due to network disturbance, use and maintenance of forged IIoT, and can cause reliability problems in business. Accordingly, in this study, a method for safe connection and utilization of IIoT was studied during the initial establishment of a smart factory. Specifically, a study was conducted to check the IIoT connection situation so that the practicality of the IIoT connected to the smart factory could be confirmed and the harmless environment established.

  • PDF

Implementation of Joystick for Flight Simulator using WiFi Communication

  • Myeong-Chul Park;Sung-Ho Lee;Cha-Hun Park
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.8
    • /
    • pp.111-118
    • /
    • 2023
  • In this paper, we propose a WiFi-based joystick with an acceleration sensor and a vibration sensor that can be used in flight simulators and VR fields. The flight simulator is a technology belonging to the ICT and SW application field and provides a simulation environment that reproduces the aircraft environment. Existing flight simulator control devices are fixed to a specific device and the user's activity area is limited. In this paper, a 3D space manipulation device was implemented for the user's free use of space. In addition, the proposed control device is designed as a WiFi communication board and display that displays information and performs 3-axis sensing for accurate and sophisticated control compared to existing VR equipment controllers. And the applicability was confirmed by implementing a Unity-based virtual environment. As a result of the implementation device verification, it was confirmed that the control device operates normally through the communication interface, It was confirmed that the sensing values in the game and the sensing values measured on the implemented board matched each other. The results of this study can be used for VR and various metaverse related contents in addition to flight simulators.

A study on modularization of public data that can be used universally in the field of big data education (빅데이터교육 현장에서 범용적으로 활용 가능한 공공데이터 모듈화 연구)

  • Su-Youn Choi;Jong-Youel Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.1
    • /
    • pp.655-661
    • /
    • 2023
  • Big data, an important element of the 4th industrial revolution, is actively opening public data in public institutions and local governments. In the public data portal, everyone can conveniently search for data and check related data, but only those in ICT-related fields are using public data. Although data held by public institutions is open to citizens, it is difficult for anyone to easily utilize public data to develop applications. In this paper, data provided in open API format from public data portals has XML and JSON formats. In this study, we are a method of modularizing public data in XML format into a part that can be easily developed by linking it to a GUI interface. Based on the necessary public data, we propose a way to easily develop mobile programs and promote the use of public data.

A Study on the Utilization of Photo Contents based Electronic Cultural Atlas (전자문화지도 기반 사진 콘텐츠 활용에 관한 연구)

  • Lee, Dong-Yul;Kang, Ji-Hoon;Moon, Sang-Ho
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.5 no.2
    • /
    • pp.315-323
    • /
    • 2015
  • As a form of convergence studies, many studies on electronic cultural atlas have been performed. In this paper, our objective is to design an electronic cultural atlas for utilizing photo contents based on display and sharing effect. This is one of the ways to effectively use various photo contents. Through electronic cultural atlas, photo contents are recognized as an object that contains a lot of information. To do this, we design an electronic cultural atlas for utilizing photo contents, and investigate the utilization differences through comparison with existing systems. In detail, we examine the limits of the traditional photo exhibition method, and research on usability of users when an electronic cultural atlas was used to exhibit and share the photos contents efficiently.

A Mrthod on the Design of Sensor Network for the Surrounding Safety Using Drones (드론을 활용한 주변 안전을 위한 센서 네트워크 구성 방안)

  • Hong, Sung-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.667-669
    • /
    • 2021
  • Recently, RFID/USN technology has been applied in various fields such as logistics, environment, education, home network, disaster prevention, military, and medical care, but despite the remarkable development of RFID/USN technology, it is difficult to apply it to marine industry due to the characteristics of poor marine environment. Therefore, satellites are mainly used in the marine sector, and existing communication networks are used in the coast, so measures for forming a shelf-only short-range network in the ocean are being considered. In this paper, we consider the use of drones as mobile base stations of USN as a base station role using USN in existing PS-LTE and LTE networks.Since autonomous navigation vessels are aiming for the intelligent system, the number of crew and labor force should be reduced and the function of autonomous network formation in the form of more stable and intelligent ICT convergence technology should be strengthened.

  • PDF

Embedded Mask Recognition System using YOLOv5 (YOLOv5를 이용한 임베디드 마스크 인식 시스템)

  • Ga-Won Yu;Eun-Sung Choi;Young-Jin Kang;Jeon, Young Jun;Jeong, Seok Chan
    • The Journal of Bigdata
    • /
    • v.7 no.1
    • /
    • pp.63-73
    • /
    • 2022
  • COVID-19 has continued from 2020 to the present, and many social changes have occurred. Wearing a mask has become mandatory, and if you do not wear a mask, you cannot use public facilities or restaurants. For this reason, most public facility entrances are equipped with a mask recognition system to check whether a mask is worn. However, it is unclear whether people who cover their mouths with a scarf or who do not wear a mask properly can be identified. In this study, we proposed an embedded mask recognition system using YOLOv5. Unlike the existing mask recognition system, it was able to distinguish not only whether a mask was worn, but also whether a mask was worn in various exceptional situations, such as a person with a scarf or a person covering their mouth with their hands, and showed excellent performance when mounted on the Nvida Jetson Nano Board.

Class Classification and Type of Learning Data by Object for Smart Autonomous Delivery (스마트 자율배송을 위한 클래스 분류와 객체별 학습데이터 유형)

  • Young-Jin Kang;;Jeong, Seok Chan
    • The Journal of Bigdata
    • /
    • v.7 no.1
    • /
    • pp.37-47
    • /
    • 2022
  • Autonomous delivery operation data is the key to driving a paradigm shift for last-mile delivery in the Corona era. To bridge the technological gap between domestic autonomous delivery robots and overseas technology-leading countries, large-scale data collection and verification that can be used for artificial intelligence training is required as the top priority. Therefore, overseas technology-leading countries are contributing to verification and technological development by opening AI training data in public data that anyone can use. In this paper, 326 objects were collected to trainn autonomous delivery robots, and artificial intelligence models such as Mask r-CNN and Yolo v3 were trained and verified. In addition, the two models were compared based on comparison and the elements required for future autonomous delivery robot research were considered.