• Title/Summary/Keyword: IoT 결함

Search Result 645, Processing Time 0.029 seconds

A Study of Establishing the Development Strategy of Construction Project Management System Using SWOT Analysis (SWOT분석을 통한 건설사업관리시스템 개발전략 수립에 관한 연구)

  • Kim, SeongJin;Ok, Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.86-93
    • /
    • 2016
  • Information technology, such as IoT, Big Data, Drone, Cloud etc., is evolving every year. Information Society is changing Intelligence Society and Creative Society. A new Construction Projects Management System Roadmap is required because it is difficult to reflect the current IT environments based on the CALS(Continuous Acquisition & Life-cycle Support) master plan, which is performed to establish every five years since 1998. This study was prepared for the Roadmap with a focus on Construction Management System based on the 4th CALS master plan, which was performed to establish the 2012 year. To this end, the construction environment and several information systems were investigated and analyzed. The problems of the construction project information system were derived using SWOT analysis, the vision, goal, direction, strategy, main tasks, specific tasks, and timetable of the Construction Project Management System are presented. This roadmap is designed to be used as operational indicators of a future construction project management system.

A Study on Routing Implementation and Performance Measurement Scheme among IPv6 Terminals (IPv6 단말간 라우팅 구현과 성능측정 구성 방안에 관한 연구)

  • Woo, Jung-Yoon;Yang, JaeSoo;Lee, Jong Won;Kim, Kangju
    • Journal of Digital Contents Society
    • /
    • v.19 no.3
    • /
    • pp.505-512
    • /
    • 2018
  • Internet demand has increased rapidly, and Internet Protocol Version 4, the main Internet protocol, can not cope with various types of network demand in the future. Therefore, it is urgent to spread IPv6-based stable network to solve the shortage of Internet address resources. Due to the proliferation of IoT and the increase in mobile devices, efficient and optimal IPv6 routing design is indispensable. In this paper, we have studied about characteristics of IPv6, address system of IPv6, structure analysis and efficient routing technology among IPv6 terminals. Furthermore, experimental results on routing packet analysis and convergence time are presented in network - based IPv6 routing implementation environment. In addition, we show the results of the experiment analysis by dividing the implementation of IPv6 routing, operation test, and fail over performance into three kinds of routing protocol methods. As a result, this study can be applied to the introduction of IPv6 system, test bed environment construction, and network design.

Development of IoT-based real-time Toxic Chemical management System (IoT 기반의 실시간 유해 화학물 관리 시스템 개발)

  • Kang, Min-Soo;Ihm, Chunhwa;Jung, Yong-Gyu;Lee, Minho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.143-149
    • /
    • 2016
  • Recent accidents caused by toxic chemicals and the social problems caused by frequent. As of 2010, there are more than 100,000 types of deadly toxic chemicals being distributed throughout Korea, and severely intoxicated patients along with an enormous number of patients can be induced at the time of an accident involving deadly toxic chemicals. Internationally, the seriousness of large-scale disasters due to a NBC disaster (nuclear, biologic and chemical disaster) is being highlighted as well. So, we obtain the information of the RFID tag attached to a glass bottle with containing the toxic chemical to transfer the data to the smart device has been studied a system that can monitor the status of the toxic chemical in real time. The proposed system is the information was sent to the main system using a zigbee communication by recognizing the tag vial containing the toxic chemical with the 13.56MHz bandwidths good permeability. User may check the information in real time by utilizing the smart device. However, the error of the system for managing the toxic chemical generates a result that can not be predicted. Failure of the system was detecting the error by using a comparator as this can cause an error. And the detected error proposed a duplex system so that they do not affect the overall system.

The Physical Activity and Smart Health Care of Trend for the Elderly (노인을 위한 신체활동 및 스마트 헬스 케어분야의 경향)

  • Yi, Eun Surk
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.511-516
    • /
    • 2017
  • The study conducted a systematic analysis through systematic literature to explore trends in physical activities and trends in the elderly and smart health care sector. Based on the research data collected from 2006 to 2017, the research paper was selected as an analysis data base and collected data from the patented patent data registered to the Patent Office. Based on the combination of the aged, physical activities, IT, IoT, and healthcare, the research identified the research trends and subjects through the analysis and analysis of subjects based on a total of 102 academic journals and 79 patents. First of all, the academic research published a surge in 2010 research in 2006, and it has emerged as an area of continuous interest in academia until 2017. Meanwhile, patents for patents soared in 2012, according to the company's patent. Second, research shows that studies are being conducted in five areas of research. Service design, monitoring systems, systems, policies, and other studies. In the case of patents, three types of patents were classified as patents, devices and information related to information. Subsequent studies will be deemed necessary to verify the effectiveness of the smart health care technology to enhance the health of the elderly.

Development of a Portable Card Reader for the Visually Impaired using Raspberry Pi (라즈베리 파이를 적용한 시각장애인을 위한 휴대용 카드 리더기 개발)

  • Lee, Hyun-Seung;Choi, In-Moon;Lim, Soon-Ja
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.10
    • /
    • pp.131-135
    • /
    • 2017
  • We developed a portable card reader for the visually impaired. In South Korea, there is insufficient development of lifestyle aids for people with disabilities. Living aids for people with disabilities are being developed using information technology, smart phones, Internet of Things(IoT) devices, 3D printers, and so on. Blind people were interviewed, which showed that the card recognition function using a currently developed smart phone app was not able to recognize the screen of the smart phone by the hand of the visually impaired, and it was inconvenient to operate. In recent years, devices that enable the visually impaired to recognize cards have been studied in foreign countries and are emerging prototypes. But what is currently available is expensive and inconvenient. In addition, visually impaired people are most vulnerable to low-income families, which makes it difficult to purchase and use expensive devices. In this study, we developed a card reader that recognizes a card using a Raspberry Pi, which is an open-source hardware that can be applied to IoT. The card reader plays it by voice and vibration, and the visually impaired can use it at a low price.

Analysis of Small Cell Technology Application for Performance Improvement in Simulation-based 5G Communication Environment (시뮬레이션 기반 5G 통신 환경에서 성능향상을 위한 스몰셀 기술 적용 분석)

  • Kim, Yoon Hwan;Kim, Tae Yeun;Lee, Dae Young;Bae, Sang Hyun
    • Smart Media Journal
    • /
    • v.9 no.2
    • /
    • pp.16-21
    • /
    • 2020
  • Recently, mobile traffic is increasing exponentially as major traffic is transferred to IoT and visual media data in the dissemination of mobile communication terminals and contents use. In order to overcome the limitations of the existing LTE system, 5G mobile communication technology (5G) is a technology that meets 1000 times data traffic capacity, 4G LTE system acceptance, low latency, high energy efficiency, and high cost compared to 4G LTE system. The path loss due to the use of the frequency domain is very high, so it may be difficult to provide a service compared to the existing 4G LTE system. To overcome these shortcomings, various techniques are under study. In this paper, small cell technology is introduced to improve the system performance of 5G mobile communication systems. The performance is analyzed by comparing the results of small cell technology application, macro communication and small cell communication, and the results of the proposed algorithm application for power control. The analysis results show that the use of small cell technology in the 5th generation mobile communication system can significantly reduce the shadow area and reduce the millimeter wave path loss problem.

Design Concept Value Competitive Research Between Service Provider and Service Receiver (수면무호흡 환자의 양압기 제품서비스디자인 개발에 대한 서비스 제공자와 수혜자가 느끼는 디자인 컨셉 가치 비교연구)

  • Lee, Sung Pil;Jung, Ju Young;Lee, Sang Ki;Hong, Jung Pyo
    • Journal of Service Research and Studies
    • /
    • v.7 no.4
    • /
    • pp.39-50
    • /
    • 2017
  • As a comparative study on the value of design concept between service provider (Developer) and service receiver (Customer) group, the aims of this study was to present a service model focused on Continuous positive airway pressure (CPAP) based on U-health care and user environment. Double Diamond-based methods led to a case study that conducted jointly by the department of otolaryngology in U hospital, Ulsan. By targeted on Sleep Apnea patients from the stage of diagnosis to CPAP treatment, variety of meaningful experiences have been extracted and classified into several types of customers. In the final analysis of the 13 service scenario models, Kano Satisfaction and Potential Customer Satisfaction Improvement Index (PCSI) were conducted with the customers, yet Score Model and Concept Position were evaluated by the service provider groups who engaged in development services. The results of this study showed that 7 items in the total of 12 items reached a consensus of viewpoint on value between service receiver and service provider, which the attributes of the service model are based on user environment. Whereas the other 5 items showed the divergent viewpoint on value which included the attributes of U-healthcare service model.

AQ-NAV: Reinforced Learning Based Channel Access Method Using Distance Estimation in Underwater Communication (AQ-NAV: 수중통신에서 거리 추정을 이용한 강화 학습 기반 채널 접속 기법)

  • Park, Seok-Hyeon;Shin, Kyungseop;Jo, Ohyun
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.7
    • /
    • pp.33-40
    • /
    • 2020
  • This work tackles the problem of conventional reinforcement learning scheme which has a relatively long training time to reduce energy consumption in underwater network. The enhanced scheme adjusts the learning range of reinforcement learning based on distance estimation. It can be reduce the scope of learning. To take account the fact that the distance estimation may not be accurate due to the underwater wireless network characteristics. this research added noise in consideration of the underwater environment. In simulation result, the proposed AQ-NAV scheme has completed learning much faster than existing method. AQ-NAV can finish the training process within less than 40 episodes. But the existing method requires more than 120 episodes. The result show that learning is possible with fewer attempts than the previous one. If AQ-NAV will be applied in Underwater Networks, It will affect energy efficiency. and It will be expected to relieved existing problem and increase network efficiency.

Design and Implementation of Cost-effecive Public Bicycle Sharing System based on IoT and Access Code Distribution (사물 인터넷과 액세스 코드 배포 기반의 경제적인 공공 자전거 공유 시스템의 설계 및 구현)

  • Bajracharya, Larsson;Jeong, Jongmun;Hwang, Mintae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.8
    • /
    • pp.1123-1132
    • /
    • 2018
  • In this paper, we design and implement a public bicycle sharing system based on smart phone application capable of distributing access codes via internet connection. When smartphone user uses the application to request a bicycle unlock code, server receives the request and sends an encrypted code, which is used to unlock the bicycle at the station and the same code is used to return the bicycle. The station's hardware prototypes were built on top of Internet devices such as raspberry pi, arduino, keypad, and motor driver, and smartphone application basically includes shared bike rental and return functionality. It also includes an additional feature of reservation for a certain time period. We tested the implemented system, and found that it is efficient because it shows the average of 3-4 seconds delay. The system can be implemented to manage multiple bikes with a single control box, and as the user can use a smartphone application, this makes the system more cost effective.

The Analysis of Economic Impact for Information Security Industry using Inter-Industry Analysis (산업연관분석을 이용한 정보보호 산업의 경제 파급효과 분석)

  • Jeong, Eun-Hee
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.1
    • /
    • pp.72-80
    • /
    • 2020
  • The information security industry is increasing in importance and market size due to the development of the fourth industry such as artificial intelligence, IoT and etc. This paper was analyzed the impact of the increasing information security industry on the domestic economy by using the Input-Output table. It was classified industrial sectors into information security products and information security services industries, and then reclassified the Input-Output table into 35 industries. And it was estimated the production inducement coefficient, the value-added inducement coefficient, employment inducement coefficient, and etc. The production inducement coefficients of the information security product and service industry are each 1.571, 1.802, and the value-added inducement coefficients of them are each 0.632, 0.997, and the employment inducement coefficients of them are each 2.494, 7.361. Only the value-added inducement coefficient of the information security service industry is slightly higher than the total industry, and the remaining inducement coefficients are all lower than the total industry. In addition, the information security product industry has no the forward and backward linkage effect, and the information security service industry has no the backward linkage effect. But it has the forward linkage effect. As a result of analyzing the economic ripple effect of the information security industry, the production inducement amounted to 359.9 trillion won, value-added inducement amounted to 164.8 trillion won, and employment inducement amounted to 803 thousand people.