• Title/Summary/Keyword: Mobile Check-in

Search Result 334, Processing Time 0.025 seconds

Analysis of Characteristics of Load Movement in Mobile Hydraulic Equipment (모바일 유압장치에서 부하의 유지와 내림 특성 비교)

  • Jo, Mi Hyeon;Huh, Jun Young
    • Journal of Drive and Control
    • /
    • v.15 no.4
    • /
    • pp.17-22
    • /
    • 2018
  • Mobile hydraulics require higher energy efficiency, and a simpler as well as robust design, than general industrial hydraulics. The 6/3-way directional control valve is widely used as a mobile hydraulic control valve. However, since the 6/3-way directional control valve is a spool type valve, it is difficult to maintain the load. A counterbalance valve is typically used, to maintain the load, and lift down. However, in an industrial field using a mobile hydraulics device, a pilot controlled check valve may be used to implement holding and lifting operation of the self-weight load, and a relief valve may be used simply to exert back pressure. But no comparative analysis of advantages and disadvantages of each method was revealed. In this study, various methods of holding and unloading load with self-weight in mobile hydraulics are investigated, and compared through simulation using AMESim software. This is experimentally verified by using Festo's mobile hydraulic test rig TP800.

A Study on the Threat Review to use Secure Smartphone Applications (안전한 스마트폰 앱 사용을 위한 위협 요소 검토 연구)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.1
    • /
    • pp.41-54
    • /
    • 2020
  • In this paper, it will study various problems such as personal information infringement from when using various useful Apps in the Smartphone environment. It also researched the vulnerabilities Mobile Apps and the risks of personal information leakage when using Smartphone information to decrease threat and find solution. In the second chapter, it will check the existing Mobile App related Apps. In the third chapter, it will check the threats and major factors that caused by the leakage of personal information which related to the app. Then it will suggest solution and end with conclusion. This paper also looked at various problems that caused by illegal adverse effect from illegal personal information collection. Then it researched and made suggestion to make consideration on safety of personal information and privacy infringement that threat to personal information For safety of mobile banking, it proposed a safety method to separate and manage the code which has the core logic which required to run the App. For safety of direction App, when running the direction App, even if the information is collected, location information for unauthorized accessed will encrypt and store in DB, so that access to personal information is difficult. For delivery App environment, by using the national deliver order call center's representative phone to receive a telephone order then, the customer information is delivered to the branch office when it receive order and it will automatically delete information from the server when the delivery is completed by improving DB server of order. For the smart work app environment, the security solution operates automatically by separating and make independent private and work areas. Then it will suggest initialization for company's confidential business information and personal information to safe from danger even if loss.

A Study on the Surface Roughness Behavior of Reactor Vessel Stud Holes in APR1400 Nuclear Power Plants (APR1400 원자로 용기 스터드 홀의 표면거칠기 거동에 관한 연구)

  • Kim, Dong Il;Kim, Chang Hun;Moon, Young Jun
    • Transactions of the Korean Society of Pressure Vessels and Piping
    • /
    • v.15 no.1
    • /
    • pp.62-70
    • /
    • 2019
  • The APR1400 reactor may be operated for a long time under high temperature and pressure conditions, causing damage to the stud holes and causing stud bolts and holes to stick. The present practice is to manually remove the anti-sticking agent and foreign matter remaining in the APR1400 reactor stud hole and to visually check the surface condition of the thread to check the damage status of the threads. In the case of the APR1400 reactor stud holes, manually cleaning the threads increases the risk of radiation exposure and operator's fatigue. To avoid this, the autonomous mobile robot is used to automatically clean the reactor stud holes. The purpose of this study is to optimize the cleaning performance of the mobile robot by looking at the behavior of the surface roughness of the stud surface cleaned by the brush attached to the mobile robot due to changes in brush material, thickness of wire, and rotation speed. A microscopic approach to the surface roughness of the flank is needed to investigate the effects of the newly proposed brush of the autonomous mobile robot on the thread holes. According to this experiment, it is reasonable to use STS brush rather than Carbon one. Optimal operating conditions are derived and the safety of APR1400 reactor stud holes maintenance can be improved.

Performance of pilot-assisted coded-OFDM-CDMA using low-density parity-check coding in Rayleigh fading channels (레일리 페이딩 채널에서 파일럿 기법과 LDPC 코딩이 적용된 COFDM-CDMA의 성능 분석)

  • 안영신;최재호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.5C
    • /
    • pp.532-538
    • /
    • 2003
  • In this paper we have investigated a novel approach applying low-density parity-check coding to a COFDM-CDMA system, which operates in a multi-path fading mobile channel. Developed as a linear-block channel coder, the LDPC code is known for a superior signal reception capability in AWGN and/or flat fading channels with respect to increased encoding rates, however, its performance degrades when the communication channel becomes multi-path fading. For a typical multi-path fading mobile channel with a SNR of 16㏈ or lower. in order to obtain a BER lower than 1 out of 10000, the LDPC code with encoding rates below 1:3 requires not only the inherent parity check information but also the piloting information for refreshing front-end equalizer taps of COFDM-CDMA, periodically. For instance, while the 1:3-rate LDPC coded transmission symbol is consisted of data bits and parity-check bits in 1 to 3 proportion, on the other hand, in the proposed method the same rate LDPC transmission symbol contains data bits, parity check bits, and pilot bits in 1 to 2 to 1 proportion, respectively. The included pilot bits are effective not only for channel estimation and channel equalization but for symbol decoding by assisting the parity-check bits, hence, improving SNR vs BER performance over the conventional 1:3-rate LDPC code. The proposed system performance has been verified using computer simulations in multi-path, Rayleigh fading channels, and the results show us that the proposed method out-performs the general LDPC channel coding methods in terms of SNR vs BER measurements.

An Efficient Overlapped LDPC Decoder with a Upper Dual-diagonal Structure

  • Byun, Yong Ki;Park, Jong Kang;Kwon, Soongyu;Kim, Jong Tae
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.13 no.1
    • /
    • pp.8-14
    • /
    • 2013
  • A low density parity check (LDPC) decoder provides a most powerful error control capability for mobile communication devices and storage systems, due to its performance being close to Shannon's limit. In this paper, we introduce an efficient overlapped LDPC decoding algorithm using a upper dual-diagonal parity check matrix structure. By means of this algorithm, the LDPC decoder can concurrently execute parts of the check node update and variable node update in the sum-product algorithm. In this way, we can reduce the number of clock cycles per iteration as well as reduce the total latency. The proposed decoding structure offers a very simple control and is very flexible in terms of the variable bit length and variable code rate. The experiment results show that the proposed decoder can complete the decoding of codewords within 70% of the number of clock cycles required for a conventional non-overlapped decoder. The proposed design also reduces the power consumption by 33% when compared to the non-overlapped design.

Monitoring System Using Mobile Warning and Mobile Web-page (모바일 경보와 모바일 웹페이지를 통한 모니터링 시스템)

  • Ju, Seung Hwan;Seo, Hee Suk;Lee, Seung Jae;Kim, Min Soo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.2
    • /
    • pp.29-38
    • /
    • 2010
  • It often occur to nature disaster that like earthquake, typhoon, etc. around KOREA. A Haiti and Chile also metropolitan area of KOREA occur earthquake. in result, People think of nature disaster. Structures of present age are easily affected by nature disaster. So we are important that warn of dangerous situation as soon as possible. On this study, I introduce Integrated monitoring system that administrator check a event as early. I develop Monitoring System using SMS(Short Message Service). Administrator always monitor structure on real-time using mobile web-page. As Administrator using mobile device like PDA, Administrator always monitor structure. As using this system, Damage of nature disaster is minimized and is prevented post damage.

Analysis of Security Threats from Increased Usage of Mobile App Services (모바일 앱 서비스 이용 증가로 인한 보안 위협 분석)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.1
    • /
    • pp.45-55
    • /
    • 2018
  • Recently, because the arrival of the fourth industrial revolution era, many information and telecommunication services have grown rapidly in the mobile business market. So, companies are based Mobile Apps on user customized services and expanding their services. From the standpoint of the business, to generate revenue, the company needs to maintain the existing current computer environment and develop Mobile Apps to offer convenience in various areas such as finance, admiration, e-commerce and sales support. However, as the number of users increase due to expansion of various Mobile services, security threats that are related to Mobile Apps are increasing and its damage is also increasing. Due to the rapid technological transformation of Mobile devices using the Internet, the level of security threats to Smartphones are rising and getting more advance, so this thesis is structured as follows. In Chapter 2, it will look at the overall trends of Mobile Apps as related research. In Chapter 3, it will discuss various security concerns that related to the latest Mobile Apps and learn about the threatening factors. In Chapter 4, it will compare and analyze the threatening factors. Then it will find and suggest the possible plan. In Chapter 5, it will end with conclusion. Finally, to protect mobile devices from security threats, the environment of operating system which manages the resources and data of Apps needs to be protected. Also, it is important that users to have awareness and check activation FinTech technology security in the process of simple payment with fingerprint or IC card.

A Concurrency Control Method using Optimistic Control in Mobile Computing DB Environment (모바일 컴퓨팅 데이터베이스 환경에서의 낙관적 제어기법을 이용한 동시성제어기법)

  • Cho Sung-Je
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.2 s.40
    • /
    • pp.131-143
    • /
    • 2006
  • The rapid growth of mobile communication technology has provided the expansion of mobile internet services, particularly mobile realtime transaction takes much weight among mobile fields. Current mobile transaction service has serious problems which check its development, such as low bandwidths, hand over, expensive charge system, and low response time. but, There is an increasing demand for various mobile applications to process transactions in a mobile computing fields. In mobile computing environments. A mobile host computing system demands for new concurrency control method to use the bandwidth efficiently, to improve the bottleneck and the response time of transactions. This study suggests about an efficient concurrency control in a mobile computing environment. Concurrency control method in existing method uses two phases locking method. In this method, Many clients can't use the same segment simultaneously, and so useless waiting time increases. The characteristic of this proposed method unlike existing one, Enable the transaction approaching different data in the same segment to minimize the useless waiting time by permitting segments, and therefore improves the coexistence of system. Also, It shows the algorithm of the proposed concurrence control method.

  • PDF

Implementation of Patient Monitoring System based on Mobile Healthcare (모바일 헬스케어 기반의 환자 모니터링 시스템 구현)

  • Kim, Kyoung-Mok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.12
    • /
    • pp.1-10
    • /
    • 2012
  • In this paper, we propose an patient monitoring system which is suitable for mobile healthcare system. The mobile healthcare system is using portable device such as smartphone and it consists of small computing device. The mobile healthcare system is carry out same performance with desktop computer. We designed medical message structure based on TinyOS to transmit patient's biometric data on the smartphone of medical team, patient and family over the mobile carrier environment, and ported successfully in HBE-Ubi-ZigbeX using NesC. And We confirmed reliable transmission of biometric data on the smartphone by implementing the Android OS based patient information monitoring application to check the status of patient for medical team, patient and family.

The development of a lifestyle modification mobile application, "Health for You" for overweight and obese breast cancer survivors in Korea

  • Seo, Su-Jin;Nho, Ju-Hee;Park, Youngsam
    • Women's Health Nursing
    • /
    • v.27 no.3
    • /
    • pp.243-255
    • /
    • 2021
  • Purpose: This study aimed to develop a lifestyle modification (LSM) mobile application based on the Android operating system for overweight and obese breast cancer survivors (BCS) in Korea and evaluate its usability. Methods: The content analysis, design, development, implementation, and evaluation of the LSM intervention mobile application for overweight and obese BCS was conducted by identifying survivors' needs, searching the literature, and reviewing existing mobile applications. The survey was conducted from June 1 to December 28, 2020 at Jeonju, Korea. Results: The mobile application for BCS included dietary and exercise information, weight logs, as well as distress and daily achievement check. It also included information and videos on the prevention of breast cancer recurrence and used a communication bulletin board. Expert and user usability evaluation of its content and functions confirmed that it was appropriate and satisfactory for overweight and obese BCS. Conclusion: This LSM mobile application developed for overweight and obese BCS was found to be appropriate for use. It can be applied for further study of effectiveness on improving their health and maintaining a healthy lifestyle, to ultimately improve quality of life.