• Title/Summary/Keyword: Network device

Search Result 2,421, Processing Time 0.035 seconds

A Study on the Current Situation and Improved Method for the Smombie through Field Survey and ICT Trend Analysis (현장 조사와 ICT 동향 분석을 통한 스몸비 현황과 개선 방안 연구)

  • Lee, Dong Hoon;Oh, Hye Soo;Jang, Jae Min;Jeong, Jong Woon;Yang, Sang Oon
    • Journal of the Korean Society of Safety
    • /
    • v.35 no.5
    • /
    • pp.74-85
    • /
    • 2020
  • Smart phone zombie or Smombie means pedestrians who walk without attention to their surroundings because they are focused upon their smart phone. Because the traffic accidents and injuries caused by Smombie have been increased rapidly in recent years, the social attention and policies are needed to prevent it. This study was conducted to analyze Smombie's current status and some solutions used before and to propose new improved method through the latest ICT trend. In this study, we did the field survey to check Smombies at several places in Seoul through people counting, and found that a lot of pedestrians still use the smart phone while walking. And we analyzed many case studies about some solutions to prevent Smombies previously. The case studies include legal regulations, government policies, smart phone app services and facilities that are used before. We studied them through internet searches and reference studies and we also checked the current operating situation as visiting several places that the solutions actually has been operated. Therefore, we found there are some limitations in previous solutions in terms of effectiveness and management. To consider new solution that can be expected to overcome the limitations, we analyzed the latest ICT trends focused on features to utilize the Smombie prevention, especially video recognition and digital signage. In these days, video recognition has been developed rapidly with assistance of AI technology and it can recognize the specific pedestrian's characteristics such as holding smart phone as well as hair style, clothes, backpack and etc. On the other hands, the digital signage is the convergence device that includes big display, network connection and various IoT sensors. It can be used as public media in many places for public services as well as advertising. Through these analysis results, we show the requirements and the user scenario for the improved method to prevent Smombie. Finally, we propose to develop R&D technology to recognize Smombie exactly as pedestrian attributes and to spread creative contents to increase pedestrian's interest and engagement for Smombie prevention through digital signage.

Implementation of a Photo-Input Game Interface Using Image Search (이미지 검색을 이용한 사진입력 게임 인터페이스 구현)

  • Lee, Taeho;Han, Jaesun;Park, Heemin
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.10
    • /
    • pp.658-669
    • /
    • 2015
  • The paradigm of game development changes with technological trends. If the system can analyze and determine undefined inputs, users' input choices are not restricted. Therefore, game scenarios can have multifarious flows depending upon the user's input data. In this paper, we propose a method of including an output plan in the game system that is based on the user's input but is not restricted to predefined choices. We have implemented an experimental game on the Android platform by combining network communication and APIs. The game interface works as follows: first, the user's input data is transmitted to the server using HTTP protocol; then, the server carries out an analysis on the input data; and finally, the server returns the decision result to the game device. The game can provide users a scenario that corresponds to the decision results. In this paper, we used an image file for the user's input data format. The server calculates similarities between the user's image file and reference images obtained from the Naver Image Search API and then returns determination results. We have confirmed the value of integrating the game development framework with other computing technologies demonstrating the potential of the proposed methods for application to various future game interfaces.

The Study for Estimating Traffic Volumes on Urban Roads Using Spatial Statistic and Navigation Data (공간통계기법과 내비게이션 자료를 활용한 도시부 도로 교통량 추정연구)

  • HONG, Dahee;KIM, Jinho;JANG, Doogik;LEE, Taewoo
    • Journal of Korean Society of Transportation
    • /
    • v.35 no.3
    • /
    • pp.220-233
    • /
    • 2017
  • Traffic volumes are fundamental data widely used in various traffic analysis, such as origin-and-destination establishment, total traveled kilometer distance calculation, congestion evaluation, and so on. The low number of links collecting the traffic-volume data in a large urban highway network has weakened the quality of the analyses in practice. This study proposes a method to estimate the traffic volume data on a highway link where no collection device is available by introducing a spatial statistic technique with (1) the traffic-volume data from TOPIS, and National Transport Information Center in the Ministry of Land, Infrastructure, and (2) the navigation data from private navigation. Two different component models were prepared for the interrupted and the uninterrupted flows respectively, due to their different traffic-flow characteristics: the piecewise constant function and the regression kriging. The comparison of the traffic volumes estimated by the proposed method against the ones counted in the field showed that the level of error includes 6.26% in MAPE and 5,410 in RMSE, and thus the prediction error is 20.3% in MAPE.

Design of pHEMT channel structure for single-pole-double-throw MMIC switches (SPDT 단일고주파집적회로 스위치용 pHEMT 채널구조 설계)

  • Mun Jae Kyoung;Lim Jong Won;Jang Woo Jin;Ji, Hong Gu;Ahn Ho Kyun;Kim Hae Cheon;Park Chong Ook
    • Journal of the Korean Vacuum Society
    • /
    • v.14 no.4
    • /
    • pp.207-214
    • /
    • 2005
  • This paper presents a channel structure for promising high performance pseudomorphic high electron mobility transistor(pHEMT) switching device for design and fabricating of microwave control circuits, such as switches, phase shifters, attenuators, limiters, for application in personal mobile communication systems. Using the designed epitaxial channel layer structure and ETRI's $0.5\mu$m pHEMT switch process, single pole double throw (SPDT) Tx/Rx monolithic microwave integrated circuit (MMIC) switch was fabricated for 2.4 GHz and 5 GHz band wireless local area network (WLAN) systems. The SPDT switch exhibits a low insertion loss of 0.849 dB, high isolation of 32.638 dB, return loss of 11.006 dB, power transfer capability of 25dBm, and 3rd order intercept point of 42dBm at frequency of 5.8GHz and control voltage of 0/-3V These performances are enough for an application to 5 GHz band WLAN systems.

Channel Searching Method of IEEE 802.15.4 Nodes for Avoiding WiFi Traffic Interference (WiFi 트래픽 간섭을 피하기 위한 IEEE 802.15.4 노드의 채널탐색방법)

  • Song, Myong Lyol
    • Journal of Internet Computing and Services
    • /
    • v.15 no.2
    • /
    • pp.19-31
    • /
    • 2014
  • In this paper, a parallel backoff delay procedure on multiple IEEE 802.15.4 channels and a channel searching method considering the frequency spectrum of WiFi traffic are studied for IEEE 802.15.4 nodes to avoid the interference from WiFi traffic. In order to search the channels being occupied by WiFi traffic, we analyzed the methods measuring the powers of adjacent channels simultaneously, checking the duration of measured power levels greater than a threshold, and finding the same periodicity of sampled RSSI data as the beacon frame by signal processing. In an wireless channel overlapped with IEEE 802.11 network, the operation of CSMA-CA algorithm for IEEE 802.15.4 nodes is explained. A method to execute a parallel backoff procedure on multiples IEEE 802.15.4 channels by an IEEE 802.15.4 device is proposed with the description of its algorithm. When we analyze the data measured by the experimental system implemented with the proposed method, it is observed that medium access delay times increase at the same time in the associated IEEE 802.15.4 channels that are adjacent each other during the generation of WiFi traffic. A channel evaluation function to decide the interference from other traffic on an IEEE 802.15.4 channel is defined. A channel searching method considering the channel evaluations on the adjacent channels together is proposed in order to search the IEEE 802.15.4 channels interfered by WiFi, and the experimental results show that it correctly finds the channels interfered by WiFi traffic.

Supplementation of the Indoor Location Tracking Techniques Based-on Load-Cells Mechanism (로드셀 기반의 실내 위치추적 보완 기법)

  • YI, Nam-Su;Moon, Seung-Jin
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.1-8
    • /
    • 2016
  • Current indoor intrusion detection and location tracking methods have the weakness in seamless operations in tracking the objective because the object must possess a communicating device and the limitation of the single cell size (approximate $100cm{\times}100cm$) exits. Also, the utilization of CCTV technologies show the shortcomings in tracking when the object disappear the area where the CCTV is not installed or illumination is not enough for capturing the scene (e.g. where the context-awarded system is not installed or low illumination presents). Therefore, in this paper we present an improved in-door tracking system based on sensor networks. Such system is built on a simulated scenario and enables us to detect and extend the area of surveillance as well as actively responding the emergency situation. Through simulated studies, we have demonstrated that the proposed system is capable of supplementing the shortcomings of signal cutting, and of estimating the location of the moving object. We expect the study will improve the better analysis of the intruder behavior, the more effective prevention and flexible response to various emergency situations.

A study on ecosystem model of the magazines for smart devices Focusing on the case of magazine business in foreign countries (스마트 디바이스 잡지 생태계 모델 연구 - 외국 잡지의 비즈니스 사례를 중심으로)

  • Chang, Yong Ho;Kong, Byoung-Hun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.5
    • /
    • pp.2641-2654
    • /
    • 2014
  • In the smart media environment, magazine industry has been experiencing a transition to ecosystem of value network, which includes high complexity and ambiguity. Using case study method, this article conducts research on digital convergence, the model of magazine ecosystem and adaptation strategy of global magazine companies. Research findings have it that the way of contents production of global magazines has been based on collaborative production system within communities, expert communities, creative users, media contents companies and magazine platform. The system shows different patterns and characteristics depending on magazine-driven platform, Platform-driven platform or user-driven platform. Collaboration system has been confirmed in various cases: Huffington Post and Zinio which collaborate with media contents companies, Amazon magazines and Bookish with magazine companies, Huffington Post and Wired with expert communities, and Flipboard with creative users and communities. Foreign magazine contents diverge into (paper, electronic, app and web magazine) as they start the lively trades of their contents on the magazine platform. In the area of contents uses, readers employ smart media technology effectively such as cloud computing, artificial intelligence and module individualization, making it possible for the virtuous cycle to remain in the relationship within communities, expert communities and creative users.

The Realization on GAS Sensor Module for Inteligent Wireless Communication (지능형 무선통신용 가스 센서 모듈 구현)

  • Kim, Hyo-Chan;Weon, Young-Su;Cho, Hyung-Rae
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.6
    • /
    • pp.123-132
    • /
    • 2012
  • Gas sensors has been used very differently that depending on following purposes; Automotive (exhaust gas, fuel mixture gas, oxygen, particulates), agriculture / food industry (fresh, stored, CO2, humidity, NH3, nitrogen oxide gas, organic gas, toxic gas emitted from pesticides and insecticides), industrial / medical (chemical gas, hydrogen, oxygen and toxic gases), military (chemical weapon), environmental measurements (CO and other air pollution consisting of sulfur and nitrogen gas), residential (LNG, LPG, butane, indoor air, humidity). The types of industrial toxic substances are known about 700 species and many of these exist in gaseous form under normal conditions. he multi-gas detection sensors will be developed for casualties that detect the most important and find easy three kinds of gases in marine plant; carbon dioxide(CO2), carbon(CO), ammonia(NH3). Package block consists of gas sensing device minor ingredient, rf front end, zigbee chip. Develope interworking technology between the sensor and zigbee chip inside a package. Conduct a performance test through test jig about prototype zigbee sensor module with rf output power and unwanted emission test. This research task available early address when poisonous gas leaked from large industrial site and contribution for workers' safety at the enclosed space.

Memory-Free Skin-Detection Algorithm and Implementation of Hardware Design for Small-Sized Display Device (소형 DISPLAY 장치를 위한 비 메모리 피부 검출 알고리즘 및 HARDWARE 구현)

  • Im, Jeong-Uk;Song, Jin-Gun;Ha, Joo-Young;Kang, Bong-Soon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.8
    • /
    • pp.1456-1464
    • /
    • 2007
  • The research of skin-tone detection has been conducting continuously to enlarge the importance in security, surveillance and administration of the information and 'Password Control System' for using face and skin recognition in airports, harbors and general companies. As well as tile rapid diffusion of the application range in image communications and an electron transaction using wide range of communication network, the importance of the accurate detection of skin color has been augmenting recently. In this paper, it will set up the boundaries of skin colors using the information of Cb and Cr in YCbCr color model of human skin color which is from hundreds compiled portrait images for each race, and suggest a efficient yet simple structure about the skin detection which has been followed by whether the comprehension of the boundaries of skin or not with adaptive skin-range set. With the possibility of the 1D Processes which does not use any memory, it is able to be applied to relatively small-sized hardware and system such as mobile apparatuses. To add the selective mode, it is not only available the improvement of tie skin detection, but also showing the correspondent results about previous face recognition technologies using complicated algorithm.

Token-Based IoT Access Control Using Distributed Ledger (분산 원장을 이용한 토큰 기반 사물 인터넷 접근 제어 기술)

  • Park, Hwan;Kim, Mi-sun;Seo, Jae-hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.377-391
    • /
    • 2019
  • Recently, system studies using tokens and block chains for authentication, access control, etc in IoT environment have been going on at home and abroad. However, existing token-based systems are not suitable for IoT environments in terms of security, reliability, and scalability because they have centralized characteristics. In addition, the system using the block chain has to overload the IoT device because it has to repeatedly perform the calculation of the hash et to hold the block chain and store all the blocks. In this paper, we intend to manage the access rights through tokens for proper access control in the IoT. In addition, we apply the Tangle to configure the P2P distributed ledger network environment to solve the problem of the centralized structure and to manage the token. The authentication process and the access right grant process are performed to issue a token and share a transaction for issuing the token so that all the nodes can verify the validity of the token. And we intent to reduce the access control process by reducing the repeated authentication process and the access authorization process by reusing the already issued token.