• Title/Summary/Keyword: S&T information service

Search Result 816, Processing Time 0.027 seconds

Development of Accident-prevention Smart Monitoring System for Woman Diver using Zigbee Module and GPS Sensor (Zigbee와 GPS를 이용한 해녀 사고예방 스마트 모니터링 시스템 개발)

  • Choi, Min Ho;Kim, Young Sang
    • Smart Media Journal
    • /
    • v.5 no.3
    • /
    • pp.74-80
    • /
    • 2016
  • In this paper, we propose an accident-prevention smart monitoring system for Haenyeo(Woman diver) using Zigbee module and GPS sensor. This system can collect such information as the diving location, the body temperature, the depth of diving, and the diving time of a Woman diver working under the water and then respond immediately to an accident occurring. The research developed a smart Teawak and smart swimming goggles which can measure the state of a Woman diver and her diving activities. Smart Teawak, the buoy tool while a Woman diver is collecting seafoods under water, is able to receive GPS and transmit the data from smart swimming goggles and Zigbee Module to IHSS(IoT based Haenyeo Safety service Software) server. In addition, IHSS, a responsive web, provides the diving location and the state of a Woman diver on the smart phone. As a result, the system will be useful in the aspects of Woman diver' health care and the safety, furthermore, which will significantly contribute to global marketing of Woman diver with its being designated as a UNESCO intangible cultural asset.

Design and Implementation of Web-based Virtual Makeup Simulation System (웹 상에서의 가상 메이크업 시뮬레이션 시스템 설계 및 구현)

  • Shon, Hyung-Do;Lee, Jae-Hyub
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.2
    • /
    • pp.167-173
    • /
    • 2002
  • The VMSS(Virtual Makeup Simulation System) is a virtual simulation system which can apply makeup, hair style, accessory to user's own face image through internee connection. The simulation result can be stored to server side DB and also can be printed out on client side printer. It is implemented using Java so, clients don't need any other client program to run the VMSS except Web browser and Java Plug-in installed on browser. IIS (Internet Information Server) Web server of Window 2000 and MS-SQL 7 are used to develop the overall system. Commercial JDBC Driver Type 4 is used to connect the applet and DB. It suggests a new direction of Web-based contents service development and can be applied to many other areas.

A Study for risk management on Documentary Collection(D/P, D/A) Payment (추심결제(D/P, D/A)방식에서의 위험관리에 관한 연구)

  • Kwak, Su-Young
    • International Commerce and Information Review
    • /
    • v.10 no.2
    • /
    • pp.283-304
    • /
    • 2008
  • According to globalization and localization of world economics international trade payment method was also changed. A traditional payment was Letter of Credit basis, however it is being increased to various methods such as remittance, documentary collection(D/P, D/A) and open account. In order to acquire a secure export payment, exporters prefer to L/C basis which is guaranteed by a reliable bank. However, the L/C should bear a security so that importers would rather documentary collection than L/C. The reasons for the preference of collection payment rather than L/C are a low commission cost, the conversion of buyer's market from seller's market due to severe competition in the world market, transaction increase between main office and branches and a right to control the goods until executing the payment by exporters. Besides of them, collection payment can handle safer and faster than open account basis. However, the collection payment has a risk which it isn't guaranteed by bank for the payment so that I would suggest countermeasures to minimize the payment risk utilizing the collection basis as follows; using export credit insurance system, a large domestic credit report provider such as D&B for absolutely fresh and new information, a collection proxy service for overseas deferred credit and suggestion specifying to order B/L not straight one on consignee in order to transfer the right of ownership with endorsement without problem.

  • PDF

A Design of Context Prediction Structure using Homogeneous Feature Extraction (동질적 특징추출을 이용한 상황예측 구조의 설계)

  • Kim, Hyung-Sun;Im, Kyoung-Mi;Lim, Jae-Hyun
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.85-94
    • /
    • 2010
  • In this paper, we propose a location-prediction structure that can provide user service in advance. It consists of seven steps and supplies intelligent services which can forecast user's location. Context information collected from physical sensors and a history database is so difficult that it can't present importance of data and abstraction of data because of heterogeneous data type. Hence, we offer the location-prediction that change data type from heterogeneous data to homogeneous data. Extracted data is clustered by SOFM, then it gets user's location information by ARIMA and realizes the services by a reasoning engine. In order to validate the proposed location-prediction, we built a test-bed and test it by the scenario.

Correlation between Appearance Management Behaviors and Mental Health Level of Female University Students for U-mental Healthcare

  • Choi, Hye-Jung;Woo, Hee-Sun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.3
    • /
    • pp.167-174
    • /
    • 2019
  • It is a descriptive study for the relationship between appearance management behaviors and mental health of some female college students. We analyzes 433 self-administered questionnaires from March to June 2017 for female students who enrolled in three-year colleges in Seoul and Gyeonggi province, South Korea. The conclusion is as follows. We used IBM SPSS Statistics 22.0(SPSS Inc., Chicago, IL, USA) for the analysis by person's characteristics, t-test and one way ANOVA, multiple regression analyses. The second-year grade shows higher points than the first-year grade in appearance management behaviors and mental health level(p<0.001, p<0.05). In addition, when students has the higher level of the household as the humanities students, they have higher level of mental health level(p<0.001). The most influential factors affecting the mental health level of female college students are domestic economic level and cosmetic management behavioral factors. The level of mental health was higher in the middle and upper group of the domestic economic level. When they do more cosmetic management behavior, they have lower the mental health level. In conclusion, it is deemed necessary for students to attend intensive and sufficient counseling with an academic advisor. The continuous attention through school counseling management services depending on grade, domestic economy level, and cosmetic management behavior is necessary in order to enhance the level of mental health for female students. In addition to that, the college needs to develop individual customized psychology counseling and educational programs through U-mental healthcare service in order to lessen the great pressure of sensitive information and provide mental consultation. The college needs to consider students' characteristics and needs from the results of this study. It is considered that a smart mental healthcare program will be needed to identify mental health of the individual through the systematic approach.

A Study on the Vulnerability Management of Internet Connection Devices based on Internet-Wide Scan (인터넷 와이드 스캔 기술 기반 인터넷 연결 디바이스의 취약점 관리 구조 연구)

  • Kim, Taeeun;Jung, Yong Hoon;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.9
    • /
    • pp.504-509
    • /
    • 2019
  • Recently, both wireless communications technology and the performance of small devices have developed exponentially, while the number of services using various types of Internet of Things (IoT) devices has also massively increased in line with the ongoing technological and environmental changes. Furthermore, ever more devices that were previously used in the offline environment-including small-size sensors and CCTV-are being connected to the Internet due to the huge increase in IoT services. However, many IoT devices are not equipped with security functions, and use vulnerable open source software as it is. In addition, conventional network equipment, such as switches and gateways, operates with vulnerabilities, because users tend not to update the equipment on a regular basis. Recently, the simple vulnerability of IoT devices has been exploited through the distributed denial of service (DDoS) from attackers creating a large number of botnets. This paper proposes a system that is capable of identifying Internet-connected devices quickly, analyzing and managing the vulnerability of such devices using Internet-wide scan technology. In addition, the vulnerability analysis rate of the proposed technology was verified through collected banner information. In the future, the company plans to automate and upgrade the proposed system so that it can be used as a technology to prevent cyber attacks.

Investigation of Research Topic and Trends of National ICT Research-Development Using the LDA Model (LDA 토픽모델링을 통한 ICT분야 국가연구개발사업의 주요 연구토픽 및 동향 탐색)

  • Woo, Chang Woo;Lee, Jong Yun
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.7
    • /
    • pp.9-18
    • /
    • 2020
  • The research objectives investigates main research topics and trends in the information and communication technology(ICT) field, Korea using LDA(Latent Dirichlet Allocation), one of the topic modeling techniques. The experimental dataset of ICT research and development(R&D) project of 5,200 was acquired through matching with the EZone system of IITP after downloading R&D project dataset from NTIS(National Science and Technology Information Service) during recent five years. Consequently, our finding was that the majority research topics were found as intelligent information technologies such as AI, big data, and IoT, and the main research trends was hyper realistic media. Finally, it is expected that the research results of topic modeling on the national R&D foundation dataset become the powerful information about establishment of planning and strategy of future's research and development in the ICT field.

Students' Actual Use and Satisfaction of Meteorological Information and Demands on Health Forecasting at a University (일 대학 학생들의 기상정보 이용실태와 만족도 및 건강정보 요구도)

  • Oh, Jin-A;Park, Jong-Kil
    • The Journal of Korean Academic Society of Nursing Education
    • /
    • v.15 no.2
    • /
    • pp.251-259
    • /
    • 2009
  • Purpose: Climate change affects human health and calls for a health forecasting service. The purpose of this study was to explore the students' actual use and their satisfaction with meteorological information and the demands on health forecasting at a university in South Kyungsang Province. Method: This study used a descriptive design through structured self-report questionnaires including frequency, contents, purpose, perception, satisfaction of meterological information and need and demand of health forecasting. Data were collected from June 1 to 5, 2009 and analyzed using the SPSS 17.0 program. Descriptive statistics, t-test, ANOVA, $\chi^2$ test and Person's correlation coefficient were used to analyze the data. Result: The majority of the students watched the daily weather information to decide about daily work, outdoor activity or habitually. The mean score of need for health forecasting was $3.44{\pm}.81$, and the demand for health forecasting was $2.93{\pm}1.05$. Significant differences were found in the need for health forecasting according to sex, major, and environmental disease. In addition, the higher the satisfaction of health forecasting, the higher the demand for it. Conclusion: I suggest improving the meteorological information system technically and developing a health forecasting service resulting in a healthier and more comfortable life.

Development of an Integrated RF Module for DMB Environment (DMB 환경에서의 통합 RF 수신을 위한 모듈 개발)

  • Park, Ju-Hyun;Choi, Jeong-Hun
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.75-76
    • /
    • 2006
  • A new broadcasting standard for Digital Multimedia Broadcasting(DMB) has been announced in Korea to provide audio, video, and data broadcasting services. There exist two types of DMB; terrestrial DMB and satellite DMB. And in order to service DMB on the single system, the integration of RF module is required. In this paper, we describe an integrated RF tuner module that can receive T-DMB and S-DMB at the same time, which includes an L-band down-converter, a Band III tuner, and a S-DMB tuner.

  • PDF

ROS2 공격 기술 동향 분석

  • Jaewoong Heo;Lee Yeji;Hyo Jin Jo
    • Review of KIISC
    • /
    • v.33 no.4
    • /
    • pp.57-63
    • /
    • 2023
  • Industry 4.0의 진행으로 이기종의 IoT 장비들 간의 통신을 위해 다양한 산업용 통신 미들웨어들이 등장했다. 그 중 Robotics 분야에서 활발히 사용되는 Robot Operating System (ROS)는 개발자 커뮤니티와 로봇 개발 도구들을 기반으로 지속적인 시장 점유율 증가세를 보이고 있다. 초기 발표된 ROS1의 경우 보안이 전혀 고려되지 않은 설계로 Packet Injection 공격등의 사이버 보안 위협에 취약했지만, ROS2의 경우 통신 미들웨어인 Data Distribution Service (DDS) 통신규격을 전송 계층에 적용하여 메시지 전송에 대한 보안 기능을 제공하고 있다. 그러나 최근 연구에서는 DDS와 관련된 ROS2 취약점이 발표되고 있다. 따라서 본 논문에서는 DDS와 관련된 ROS2의 공격 기술 동향을 소개한다.