• Title/Summary/Keyword: S-SMART system

Search Result 2,428, Processing Time 0.035 seconds

Analyzing the Importance and Priority of Safety Information in Walking Tourism: Focusing on Open Data Utilization (도보여행 안전정보의 유형별 중요도 및 우선순위 도출: 오픈데이터 활용을 중심으로)

  • Ham, Juyeon;Choi, Sujeong;Koo, Chulmo
    • Knowledge Management Research
    • /
    • v.19 no.1
    • /
    • pp.59-77
    • /
    • 2018
  • The tourism industry is now changing to smart tourism, which maximizes tourists' overall tourism experience with the use of advanced mobile technologies and emphasizes the utilization of tourism information. Despite the quantitative expansion of the tourism industry, there is a lack of academic and practical discussion on tourism safety. Especially, in the context of walking tourism, tourists are more likely to be exposed to natural or social disasters and emergencies. Therefore, it is necessary to build a system that can provide walking tourists with safety information not only on dangerous factors which are anticipated to be confronted during a walking trip in advance but also on specific dangers in real time. Under the circumstances, this study seeks to identify the types of tourism safety information that can be offered by using publicly available open data, drawing on the safety information framework on the walking tourism that is presented in Choi et al. (2017)'s study. More specifically, this study focuses on the use of open data which is provided by the Korean government. Furthermore, this study verifies the types of safety information that are most urgently needed in walking travel situations. Specifically, this study aims to derive the importance and priority of each type of safety information for a walking trip by applying the analytic hierarchy process (AHP) analysis. For this, we collected 35 questionnaires from walking tour operators (practitioners) and walking tourists. The main results are as follows. First, natural disaster information is the most important factor in the top-level factor of safety information for walking tourists, followed by social disaster, life safety, and exhibition (security crisis) information. Second, information on natural disasters, environmental pollution, and weather is considered to be important at the sub-level factor. Lastly, the noteworthy result of this study is that the importance of each type of safety information varies depending on the walking tour operators (practitioners) and the walking tourists. That is, there is a recognition difference between the operator (practitioner) and the user in the importance and priority of the safety information of the walking trip. Therefore, it is necessary to develop policies and services reflecting the opinions of potential users when providing safety information so that the most importantly recognized information can be provided first.

Fibroblastic Reticular Cell Derived from Lymph Node Is Involved in the Assistance of Antigen Process (림프절 유래 fibroblastic reticular cell의 효율적 항원처리 관련성에 대한 연구)

  • Kim, Min Hwan;Lee, Jong-Hwan
    • Journal of Life Science
    • /
    • v.26 no.9
    • /
    • pp.1027-1032
    • /
    • 2016
  • Antigen is substance causing disease derived from pathogen. Living organism has the immune system in terms of defense mechanism against antigen. Antigen is processed through several pathways such as phagocytosis, antibody action, complement activation, and cytotoxins by NK or cytotoxic T lymphocyte via MHC molecule. Lymph node (LN) is comprised of the complicated 3 dimensional network and several stromal cells. Fibroblastic reticular cells (FRC) are distributed in T zone for interaction with T cells. FRC produces the extra cellular matrix (ECM) into LN for ECM reorganization against pathogen infections and secretes homing chemokines. However, it has not so much been known about the involvement of the antigen process of FRC. The present report is for the function of FRC on antigen process. For this, FRC was positioned with several infected situations such as co-culture with macrophage, T cell, lipopolysaccharide (LPS) and TNFα stimulation. When co-culture between FRC with macrophage and T cells was performed, morphological change of FRC was observed and empty space between FRCs was made by morphological change. The matrix metallo-proteinase (MMP) activity was up-regulated by Y27632 and T cells onto FRC. Furthermore, inflammatory cytokine, TNFα regulated the expression of adhesion molecules and MHC I antigen transporter in FRC by gene chip assay. NO production was elevated by FRC monolayer co-cultured with macrophage stimulated by LPS. GFP antigen was up-taken by macrophage co-cultured with FRC. Collectively, it suggests that FRC assists of the facilitation of antigen process and LN stroma is implicated into antigen process pathway.

A Proposal of USN-based DER(Decentralized Energy Resources) Management Algorithm (USN 기반의 댁내 분산 전력 관리 알고리즘 제안)

  • Cho, Young-Rok;Jang, Min-Seok;Lee, Yon-Sik;Bae, Seok-Chan;Kim, Weon-Goo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.824-827
    • /
    • 2011
  • Needs for Smart Grid development are increasing all over the world as a solution to its problem according to depletion of energy resources, climatic and environmental rapidly change and growing demand for electrical power. Especially decentralized power is attracting world's attention. In this mood a new era for a unit scale of decentralized power environment is on its way in building. However there is a problem to have to be solved in the uniformity of power quality because the amount of power generated from renewable energy resources such as wind power and solar light is very sensitive to climate fluctuation. And thus this paper tries to suggest an energy management algorithm on basis of real time monitoring for meteorological data. The proposed EMS model embodies the method for predicting the power generation by monitoring and analyzing the climatic data and controling the efficient power distribution between the renewable energy and the existing power. The ultimate goal of this paper is to provide the technological basis for achieving zero-energy house.

  • PDF

A Study on Design of Smart Home Service Robot McBot II (스마트 홈 서비스 로봇 맥봇II의 설계에 관한 연구)

  • Kim, Seung-Woo;Kim, Hi-Jun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.4
    • /
    • pp.1824-1832
    • /
    • 2011
  • In this paper, a smart home service robot McBot II is newly developed in much more practical and intelligent system than McBot I which we had developed a few years ago. Thus far, vacuum-cleaners have lightened the burden of household chores but the operational labor that vacuum-cleaners entail has been very severe. Recently, a cleaning robot was commercialized to solve but it also was not successful because it still had the problem of mess-cleanup, which pertained to the clean-up of large trash and the arrangement of newspapers, clothes, etc. Hence, we develop a new home mess-cleanup robot McBot II to completely overcome this problem on real environments. The mechanical design and the basic control of McBot II, which performs mess-cleanup function etc. in house, is actually focused in this paper. McBot II is mechanically modeled in the same method that the human works in door by using the waist and the hands. The big-ranged vertical lift and the shoulder joints to be able to forward move are mechanically designed for the operating function as the human's waist when the robot works. The mobility of McBot II is designed in the holonomic mobile robot for the collision avoidance of obstacle and the high speed navigation on the small area in door. Finally, good performance of McBot II, which has been optimally desinged, is confirmed through the experimental results for the control of the robotic body, mobility, arms and hands in this paper.

Design of Small Space Convergence Locking device Using IoT (IOT를 이용한 소규모 공간의 융합 잠금 장치 제안)

  • Park, Hyun-Joo
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.2
    • /
    • pp.45-50
    • /
    • 2021
  • In this paper, we propose the development of a smart space security device that can be opened and closed remotely using IoT. Existing space security devices can control opening and closing by breaking hardware or only using button devices or replicated keys. The recent COVID-19 crisis has created several applications for non-contact devices. In this study, we propose the development of a small space security device that has the function of unlocking through an app without touching the device. By transferring the control authority to a smartphone, device that cannot be opened or closed by only operating hardware at the user's option. It is convenient and hygienic because it can be opened and closed using an app without touching the locking device. Multiple security is possible because security can be released using an app after user authentication by fingerprint recognition and pattern input on a smartphone. If the user wishes, after using the app security, the security is released by directly touching a button installed in the safe or space or opening it with a key. In addition, by adding an inactive function to the app, it is designed so that the door of the safe cannot be opened when the key is lost or the small safe is lost. This study is expected to be able to effectively expand the security system by applying variously to objects that require security.

A Study on Authentication and Management Scheme of RFID Tag for Ubiquitous Environment (유비쿼터스 환경을 위한 RFID 태그의 인증과 관리에 관한 연구)

  • Seo Dae-Hee;Lee Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.81-94
    • /
    • 2006
  • This study, in particular, aims to regulate the core techniques of ubiquitous computing, such as the use of an ad hoc network and the smart-tag technique, and to look more closely into RFID Tag's smart-tag-related security service. The study aims to do so because several important technical factors and structures must be taken into account for RFID Tag to be applied in the ubiquitous-computing-related infrastructure, and the security of the tag is considered one of the core technologies. To realize secure ubiquitous computing in the case of the Passive-tag-Performing RF communication, a less costly security service, the technical items needed to carry this out, a security service to be applied to passive tags, and network management techniques are required. Therefore, the passive-tag-based networks as the authentication level is established based on the secure authentication of each tag and the service that the tag delivers in the passive-tag-based networks and as the same service and authentication levels are applied, and the active-tag-based network system proposed herein is not merely a security service against illegal RFID tags by performing a current-location and service registration process after the secure authentication process of the active RFID tag, but is also a secure protocol for single and group services, is proposed in this study.

A study of the impact of Metaverse attributes on intention to use - based on the Extended Technology Acceptance Model (메타버스특성이 이용의도에 미치는 영향에 관한 연구 - 확장된 기술수용모델을 기반으로)

  • Seung Beom Kim;Hyoung-Yong Lee
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.2
    • /
    • pp.149-170
    • /
    • 2023
  • This study analyzed the factors influencing users' intention to use the Metaverse by applying the extended technology acceptance model. In other words, the factors affecting users' intention to use the Metaverse were defined as technical characteristics (telepresence, interoperability, seamlessness, concurrence, and economy flow) and personal characteristics (social influence and perceived enjoyment) from the perspective of the Extended Technology Acceptance Model. For this purpose, a survey was conducted among men and women of various ages ranging from teenagers to 60s, and the data collected from 327 participants were analyzed using SPSS 22.0 and Smart PLS 4.0. The results showed that perceived usefulness and perceived ease of use, which are antecedents of the Extended Technology Acceptance Model, influence the intention to use Metaverse, and perceived ease of use influences perceived usefulness. Telepresence, interoperability and economy flow were found to have a positive effect on perceived usefulness, and interoperability, seamlessness and concurrence were found to have a positive effect on perceived ease of use. In addition, social influence and perceived enjoyment had a positive effect on intention to use the Metaverse. This study is significant in that it empirically analyzed the factors of users' acceptance of the Metaverse, which is attracting attention as a new platform that will bring significant changes to our daily lives and platform consumption environments.

Design and Implementation of Cost-effecive Public Bicycle Sharing System based on IoT and Access Code Distribution (사물 인터넷과 액세스 코드 배포 기반의 경제적인 공공 자전거 공유 시스템의 설계 및 구현)

  • Bajracharya, Larsson;Jeong, Jongmun;Hwang, Mintae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.8
    • /
    • pp.1123-1132
    • /
    • 2018
  • In this paper, we design and implement a public bicycle sharing system based on smart phone application capable of distributing access codes via internet connection. When smartphone user uses the application to request a bicycle unlock code, server receives the request and sends an encrypted code, which is used to unlock the bicycle at the station and the same code is used to return the bicycle. The station's hardware prototypes were built on top of Internet devices such as raspberry pi, arduino, keypad, and motor driver, and smartphone application basically includes shared bike rental and return functionality. It also includes an additional feature of reservation for a certain time period. We tested the implemented system, and found that it is efficient because it shows the average of 3-4 seconds delay. The system can be implemented to manage multiple bikes with a single control box, and as the user can use a smartphone application, this makes the system more cost effective.

Study of the Acceptance of Interested Parties(Auditor /Auditee) in the Information System Audit Technologies Based Technology Acceptance Model(TAM) (정보시스템 감리기술에 대해 이해관계자(감리인/피감리인)의 수용에 관한 연구 -기술수용모델(TAM)을 중심으로-)

  • Kim, Hak-Joon;Jeon, Soon-Cheon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.2
    • /
    • pp.1403-1413
    • /
    • 2015
  • An information System Audit by the recognition of a problem and suggestions for solutions for overall matters about constructing and managing information systems is needed in order to contribute to the improvement of an information system's quality and improving the performance of projects. In reality, however, the general cognition is that audit is biased by subjective opinions. For this, an auditor needs to measure the level of recognition of the usability and convenience of the technologies of automating audit by applying TAM in the information system audit, and to analyze the relationship with recognition and availability of the interested parties for the technology (tool) of the audit. By the hypothesis verification result, an auditor needs to present objective corroborative facts that back up the level of recognition and usability for the information technology in the field of audit. This study verified that the phenomenon of technology application can be explained and predicted by applying TAM in the field of audit. Through an empirical study of the recognition level of audit and contractor, the developer suggests that the audit plan stage is similar to the audit corrective action stage, but the audit action stage is different from the audit review stage. This research can verify the audit technology preferred for the availability and intention of use and usability.

A Study on the Application of Blockchain Technology to the Record Management Model (블록체인기술을 적용한 기록관리 모델 구축 방법 연구)

  • Hong, Deok-Yong
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.19 no.3
    • /
    • pp.223-245
    • /
    • 2019
  • As the foundation for the Fourth Industrial Revolution, blockchain is becoming an essential core infrastructure and technology that creates new growth engines in various industries and is rapidly spreading to the environment of businesses and institutions worldwide. In this study, the characteristics and trends of blockchain technology were investigated and arranged, its application to the records management section of public institutions was required, and the procedures and methods of construction in the records management field of public institutions were studied in literature. Finally, blockchain technology was applied to the records management to propose an archive chain model and describe possible expectations. When the transactions that record the records management process of electronic documents are loaded into the blockchain, all the step information can be checked at once in the activity of processing the records management standard tasks that were fragmentarily nonlinked. If a blockchain function is installed in the electronic records management system, the person who produces the document by acquiring and registering the document enters the metadata and information, as well as stores and classifies all contents. This would simplify the process of reporting the production status and provide real-time information through the original text information disclosure service. Archivechain is a model that applies a cloud infrastructure as a backend as a service (BaaS) by applying a hyperledger platform based on the assumption that an electronic document production system and a records management system are integrated. Creating a smart, electronic system of the records management is the solution to bringing scattered information together by placing all life cycles of public records management in a blockchain.