• Title/Summary/Keyword: Smart Framework

Search Result 682, Processing Time 0.027 seconds

Advanced Information Data-interactive Learning System Effect for Creative Design Project

  • Park, Sangwoo;Lee, Inseop;Lee, Junseok;Sul, Sanghun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.8
    • /
    • pp.2831-2845
    • /
    • 2022
  • Compared to the significant approach of project-based learning research, a data-driven design project-based learning has not reached a meaningful consensus regarding the most valid and reliable method for assessing design creativity. This article proposes an advanced information data-interactive learning system for creative design using a service design process that combines a design thinking. We propose a service framework to improve the convergence design process between students and advanced information data analysis, allowing students to participate actively in the data visualization and research using patent data. Solving a design problem by discovery and interpretation process, the Advanced information-interactive learning framework allows the students to verify the creative idea values or to ideate new factors and the associated various feasible solutions. The student can perform the patent data according to a business intelligence platform. Most of the new ideas for solving design projects are evaluated through complete patent data analysis and visualization in the beginning of the service design process. In this article, we propose to adapt advanced information data to educate the service design process, allowing the students to evaluate their own idea and define the problems iteratively until satisfaction. Quantitative evaluation results have shown that the advanced information data-driven learning system approach can improve the design project - based learning results in terms of design creativity. Our findings can contribute to data-driven project-based learning for advanced information data that play a crucial role in convergence design in related standards and other smart educational fields that are linked.

Autonomous Mobile-Based Model for Tawaf / Sa'ay Rounds Counting with Supported Supplications from the Quran and Sunna'a

  • Nashwan, Alromema
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.205-211
    • /
    • 2022
  • Performing the rituals of Hajj and Umrah is an obligation of Allah Almighty to all Muslims from all over the world. Millions of Muslims visit the holy mosques in Makkah every year to perform Hajj and Umrah. One of the most important pillars in Performing Hajj/Umrah is Tawaf and Sa'ay. Tawaf finished by seven rounds around the holy house (Al-Kabaa) and Sa'ay is also seven runs between As-Safa and Al-Marwa. Counting/knowing the number of runs during Tawaf/Sa'ay is one of the difficulties that many pilgrims face. The pilgrim's confusing for counting (Tawaf/Sa'ay) rounds finished at a specific time leads pilgrims to stay more time in Mataff bowl or Masa'a run causing stampedes and more crowded as well as losing the desired time for prayers to get closer to Almighty Allah in this holy place. These issues can be solved using effective crowd management systems for Tawaf/Sa'ay pillars, which is the topic of this research paper. While smart devices and their applications are gaining popularity in helping pilgrims for performing Hajj/Umrah activities efficiently, little has been dedicated for solving these issues. We present an autonomous Mobile-based framework for guiding pilgrims during Tawaf/Sa'ay pillars with the aid of GPS for points tracking and rounds counting. This framework is specially designed to prevent and manage stampedes during Tawaf/Sa'ay pillars, by helping pilgrims automatically counting the rounds during Tawaf/Sa'ay with supported Supplications (in written/audio form with different languages) from the Quran and Sunna'a.

A Comparative Study on the Socio-Technical Transition Theories: Integrated Approach to Transition Policy Design and Implementation (사회-기술 전환이론 비교 연구 - 전환정책 설계와 운영을 위한 통합적 접근 -)

  • Lee, Youngseok;Kim, Byung-Keun
    • 한국정책학회보
    • /
    • v.23 no.4
    • /
    • pp.179-209
    • /
    • 2014
  • Transition studies have been gaining attention among innovation researchers from the early 1990's mainly influenced by emerging global agendas on sustainability. In this paper, we review research issues and trends focusing on four prominent transition theories - Technological innovation systems, Multi-level perspective, Transition management and Strategic niche management. After reviewing main characteristics, research trends and debates of each theory from established literatures, we conduct comparative analysis of these theories and suggest integrated framework that can be considered when modeling transition policy. This integrated framework is applied to the case study on smart-grid policy of Korea.

Integrated Object Detection and Blockchain Framework for Remote Safety Inspection at Construction Sites

  • Kim, Dohyeong;Yang, Jaehun;Anjum, Sharjeel;Lee, Dongmin;Pyeon, Jae-ho;Park, Chansik;Lee, Doyeop
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.136-144
    • /
    • 2022
  • Construction sites are characterized by dangerous situations and environments that cause fatal accidents. Potential risk detection needs to be improved by continuously monitoring site conditions. However, the current labor-intensive inspection practice has many limitations in monitoring dangerous conditions at construction sites. Computer vision technology that can quickly analyze and collect site conditions from images has been in the spotlight as a solution. Nonetheless, inspection results obtained via computer vision are still stored and managed in centralized systems vulnerable to tampering with information by the central node. Blockchain has been used as a reliable and efficient decentralized information management system. Despite its potential, only limited research has been conducted integrating computer vision and blockchain. Therefore, to solve the current safety management problems, the authors propose a framework for construction site inspection that integrates object detection and blockchain network, enabling efficient and reliable remote inspection. Object detection is applied to enable the automatic analysis of site safety conditions. As a result, the workload of safety managers can be reduced with inspection results stored and distributed reliably through the blockchain network. In addition, errors or forgery in the inspection process can be automatically prevented and verified through a smart contract. As site safety conditions are reliably shared with project participants, project participants can remotely inspect site conditions and make safety-related decisions in trust.

  • PDF

A Study on the Factors Affecting the Success of Intelligent Public Service: Information System Success Model Perspective (판별시스템 중심의 지능형공공서비스 성공에 영향을 미치는 요인 연구: 정보시스템성공모형을 중심으로)

  • Kim, Jung Yeon;Lee, Kyoung Su;Kwon, Oh Byung
    • The Journal of Information Systems
    • /
    • v.32 no.1
    • /
    • pp.109-146
    • /
    • 2023
  • Purpose With Intelligent public service (IPS), it is possible to automate the quality of civil affairs, provide customized services for citizens, and provide timely public services. However, empirical studies on factors for the successful use of IPS are still insufficient. Hence, the purpose of this study is to empirically analyze the factors that affect the success of IPS with classification function. ISSM (Information System Success Model) is considered as the underlying research model, and how the algorithm quality, data quality, and environmental quality of the discrimination system affect the relationship between utilization intentions is analyzed. Design/methodology/approach In this study, a survey was conducted targeting users using IPS. After giving them a preliminary explanation of the intelligent public service centered on the discrimination system, they briefly experienced two types of IPS currently being used in the public sector. Structural model analysis was conducted using Smart-PLS 4.0 with a total of 415 valid samples. Findings First, it was confirmed that algorithm quality and data quality had a significant positive (+) effect on information quality and system quality. Second, it was confirmed that information quality, system quality, and environmental quality had a positive (+) effect on the use of IPS. Thirdly, it was confirmed that the use of IPS had a positive (+) effect on the net profit for the use of IPS. In addition, the moderating effect of the degree of knowledge on AI, the perceived accuracy of discriminative experience and IPS, and the user was analyzed. The results suggest that ISSM and TOE framework can expand the understanding of the success of IPS.

The Relationship between Exporters and the long-term orientation of Intermediaries in Korea: Using the SOR Model (수출업체와 한국 유통업체의 장기적 지향성 연구: SOR 모델을 중심으로)

  • Joon-Ho Shin
    • Korea Trade Review
    • /
    • v.48 no.3
    • /
    • pp.151-176
    • /
    • 2023
  • This paper critically examines the role performance of local distributors within the Stimulus-Organism-Response (SOR) model, while also considering the moderating influence of market competition on the organism (O) and response (R) elements. Adopting a holistic approach, the SOR model provides a comprehensive framework for analyzing how external stimuli, including distributive, procedural, and interaction unfairness, interact with internal psychological processes, such as perceived unfairness, to shape the long-term orientation of importing agents. Moreover, this study acknowledges the pivotal role of market competition in the operational context of local distributors. It posits that competitive market dynamics play a crucial role in intensifying the relationship between behavioral factors and the long-term orientation of distributors, thereby revealing contingent effects within the SOR model. Through the exploration of these dynamics, this study contributes to a comprehensive understanding of the interplay among external stimuli, internal psychological processes, and market competition within the SOR framework, advancing our knowledge in this field.

Blockchain based SDN multicontroller framework for Secure Sat_IoT networks (안전한 위성-IoT 네트워크를 위한 블록체인 기반 SDN 분산 컨트롤러 구현)

  • June Beom Park;Jong Sou Park
    • The Journal of Bigdata
    • /
    • v.8 no.2
    • /
    • pp.141-148
    • /
    • 2023
  • Recent advancements in the integration of satellite technology and the Internet of Things (IoT) have led to the development of a sophisticated network ecosystem, capable of generating and utilizing vast amounts of big data across various sectors. However, this integrated network faces significant security challenges, primarily due to constraints like limited latency, low power requirements, and the incorporation of diverse heterogeneous devices. Addressing these security concerns, this paper explores the construction of a satellite-IoT network through the application of Software Defined Networking (SDN). While SDN offers numerous benefits, it also inherits certain inherent security vulnerabilities. To mitigate these issues, we propose a novel approach that incorporates blockchain technology within the SDN framework. This blockchain-based SDN environment enhances security through a distributed controller system, which also facilitates the authentication of IoT terminals and nodes. Our paper details the implementation plan for this system and discusses its validation through a series of tests. Looking forward, we aim to expand our research to include the convergence of artificial intelligence with satellite-IoT devices, exploring new avenues for leveraging the potential of big data in this context.

Bayesian ballast damage detection utilizing a modified evolutionary algorithm

  • Hu, Qin;Lam, Heung Fai;Zhu, Hong Ping;Alabi, Stephen Adeyemi
    • Smart Structures and Systems
    • /
    • v.21 no.4
    • /
    • pp.435-448
    • /
    • 2018
  • This paper reports the development of a theoretically rigorous method for permanent way engineers to assess the condition of railway ballast under a concrete sleeper with the potential to be extended to a smart system for long-term health monitoring of railway ballast. Owing to the uncertainties induced by the problems of modeling error and measurement noise, the Bayesian approach was followed in the development. After the selection of the most plausible model class for describing the damage status of the rail-sleeper-ballast system, Bayesian model updating is adopted to calculate the posterior PDF of the ballast stiffness at various regions under the sleeper. An obvious drop in ballast stiffness at a region under the sleeper is an evidence of ballast damage. In model updating, the model that can minimize the discrepancy between the measured and model-predicted modal parameters can be considered as the most probable model for calculating the posterior PDF under the Bayesian framework. To address the problems of non-uniqueness and local minima in the model updating process, a two-stage hybrid optimization method was developed. The modified evolutionary algorithm was developed in the first stage to identify the important regions in the parameter space and resulting in a set of initial trials for deterministic optimization to locate all most probable models in the second stage. The proposed methodology was numerically and experimentally verified. Using the identified model, a series of comprehensive numerical case studies was carried out to investigate the effects of data quantity and quality on the results of ballast damage detection. Difficulties to be overcome before the proposed method can be extended to a long-term ballast monitoring system are discussed in the conclusion.

mVoIP Vulnerability Analysis And its Countermeasures on Smart Phone (스마트폰에서 mVoIP 취약성 분석 및 대응 방안)

  • Cho, Sik-Wan;Jang, Won-Jun;Lee, Hyung-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.3 no.3
    • /
    • pp.7-12
    • /
    • 2012
  • mVoIP (mobile Voice over Internet Protocol) service is a technology to transmit voice data through an IP network using mobile device. mVoIP provides various supplementary services with low communication cost. It can maximize the availability and efficiency by using IP-based network resources. In addition, the users can use voice call service at any time and in any place, as long as they can access the Internet on mobile device easily. However, SIP on mobile device is exposed to IP-based attacks and threats. Observed cyber threats to SIP services include wiretapping, denial of service, and service misuse, VoIP spam which are also applicable to existing IP-based networks. These attacks are also applicable to SIP and continuously cause problems. In this study, we analysis the threat and vulnerability on mVoIP service and propose several possible attack scenarios on existing mobile VoIP devices. Based on a proposed analysis and vulnerability test mechanism, we can construct more enhanced SIP security mechanism and stable mobile VoIP service framework after eliminating its vulnerability on mobile telephony system.

Efficient Kernel Integrity Monitor Design for Commodity Mobile Application Processors

  • Heo, Ingoo;Jang, Daehee;Moon, Hyungon;Cho, Hansu;Lee, Seungwook;Kang, Brent Byunghoon;Paek, Yunheung
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.15 no.1
    • /
    • pp.48-59
    • /
    • 2015
  • In recent years, there are increasing threats of rootkits that undermine the integrity of a system by manipulating OS kernel. To cope with the rootkits, in Vigilare, the snoop-based monitoring which snoops the memory traffics of the host system was proposed. Although the previous work shows its detection capability and negligible performance loss, the problem is that the proposed design is not acceptable in recent commodity mobile application processors (APs) which have become de facto the standard computing platforms of smart devices. To mend this problem and adopt the idea of snoop-based monitoring in commercial products, in this paper, we propose a snoop-based monitor design called S-Mon, which is designed for the AP platforms. In designing S-Mon, we especially consider two design constraints in the APs which were not addressed in Vigilare; the unified memory model and the crossbar switch interconnect. Taking into account those, we derive a more realistic architecture for the snoop-based monitoring and a new hardware module, called the region controller, is also proposed. In our experiments on a simulation framework modeling a productionquality device, it is shown that our S-Mon can detect the rootkit attacks while the runtime overhead is also negligible.