• Title/Summary/Keyword: Smart Terminal

Search Result 228, Processing Time 0.024 seconds

Analysis of Departing Passengers' Dwell Time using Clustering Techniques (클러스터링 기법을 활용한 출발 여객 체류 시간 분석)

  • An, Deok-bae;Kim, Hui-yang;Baik, Ho-jong
    • Journal of Advanced Navigation Technology
    • /
    • v.23 no.5
    • /
    • pp.380-385
    • /
    • 2019
  • This paper is concerned with departure passengers' dwell time analysis using real system data. Previous researches emphasize the importance of dwell time analysis from perspective of airport terminal planning and non-aeronautical revenue. However, short-term airport operation using passengers' dwell time is considered impossible due to absence of passengers' behavior data. Recently, in accordance with the wave of smart airport, world leading airports are systematically collecting passenger data. So there is high possibility of analyzing passengers' dwell time with the data stacked in the airport database. We conducted dwell time analysis using data from Incheon Int'l airport. In order to handle passenger data, we adapted clustering algorithm which is one of data mining techniques. As a clustering result, passengers are divided into 3 clusters. One is the cluster for passengers whose dwell time is relatively short and who tend to spend longer time in the airside. Another is the cluster for passengers who have near 3 hours dwell time. The other is the cluster for passengers whose total dwell time is extremely long.

App Store security policy trends (앱스토어 보안정책 동향)

  • Bae, Jung-Min;Bae, Yu-Mi;Jung, Sung-Jae;Jang, Rea-Young;Soh, Woo-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.587-590
    • /
    • 2014
  • Spread of smart devices increases, the App Store market is formed so huge, even at this point, every day the scale is increasing now. As a result, for the benefit of companies and private individuals, malicious apps that threaten the security of smart devices, have appeared occasionally in the App Store. Security of the terminal, has issued various solutions through research at many universities and companies, and country. However, solutions for research and policy approaches that are blocking the procedure to register the application malicious app, so that it is not registered in the App Store, Only company that operates the app store is doing it. And the reference is also insufficient, various problems have occurred. In this study, after analyzing the problem of the security policy of the current App Store, presenting the breaking point.

  • PDF

A Study on the Application of Digital Twin Technology for Container Terminals (컨테이너 터미널의 디지털 트윈 기술 적용에 관한 연구)

  • Choi, Hoon-Do;Yu, Jang-Ho
    • Journal of Navigation and Port Research
    • /
    • v.44 no.6
    • /
    • pp.557-563
    • /
    • 2020
  • Digital Twin Technology is currently being utilized in many industries and logistics seems soon to follow that trend. Currently, technology introduction to container terminals is restrictedly developing. In reviewing the existing literature, it became clear that research on the application of Digital Twin technology for container terminals is deficient. This study fulfilled AHP and IPA analysis causing fields to adjust priority at the container terminal. The result of analysis on the urgent necessity of adjustable fields' detailed elements from Digital Twin Technology, ATC, intelligent CCTV, and container yards, and showed that they were of the highest priority level. Also, VR/AR Equipment, AYT, Smart Container, Automated Container Delivery Facility, Refrigerated/Freezer Container, Wearable Device for Port Maintenance, and Smart Buoy were reviewed in detail. Our group suggests AQC, Berth, AGV, ASC, Apron, and Automated Mooring as potentially useful Digital Twin Technologies. Finally, our research suggests the OSS equipment, intermodal linkage facility, intelligent drone, and hazardous material storage are areas of low priority.

A Secure Subscription-Push Service Scheme Based on Blockchain and Edge Computing for IoT

  • Deng, Yinjuan;Wang, Shangping;Zhang, Qian;Zhang, Duo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.445-466
    • /
    • 2022
  • As everything linking to the internet, people can subscribe to various services from a service provider to facilitate their lives through the Internet of Things (IoT). An obligatory thing for the service provider is that they should push the service data safely and timely to multiple IoT terminal devices regularly after the IoT devices accomplishing the service subscription. In order to control the service message received by the legal devices as while as keep the confidentiality of the data, the public key encryption algorithm is utilized. While the existing public encryption algorithms for push service are too complicated for IoT devices, and almost of the current subscription schemes based on push mode are relying on centralized organization which may suffer from centralized entity corruption or single point of failure. To address these issues, we design a secure subscription-push service scheme based on blockchain and edge computing in this article, which is decentralized with secure architecture for the subscription and push of service. Furthermore, inspired by broadcast encryption and multicast encryption, a new encryption algorithm is designed to manage the permissions of IoT devices together with smart contract, and to protect the confidentiality of push messages, which is suitable for IoT devices. The edge computing nodes, in the new system architecture, maintain the blockchain to ensure the impartiality and traceability of service subscriptions and push messages, meanwhile undertake some calculations for IoT devices with limited computing power. The legalities of subscription services are guaranteed by verifying subscription tags on the smart contract. Lastly, the analysis indicates that the scheme is reliable, and the proposed encryption algorithm is safe and efficient.

Development of Textile Sensors for Prevention of Forward Head Posture (거북목 예방을 위한 텍스타일 센서 개발)

  • Minsuk kim;Jinhee Park;Jooyong Kim
    • Journal of Fashion Business
    • /
    • v.27 no.4
    • /
    • pp.125-140
    • /
    • 2023
  • This study aimed to develop a smart wearable device for assessing the risk angle associated with turtle neck syndrome in patients with Video Display Terminal (VDT) syndrome. Turtle neck syndrome, characterized by forward head posture resulting from upper cross syndrome, leads to thoracic kyphosis. In this research, a stretch sensor was used to monitor the progression of turtle neck syndrome, and the sensor data was analyzed using a Universal Testing Machine (UTM) and the Gauge Factor (GF) calculation method. The scapula and cervical spine angles were measured at five stages, with 15-degree increments from 0° to 60°. During the experimental process, the stretch sensor was attached to the thoracic spine in three different lengths: 30mm, 50mm, and 100mm. Among these, the attachment method yielding the most reliable data was determined by measuring with three techniques (General Trim Adhesive, PU film, and Heat Transfer Machine), and clothing using the heat transfer machine was selected. The experimental results confirmed that the most significant change in thoracic kyphosis occurred at approximately 30° of forward head posture. Prolonged deformity can lead to various issues, highlighting the need for textile sensor solutions. The developed wearable device aims to provide users with real-time feedback on their turtle neck posture and incorporate features that can help prevent or improve the condition.

Measures to improve mobile communication propagation environment by linking small cells in a small closed environment (소규모 폐쇄 환경에서 스몰 셀을 연계한 이동통신 전파환경 개선방안)

  • YounGjin kim;Beomseok Chae;HyungJin kim
    • Smart Media Journal
    • /
    • v.13 no.1
    • /
    • pp.52-59
    • /
    • 2024
  • This paper proposes a plan to improve the reception radio environment of the mobile terminal and maintain a constant reception electric field by using small cells in a small closed environment. In order to configure an efficient communication infrastructure for small cells, both ends of wireless transmission and reception of an Ethernet-based wireless video recording system are connected using an L2 switch. The small cell connected to the receiving side L2 switch shares the wireless network section of the wireless video recording system and connects to the transmitting side L2 switch. After that, when it is normally linked to FMS, a management system for small cells, through the Internet network, the output of small cells is checked. In order to verify the results, a proposed network is formed on the elevator inside the building with a poor radio wave environment, and the radio wave environment is measured before and after the small cell application in the section where the elevator operates. As a result, the main parameters of the radio wave environment in all sections of the elevator are improved, as well as a constant receiving electric field strength within the moving elevator.

A Study on the Applicability of IoT for Container Terminal (컨테이너 터미널의 사물인터넷(IoT) 적용가능성에 관한 연구)

  • Jeon, Sang-Hyeon;Kang, Dal-Won;Min, Se-Hong;Kim, Si-Hyun
    • Journal of Korea Port Economic Association
    • /
    • v.36 no.2
    • /
    • pp.1-18
    • /
    • 2020
  • The Internet of things (IoT) has been applied to a variety of industrial uses such as public service sectors, medical industries, automotive industries, and so on. Led by smart cities, this is typical. However, from a logistics perspective, the level of application is insufficient. This study examines the applicability of IoT-related technology in a container terminal, an object of the present invention, to derive an applicable plan. Analytic network process (ANP) analysis reveals the following results for IoT applications in container terminals: operating systems (26.7%), safety/environmental/security systems (26.4%), equipment maintenance systems (25.3%), and facility maintenance systems (21.6 %). The second ANP analysis reveals the following results: Economy (40.2%), productivity (21.1%), service level (19.5%), and utilizing technology level (19.2%). The application or standard of evaluation is important when applying IoT technology to container terminals; however, it is not concentrated in a certain area. It is desirable to build each container system with linkage and efficiency from a macroscopic view.

Analysis of Wireless Network in Freight Container Terminal and Methods for Service Quality Enhancement (컨테이너 터미널의 무선 네트워크 분석과 서비스 품질 향상 방안)

  • Han, Seung-Ho;Park, Hyun-Sung;Kim, Jong-Deok;Kim, Yong-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.3B
    • /
    • pp.235-246
    • /
    • 2009
  • The number of industry wireless networks based on IEEE 802.11 WLAN technology deployed in large outdoor work sites, such as freight container terminal, is increasing these days. Wider service coverage, frequent movements of stations and high requirement on service reliability are main characteristics of these networks compared to the conventional IEEE 802.11 networks used in home, office and school. While the importance of these networks Bets higher, we can hardly find previous studies including concrete analysis on these networks based on actual experiments. We carried out several field experiments at a freight container terminal to analyze its IEEE 802.11 network and found out some problematic situations, such as over 50% retransmission rates and frequent disruption of communication link while a station is moving. We explain why these problematic situations happen and suggest some solutions, such as application of mesh technology, smart handoff based on location and movement pattern and adjustment of signal strength and channel allocation. Methods and tools used in the experiments are also detailed in the paper which may be helpful for similar future studies.

Seamless and Secure Service Framework using Multiple Network Interlaces Terminal in Heterogeneous Environment (이종 네트워크 환경에서 다중 인터페이스 단말을 활용한 끊김 없이 안전한 서비스 프레임워크)

  • Yoon, Sung-Hun;Lee, Soon-Seok;Kim, Sang-Ha
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.4
    • /
    • pp.53-65
    • /
    • 2011
  • As the Information and Communication Technologies continue to advance, some sensitive services (e.g. e-commerce, on-line financial service, and etc.) have spread rapidly. Accordingly, ensuring the safety of the sensitive service itself using personal Information as well as the protection of personal Information Is becoming very important. In addition, with the popularization of smart phone and the universalized use of wireless Internet, many services that have been provided on the basis of the conventional wired network are increasingly propagating to wired and wireless converged network environment. These changes in the network environment requires new paradigm for the pursuit of safe and stable communication. In this paper, we propose seamless and secure service framework that can facilitate a sustainable secure connection between the user terminal and the sensitive service system by using both the personal and network Information. The proposed service framework is capable of isolating the source of authorized use by a third party of the personal Information as far as the user terminal is not lost, although some personal Information is disclosed. Besides, it can provide a seamless and safe service environment even if the access network is changed by relocation of terminals in the heterogeneous mobile network environment.

Design and Implementation of Web-based Text Summarization System for Mobile Device (이동 단말을 위한 웹 기반 텍스트 요약 시스템의 설계 및 구현)

  • Cha, Ji-Eun;Chun, Seung-Man;Park, Jong-Tae
    • The KIPS Transactions:PartC
    • /
    • v.16C no.6
    • /
    • pp.725-730
    • /
    • 2009
  • Recently, there has been increasing interest to web access through mobile host due to the explosion of internet mobile terminal such as smart phone. However, small displays of mobile hosts make it difficult to browse the full content of a web page at a time. In order to overcome these limitation, we have designed and implemented Web-based text summarization system. The proposed system can summarize the text for the Web page in which abundant text exist in a page. This can reduce the amount of data transmission and minimize the unnecessary data output during browsing at mobile host. Through implementation, we have confirmed the functions of the proposed system.