• Title/Summary/Keyword: Telecommunication data

Search Result 948, Processing Time 0.024 seconds

Data aggregation in the Wireless Sensor Network System for Environment Monitoring (환경감시를 위한 무선 센서 네트워크 시스템에서의 데이터 병합)

  • Seo, Dong-Hyeok;Jeon, Min-Ho;Lee, Dong Gyu;Ryu, Keun Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.403-406
    • /
    • 2009
  • 센서 네트워크 환경에서 각 센서 노드는 크기의 제약으로 인해 전력에 대한 한계점이 존재하여 데이터의 전송 및 데이터의 수집에 대한 작동을 최소화해야 한다. 특히, 데이터의 전송은 센서 노드의 전력소모에 큰 영향을 끼친다. 그리고 센서 네트워크에서는 근본적으로 높은 전송 에러율과 센서의 이동으로 인한 문제를 가진다. 본 논문에서는 가상환경에서 움직이거나 시간에 따라서 생기는 장애물에 대한 실질적인 전송 에러율 문제를 해결할 데이터 병합기법을 제안한다. 제안하는 기법은 신뢰성 있는 데이터 병합기법(RDAP : Reliable Data Aggregation Protocol)에 홉 수를 첨가하여 센서들이 예상치 못한 라우팅 경로 재설정으로 인해 센서노드의 센싱 값 손실을 방지할 수 있다.

Super-Pixel-Based Segmentation and Classification for UAV Image (슈퍼 픽셀기반 무인항공 영상 영역분할 및 분류)

  • Kim, In-Kyu;Hwang, Seung-Jun;Na, Jong-Pil;Park, Seung-Je;Baek, Joong-Hwan
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.2
    • /
    • pp.151-157
    • /
    • 2014
  • Recently UAV(unmanned aerial vehicle) is frequently used not only for military purpose but also for civil purpose. UAV automatically navigates following the coordinates input in advance using GPS information. However it is impossible when GPS cannot be received because of jamming or external interference. In order to solve this problem, we propose a real-time segmentation and classification algorithm for the specific regions from UAV image in this paper. We use the super-pixels algorithm using graph-based image segmentation as a pre-processing stage for the feature extraction. We choose the most ideal model by analyzing various color models and mixture color models. Also, we use support vector machine for classification, which is one of the machine learning algorithms and can use small quantity of training data. 18 color and texture feature vectors are extracted from the UAV image, then 3 classes of regions; river, vinyl house, rice filed are classified in real-time through training and prediction processes.

GIS-based Market Analysis and Sales Management System : The Case of a Telecommunication Company (시장분석 및 영업관리 역량 강화를 위한 통신사의 GIS 적용 사례)

  • Chang, Nam-Sik
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.61-75
    • /
    • 2011
  • A Geographic Information System(GIS) is a system that captures, stores, analyzes, manages and presents data with reference to geographic location data. In the later 1990s and earlier 2000s it was limitedly used in government sectors such as public utility management, urban planning, landscape architecture, and environmental contamination control. However, a growing number of open-source packages running on a range of operating systems enabled many private enterprises to explore the concept of viewing GIS-based sales and customer data over their own computer monitors. K telecommunication company has dominated the Korean telecommunication market by providing diverse services, such as high-speed internet, PSTN(Public Switched Telephone Network), VOLP (Voice Over Internet Protocol), and IPTV(Internet Protocol Television). Even though the telecommunication market in Korea is huge, the competition between major services providers is growing more fierce than ever before. Service providers struggled to acquire as many new customers as possible, attempted to cross sell more products to their regular customers, and made more efforts on retaining the best customers by offering unprecedented benefits. Most service providers including K telecommunication company tried to adopt the concept of customer relationship management(CRM), and analyze customer's demographic and transactional data statistically in order to understand their customer's behavior. However, managing customer information has still remained at the basic level, and the quality and the quantity of customer data were not enough not only to understand the customers but also to design a strategy for marketing and sales. For example, the currently used 3,074 legal regional divisions, which are originally defined by the government, were too broad to calculate sub-regional customer's service subscription and cancellation ratio. Additional external data such as house size, house price, and household demographics are also needed to measure sales potential. Furthermore, making tables and reports were time consuming and they were insufficient to make a clear judgment about the market situation. In 2009, this company needed a dramatic shift in the way marketing and sales activities, and finally developed a dedicated GIS_based market analysis and sales management system. This system made huge improvement in the efficiency with which the company was able to manage and organize all customer and sales related information, and access to those information easily and visually. After the GIS information system was developed, and applied to marketing and sales activities at the corporate level, the company was reported to increase sales and market share substantially. This was due to the fact that by analyzing past market and sales initiatives, creating sales potential, and targeting key markets, the system could make suggestions and enable the company to focus its resources on the demographics most likely to respond to the promotion. This paper reviews subjective and unclear marketing and sales activities that K telecommunication company operated, and introduces the whole process of developing the GIS information system. The process consists of the following 5 modules : (1) Customer profile cleansing and standardization, (2) Internal/External DB enrichment, (3) Segmentation of 3,074 legal regions into 46,590 sub_regions called blocks, (4) GIS data mart design, and (5) GIS system construction. The objective of this case study is to emphasize the need of GIS system and how it works in the private enterprises by reviewing the development process of the K company's market analysis and sales management system. We hope that this paper suggest valuable guideline to companies that consider introducing or constructing a GIS information system.

The smart EV charging system based on the big data analysis of the power consumption patterns

  • Kang, Hun-Cheol;Kang, Ki-Beom;Ahn, Hyun-kwon;Lee, Seong-Hyun;Ahn, Tae-Hyo;Jwa, Jeong-Woo
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.9 no.2
    • /
    • pp.1-10
    • /
    • 2017
  • The high costs of electric vehicle supply equipment (EVSE) and installation are currently a stumbling block to the proliferation of electric vehicles (EVs). The cost-effective solutions are needed to support the expansion of charging infrastructure. In this paper, we develope EV charging system based on the big data analysis of the power consumption patterns. The developed EV charging system is consisted of the smart EV outlet, gateways, powergates, the big data management system, and mobile applications. The smart EV outlet is designed to low costs of equipment and installation by replacing the existing 220V outlet. We can connect the smart EV outlet to household appliances. Z-wave technology is used in the smart EV outlet to provide the EV power usage to users using Apps. The smart EV outlet provides 220V EV charging and therefore, we can restore vehicle driving range during overnight and work hours.

Blockchain-based Data Storage Security Architecture for e-Health Care Systems: A Case of Government of Tanzania Hospital Management Information System

  • Mnyawi, Richard;Kombe, Cleverence;Sam, Anael;Nyambo, Devotha
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.364-374
    • /
    • 2022
  • Health information systems (HIS) are facing security challenges on data privacy and confidentiality. These challenges are based on centralized system architecture creating a target for malicious attacks. Blockchain technology has emerged as a trending technology with the potential to improve data security. Despite the effectiveness of this technology, still HIS are suffering from a lack of data privacy and confidentiality. This paper presents a blockchain-based data storage security architecture integrated with an e-Health care system to improve its security. The study employed a qualitative research method where data were collected using interviews and document analysis. Execute-order-validate Fabric's storage security architecture was implemented through private data collection, which is the combination of the actual private data stored in a private state, and a hash of that private data to guarantee data privacy. The key findings of this research show that data privacy and confidentiality are attained through a private data policy. Network peers are decentralized with blockchain only for hash storage to avoid storage challenges. Cost-effectiveness is achieved through data storage within a database of a Hyperledger Fabric. The overall performance of Fabric is higher than Ethereum. Ethereum's low performance is due to its execute-validate architecture which has high computation power with transaction inconsistencies. E-Health care system administrators should be trained and engaged with blockchain architectural designs for health data storage security. Health policymakers should be aware of blockchain technology and make use of the findings. The scientific contribution of this study is based on; cost-effectiveness of secured data storage, the use of hashes of network data stored in each node, and low energy consumption of Fabric leading to high performance.

A Study of Implementation for Home Networking Security System (홈 네트워크를 위한 보안 시스템 구현에 관한 연구)

  • Seol, Jeong-Hwan;Kim, In-Kyum;Lee, Ki-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.616-619
    • /
    • 2008
  • In this paper, we design and implement the authentication system for home network service and applied it to actual sensor nodes. We achieved authentication key, encryption and decryption applied RC5 encryption algorithm of SNEP. In addition, we used pair-wise key pre-distribution for prevention of authentication sniffing in wireless sensor network. The experiment environment consists of a base station receiving data and sensor nodes sending data. Each sensor nodes sends both the data and encrypted authentication key to the base station. As a simulation environment, we assumed some what-if scenarios of security menaces in home network service. And we slightly altered the TOS_Msg construction of TinyOS. The experiences had shown that the malfunction doesn't happen in communication among other groups. And we confirmed in tests that the system is secure when a sensor having malicious propose is added.

  • PDF

Feasibility study of wireless motion control (Wireless 모션제어의 가능성 연구)

  • Lee, Don-Jin;Ahn, Jung-Hwan
    • Proceedings of the KSME Conference
    • /
    • 2001.06b
    • /
    • pp.82-86
    • /
    • 2001
  • This papers deals with feasibility study of wireless motion control. Wireless telecommunication advances with development of IT technology and extends more and more areas. So we selected Bluetooth out of the technologies(Bluetooth, SWAP(SharedWireless Access Protocol), IrDA(Infra Red Data Association), WLAN(Wireless Local Area Network)) which was developed for local data communication and set up simple experimental system for wireless data transfer and server and client program for wireless data transfer was wrote. We successfully transferred some data wirelessly with this program.

  • PDF

A Study on Congestion Control for LAN Interworking in ATM Network (ATM 망에서 LAN 연동을 위한 폭주 제어에 관한 연구)

  • Park, Chun-Kwan
    • Journal of IKEEE
    • /
    • v.2 no.1 s.2
    • /
    • pp.122-133
    • /
    • 1998
  • The CL network fer CBDS(Connectionless Broadband Data Service) defined by ITU-(International Telecommunication Union-Telecommunication) consists of CL(ConnectionLess) servers which route frames and links which connect between CL user and CL server or between CL servers[1][2]. In this configuration, two kinds of congestion, CL link congestion and CL server congestion may occur. Therefore this paper has proposed the scheme that can deal with the above congestion state of LAN traffic efficiently in interworking LANs in ATM network. Proposed schemes ale link-by-link scheme and hybrid scheme. Link-by-link scheme uses the ABR feedback loops of AIM layer between CL user and CL server or between CL servers, and the header translation table carrying out the routing function of frame. And hybrid scheme is the scheme that adds end-to-end loop to link-by-link scheme and then uses RM message using CLNAP-PDU(ConnectionLess Network Access Protocol - Protocol Data Units) of CL layer. These schemes can be implemented easily because of using the ABR loop of ATM layer, end-to-end loop of CL layer, and the routing function of CL server. In this paper the characteristic and effects of two schemes in CL server bas been compared and analyzed.

  • PDF

Association between receiving work communications outside of work hours via telecommunication devices and work-related headaches and eyestrain: a cross-sectional analysis of the 6th Korean Working Conditions Survey

  • Yoon-Soo Jang;Jae-Han Lee;Na-Rae Lee;Dong-Woo Kim;June-Hee Lee;Kyung-Jae Lee
    • Annals of Occupational and Environmental Medicine
    • /
    • v.35
    • /
    • pp.50.1-50.11
    • /
    • 2023
  • Background: The rise in telecommuting or non-face-to-face work owing to the coronavirus disease 2019 pandemic has fueled conversations regarding the "right to disconnect." Although evidence suggests that receiving work-related communications through telecommunication devices outside of work hours may lead to various symptoms and illnesses, limited research has been undertaken on these symptoms. This study therefore aims to investigate the correlation between receiving work communications through telecommunication devices after work hours and the occurrence of work-related headaches and eyestrain in full-time, non-shift white-collar workers. Methods: This study used data from the 6th Korean Working Conditions Survey. The frequency of using telecommunication devices for work purposes outside of working hours was divided into five categories: "Every day," "Several times a week," "Several times a month," "Rarely," and "Never." Work-related headaches and eyestrain were categorized based on a "yes" or "no" response to the survey questions. Descriptive statistics, χ2 tests, and multiple logistic regression analyses were performed using SPSS 27.0. Results: After adjusting for sex, age, income level, education, occupation, workplace size, work hours, and sleep disorders, the odds ratio (OR) of work-related headaches and eyestrain based on frequency of telecommunication device usage were as follows: "rarely" (OR: 1.292; 95% confidence interval [CI]: 1.111-1.503), "several times a month" (OR: 1.551; 95% CI: 1.249-1.926), "several times a week" (OR: 1.474; 95% CI: 1.217-1.784), and "every day" (OR: 1.548; 95% CI: 1.321-1.813). Conclusions: Employees who use telecommunication devices for work after regular hours are more susceptible to experiencing work-related headaches and eyestrain compared to those who do not. However, there is a dearth of research examining the physical and mental health impacts of using telecommunication devices for after-hours work. Furthermore, the existing preventative measures in Korea are insufficient. Consequently, it is imperative to develop effective measures and conduct additional research to address this issue.

Routing Algorithms on a Ring-type Data Network (링 구조의 데이터 통신망에서의 라우팅 방안)

  • Ju, Un-Gi
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2005.05a
    • /
    • pp.238-242
    • /
    • 2005
  • This paper considers a routing problem on a RPR(Resilient Packet Ring). The RPR is one of the ring-type data telecommunication network. Our major problem is to find an optimal routing algorithm for a given data traffic on the network under no splitting the traffic service, where the maximum load of a link is minimized. This paper characterizes the Minmax problem and develops two heuristic algorithms. By using the numerical comparison, we show that our heuristic algorithm is valuable for efficient routing the data traffic on a RPR.

  • PDF