• Title/Summary/Keyword: USER MANAGEMENT

Search Result 6,229, Processing Time 0.029 seconds

Wireless Water Leak Detection System Using Sensor Networks (센서네트워크를 이용한 무선 누수 탐지 시스템)

  • Choi, Soo-Hwan;Eom, Doo-Seop
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.48 no.3
    • /
    • pp.125-131
    • /
    • 2011
  • Water leak detection system is a system based on wireless sensor networks(WSNs) which detect a leak on water supply, localize the leak position and finally inform a water management center. A traditional leak detection method is to use experienced personnel who walk along a pipeline listening to the sound that is generated by the leaks and their effectiveness depend on the experience of the user. Also making more successful detection, it should be processed at middle of the night when people do not use water, as the result users have to operate the leak detection system at midnight. In this paper, we propose a new method for the water leak detection system based on the WSNs and describe it in detail. Leak detection devices which detect a leakage of water transmit and receive the result of water leak detection with each other by configuring WSNs to improve reliability of the detection result. Also, we analyzed the sound from water flowed in pipeline, proposed the pre-signal processing to separate a leakage sound from noisy sound. And lastly, It is especially important to make a time synchronization with water leak detection devices that are installed on the pipeline, we used 1PPS(1 Pulse Per Second) signal generated by GPS, therefore we could get a precise time synchronization. The proposed system set up in Namyangju and performances were evaluated.

Comparison of Deterministic and Probabilistic Approaches through Cases of Exposure Assessment of Child Products (어린이용품 노출평가 연구에서의 결정론적 및 확률론적 방법론 사용실태 분석 및 고찰)

  • Jang, Bo Youn;Jeong, Da-In;Lee, Hunjoo
    • Journal of Environmental Health Sciences
    • /
    • v.43 no.3
    • /
    • pp.223-232
    • /
    • 2017
  • Objectives: In response to increased interest in the safety of children's products, a risk management system is being prepared through exposure assessment of hazardous chemicals. To estimate exposure levels, risk assessors are using deterministic and probabilistic approaches to statistical methodology and a commercialized Monte Carlo simulation based on tools (MCTool) to efficiently support calculation of the probability density functions. This study was conducted to analyze and discuss the usage patterns and problems associated with the results of these two approaches and MCTools used in the case of probabilistic approaches by reviewing research reports related to exposure assessment for children's products. Methods: We collected six research reports on exposure and risk assessment of children's products and summarized the deterministic results and corresponding underlying distributions for exposure dose and concentration results estimated through deterministic and probabilistic approaches. We focused on mechanisms and differences in the MCTools used for decision making with probabilistic distributions to validate the simulation adequacy in detail. Results: The estimation results of exposure dose and concentration from the deterministic approaches were 0.19-3.98 times higher than the results from the probabilistic approach. For the probabilistic approach, the use of lognormal, Student's T, and Weibull distributions had the highest frequency as underlying distributions of the input parameters. However, we could not examine the reasons for the selection of each distribution because of the absence of test-statistics. In addition, there were some cases estimating the discrete probability distribution model as the underlying distribution for continuous variables, such as weight. To find the cause of abnormal simulations, we applied two MCTools used for all reports and described the improper usage routes of MCTools. Conclusions: For transparent and realistic exposure assessment, it is necessary to 1) establish standardized guidelines for the proper use of the two statistical approaches, including notes by MCTool and 2) consider the development of a new software tool with proper configurations and features specialized for risk assessment. Such guidelines and software will make exposure assessment more user-friendly, consistent, and rapid in the future.

A Study on the Architectural Design Utility of Object-based CAD System (객체기반 CAD 시스템의 건축설계적 효용에 관한 연구)

  • Yoo, Chang-Geun
    • Journal of The Korean Digital Architecture Interior Association
    • /
    • v.2 no.1
    • /
    • pp.9-15
    • /
    • 2002
  • As architectural forms tend to be large-scaled, high-storied and complicated, use of computer for processing design information has been generalized. However, CAD use in the process of developing architectural design has been neglected greatly in the educational field of architectural field due to the surging of recognition that it may limit the essential property of architectural design. It may be resulted from the limitation of CAD system, that is, it is because of tardy speed of application development for the related areas with the lack of simplicity and clarity of flexibility to be secured on the drawing and user interface. Recent CAD systems, however, overcome such a limitation, convert into object-based design from entity-based drawing, drafting and modeling for implementing design concept of architects and it connects with internet linked to superspeed information communication network and changes process and stream of architectural design. Therefore, this study deals with utility of object based CAD system with products of Autodesk Co. and consequently obtain the following conclusions. First, it expands architect's design areas by supporting cooperative design system based on model-based architectural design and internet. Second, it reduces consumption of personal and material resources and time in the process of drawing production for improving architectural design works. Third, it can reduce the frequent design changes by improving understanding of architectural space with visualization of immediate 3D information, escaping from traditional methods to deliver design information to building owner through 2D drawing or model and perspective drawing requiring much cost and time. Fourth, it keeps exactness without omission or duplication of design information and generate and renew information of all related drawings on a drawing. Fifth, it is possible to change difficult and boring architectural design work into a pleasure owing to immediate modeling and drawing of design idea. In addition, digital drawing generated by using object-based CAD system can playa role of establishing Urban Information System to be used for protecting from building in disaster and urban disasters in connection with GIS numerical map and be used for reference of all kinds of information required fro post-management of buildings. However, what is more important is that surplus time from introduction of object-based CAD system should be used for consideration to be recognized as a good space and building built as a product of this project for comfort to urban people.

  • PDF

Digital Stress of Consumers in Using Digital Goods (디지털 제품 관련 소비자 스트레스에 관한 연구)

  • Kim, Jung-Eun;Yeo, Jung-Sung
    • Journal of Families and Better Life
    • /
    • v.25 no.3 s.87
    • /
    • pp.119-135
    • /
    • 2007
  • The purpose of this study is to find out the level of digital stress that people experience and to investigate the effects of socio-economic variables on that. To collect data, structured questionnaire was developed and 1,200 questionnaires were distributed through internet. There were 2 dimensions in this study to examine digital stress. First dimension was about the devices themselves: computers and the other digital goods. Second dimension was about the time digital stress occurring in consumers' decision-making process: purchasing and using. Based on Yeo&Kim(2004), sub-dimensions of purchasing and using aspects were chosen. 5 sub-dimensions in purchasing side were new technology, cost, variety of alternatives, warranty service, and informational problem 6 sub-dimensions in using field were mal(or impaired)-functioning. physical aspects, immaturity in use, pressure to use, addiction to use, and informational problem. As independent variables, sex, age, educational level, digitalization acceptability and computer usability were used. The overall level of digital stress was around the average point which was not as high as expected. Digital stress of purchasing was higher than that of using. First, in purchasing aspects, the level of digital stress was relatively high in cost, variety of alternatives and warranty service. Hence, clear communications with consumers about the distinctive aspects and cost of digital devices in market are needed. Secondly, in using side, mal-functioning and physical aspects were relatively more powerful stressors. In the other words, the more serious problems were not from the characteristics of individual consumers but from those of products. Producers should put their best efforts to reduce imperfection (defectiveness) and develop user-friendly digital devices. Also, users' individual efforts to overcome the problems that can be solved privately are necessary. Finally, it was discovered that sex and computer usability were very important variables on digital stress. To extend computer usability of consumers and get over digital illiteracy, it is essential to expand the paths to give chances for people to contact with computers and other digital goods. Still there are lots of people whore computer-illiterate or low-skilled at computers. In policies or educational programs made by government, communities, or schools, more attention should be paid to the digitally vulnerable groups.

An Early Spectrum Sensing for Efficient Radio Access in Cloud-Conceptual Base Station Systems (클라우드 기지국 시스템에서 효율적 무선 접속을 위한 이른 스펙트럼 감지 기법)

  • Jo, Gahee;Lee, Jae Won;Na, Jee-Hyeon;Cho, Ho-Shin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.1
    • /
    • pp.68-78
    • /
    • 2013
  • In this paper, we propose an early spectrum sensing(ESS) as an advance preparation for radio-access trial, which enables multi-mode terminals to access the most appropriate radio-access system in a cloud-conceptual base station system where multiple radio access technologies(RATs) coexist. Prior to a random access to one of RATs, a multi-mode terminal conducts a spectrum sensing over entire frequency bands of whole RATs, then select the RAT with the lowest sensing power, that is likely to have the most available spectrum. Thus, an access failure caused by that the selected RAT has no available radio spectrum could be avoidable in advance. In computer simulation, we consider as various RATs as possible. First, circuit and packet systems are taken into consideration. In addition, the packet systems are classified according to the feasibility of carrier aggregation(CA). In case of terminal, three modes are considered with circuit-only, packet-only, and multi-mode. Subsequently, packet traffic is classified into real-time and non-real-time traffic with three different tolerable delay levels. The simulation includes a call process starting with a call generation and ending up with a resource allocation reflecting individual user's QoS requirements and evaluates the proposed scheme in terms of the successful access probability, system access time, system balancing factor and packet loss probability.

Prediction Model of Remaining Service Life of Concrete for Irrigation Structures by Measuring Carbonation (중성화 측정을 통한 콘크리트의 잔존수명 예측 모델)

  • Lee, Joon-Gu;Park, Kwang-Soo;Kim, Han-Joung;Lee, Joung-Jae
    • Journal of the Korea Concrete Institute
    • /
    • v.15 no.4
    • /
    • pp.529-540
    • /
    • 2003
  • Recently, the researches on the durability design of concrete structures have been studied. As the examples, models to evaluate the service life prediction of the structure have been developed. The purpose of this article is to develop the model for predicting remaining service life. The final aim is to provide the user time for repairing the concrete structures. In addition, it makes possible to maintain the concrete structure economically. 70 reservoirs out of the inland concrete structures were selected and concrete structures of their components were surveyed. Two methods were used for measuring carbonation; TG/DTA method and Phenolphtalein indicator and, the value of pH was measured by the pH meter, After deriving correlations of calcium carbonate and used year, duration from completion year to 2002, pH value, and concrete cover depth the model was developed for predicting remaining service life by measuring data as small as possible. The conventional models had been developed on the basis of experiment data obtained from the restricted lab environment like as carbon gas exposure. On the other hand this model was developed on the basis of measuring data obtained from the real field that the complex deterioration actions are occurred such as freezing and thawing, carbonation, steel corrosion, and so on. The reliability of the developed model will be evaluated high in this point and this model can help to maintain concrete structures economically by providing the manager time to repair the deteriorated concrete structures in site of facility management.

Infrared-based User Location Tracking System for Indoor Environments (적외선 기반 실내 사용자 위치 추적 시스템)

  • Jung, Seok-Min;Jung, Woo-Jin;Woo, Woon-Tack
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.5
    • /
    • pp.9-20
    • /
    • 2005
  • In this paper, we propose ubiTrack, a system which tracks users' location in indoor environments by employing infrared-based proximity method. Most of recently developed systems have focussed on performance and accuracy. For this reason, they adopted the idea of centralized management, which gathers all information in a main system to monitor users' location. However, these systems raise privacy concerns in ubiquitous computing environments where tons of sensors are seamlessly embedded into environments. In addition, centralized systems also need high computational power to support multiple users. The proposed ubiTrack is designed as a passive mobile architecture to relax privacy problems. Moreover, ubiTrack utilizes appropriate area as a unit to efficiently track users. To achieve this, ubiTrack overlaps each sensing area by utilizing the TDM (Time-Division Multiplexing) method. Additionally, ubiTrack exploits various filtering methods at each receiver and utilization module. The filtering methods minimize unexpected noise effect caused by external shock or intensity weakness of ID signal at the boundary of sensing area. ubiTrack can be applied not only to location-based applications but also to context-aware applications because of its associated module. This module is a part of middleware to support communication between heterogeneous applications or sensors in ubiquitous computing environments.

An improvement plan of Curriculum in Departments of Dental Technology (치기공과 교육과정의 개선방안)

  • Bae, Bong-Jin;Lee, Hwa-Sik;Park, Myung-Ho
    • Journal of Technologic Dentistry
    • /
    • v.31 no.4
    • /
    • pp.55-66
    • /
    • 2009
  • This research collected the curriculum for Dental Technology from a total of 20 schools --3-year colleges and 4-year colleges-- all in Korea. And we analyzed the average credits of subjects from students. As a result of this analysis, we get the conclusion below: 1. In the arithmetic mean of the major basis subjects which graduates and undergraduates answered about each subjects; Seminar, Dental morphology I II, Dental morphology practice I II, and Dental devices & instruments don't have many credits. And averages of the major application subjects credits which are Implants(especially low), Occlusal anatomy practice I II, Dental ceramics practice I II, and Dental ceramics practice are low, mostly have a converged tendency in high points. 2. In an analysis of the correlation which is based on the major basis subjects: Dental esthetic, oral anatomy I II, Dental materal practice III, Dental casting pracedure, Oral hygiene, Health & medical law, Management administration, and Medical terminology have a meaningful difference. (${\rho}$ < 0.05) 3. In an analysis of the correlation which is based on the major application subjects; Crown and bridge prosthodontics practice IV, Complete denture prosthodontics I II III, Complete denture prosthodontics practice I II III, Dental ceramics I II, Dental ceramics practice I II, Dental ceramics practice IIII, Occlusal anatomy I II, Occlusal anatomy practice I, Operative dentistry laboratory technology I, Operative dentistry laboratory technology practice II, Dental attachment laboratory technology practice, Implants, and Dental laboratory clinical practice have meaningful difference. (${\rho}$ < 0.05) 4. In an analysis of the correlation which is based on the ratio of a theory to an actual training; 40:60(38.57%) is the highest, followed by 30:70(30.04%), 50:50(23.32%), 60:40(5.83%), and 70:30(2.24%). These have meaningful difference. (${\rho}$ < 0.05) 5. In an analysis of the correlation which is based on the distinction of sex: Partial denture prosthodontics practice I II III, Complete denture prosthodontics I II III, Complete denture prosthodontics practice I II III, Occlusal anatomy practice I II, Implants, Medical terminology have meaningful difference. (${\rho}$ < 0.05) For the purpose of training entrepreneurs of middle standing who is required by a future society, Department of Dental Technology's Curriculum need to be managed with planning a curriculum which reflects opinions of graduates, undergraduates and a society, and also are considered not focusing on a supplier but focusing on a user.

  • PDF

A Study on Continued Intention of Social Network Services by Applying Privacy Calculus Model: Facebook and KakaoTalk Cases (프라이버시 계산 모형을 적용한 SNS 지속 사용 의도에 대한 연구: 페이스북과 카카오톡 사례 중심으로)

  • Min, Jinyoung;Kim, Byoungsoo
    • Information Systems Review
    • /
    • v.15 no.1
    • /
    • pp.105-122
    • /
    • 2013
  • Given the proliferation of social network services, it has become important to understand its user's continued use behavior. As users' privacy concerns in SNS have been identified as a critical barrier against forming this continued intention, many studies have focused on inducing continued intention by mitigating privacy concerns. However, this paper suggests to approach users' continued intention not only from the perspective of mitigating privacy concerns but also from the perspective of increasing potential benefits. Under the theoretical framework of privacy calculus model, we conducted cross sectional survey on 150 Facebook and 150 KakaoTalk users. The result suggests that trust mediates the relationships between privacy concerns and continued intention and between network externality and continued intention, and the influence of support for network formation on continued intention. The effect of network externality on continued intention, however, is not significant among Facebook users while it is significant among KakaoTalk users.

  • PDF

The Impact of Hardware Impairments and Imperfect Channel State Information on Physical Layer Security (하드웨어왜곡과 불완전한 채널상태정보가 물리계층보안에 미치는 영향)

  • Shim, Kyusung;Do, Nhu Tri;An, Beongku
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.4
    • /
    • pp.79-86
    • /
    • 2016
  • Physical layer security is cryptography technique to protect information by using physical nature of signals. Currently, many works on physical layer security have been actively researching while those researching models still have some problems to be solved. Eavesdropper does not share its channel state information with legitimate users to hide its presence. And when node transmits signal, hardware impairments are occurred, whereas many current researches assume that node model is ideal node and does not consider hardware impairments. The main features and contributions of this paper to solve these problems are as follows. First, our proposed system model deploys torch node around legitimate user to obtain channel state information of eavesdropper and considers hardware impairments by using channel state information of torch node. Second, we derive closed-form expression of intercept probability for the proposed system model. The results of the performance evaluation through various simulations to find out the effects on proposed system model in physical layer security show that imperfect channel state information does not effect on intercept probability while imperfect node model effects on intercept probability, Ergodic secrecy capacity and secrecy capacity.