• Title/Summary/Keyword: User Management System

Search Result 3,214, Processing Time 0.033 seconds

A Study on Interactive Information Service based on Augmented Reality (증강현실기반 양방향 정보서비스에 관한 연구)

  • Kim, Yong
    • Journal of Information Management
    • /
    • v.41 no.4
    • /
    • pp.41-67
    • /
    • 2010
  • Augmented reality technology was invented for military purposes at the beginning. But the development of wireless and location based technology in 2000s makes AR services reach the age of innovation. Especially, it attracts attention as a media which enriches our perception. There is a potential that it can extend the virtual information in the real world from optical sense to auditory, tactile, and olfactory sense. This study proposed the interactive information service system and method based on AR. To do it, technical background on AR was analyzed and a method to apply the technology was examined. Especially, as a eco service, this study proposed new information service using 2D bar code in a library for user need and convenience in ubiquitous environment. The proposed service system can optimize practical utilization of information resources in virtual and real reality as consolidating analog and digital resources in a library.

A Study of Improving Method for The Convergence Infra Build of Vehicle Management Using by RFID Technologies (RFID를 활용한 차량관리 융합 인프라 구축방안 연구)

  • Lee, Bong-Choon;Ha, Deock-Ho;Kim, Ki-Moon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.9
    • /
    • pp.1539-1546
    • /
    • 2008
  • In the present age, a vehicle works important part in our lives and economical domain that transport people, freights, and everything. And both of its number and value are increasing more and more. But user's convenience, control system could not be archived improvement than technological success. In this paper, we suggest some kinds of administrative agendas; simplifying executive processes, designing vehicle information system using by RFID which includes Ubiquitous skill and optical communication network. Especially, this paper suggests public vehicle control model which ran simplify every executive processes of vehicle's life in the newest method. There are many kinds of RFID applicative products about transportation. And a dual invest should be interrupted for economical purpose. So we also proposes some way for problems of these types.

Semantic-based Keyword Search System over Relational Database (관계형 데이터베이스에서의 시맨틱 기반 키워드 탐색 시스템)

  • Yang, Younghyoo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.12
    • /
    • pp.91-101
    • /
    • 2013
  • One issue with keyword search in general is its ambiguity which can ultimately impact the effectiveness of the search in terms of the quality of the search results. This ambiguity is primarily due to the ambiguity of the contextual meaning of each term in the query. In addition to the query ambiguity itself, the relationships between the keywords in the search results are crucial for the proper interpretation of the search results by the user and should be clearly presented in the search results. We address the keyword search ambiguity issue by adapting some of the existing approaches for keyword mapping from the query terms to the schema terms/instances. The approaches we have adapted for term mapping capture both the syntactic similarity between the query keywords and the schema terms as well as the semantic similarity of the two and give better mappings and ultimately 50% raised accurate results. Finally, to address the last issue of lacking clear relationships among the terms appearing in the search results, our system has leveraged semantic web technologies in order to enrich the knowledgebase and to discover the relationships between the keywords.

A Study for Implementation of System for protecting Privacy data from IoT Things (IoT 장치의 개인정보 데이터 보호 시스템 구현에 관한 연구)

  • Kim, Seon Uk;Hong, Seong Eun;Bang, Jun Il;Kim, Hwa Jong
    • Smart Media Journal
    • /
    • v.10 no.2
    • /
    • pp.84-91
    • /
    • 2021
  • In the EU GDPR, when collecting personal information, the right of the information subject(user) to consent or refuse is given the highest priority. Therefore, the information subject must be able to withdraw consent and be forgotten and claim the right at any time. Especially, restricted IoT devices(Constrained Node) implement the function of consent of the data subject regarding the collection and processing of privacy data, and it is very difficult to post the utilization content of the collected information. In this paper, we designed and implemented a management system that allows data subjects to monitor data collected and processed from IoT devices, recognize information leakage problems, connect, and control devices. Taking into account the common information of the standard OCF(Open Connectivity Foundation) of IoT devices and AllJoyn, a device connection framework, 10 meta-data for information protection were defined, and this was named DPD (Data Protection Descriptor). we developed DPM (Data Protection Manager), a software that allows information subjects to manage information based on DPD.

Implimentation of Smart Farm System Using the Used Smart Phone (중고 스마트폰을 활용한 스마트 팜 시스템의 구현)

  • Kwon, Sung-Gab;Kang, Shin-Chul;Tack, Han-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.11
    • /
    • pp.1524-1530
    • /
    • 2018
  • In this paper, we designed a product that can prevent environmental pollution, waste of resources, and leakage of foreign currency by commercializing a green IT solution by merging a used smart phone with the IoT object communication technology for the first time in the world. For the experiment of the designed system, various performance and communication condition was experimented by installing it in the actual crop cultivation facility. As a result, when a problem occurs, the alarm sound and video notification are generated by the user's smart phone, and remote control of various installed devices and data analysis in real time are possible. In this study, it is thought that the terminal management board developed for the utilization of the used smart phone can be applied to various fields such as agriculture and environment.

A Design of Smart Home IoT Device Remote Control Policy Management System based on CEP (CEP 기반의 스마트 홈 IoT 디바이스 원격 제어 정책 관리 시스템 설계)

  • Kim, KyeYoung;Moon, Daejin;Cho, Dae-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.576-578
    • /
    • 2016
  • Various smart home IoT devices and services while the Internet of things is the development has been provided. The core of the smart home IoT service is that user control the device via the Internet communication. Communication of IoT devices, because most with an IP address within the private network, there is a difficulty in the remote control to control access from outside the network. Any of the methods for remote control, to determine the IP address of each other, there is a UDP hole punching for communication. To ensure the data communication success rate closed to 100%, the UDP hole punching must undergo a process of three stages in some cases. In this paper, to provide a system for managing the remote control policy based on the CEP in order to omit the unnecessary steps on the remote control of IoT devices using UDP hole punching.

  • PDF

Chaincode-based File Integrity Verification Model (체인코드 기반의 파일 무결성 검증 모델)

  • Kim, Hyo-Jong;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.4
    • /
    • pp.51-60
    • /
    • 2021
  • Recent advances in network and hardware technologies have led to active research and multiple network technologies that fuse blockchain technologies with security. We propose a system model that analyzes technologies using existing blockchain and verifies the integrity of files using private blockchain in a limited environment. The proposed model can be written as a chain code of Hyperleisure Fabric, a private blockchain platform, and verified for integrity of files through Hyperleisure Explorer, a private blockchain integrated management platform. The system performance of the proposed model was analyzed from a developer perspective and from a user perspective. As a result of the analysis, there are compatibility problems according to the version of various modules to run the blockchain platform, and only limited elements such as chain code status and groups can be checked.

Underwater Drone Development for Ship Inspection Part 2: Monitoring System and Operation (선박 검사 수중 드론 개발 Part 2: 모니터링 시스템 및 운용)

  • Ha, Yeon-Chul;Kim, Jin-Woo;Kim, Goo;Jeong, Kyeong-Taek;Choi, Hyun-Deuk
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.21 no.3
    • /
    • pp.133-141
    • /
    • 2020
  • In this paper, the communication method of data information accepted by underwater drones and the implementation method to console display of data information were described, and the function of integrated monitoring system interface and the design and implementation of sonar interface were explained. The operation and posture of underwater drones can be controlled using a controller connected to the console, and the distance information between underwater drones and obstacles is obtained from sonar so that they can be visually displayed on the console screen along with camera images. The integrated monitoring navigation console is implemented to suit improvements, making it convenient and easy for workers to use. In addition, by upgrading integrated monitoring and control software functions, the company added user-specific project management functions and the output of reports for hull inspection to make them different and competitive from other underwater drones.

A Study on Human-Centered IT Utilization in Caring for Elderly People Who Live Alone (독거노인 돌봄에 있어 인간중심의 IT 활용방안에 관한 연구)

  • Choi, So-Yun
    • Journal of Digital Convergence
    • /
    • v.20 no.2
    • /
    • pp.455-462
    • /
    • 2022
  • This study was conducted to find ways to utilize human-centered IT in caring for elderly people who live alone. Through focus group interviews with experts, this study investigated the problems with delivery system, and ethical issues. Problems such as lack of trust, supplier-centered care, and uniform service provision were derived as major problems in the delivery system. These findings indicate that IT should be used as an auxiliary means of face-to-face services and to be controllable and convenient. Issues such as "guaranteeing the right to self-determination," "protecting privacy," "sufficiently guaranteeing the right to know," and "encompassing blind spots" were raised as important ethical issues related to human-centered IT utilization. Based on the research results, this study presented the necessity of designing user-centered information technology and the necessity of developing ethical indicators for the use of human-centered technology.

A Design of Sensor Web service Framework for Wireless Sensor Networks Environment (무선 센서 네트워크 환경에 대한 센서 웹 서비스 프레임워크의 설계)

  • Kim, Yong-Tae;Jeong, Yoon-Su;Park, Byung-Joo;Park, Gil-Cheol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.10
    • /
    • pp.123-131
    • /
    • 2009
  • In this paper, we design ZigBee RF based framework for mobile web service on collected data by sensor node and transmitting data to data base by sensor network and remote sensing server through wireless connection. The proposed system is an integrated platform of sensor network for the sensor management and providing SOA based sensor web access. This paper combines SOA technology with sensor network. composes sensor node as web view, and provides high capability. extensiveness, reliability, and usability to the user who accesses to sensor web. The mobile message conversion module, SOAP message processing module. WSDL message generator, and mobile web service module is embodied for improving the capacity of the framework. The capacity evaluation of local wireless communication system which is proposed in this paper is analyzed through NS-2 simulation.