• Title/Summary/Keyword: critical art

Search Result 299, Processing Time 0.024 seconds

Analyses of Security into End-to-End Point Healthcare System based on Internet of Things (사물인터넷 기반의 헬스케어 시스템의 종단간 보안성 분석)

  • Kim, Jung Tae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.6
    • /
    • pp.871-880
    • /
    • 2017
  • Recently, service based on internet is inter-connected and integrated with a variety of connection. This kind of internet of things consist of heterogenous devices such as sensor node, devices and end-to end equipment which used in conventional protocols and services. The representative system is healthcare system. From healthcare appliance used by IoT, patient and doctor can utilize healthcare information with safety and high speed management. It is very convenient management to operate mobility. But it induced security and vulnerability issues because it has small memory capacity, low power supply and low computing power. This made impossible to implement security algorithm with embedded engine based on hardware. Nowdays, we can't realize conventional standard algorithm due to these kinds of reasons. From the critical issues, it occurred security and vulnerability issues. Therefore, we analysed and compared with conventional method and proposed techniques. Finally, we evaluated security issues and requirement for end-to-end point healthcare system based on internet of things.

Time Management Status of Small Contractors and Suggestions on Education for Time Management in Colleges (소규모 건설회사의 공정관리 현황과 대학의 공정관리 교육방안)

  • Jang, Myung-Houn;Yi, Yong-Kyu
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.3
    • /
    • pp.413-422
    • /
    • 2016
  • A construction manager tries to complete a construction project within its duration and budget using available resources. Schedule networks such as Bar-chart and CPM(critical path method) are used to finish the project within the duration. A survey shows that small contractors prefer Microsoft Excel to commercial time management softwares to manage construction time in their fields, because the Excel is useful to control cost with schedule and few time management experts works in the small contractors. A college produces talented graduates who are able to manage time of a construction project. But the quality and quantity of college eduction for time management is insufficient. Another survey shows that majors in Architectural engineering of local national universities have the curriculum for time management, and teach mainly the theory of network scheduling and how to make the network schedule. The several majors have classes for the theory and exercise of commercial time management softwares in several majors. It is necessary to educate time management experts able to use Bar-chart and commercial time management softwares for the small contractors.

Smart Centralized Remote Security Service Provisioning Framework for Open ICT Environment (개방형 ICT 환경을 위한 집중식 원격 보안 서비스 프로비저닝 프레임워크 구성 방안)

  • Park, Namje
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.2
    • /
    • pp.81-88
    • /
    • 2016
  • Machine-to-Machine (M2M) communication provides each component (machine) with access to Internet, evolving into the IoT technology. IoT is a trend where numbers of devices provide the communication service, using the Internet protocol. As spreading the concept of IoT(Internet of Things), various objects become home information sources. According to the wide spread of various devices, it is difficult to access data on the devices with unified manners. Under this environment, security is a critical element to create various types of application and service. In this paper propose the inter-device authentication and Centralized Remote Security Provisioning framework in Open M2M environment. The results of previous studies in this task is carried out by protecting it with the latest information on M2M / IoT and designed to provide the ultimate goal of future M2M / IoT optimized platform that can be integrated M2M / IoT service security and security model presents the information.

Development of BSKT For Cultivating Tacit Knowledge Transfer (암묵지전이 활성화를 위한 BSKT(Brokering Systems for tacit Knowledge Transfer)개발)

  • Hong, Jong-Yi
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.1
    • /
    • pp.39-48
    • /
    • 2016
  • The tacit knowledge transfer cultivate the value and mount of tacit knowledge. The tacit knowledge transfer plays the most important role for improving the competitiveness of the organization. Despite the tacit knowledge transfer is very important, the research related with tacit knowledge transfer has not been actively carried out. The barriers to tacit knowledge transfer interfere with the tacit knowledge transfer. The barriers to tacit knowledge transfer are lack of understanding knowledge experts, heavy over-work, insufficient compensation, trust shortage and knowledge stickiness. In order to overcome the barrier of the tacit knowledge transfer, it is necessary to promote knowledge broker. The knowledge broker is the foundation for the tacit knowledge transfer and the critical success factor for efficient tacit knowledge transfer. However, most research related on the knowledge broker had focused on the degree, centrality and density of the knowledge network. The framework is needed to performance indicator for diagnosing the tacit knowledge transfer. Therefore, we suggest the knowledge broker framework based on the social network analysis.

Analyses of Requirement of Security based on Gateway Architecture for Secure Internet (사물인터넷망의 보안 및 프라이버시 문제 해결을 위한 게이트웨이 보안 구조 분석)

  • Kim, Jung Tae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.3
    • /
    • pp.461-470
    • /
    • 2016
  • As IoT is broadly used in many fields, the security of IoT is becoming especially important and critical issues. Security and privacy are the key issues for IoT applications, and still faced with some enormous challenges. Sensor has limited resources such as computing power, memory, battery. By means of deeply analyzing the security architecture and features in security framework. While a number of researchers have explored such security challenges and open problems in IoT, there is an unfortunate lack of a systematic study of the security challenges in the IoT landscape. This special issue features recent and emerging advances IoT architecture, protocols, services and applications. The alternative method is IoT security gateway. In this paper, we surveyed the demands and requirements. By means of deeply analyzing the security architecture and features, we analyzed the demands and requirements for security based on gateway application.

A Study on the Grotesque Tendency in German Expressionism - Focused on Café Müller (독일 표현주의에 내재된 그로테스크 성향 연구 - 카페 뮐러(Café Müller)를 중심으로)

  • CHOI, Jung Yun
    • Trans-
    • /
    • v.15
    • /
    • pp.105-140
    • /
    • 2023
  • This study aims to investigate the interrelationship between German expressionist dance and grotesque art, with a specific focus on the analysis of Pina Bausch's renowned work, <Café Müller>. German expressionist dance emerged as a response to the social instability and economic downturn that followed World War I, leading to the introduction of expressionism and grotesque aesthetics. The incorporation of grotesque expression in dance plays a critical role in boldly portraying the destruction of the human condition and its underlying causes, thereby offering insights into social contradictions and the erosion of human nature. This research thoroughly explores the intricate connection between German expressionist dance and grotesque expression, providing a comprehensive analysis of Pina Bausch's <Café Müller> to reassess the profound meaning and significance of expressionist dance. Additionally, this study delves into the inherent grotesque tendencies embedded within the work, surpassing conventional notions of visual beauty and ugliness, and strives to reinterpret the essence of grotesque expression through the nuanced movements of the dancers and the integration of auditory elements within the performance.

3D Printing in Modular Construction: Opportunities and Challenges

  • Li, Mingkai;Li, Dezhi;Zhang, Jiansong;Cheng, Jack C.P.;Gan, Vincent J.L.
    • International conference on construction engineering and project management
    • /
    • 2020.12a
    • /
    • pp.75-84
    • /
    • 2020
  • Modular construction is a construction method whereby prefabricated volumetric units are produced in a factory and are installed on site to form a building block. The construction productivity can be substantially improved by the manufacturing and assembly of standardized modular units. 3D printing is a computer-controlled fabrication method first adopted in the manufacturing industry and was utilized for the automated construction of small-scale houses in recent years. Implementing 3D printing in the fabrication of modular units brings huge benefits to modular construction, including increased customization, lower material waste, and reduced labor work. Such implementation also benefits the large-scale and wider adoption of 3D printing in engineering practice. However, a critical issue for 3D printed modules is the loading capacity, particularly in response to horizontal forces like wind load, which requires a deeper understanding of the building structure behavior and the design of load-bearing modules. Therefore, this paper presents the state-of-the-art literature concerning recent achievement in 3D printing for buildings, followed by discussion on the opportunities and challenges for examining 3D printing in modular construction. Promising 3D printing techniques are critically reviewed and discussed with regard to their advantages and limitations in construction. The appropriate structural form needs to be determined at the design stage, taking into consideration the overall building structural behavior, site environmental conditions (e.g., wind), and load-carrying capacity of the 3D printed modules. Detailed finite element modelling of the entire modular buildings needs to be conducted to verify the structural performance, considering the code-stipulated lateral drift, strength criteria, and other design requirements. Moreover, integration of building information modelling (BIM) method is beneficial for generating the material and geometric details of the 3D printed modules, which can then be utilized for the fabrication.

  • PDF

State-of-the-Art in Cyber Situational Awareness: A Comprehensive Review and Analysis

  • Kookjin Kim;Jaepil Youn;Hansung Kim;Dongil Shin;Dongkyoo Shin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.5
    • /
    • pp.1273-1300
    • /
    • 2024
  • In the complex virtual environment of cyberspace, comprised of digital and communication networks, ensuring the security of information is being recognized as an ongoing challenge. The importance of 'Cyber Situation Awareness (CSA)' is being emphasized in response to this. CSA is understood as a vital capability to identify, understand, and respond to various cyber threats and is positioned at the heart of cyber security strategies from a defensive perspective. Critical industries such as finance, healthcare, manufacturing, telecommunications, transportation, and energy can be subjected to not just economic and societal losses from cyber threats but, in severe cases, national losses. Consequently, the importance of CSA is being accentuated and research activities are being vigorously undertaken. A systematic five-step approach to CSA is introduced against this backdrop, and a deep analysis of recent research trends, techniques, challenges, and future directions since 2019 is provided. The approach encompasses current situation and identification awareness, the impact of attacks and vulnerability assessment, the evolution of situations and tracking of actor behaviors, root cause and forensic analysis, and future scenarios and threat predictions. Through this survey, readers will be deepened in their understanding of the fundamental importance and practical applications of CSA, and their insights into research and applications in this field will be enhanced. This survey is expected to serve as a useful guide and reference for researchers and experts particularly interested in CSA research and applications.

A gene expression programming-based model to predict water inflow into tunnels

  • Arsalan Mahmoodzadeh;Hawkar Hashim Ibrahim;Laith R. Flaih;Abed Alanazi;Abdullah Alqahtani;Shtwai Alsubai;Nabil Ben Kahla;Adil Hussein Mohammed
    • Geomechanics and Engineering
    • /
    • v.37 no.1
    • /
    • pp.65-72
    • /
    • 2024
  • Water ingress poses a common and intricate geological hazard with profound implications for tunnel construction's speed and safety. The project's success hinges significantly on the precision of estimating water inflow during excavation, a critical factor in early-stage decision-making during conception and design. This article introduces an optimized model employing the gene expression programming (GEP) approach to forecast tunnel water inflow. The GEP model was refined by developing an equation that best aligns with predictive outcomes. The equation's outputs were compared with measured data and assessed against practical scenarios to validate its potential applicability in calculating tunnel water input. The optimized GEP model excelled in forecasting tunnel water inflow, outperforming alternative machine learning algorithms like SVR, GPR, DT, and KNN. This positions the GEP model as a leading choice for accurate and superior predictions. A state-of-the-art machine learning-based graphical user interface (GUI) was innovatively crafted for predicting and visualizing tunnel water inflow. This cutting-edge tool leverages ML algorithms, marking a substantial advancement in tunneling prediction technologies, providing accuracy and accessibility in water inflow projections.

A Study of the Reactive Movement Synchronization for Analysis of Group Flow (그룹 몰입도 판단을 위한 움직임 동기화 연구)

  • Ryu, Joon Mo;Park, Seung-Bo;Kim, Jae Kyeong
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.1
    • /
    • pp.79-94
    • /
    • 2013
  • Recently, the high value added business is steadily growing in the culture and art area. To generated high value from a performance, the satisfaction of audience is necessary. The flow in a critical factor for satisfaction, and it should be induced from audience and measures. To evaluate interest and emotion of audience on contents, producers or investors need a kind of index for the measurement of the flow. But it is neither easy to define the flow quantitatively, nor to collect audience's reaction immediately. The previous studies of the group flow were evaluated by the sum of the average value of each person's reaction. The flow or "good feeling" from each audience was extracted from his face, especially, the change of his (or her) expression and body movement. But it was not easy to handle the large amount of real-time data from each sensor signals. And also it was difficult to set experimental devices, in terms of economic and environmental problems. Because, all participants should have their own personal sensor to check their physical signal. Also each camera should be located in front of their head to catch their looks. Therefore we need more simple system to analyze group flow. This study provides the method for measurement of audiences flow with group synchronization at same time and place. To measure the synchronization, we made real-time processing system using the Differential Image and Group Emotion Analysis (GEA) system. Differential Image was obtained from camera and by the previous frame was subtracted from present frame. So the movement variation on audience's reaction was obtained. And then we developed a program, GEX(Group Emotion Analysis), for flow judgment model. After the measurement of the audience's reaction, the synchronization is divided as Dynamic State Synchronization and Static State Synchronization. The Dynamic State Synchronization accompanies audience's active reaction, while the Static State Synchronization means to movement of audience. The Dynamic State Synchronization can be caused by the audience's surprise action such as scary, creepy or reversal scene. And the Static State Synchronization was triggered by impressed or sad scene. Therefore we showed them several short movies containing various scenes mentioned previously. And these kind of scenes made them sad, clap, and creepy, etc. To check the movement of audience, we defined the critical point, ${\alpha}$and ${\beta}$. Dynamic State Synchronization was meaningful when the movement value was over critical point ${\beta}$, while Static State Synchronization was effective under critical point ${\alpha}$. ${\beta}$ is made by audience' clapping movement of 10 teams in stead of using average number of movement. After checking the reactive movement of audience, the percentage(%) ratio was calculated from the division of "people having reaction" by "total people". Total 37 teams were made in "2012 Seoul DMC Culture Open" and they involved the experiments. First, they followed induction to clap by staff. Second, basic scene for neutralize emotion of audience. Third, flow scene was displayed to audience. Forth, the reversal scene was introduced. And then 24 teams of them were provided with amuse and creepy scenes. And the other 10 teams were exposed with the sad scene. There were clapping and laughing action of audience on the amuse scene with shaking their head or hid with closing eyes. And also the sad or touching scene made them silent. If the results were over about 80%, the group could be judged as the synchronization and the flow were achieved. As a result, the audience showed similar reactions about similar stimulation at same time and place. Once we get an additional normalization and experiment, we can obtain find the flow factor through the synchronization on a much bigger group and this should be useful for planning contents.