• Title/Summary/Keyword: environment information

Search Result 26,493, Processing Time 0.046 seconds

Integrated GIS-Based Logistics Process Monitoring Framework with Convenient Work Processing Environment for Smart Logistics

  • Yu, Yeong-Woong;Jung, Hoon;Bae, Hyerim
    • ETRI Journal
    • /
    • v.37 no.2
    • /
    • pp.306-316
    • /
    • 2015
  • In today's highly competitive business environment, most companies try to manage their logistics function strategically to satisfy their orders as cost-effectively as possible and maximize their present and future profits. In this environment, logistics process visibility is essential to companies wishing to competently track components, parts, or products in transit from the original suppliers to the final destinations. Thus, it is important to provide instantly and easily recognizable information about such visibility to all stakeholders, especially customers. To ensure a high-level geographical visibility of the logistics processes, in this paper, we propose a way of implementing a GIS-based logistics process monitoring environment and of integrating a performer's work processing environment on the monitoring system. Additionally, to provide more abundant monitoring information, we describe a procedure for creating and processing various monitoring information, which are represented as ECA rules in this work processing environment. Therefore, it is possible to provide intuitive and visible monitoring information regarding the logistics process and resource elements.

A Basic Study on Review the Classification System and the Process of BlM Information for an Automatic Review of Certification Method of Health and Barrier Free Environment (장애물 없는 생활환경 인증제도의 자동검토를 위한 BIM 모델링 정보 및 인증 항목 정보의 분류체계 분석 프로세스에 관한 기초 연구)

  • Hong, Sa-Chul;Kim, Suk-Tae
    • Korean Institute of Interior Design Journal
    • /
    • v.27 no.2
    • /
    • pp.154-165
    • /
    • 2018
  • For the foundational study on automatic review of the barrier free Environment certification for the socially disadvantaged using BIM modeling information, we first confirm the need of the automatic review by analyzing the barrier free Environment certification an by investigating the existing studies on barrier free Environment certification. After that, we select a primary approach for our research by investigating the related works such as automatic review of the building code. As a next step, we generate the BIM modeling information, extract the classification system, analyze and extract items in the barrier free Environment certification according the extracted system, compares the items with the BIM generation information, and allocate them. And, we showed the potential usability of automatic review by deriving a process to prepare the ruleset structure for the automatic review and to prepare a criteria for BIM modeling guide.

Indoor Environment Monitoring System Using Short-range Wireless Communication in Mobile Devices (휴대용 단말기의 근거리 무선통신을 이용한 실내 환경모니터링 시스템)

  • Ye, Seong-Hyeon;Han, Soonhee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.9
    • /
    • pp.2167-2173
    • /
    • 2013
  • Recently, people are paying huge attention to problems caused by indoor air pollution. Also, the need for the system that monitors environmental information for indoor and warns a danger is growing increasingly. In this regard, we designed and implemented environment monitoring system for indoor. In this paper, we describe the system with hardware elements and it's communication method. In order to transfer the data from environment sensors, we use short-range wireless communication in smart phone. The proposed system is possible to know the indoor environment information in installed sensor node. If the risk is found, For the proposed system, there is an advantage that may be appropriate evacuation.

Lightweight Protocol for Low Power and Reliability Improvement Based on CoAP in the Internet of Things(IoT) Environment (사물인터넷 환경에서 CoAP 기반의 저전력, 신뢰성 향상을 위한 경량 프로토콜)

  • Seo, Doook;Lee, Dongho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.1
    • /
    • pp.21-28
    • /
    • 2019
  • Internet of Things(IoT) is a technology or environment that collects data by attaching sensors to objects and transmits the collected information to each other through wired / wireless communication in real time. It is expected that when the Internet of objects is activated, many objects can identify and recognize each other by themselves and provide various services to facilitate our lives through mutual information exchange. In addition, the internet market for things is growing rapidly each year, and various IT technologies are expected to converge. In the Internet environment of objects, data exchange technology between object devices, that is, message protocol, is classified as one of important technologies. In this paper, we examine various lightweight message protocols suitable for the Internet environment of objects, and compare the reliability of the CoAP protocol structure with the MQTT protocol for a limited environment. Finally, we confirm the reliability of TCP / TLS and WebSockets-based CoAP transmission protocol of IETF's CoRE WG that can use various transport layers other than UDP in Internet environment including cloud infrastructure.

Environmental Information System Analysis and Evaluation of Information Applications for Supportig the Environmental Inspection Practices (환경감시업무 지원을 위한 환경정보시스템 분석과 정보 활용도 평가)

  • Son, Seung-Woo;Yoon, Jeong-Ho;Jeon, Hyung-Jin;Lee, Jong-Min;Moon, Ji-Won;Kim, Tae-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.2
    • /
    • pp.726-736
    • /
    • 2017
  • This study was conducted to analyze whether environmental information could be used for environmental inspection. In addition, environmental information was collected and then an environmental information system applicable to inspection was (developed) using the on-site inspection of pollutant emission facilities and interviews with inspection experts based on the collected information. Moreover, the availability of the information was evaluated based on the (dual-purpose) environmental information system. The information was accumulated in the environmental information system and controlled according to its purpose. The environmental information needed for inspection was divided into four categories: information on emissions, information on emission companies, information on inspection records, and geographic information. The environmental information for each system was evaluated based on these four categories. For most of the systems, it was not possible to find the necessary inspection records. Based on the results, a method was proposed to connect and integrate the perspective of applied and environmental information from previous environmental information systems.

Access Control as a Service for Information Protection in Semantic Web based Smart Environment

  • Siddiqui, Isma Farah;Lee, Scott Uk-Jin
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.9-16
    • /
    • 2016
  • Pervasive computing and Internet of Things (IoT) have recently received considerable interest to deploy solutions for the future Internet. Smart environments are integrated with Semantic Web to provide context-awareness to the processed information. Self-learning techniques have been adopted within smart solutions for efficient retrieval of data but do not process data with privacy parameters for in-place authorization. To overcome this issue, we present a novel approach of deploying access control as a service mechanism within Semantic Web based smart environment by using eXtensible Access Control Markup Language (XACML). The proposed XACML as a Service (XACMLaaS) approach offers fine-grained access control for protecting information within smart environment. In this paper, we have defined mathematical rules for each components of proposed access control service layer. These rules are for implementation of access control using XACML. The proposed approach allows the adaptation of authorization of information at component level and provides scalable solution for authorization policies and rule enforcement within smart environment.

Study on the Establishment of Threshold Criteria for Heat Health Watch Warning System in Korea; Part I : Establishment of Criteria and Verification (고온건강경보시스템 기준 설정에 관한 연구( I ) - 기준 설정 및 검증 -)

  • Park, Jong-Kil;Jung, Woo-Sik;Kim, Eun-Byul
    • Journal of Environmental Science International
    • /
    • v.18 no.7
    • /
    • pp.767-780
    • /
    • 2009
  • This study investigates the standard, duration period and excess mortality of extreme heat using the standardized daily mortality data from 1991 to 2004, establishing a standard threshold Criteria for Heat Health Watch Warning System in Korea. It ultimately aims to provide the guidance in building up Heat Health Watch Warning System for Korea by suggesting the standard to quantify thermal stress from heat. The standard threshold Criteria for Heat Health Watch Warning System for Seoul metropolitan city takes into account both daily maximum temperature and daily maximum heat index(HI) and consists of four phases; caution, extreme caution, danger, and extreme danger. Extreme caution phase and danger phase are used as the advisory and warning of extreme heat, respectively. Since the nationwide distribution of the frequency of extreme heat day and the excess mortality rate shows little difference across regions, the standard threshold Criteria for Heat Health Watch Warning System for Seoul metropolitan city can be used for other regions.

A Study of Improved Session Management for Mobile Web under BYOD environment (BYOD 환경을 고려한 모바일 웹을 위한 세션 관리 개선 방안 연구)

  • Kim, Young-hun;Park, Yongsuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.5
    • /
    • pp.1117-1124
    • /
    • 2015
  • This paper explains a web session management system for mobile web environment with BYOD(Bring Your Own Device). This system operates by enhanced secure session token. This system consists of an unique identifier, time stamp, and encryption algorithm. The Unique identifier in this system classifies each mobile device for web security based on mobile environment with BYOD. And the Time stamp in this system that determine session effectiveness for web security. Also the Cipher algorithm in this system that protects session token information for web security. This paper analysis a security of session management system running on mobile web environment using the simulation techniques. The proposed method is more suitable than the other methods under enviroment mobile web environment with BYOD.

Compatibility for the Typhoon Damages Predicted by Korea Risk Assessment Model Input Data (한국형 재해평가모형(RAM)의 초기입력자료 적합성 평가)

  • Park, Jong-Kil;Lee, Bo-Ram;Jung, Woo-Sik
    • Journal of Environmental Science International
    • /
    • v.24 no.7
    • /
    • pp.865-874
    • /
    • 2015
  • This study was conducted to investigate the correlation between the distribution chart and input data of the predicted 3-second gust and damage cost, by using the forecast field and analysis field of Regional Data Assimilation Prediction System (RDAPS) as initial input data of Korea risk assessment model (RAM) developed in the preceding study. In this study the cases of typhoon Rusa which caused occurred great damage to the Korean peninsula was analyzed to assess the suitability of initial input data. As a result, this study has found out that the distribution chart from the forecast field and analysis field predicted from the point where the effect due to the typhoon began had similarity in both 3-second gust and damage cost with the course of time. As a result of examining the correlation, the 3-second gust had over 0.8, and it means that the forecast field and analysis field show similar results. This study has shown that utilizing the forecast field as initial input data of Korea RAM could suit the purpose of pre-disaster prevention.

Extended 3-Party Mutual Authentication Protocols for the Virtual Home Environment in Next Generation Mobile Networks (차세대 이동통신 네트워크의 Virtual Home Environment 구조에 적용 가능한 3자간 상호 인증 프로토콜)

  • Jeong, Jong-Min;Lee, Goo-Yeon;Lee, Yong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.4
    • /
    • pp.22-29
    • /
    • 2003
  • In the virtual home environment (VHE), which was proposed to offer global roaming and personal service environment portability, user's profiles and service logics are conveyed from home network to visited network to provide services at the visited network. Because user's profiles and service logics may contain confidential information, some procedures for mutual authentication among entities for offering confidence are needed. For these issues, we propose and analyze three 3-Party mutual authentication Protocols adaptable to the VHE in 3G ; password based mutual authentication protocol, mutual authentication protocol with CHAP and key exchange and mutual authentication protocol with trusted third party.