• Title/Summary/Keyword: future Internet

Search Result 2,267, Processing Time 0.026 seconds

Activity and Safety Recognition using Smart Work Shoes for Construction Worksite

  • Wang, Changwon;Kim, Young;Lee, Seung Hyun;Sung, Nak-Jun;Min, Se Dong;Choi, Min-Hyung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.2
    • /
    • pp.654-670
    • /
    • 2020
  • Workers at construction sites are easily exposed to many dangers and accidents involving falls, tripping, and missteps on stairs. However, researches on construction site monitoring system to prevent work-related injuries are still insufficient. The purpose of this study was to develop a wearable textile pressure insole sensor and examine its effectiveness in managing the real-time safety of construction workers. The sensor was designed based on the principles of parallel capacitance measurement using conductive textile and the monitoring system was developed by C# language. Three separate experiments were carried out for performance evaluation of the proposed sensor: (1) varying the distance between two capacitance plates to examine changes in capacitance charges, (2) repeatedly applying 1 N of pressure for 5,000 times to evaluate consistency, and (3) gradually increasing force by 1 N (from 1 N to 46 N) to test the linearity of the sensor value. Five subjects participated in our pilot test, which examined whether ascending and descending the stairs can be distinguished by our sensor and by weka assessment tool using k-NN algorithm. The 10-fold cross-validation method was used for analysis and the results of accuracy in identifying stair ascending and descending were 87.2% and 90.9%, respectively. By applying our sensor, the type of activity, weight-shifting patterns for balance control, and plantar pressure distribution for postural changes of the construction workers can be detected. The results of this study can be the basis for future sensor-based monitoring device development studies and fall prediction researches for construction workers.

Outage Analysis and Optimization for Time Switching-based Two-Way Relaying with Energy Harvesting Relay Node

  • Du, Guanyao;Xiong, Ke;Zhang, Yu;Qiu, Zhengding
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.2
    • /
    • pp.545-563
    • /
    • 2015
  • Energy harvesting (EH) and network coding (NC) have emerged as two promising technologies for future wireless networks. In this paper, we combine them together in a single system and then present a time switching-based network coding relaying (TSNCR) protocol for the two-way relay system, where an energy constrained relay harvests energy from the transmitted radio frequency (RF) signals from two sources, and then helps the two-way relay information exchange between the two sources with the consumption of the harvested energy. To evaluate the system performance, we derive an explicit expression of the outage probability for the proposed TSNCR protocol. In order to explore the system performance limit, we formulate an optimization problem to minimize the system outage probability. Since the problem is non-convex and cannot be directly solved, we design a genetic algorithm (GA)-based optimization algorithm for it. Numerical results validate our theoretical analysis and show that in such an EH two-way relay system, if NC is applied, the system outage probability can be greatly decreased. Moreover, it is shown that the relay position greatly affects the system performance of TSNCR, where relatively worse outage performance is achieved when the relay is placed in the middle of the two sources. This is the first time to observe such a phenomena in EH two-way relay systems.

The design and implementation of pin plugin tool to bypass anti-debugging techniques (Pin을 이용한 안티디버깅 우회 설계 및 구현)

  • Hong, Soohwa;Park, Yongsu
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.33-42
    • /
    • 2016
  • Pin is a framework that creates dynamic program analysis tools and can be used to perform program analysis on user space in Linux and Windows. It is hard to analyze the program such as Anti-reversing program or malware using anti-debugging by Pin. In this paper, we will suggest the implementation of scheme bypassing anti-debugging with Pin. Each pin code is written to bypass anti-debugging detecting Pin. And Pin creates a pin tool combined with Pin codes that bypass anti-debugging methods. The pin tool are tested with files created by anti-debugging protector. The technique in the paper is expected to be a reference of code bypassing anti-debugging and be applied to bypass newly discovered anti-debugging through code modification in the future.

Establishing the Concept of ICT-Based Creative Talented Persons (ICT기반 창의인재상 정립에 관한 연구)

  • Lee, Jaeho;Jin, Sukun;Shin, Hyunkyung
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.141-150
    • /
    • 2016
  • This study proposed the concept model of ICT-based Creative Talented Persons as the type of persons that gifted education in the ICT area should cultivate for the 21st century. The model of ICT-based Creative Talented Persons is made of three dimensions by 3 core competencies, 9 traits, and 27 characteristics. The field experts, that is, teachers on elementary and secondary school levels evaluate the validity of the model. Teachers expressed positive opinions about the validity of the multi-dimension model of ICT-based Creative Talented Persons. We expect that this model can provide a useful guide to designing and operating ICT education and ICT gifted education for cultivating talented persons to contribute for the future society.

A Study on Security System of 4G Network System (4세대 네트워크 시스템의 보안시스템에 관한 연구)

  • Kim, Hee-Sook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.15-23
    • /
    • 2016
  • In this paper we presented 4G security models in an open environment. 4G networks have still more security holes and open issues for expert to notice. In here. we show that a number of new security threats to cause unexpected service interruption and disclosure of information will be possible in 4G due mainly to the fact that 4G is an IP-based, heterogeneous network. it tells about the security issues and vulnerabilities present in the above 4G standards.. we try to present several architectures behind 4G infrastructure for example WiMAX and 3GPP LTE architecture. Finally, we point to potential areas for future vulnerabilities and evaluate areas in 4G security which warrant attention. When you make a big dada program, If you use this network architecture then you can improve your learning speed.

A Development of Remote Medical Treatment System for Stroke Recovery using ZigBee-based Wireless Brain Stimulator and Internet (ZigBee 기반의 무선 뇌 자극기와 네트워크를 이용한 원격 뇌졸중 회복 시스템의 개발)

  • Kim, G.H.;Ryu, M.H.;Kim, J.J.;Kim, N.G.;Yang, Y.S.
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.57 no.3
    • /
    • pp.514-517
    • /
    • 2008
  • Ubiquitous healthcare (U-healthcare) system is one of potential applications of embedded system. Conventional U-healthcare systems are used in health monitoring or chronic disease care based on measuring and transmission of various vital signs. However, future U-healthcare system can be of benefit to more people such as stroke patients which have limited activity by providing them proper medical care as well as continuous monitoring. Recently, an electric brain stimulation treatments have been found to be a better way compared to conventional ones and many are interested in using the method toward the treatment of stroke. In this study, we proposed a remote medical treatment system using ZigBee-based wireless electric brain stimulator that can help them to get a treatment without visiting their doctors. The developed remote medical treatment system connects the doctors to the brain stimulator implanted in the patients via the internet and ZigBee communication built in the brain stimulator. Also, the system receive personal information of the connected patients and cumulate the total records of electric stimulation therapy in a database. Doctors can easily access the information for better treatment planning with the help of graphical visualization tools and management software. The developed remote medical treatment system can extend their coverage to outdoors being networked with hand-held devices through ZigBee.

College Students' Perceptions on Electronic Commerce (전자상거래에 대한 대학생의 인식과 구매태도)

  • Shim, Jong-Seop
    • Korean Business Review
    • /
    • v.12
    • /
    • pp.29-66
    • /
    • 1999
  • Electronic Commerce is rapidly expanding with the development of internet and will be very useful for the consumers in the future. However, we could not find many studies on consumers' attitudes and behaviors in the cybermarket. The purpose of this study is to analyze perceptions of college students in Seoul and Chunchon on Electronic Commerce. The main findings are as follows. First, they prefer surfing on the net with search engines like Simmamai or Yahoo to directly looking over the homepages of department stores and advertisement sites. Students in Chunchon, especially, tend to check out banners at E-mail sites. Second, most of the students get information about shopping mall sites and products from their friends, newspapers or magazines. And they want to have information (advertisements) classified by brand names of the products. Third, students in Seoul rely on brand names more than those in Chunchon do. Students in Chunchon, compared with those in Seoul, believe more kinds of products are available in the internet shopping mall. They complain, however, deficiencies of information about the products and high prices. They want the price information compared with those in traditional markets. Fourth, they feel very uncomfortable about informing their credit card numbers, and thus prefer payments with Electronic Money. And finally, they are not satisfied with return and exchange policies and after-sale services. They also complain that the products are not delivered safely when they are not home. They want the delivery-date indicated.

  • PDF

Ontology based Context-Aware Recommendation System using Concept Hierarchy (개념 계층 모델을 이용한 온톨로지 기반 상황 인식 추천 시스템)

  • Ahn, Myoung-Hwan;Kwon, Joon-Hee
    • Journal of Internet Computing and Services
    • /
    • v.8 no.5
    • /
    • pp.81-89
    • /
    • 2007
  • In this thesis, we propose ontology based context-aware recommendation system using concept hierarchy(OCARCH), Context-aware recommendation services are useful to provide an user with relevant information and/or services bared on his current context, However several approaches to context-aware recommendation system have been already proposed, each of them provide information without considering level of information concept bared on his current context, For this reason, we propose OCARCH as system capable of helping people to find their way quickly and easily through large amounts of information by determining level of information concept based on his current context, We are also using prefetching algorithm to store recommendation information that the user is likely to need in the near future based on current predictions, Therefore the OCARCH enables users to obtain relevant information efficiently, Several experiments are performed and the experimental results show that the proposed system provides more effective than conventional context-aware recommendation system.

  • PDF

2D Human Pose Estimation based on Object Detection using RGB-D information

  • Park, Seohee;Ji, Myunggeun;Chun, Junchul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.800-816
    • /
    • 2018
  • In recent years, video surveillance research has been able to recognize various behaviors of pedestrians and analyze the overall situation of objects by combining image analysis technology and deep learning method. Human Activity Recognition (HAR), which is important issue in video surveillance research, is a field to detect abnormal behavior of pedestrians in CCTV environment. In order to recognize human behavior, it is necessary to detect the human in the image and to estimate the pose from the detected human. In this paper, we propose a novel approach for 2D Human Pose Estimation based on object detection using RGB-D information. By adding depth information to the RGB information that has some limitation in detecting object due to lack of topological information, we can improve the detecting accuracy. Subsequently, the rescaled region of the detected object is applied to ConVol.utional Pose Machines (CPM) which is a sequential prediction structure based on ConVol.utional Neural Network. We utilize CPM to generate belief maps to predict the positions of keypoint representing human body parts and to estimate human pose by detecting 14 key body points. From the experimental results, we can prove that the proposed method detects target objects robustly in occlusion. It is also possible to perform 2D human pose estimation by providing an accurately detected region as an input of the CPM. As for the future work, we will estimate the 3D human pose by mapping the 2D coordinate information on the body part onto the 3D space. Consequently, we can provide useful human behavior information in the research of HAR.

Joint Space-time Coding and Power Domain Non-orthogonal Multiple Access for Future Wireless System

  • Xu, Jin;Ding, Hanqing;Yu, Zeqi;Zhang, Zhe;Liu, Weihua;Chen, Xueyan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.93-113
    • /
    • 2020
  • According to information theory, non-orthogonal transmission can achieve the multiple-user channel capacity with an onion-peeling like successive interference cancellation (SIC) based detection followed by a capacity approaching channel code. However, in multiple antenna system, due to the unideal characteristic of the SIC detector, the residual interference propagated to the next detection stage will significantly degrade the detection performance of spatial data layers. To overcome this problem, we proposed a modified power-domain non-orthogonal multiple access (P-NOMA) scheme joint designed with space-time coding for multiple input multiple output (MIMO) NOMA system. First, with proper power allocation for each user, inter-user signals can be separated from each other for NOMA detection. Second, a well-designed quasi-orthogonal space-time block code (QO-STBC) was employed to facilitate the SIC-based MIMO detection of spatial data layers within each user. Last, we proposed an optimization algorithm to assign channel coding rates to balance the bit error rate (BER) performance of those spatial data layers for each user. Link-level performance simulation results demonstrate that the proposed time-space-power domain joint transmission scheme performs better than the traditional P-NOMA scheme. Furthermore, the proposed algorithm is of low complexity and easy to implement.