• Title/Summary/Keyword: mobile office

Search Result 255, Processing Time 0.025 seconds

Remediation of Heavy Metal Contamination in OBOD Site with Soil Washing : Selection of Extractants (토양세척법에 의한 중금속오염 폐탄처리장 토양의 정화 : 세척액의 선정)

  • Lee, Sang-Hwan;Kim, Eul-Young;Seo, Sang-Kee;Kim, Gweon-Bo;Kim, Jae-Hwan;Lee, Jong-Keun
    • Journal of Soil and Groundwater Environment
    • /
    • v.13 no.2
    • /
    • pp.44-53
    • /
    • 2008
  • The efficiences of mineral acid (HCl), neutral salts ($CaCl_2$), and chelating agent (citric acid and $Na_2$-EDTA) were tested for extracting heavy metals from open burning and open detonation (OBOD) site soil. The extraction efficiencies of Cd, Cu, Pb and Zn from soil for various extractants were in the order of HCl > citric acid > $Na_2$-EDTA > $CaCl_2$, HCl (1.0 M) extracted effectively 82%, 86%, 80%, and 46% of initial total concentrations of Cd, Cu, Pb, and Zn, respectively. Significant negative correlations were observed between pH of extractant and amount of extracted heavy metals. Initially, examined heavy metals were predominantly bound to carbonate and Fe, Mn-oxide fraction. Though the significant amount of carbonate and Fe, Mn-oxide bounded metals were removed but a significant amount remained metals shifted to exchangeable (more mobile) fraction by HCl and citric acid extraction. The increased mobility of remaining metals could be problematic for water resources, thus careful management is needed to control the movement of heavy metals.

GIS-based Web-Service Architecture

  • Niaraki, Abolghasem Sadeghi;Kim, Kye-Hyun;Lee, Chol-Young;Kim, Tae-Hoon
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 2008.10a
    • /
    • pp.113-118
    • /
    • 2008
  • The present research addresses the system design for building a geospatially-based web services application for mobile users. In recent years, geospatial information(GI) and Geographic Information Systems(GIS) are significant resources in decision-making analyses at various levels of society and activities. Recently, the integration of GIS and web services, called GIS web services, provides the wider implementation of GIS. At the present time, accessing, presenting, and manipulating updatedgeospatial information to locate geo-related facility services are real challenges related to application developers to implement for foot-travelers properly. The present paper investigates how the web services work in a GIS for discovering geo-related facility services such as a restaurant and post office in the user's vicinity. Thus, a prototype, with an architecture consisting of a windows application on the client side as well as facility services and geo-engineon the server side, were designed and implemented with the proposed GIS web services platform. On both the client and server sides, visual studio .Net technology was used. A geo-engine on the server side was also built with ESRI's MapObjects. Following successful implementation of the prototype presented in this study, the mobile user is able to invoke remote web services to assess the location of various facilities such as restaurants. Moreover, the present research demonstratesthat web services are not restricted only to web-based use, but can also be utilized by any web-connected application.

  • PDF

Efficient navigation of mobile robot based on the robot's experience in human co-existing environment

  • Choi, Jae-Sik;Chung, Woo-Jin;Song, Jae-Bok
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.2024-2029
    • /
    • 2005
  • In this paper, it is shown how a mobile robot can navigate with high speed in dynamic real environment. In order to achieve high speed and safe navigation, a robot collects environmental information. A robot empirically memorizes locations of high risk due to the abrupt appearance of dynamic obstacles. After collecting sufficient data, a robot navigates in high speed in safe regions. This fact implies that the robot accumulates location dependent environmental information and the robot exploits its experiences in order to improve its navigation performance. This paper proposes a computational scheme how a robot can distinguish regions of high risk. Then, we focus on velocity control in order to achieve high speed navigation. The proposed scheme is experimentally tested in real office building. The experimental results clearly show that the proposed scheme is useful for improving a performance of autonomous navigation. Although the scope of this paper is limited to the velocity control in order to deal with unexpected obstacles, this paper points out a new direction towards the intelligent behavior control of autonomous robots based on the robot's experience.

  • PDF

Implementation of HMM Based Speech Recognizer with Medium Vocabulary Size Using TMS320C6201 DSP (TMS320C6201 DSP를 이용한 HMM 기반의 음성인식기 구현)

  • Jung, Sung-Yun;Son, Jong-Mok;Bae, Keun-Sung
    • The Journal of the Acoustical Society of Korea
    • /
    • v.25 no.1E
    • /
    • pp.20-24
    • /
    • 2006
  • In this paper, we focused on the real time implementation of a speech recognition system with medium size of vocabulary considering its application to a mobile phone. First, we developed the PC based variable vocabulary word recognizer having the size of program memory and total acoustic models as small as possible. To reduce the memory size of acoustic models, linear discriminant analysis and phonetic tied mixture were applied in the feature selection process and training HMMs, respectively. In addition, state based Gaussian selection method with the real time cepstral normalization was used for reduction of computational load and robust recognition. Then, we verified the real-time operation of the implemented recognition system on the TMS320C6201 EVM board. The implemented recognition system uses memory size of about 610 kbytes including both program memory and data memory. The recognition rate was 95.86% for ETRI 445DB, and 96.4%, 97.92%, 87.04% for three kinds of name databases collected through the mobile phones.

Efficient Implementation of Crypto Processing Based on Pre_Buffered Key Stream Method (Pre_Buffered 키스트림을 이용한 효율적인 암호처리 구현)

  • Kang, Cheol-Oh;Kim, Eun-Chan;Park, Jea-Min;Ryou, Jea-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.989-1000
    • /
    • 2013
  • Mobile devices use VPN solution to transfer information securely through open network in mobile office environment. In this paper, we propose Pre_Buffered mechanism that improves the throughput of IPSec VPN using low performance H/W crypto Token. Pre_Buffered method precompute key stream, store them in Buffer and use them in IPSec engine for IP packet processing. Moreover, Design, analysis, and experimental results prove the efficiency and feasibility of our proposed method.

Developing a Home Care Nursing Information System by utilizing Wire-Wireless Network and Mobile Computing System (컴퓨터 통신망과 PDA(휴대용개인단말기)를 이용한 가정간호정보시스템 개발)

  • 박정호;박성애;윤순녕;강성례
    • Journal of Korean Academy of Nursing
    • /
    • v.34 no.2
    • /
    • pp.290-296
    • /
    • 2004
  • Purpose: The purpose of this study was to develop a home care nursing network system for operating home care effectively and efficiently by utilizing a wire-wireless network and mobile computing in order to record and send patients' data in real time, and by combining the headquarter office and the local offices with home care nurses over the Internet. It complements the preceding research from 1999 by adding home care nursing standard guidelines and upgrading the PDA program. Method: Method/l and Prototyping were adopted to develop the main network system. Result: The detailed research process is as follows: 1 )home care nursing standard guidelines for Diabetes, cancer and peritoneal-dialysis were added in 12 domains of nursing problem fields with nursing assessment/intervention algorithms. 2) complementing the PDA program was done by omitting and integrating the home care nursing algorhythm path which is unnecessary and duplicated. Also, upgrading the PDA system was done by utilizing the machinery and tools where the PDA and the data transmission modem are integrated, CDMX-1X base construction, in order to reduce a transmission error or transmission failure.

Safe Navigation of a Mobile Robot Considering the Occluded Obstacles (가려진 동적 장애물을 고려한 이동로봇의 안전한 주행기술개발)

  • Kim, Seok-Gyu;Chung, Woo-Jin
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.14 no.2
    • /
    • pp.141-147
    • /
    • 2008
  • In this paper, we present one approach to achieve safe navigation in indoor dynamic environment. So far, there have been various useful collision avoidance algorithms and path planning schemes. However, those algorithms have a fundamental limitation that the robot can avoid only "visible" obstacles. In real environment, it is not possible to detect all the dynamic obstacles around the robot. There exist a lot of "occluded" regions due to the limitation of field of view. In order to avoid possible collisions, it is desirable to consider visibility information. Then, a robot can reduce the speed or modify a path. This paper proposes a safe navigation scheme to reduce the risk of collision due to unexpected dynamic obstacles. The robot's motion is controlled according to a hybrid control scheme. The possibility of collision is dually reflected to a path planning and a speed control. The proposed scheme clearly indicates the structural procedure on how to model and to exploit the risk of navigation. The proposed scheme is experimentally tested in a real office building. The presented result shows that the robot moves along the safe path to obtain sufficient field of view, while appropriate speed control is carried out.

A DDoS Attack Detection of private mobile network using Time Series Analysis (시계열 분석을 적용한 사설 모바일 네트워크의 DDoS 공격 탐지)

  • Kim, Dae Hwan;Lee, Soo Jin;Pyo, Sang Ho
    • Convergence Security Journal
    • /
    • v.16 no.4
    • /
    • pp.17-24
    • /
    • 2016
  • Many companies and organizations are building a mobile office environment using the LTE network, the national disaster network and Air Force LTE network are built for public safety and national defense. However the recent threats on information security have been evolving from information leakage to DDoS attacks to neutralize the service. Especially, the type of device such as Smart phones, smart pad, tablet PC, and the numbers are growing exponentially and As performance of mobile device and speed of line develop rapidly, DDoS attacks in the mobile environment is becoming a threat. So far, universal countermeasure to DDoS attacks has been interception the network and server step, Yet problem regarding DDoS attack traffic on mobile network and expenditure of network resources still remains. Therefore, this paper analyzes the traffic type distributed in the private mobile network such as the National Disaster Network, and Air Force LTE network in order to preemptively detect DDoS attacks on terminal step. However, as direct analysis on traffic distributed in the National Disaster Network, and Air Force LTE network is restricted, transmission traffics in Minecraft and uploading video file upload which exhibit similar traffic information are analyzed in time series, thereby verifing its effectiveness through establishment of DDoS attacks standard in mobile network and application that detects and protects DDoS attacks

Universal and Can be Applied Wireless Channel Assignment Algorithm (범용 적용이 가능한 무선채널할당알고리즘)

  • Heo, Seo-Jung;Son, Dong-Cheul;Kim, Chang-Suk
    • Journal of Digital Convergence
    • /
    • v.10 no.9
    • /
    • pp.375-381
    • /
    • 2012
  • If a mobile station requests a channel allocation in its mobile networks, the switching center assigns a channel to a mobile station that belongs to each base station. There are three kinds of channel allocation schemes; a fixed channel allocation, a dynamic channel allocation and a hybrid combination of these two forms. In assigning a good frequency, it is our intention to provide quality service to our customers as well as to use resources efficiently. This paper proposes methods of assigning frequencies that minimize interference between channels and that also minimize the amount of searching time involved. In this paper, we propose an algorithm to per specific equipment, regardless of the number of channels that can be used as a general-purpose system, such as base stations, control stations, central office model is proposed, the existing operators manner similar to the fixed channel allocation based statistics and assigned when the conventional method and the improved method is proposed. Different ways and compared via simulations to verify the effectiveness of the proposed approach.

In the Automation Environment of Factory and Production, the Implementation of Security-enhanced Mobile Device Management System using Android-based Smart Phones (공장 및 생산 자동화에 있어 안드로이드 기반의 보안성이 강화된 모바일장비관리시스템 구현)

  • Yu, Hyung-Cik;Seon, Ki-Hyun;Kim, Sung-Un
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.7
    • /
    • pp.779-789
    • /
    • 2014
  • Utilizing smart phones based on android applications in the field of FA(Factory Automation) or PA(Production Automation) is being deployed actively. In general, MDM(Mobile Device Management) is a crucial infra-structure to build such a FA or PA environment. In this paper, we suggest an open mobile device management platform and implement its prototype. The developed prototype consists of three modules such as DMS(Device Management Server), FUMO(Firmware Update Management Object) and SCOMO(Software Component Management Object). In addition, we suggest a security module based on the concept of the EAP (Extensible Authentication Protocol) and the AES (Advanced Encryption Standard). The suggested security module's prototype is applied to guarantee the data integrity in the process of communicating among DMS, FUMO and SCOMO for the purpose of utilizing smart phones based on android applications in a FA field. We also evaluate the performance of the implemented security prototype. According to our simulation results, the implemented prototype has a good performance in a FA environment and can be utilized in the other FA, PA or OA(Office Automation) environment with guaranteeing the security.