• Title/Summary/Keyword: open control platform

Search Result 157, Processing Time 0.022 seconds

Development of AI Image Analysis Emergency Door Opening and Closing System linked Wired/Wireless Counting (유무선 카운팅 연동형 AI 영상분석 비상문 개폐 시스템 개발)

  • Cheol-soo, Kang;Ji-yun, Hong;Bong-hyun, Kim
    • Journal of Digital Policy
    • /
    • v.1 no.2
    • /
    • pp.1-8
    • /
    • 2022
  • In case of a dangerous situation, the roof, which serves as an emergency exit, must be open in case of fire according to the Fire Act. However, when the roof door is opened, it has become a place of various incidents and accidents such as illegal entry, crime, and suicide. As a result, it is a reality to close the roof door in terms of facility management to prevent crime, various incidents, and accidents. Accordingly, the government is pushing to legislate regulations on housing construction standards, etc. that mandate the installation of electronic automatic opening and closing devices on rooftop doors. Therefore, in this paper, an intelligent emergency door opening/closing device system is proposed. To this end, an intelligent emergency door opening and closing system was developed by linking wired and wireless access counting and AI image analysis. Finally, it is possible to build a wireless communication-based integrated management platform that provides remote control and history management in a centralized method of device status real-time monitoring and event alarm.

The Effects of Fatigue Induced by Submaximal Treadmill Exercise on Body Sway (최대하 트레드밀 운동에 의한 피로가 신체 동요에 미치는 영향)

  • Lee, Mi-Sun;Yi, Chung-Hwi;Cho, Sang-Hyun;Kwon, Oh-Yun
    • Physical Therapy Korea
    • /
    • v.7 no.2
    • /
    • pp.35-54
    • /
    • 2000
  • The purposes of this study were to assess variation of body sway prior to and after submaximal treadmill exercise; to determine the time course of the effects of a fatiguing performed on a treadmill on body sway; and to compare position sense prior to and after exercise in order to assess any variance in proprioception caused by submaximal treadmill exercise. The subjects were twenty-four healthy men in their twenties. They stood barefoot on the Kinesthetic Ability Training Balance Platform to measure body sway. Control trials were performed with eyes alternately open and closed. In the eyes open condition, they were asked to look at a target placed at eye level 1 m in front them. A total of 10 trials, each lasting 20 seconds, were performed. After this series of trials, position sense was measured. Subjects then exercised on the treadmill until 85% of each person's maximal heart rate was reached. The first series of postural sway measurements began immediately after this exercise. The second identical series of postural sway trials was performed at approximately 10 minutes after exercise. The third series was performed approximately 20 minutes after exercise. This allowed approximately 5 minutes of rest between each experimental series. Position sense was measured at approximately 15 and 25 minutes after exercise. The results were as follows: 1) There was a significant increase in body sway after submaximal treadmill exercise compared to pre-exercise values under both visual conditions (p<.05). 2) After submaximal treadmill exercise, under the eyes open condition, the mean value of body sway was significantly increased after both the first and second series (p<.05). Under the eyes closed condition, the mean value of body sway increased significantly after the first series but decreased significantly after the third series (p<.05). 3) Position sense, measured repeatedly after submaximal treadmill exercise, did not change significantly with respect to pre-exercise values (p>.05). These results suggest that fatigue induced by submaximal treadmill exercise produced an increase in body sway in young healthy subjects with or without visual input, but the increase appeared to be lasting less than 15 minutes. No significant change in position sense suggested that proprioception was unaffected by submaximal treadmill exercise-induced fatigue.

  • PDF

A Study on the Geometric Correction Accuracy Evaluation of Satellite Images Using Daum Map API (Daum Map API를 이용한 위성영상의 기하보정 정확도 평가)

  • Lee, Seong-Geun;Lee, Ho-Jin;Kim, Tae-Geun;Cho, Gi-Sung
    • Journal of Cadastre & Land InformatiX
    • /
    • v.46 no.2
    • /
    • pp.183-196
    • /
    • 2016
  • Ground control points are needed for precision geometric correction of satellite images, and the coordinates of a high-quality ground control point can be obtained from the GPS measurement. However, considering the GPS measurement requires an excessive amount o f t ime a nd e fforts, there is a need for coming up with an alternative solution to replace it. Therefore, we examined the possibility of replacing the existing GPS measurement with coordinates available at online maps to acquire the coordinates of ground control points. To this end, we examined error amounts between the coordinates of ground control points obtained through Daum Map API, and them compared the accuracies between three types of coordinate transformation equations which were used for geometric correction of satellite images. In addition, we used the coordinate transformation equation with the highest accuracy, the coordinates of ground control point obtained through the GPS measurement and those acquired through D aum M ap A PI, and conducted geometric correction on them to compare their accuracy and evaluate their effectiveness. According to the results, the 3rd order polynomial transformation equation showed the highest accuracy among three types of coordinates transformation equations. In the case of using mid-resolution satellite images such as those taken by Landsat-8, it seems that it is possible to use geometrically corrected images that have been obtained after acquiring the coordinates of ground control points through Daum Map API.

Data Resource Management under Distributed Computing Environment (분산 컴퓨팅 환경하에서의 데이타 자원 관리)

  • 조희경;안중호
    • Proceedings of the Korea Database Society Conference
    • /
    • 1994.09a
    • /
    • pp.105-129
    • /
    • 1994
  • The information system of corporations are facing a new environment expressed by miniaturization, decentralization and Open System. It is therefore of utmost importance for corporations to adapt flexibly th such new environment by providing for corresponding changes to their existing information systems. The objectives of this study are to identify this new environment faced by today′s information system and develop effective methods for data resource management under this new environment. In this study, it is assumed that the new environment faced by information systems can be specified as Distributed Computing Environment, and in order to achieve such system, presents Client/server architecture as its representative computing structure, This study defines Client/server architecture as a computing architecture which specialize the fuctionality of the client system and the server system in order to have an application distribute and perform cooperative processing at the best platform. Furthermore, from among the five structures utilized in Client/server architecture for distribution and cooperative processing of application between server and client this study presents two different data management methods under the Client/server environment; one is "Remote Data Management Method" which uses file server or database server and. the other is "Distributed Data Management Method" using distributed database management system. The result of this study leads to the conclusion that in the client/server environment although distributed application is assumed, the data could become centralized (in the case of file server or database server) or decentralized (in the case of distributed database system) and the data management method through a distributed database system where complete responsibility and powers with respect to control of data used by the user are given not only is it more adaptable to modern flexible corporate environment, but in terms of system operation, it presents a more efficient data management alternative compared to existing data management methods in terms of cutting costs.

  • PDF

Transparent Nano-floating Gate Memory Using Self-Assembled Bismuth Nanocrystals in $Bi_2Mg_{2/3}Nb_{4/3}O_7$ (BMN) Pyrochlore Thin Films

  • Jeong, Hyeon-Jun;Song, Hyeon-A;Yang, Seung-Dong;Lee, Ga-Won;Yun, Sun-Gil
    • Proceedings of the Materials Research Society of Korea Conference
    • /
    • 2011.10a
    • /
    • pp.20.1-20.1
    • /
    • 2011
  • The nano-sized quantum structure has been an attractive candidate for investigations of the fundamental physical properties and potential applications of next-generation electronic devices. Metal nano-particles form deep quantum wells between control and tunnel oxides due to a difference in work functions. The charge storage capacity of nanoparticles has led to their use in the development of nano-floating gate memory (NFGM) devices. When compared with conventional floating gate memory devices, NFGM devices offer a number of advantages that have attracted a great deal of attention: a greater inherent scalability, better endurance, a faster write/erase speed, and more processes that are compatible with conventional silicon processes. To improve the performance of NFGM, metal nanocrystals such as Au, Ag, Ni Pt, and W have been proposed due to superior density, a strong coupling with the conduction channel, a wide range of work function selectivity, and a small energy perturbation. In the present study, bismuth metal nanocrystals were self-assembled within high-k $Bi_2Mg_{2/3}Nb_{4/3}O_7$ (BMN) films grown at room temperature in Ar ambient via radio-frequency magnetron sputtering. The work function of the bismuth metal nanocrystals (4.34 eV) was important for nanocrystal-based nonvolatile memory (NVM) applications. If transparent NFGM devices can be integrated with transparent solar cells, non-volatile memory fields will open a new platform for flexible electron devices.

  • PDF

Addressing Mobile Agent Security through Agent Collaboration

  • Jean, Evens;Jiao, Yu;Hurson, Ali-R.
    • Journal of Information Processing Systems
    • /
    • v.3 no.2
    • /
    • pp.43-53
    • /
    • 2007
  • The use of agent paradigm in today's applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execution environment; while hosts aim at preventing the execution of potentially malicious code. In general, hosts support the migration of agents through the provision of an agent server and managing the activities of arriving agents on the host. Numerous studies have been conducted to address the security concerns present in the mobile agent paradigm with a strong focus on the theoretical aspect of the problem. Various proposals in Intrusion Detection Systems aim at securing hosts in traditional client-server execution environments. The use of such proposals to address the security of agent hosts is not desirable since migrating agents typically execute on hosts as a separate thread of the agent server process. Agent servers are open to the execution of virtually any migrating agent; thus the intent or tasks of such agents cannot be known a priori. It is also conceivable that migrating agents may wish to hide their intentions from agent servers. In light of these observations, this work attempts to bridge the gap from theory to practice by analyzing the security mechanisms available in Aglet. We lay the foundation for implementation of application specific protocols dotted with access control, secured communication and ability to detect tampering of agent data. As agents exists in a distributed environment, our proposal also introduces a novel security framework to address the security concerns of hosts through collaboration and pattern matching even in the presence of differing views of the system. The introduced framework has been implemented on the Aglet platform and evaluated in terms of accuracy, false positive, and false negative rates along with its performance strain on the system.

Worker-Driven Service Development Tool for Smart Factory

  • Lee, Jin-Heung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.7
    • /
    • pp.143-150
    • /
    • 2020
  • Recently, many companies are interested in smart factory services. Because various smart factory services are provided by the combination of mobile devices, cloud computing, and IoT services. However, many workers turn away from these systems because most of them are not implemented from the worker's point of view. To solve this, we implemented a development tool that allows field workers to produce their own services so that workers can easily create smart factory services. Manufacturing data is collected in real time from sensors which are connected to manufacturing facilities and stored within smart factory platforms. Implemented development tools can produce services such as monitoring, processing, analysis, and control of manufacturing data in drag-and-drop. The implemented system is effective for small manufacturing companies because of their environment: making various services quickly according to the company's purpose. In addition, it is assumed that this also will help workers' improve operation skills on running smart factories and fostering smart factory capable personnel.

Case Study on AUTOSAR Software Functional Safety Mechanism Design: Shift-by-Wire System (AUTOSAR 소프트웨어 기능안전 메커니즘 설계 사례연구: Shift-by-Wire 시스템)

  • Kum, Daehyun;Kwon, Soohyeon;Lee, Jaeseong;Lee, Seonghun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.16 no.6
    • /
    • pp.267-276
    • /
    • 2021
  • The automotive industry and academic research have been continuously conducting research on standardization such as AUTOSAR (AUTomotive Open System ARchitecture) and ISO26262 to solve problems such as safety and efficiency caused by the complexity of electric/electronic architecture of automotive. AUTOSAR is an automotive standard software platform that has a layered structure independent of MCU (Micro Controller Unit) hardware, and improves product reliability through software modularity and reusability. And, ISO26262, an international standard for automotive functional safety and suggests a method to minimize errors in automotive ECU (Electronic Control Unit)s by defining the development process and results for the entire life cycle of automotive electrical/electronic systems. These design methods are variously applied in representative automotive safety-critical systems. However, since the functional and safety requirements are different according to the characteristics of the safety-critical system, it is essential to research the AUTOSAR functional safety design method specialized for each application domain. In this paper, a software functional safety mechanism design method using AUTOSAR is proposed, and a new failure management framework is proposed to ensure the high reliability of the product. The AUTOSAR functional safety mechanism consists of memory partitioning protection, timing monitoring protection, and end-to-end protection. The fault management framework is composed of several safety SWCs to maintain the minimum function and performance even if a fault occurs during the operation of a safety-critical system. Finally, the proposed method is applied to the Shift-by-Wire system design to prove the validity of the proposed method.

Cloud Security and Privacy: SAAS, PAAS, and IAAS

  • Bokhari Nabil;Jose Javier Martinez Herraiz
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.23-28
    • /
    • 2024
  • The multi-tenancy and high scalability of the cloud have inspired businesses and organizations across various sectors to adopt and deploy cloud computing. Cloud computing provides cost-effective, reliable, and convenient access to pooled resources, including storage, servers, and networking. Cloud service models, SaaS, PaaS, and IaaS, enable organizations, developers, and end users to access resources, develop and deploy applications, and provide access to pooled computing infrastructure. Despite the benefits, cloud service models are vulnerable to multiple security and privacy attacks and threats. The SaaS layer is on top of the PaaS, and the IaaS is the bottom layer of the model. The software is hosted by a platform offered as a service through an infrastructure provided by a cloud computing provider. The Hypertext Transfer Protocol (HTTP) delivers cloud-based apps through a web browser. The stateless nature of HTTP facilitates session hijacking and related attacks. The Open Web Applications Security Project identifies web apps' most critical security risks as SQL injections, cross-site scripting, sensitive data leakage, lack of functional access control, and broken authentication. The systematic literature review reveals that data security, application-level security, and authentication are the primary security threats in the SaaS model. The recommended solutions to enhance security in SaaS include Elliptic-curve cryptography and Identity-based encryption. Integration and security challenges in PaaS and IaaS can be effectively addressed using well-defined APIs, implementing Service Level Agreements (SLAs), and standard syntax for cloud provisioning.

Operational Process and Success Factors of Corporate Venture in a Chinese Company: A Case Study of Haier (중국기업의 사내벤처 운영과정과 성공요인: 하이얼(Haier) 중심으로)

  • Yu-Rou Hou;Yuan-Jing Jin;Moon-Gu Huh
    • Asia-Pacific Journal of Business
    • /
    • v.14 no.4
    • /
    • pp.87-113
    • /
    • 2023
  • Purpose - Focusing on Haier, a successful corporate venture in China, we analyse the operating mechanism and success factors of corporate venture, and reveal the necessary factors for the successful implementation of corporate venture. Design/methodology/approach - This study is a single case study centred on Haier, a successful corporate venture in China. Findings - The operational process of Haier's corporate venture includes six key aspects: project selection, team building, resource allocation and support, project implementation, risk control measures, performance evaluation and rewards. In terms of success factors, the support of top management with leadership capability of value creation and sharing is very important for the success of corporate venture. Secondly, a multi reward mechanism can be introduced to motivate employees and improve performance. Thirdly, it is important to integrate corporate culture into the operating mechanism of an corporate venture. Fourthly, flexible operations that break down rigid organisational boundaries and transform the organisation into a more open platform for entrepreneurship can increase the likelihood of success. Finally, empowering employees with operational discretion can also have a positive impact on the success of an Corporate Venture. Research implications or Originality - This study contributes to theory and practice by analysing the success conditions of corporate venture, providing new understanding and drawing new perspectives, especially from the experience of Haier. The results suggest strategies and flexibility for successfully pursuing corporate venture, and provide important experience for international companies to help them gain competitive advantage in global competition. It also helps corporate leaders to promote new directions and innovations and improve their strategies to respond to dynamic environments.