• Title/Summary/Keyword: smart work environment

Search Result 324, Processing Time 0.026 seconds

The Implementation of wire and wireless Integration Module of Zigbee and Optical Communication for Ship Area network(SAN) (Ship Area Network(SAN)를 위한 Zigbee 및 광 통신 유무선 통합 모듈 구현)

  • Moon, Yong-Seon;Bae, Young-Chul;Park, Jong-Kyu;Roh, Sang-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.5
    • /
    • pp.428-434
    • /
    • 2010
  • In this paper, we propose intelligent SAN(Ship Area Network) which is reliable transmission by integration of optical network of wire communication and Zigbee of wireless communication. We also implement module for remote control and constitute, managing for a various sensors and a controllers which are connected SAN integration network It will be help to prevent accident of ship to monitor work environment, real time monitoring of a equipment and main compartment of a poor ship inside. And it will be also available to enhance labor reduction, sailing safety and sailing economical efficiency of ship inside.

Study on Mobile IPTV Service based Muli-interface (다중 인터페이스 기반의 모바일 IPTV 서비스의 연구)

  • Lee, Jong-Seo;Moon, Il-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.87-89
    • /
    • 2010
  • A lot of attention for IPTV service has increased in a Mobile Environment. Also popularity of smart-phone, streaming service, a lot of content is actively shaping the market. These service provide users with guaranteed quality of service. There are important quality in a mobile IPTV provides users with a seamless quality of the streaming service can be viewed as a split. Research on improving the quality of services cropped, but to prevent dropouts research using multi-interface is not widely work. In this paper, we suggest that mobile IPTV service based multi-interface.

  • PDF

A Mobile Customization Technique using Push Service (푸시 서비스를 이용한 모바일 커스터마이제이션 기법)

  • Jung, Chang-Hun;Ye, Jun-Ho;Kim, Chul-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.9
    • /
    • pp.4498-4506
    • /
    • 2013
  • Due to smart work, the variety of tasks are performed in the mobile environment. According to the main flow, it is required to provide the various business services and change the business services instantly. Thus, in this paper, we propose a mobile customization technique for changing mobile services in real time. The mobile customization technique of this paper propose the customization architecture and process that is based on GCM's push service of Google and Intent technology of Android.

A Case Study: Designeer Education Program and Application of Capstone Design - Focusing on Design Thinking Process of a Robot Vacuum Cleaner (디자이니어 양성 커리큘럼 및 캡스톤 디자인 응용 사례연구: 로봇청소기의 디자인적 사고 프로세스 사례를 중심으로)

  • Lim, Dokshin;Ahn, Junghyun
    • Journal of Engineering Education Research
    • /
    • v.22 no.2
    • /
    • pp.61-70
    • /
    • 2019
  • This paper deals with a 'Designeer' education program that has a specific objective of educating design to undergraduate students in mechanical engineering with the aim of enhancing their ability of collaboration with designers when they are going to work in the field after graduation. The entire curriculum of the Designeer education program is introduced first, the end of which two-semester Capstone Design Courses for senior students is offered to let them practice all the knowledge and skills in a project-based learning environment. Learning specific matters such as sketching & visual thinking, prototyping and user experience design is one thing and practicing those knowledge and skills into a Capstone Design project is another. At this point, design thinking process needs to be in place to give students a foresight of one-year journey and to ensure that they will produce a desirable, feasible and viable product at the end of the year when they define the right problem at the beginning. Their frustrations and discoveries while applying design thinking throughout the year is explained by taking an example of a Robot Vacuum Cleaner design project. Finally, we provide real examples of effective methods to practice divergent and convergent phases.

A Novel Duty Cycle Based Cross Layer Model for Energy Efficient Routing in IWSN Based IoT Application

  • Singh, Ghanshyam;Joshi, Pallavi;Raghuvanshi, Ajay Singh
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.1849-1876
    • /
    • 2022
  • Wireless Sensor Network (WSN) is considered as an integral part of the Internet of Things (IoT) for collecting real-time data from the site having many applications in industry 4.0 and smart cities. The task of nodes is to sense the environment and send the relevant information over the internet. Though this task seems very straightforward but it is vulnerable to certain issues like energy consumption, delay, throughput, etc. To efficiently address these issues, this work develops a cross-layer model for the optimization between MAC and the Network layer of the OSI model for WSN. A high value of duty cycle for nodes is selected to control the delay and further enhances data transmission reliability. A node measurement prediction system based on the Kalman filter has been introduced, which uses the constraint based on covariance value to decide the scheduling scheme of the nodes. The concept of duty cycle for node scheduling is employed with a greedy data forwarding scheme. The proposed Duty Cycle-based Greedy Routing (DCGR) scheme aims to minimize the hop count, thereby mitigating the energy consumption rate. The proposed algorithm is tested using a real-world wastewater treatment dataset. The proposed method marks an 87.5% increase in the energy efficiency and reduction in the network latency by 61% when validated with other similar pre-existing schemes.

Development of Smart Mobility System for Persons with Disabilities (장애인을 위한 스마트 모빌리티 시스템 개발)

  • Yu, Yeong Jun;Park, Se Eun;An, Tae Jun;Yang, Ji Ho;Lee, Myeong-Gyu;Lee, Chul-Hee
    • Journal of Drive and Control
    • /
    • v.19 no.4
    • /
    • pp.97-103
    • /
    • 2022
  • Low fertility rates and increased life expectancy further exacerbate the process of an aging society. This is also reflected in the gradual increase in the proportion of vulnerable groups in the social population. The demand for improved mobility among vulnerable groups such as the elderly or the disabled has greatly driven the growth of the electric-assisted mobility device market. However, such mobile devices generally require a certain operating capability, which limits the range of vulnerable groups who can use the device and increases the cost of learning. Therefore, autonomous driving technology needs to be introduced to make mobility easier for a wider range of vulnerable groups to meet their needs of work and leisure in different environments. This study uses mini PC Odyssey, Velodyne Lidar VLP-16, electronic device and Linux-based ROS program to realize the functions of working environment recognition, simultaneous localization, map generation and navigation of electric powered mobile devices for vulnerable groups. This autonomous driving mobility device is expected to be of great help to the vulnerable who lack the immediate response in dangerous situations.

Certificate Revocation in Connected Vehicles

  • Sami S. Albouq
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.13-20
    • /
    • 2023
  • In connected vehicles, drivers are exposed to attacks when they communicate with unauthenticated peers. This occurs when a vehicle relies on outdated information resulting in interactions with vehicles that have expired or revoked certificates claiming to be legitimate nodes. Vehicles must frequently receive or query an updated revoked certificate list to avoid communicating with suspicious vehicles to protect themselves. In this paper, we propose a scheme that works on a highway divided into clusters and managed by roadside units (RSUs) to ensure authenticity and preserve hidden identities of vehicles. The proposed scheme includes four main components each of which plays a major role. In the top hierarchy, we have the authority that is responsible for issuing long-term certificates and managing and controlling all descending intermediate authorities, which cover specific regions (e.g., RSUs) and provide vehicles with short-term pseudonyms certificates to hide their identity and avoid traceability. Every certificate-related operation is recorded in a blockchain storage to ensure integrity and transparency. To regulate communication among nodes, security managers were introduced to enable authorization and access right during communications. Together, these components provide vehicles with an immediately revoked certificate list through RSUs, which are provided with publish/subscribe brokers that enable a controlled messaging infrastructure. We validate our work in a simulated smart highway environment comprising interconnected RSUs to demonstrate our technique's effectiveness.

A Study on the Safety Perception, Ethical Awareness, and Safety Activities of Nursing Students

  • Keum-Bong Choi
    • International journal of advanced smart convergence
    • /
    • v.12 no.4
    • /
    • pp.407-417
    • /
    • 2023
  • The purpose of this study is to identify the level of safety perception, ethical awareness, and safety activities of nursing students for patients, and to identify the correlation and impact between them. The research design is a descriptive survey study, and the subject of the study were 197 nursing college students in G City. Safety perception, ethical awareness, and safety activity tools were used for, and the data collection period was from October 17 to 28 in 2022. T-test, one-way ANOVA, Pearson's correlation coefficient, Regression analysis were used to analyze data. The result of the study indicated that the average level of safety perception of nursing students was 3.72 points, the average ethical awareness of patients, professional work, and cooperators perceived by nursing students was 3.04 points, and the safety activities of nursing students were 4.20 points. In the case of safety awareness and ethics awareness, r=.327, a significant positive correlation, in the case of safety awareness and safety activities, r=.399, significant positive correlation, ethics awareness and safety activities as r=.296. And so on these results showed that high safety perception increases safety activities, and high ethical awareness increases safety activities. Therefore, we need practical and step-by-step convergence education to equip nursing students with patient safety nursing capabilities. To this end, a safer environment will be created if the social support network for the systematic application of safety education is well formed.

QNFT: A Post-Quantum Non-fungible Tokens for Secure Metaverse Environment

  • Abir El Azzaoui;JaeSoo Kim
    • Journal of Information Processing Systems
    • /
    • v.20 no.2
    • /
    • pp.273-283
    • /
    • 2024
  • The digital domain has witnessed unprecedented growth, reshaping the way we interact, work, and even perceive reality. The internet has evolved into a vast ecosystem of interconnected virtual worlds, giving birth to the concept of the Metaverse. The Metaverse, often envisioned as a collective virtual shared space, is created by the convergence of virtually enhanced physical reality and interactive digital spaces. Within this Metaverse space, the concept of ownership, identity, and authenticity takes on new dimensions, necessitating innovative solutions to safeguard individual rights. The digital transformation through Metaverse has also brought forth challenges, especially in copyright protection. As the lines between the virtual and physical blur, the traditional notions of ownership and rights are being tested. The Metaverse, with its multitude of user-generated content, poses unique challenges. The primary objective of this research is multifaceted. Firstly, there's a pressing need to understand the strategies employed by non-fungible token (NFT) marketplaces within the Metaverse to strengthen security and prevent copyright violations. As these platforms become centers for digital transactions, ensuring the authenticity and security of each trade becomes paramount. Secondly, the study aims to delve deep into the foundational technologies underpinning NFTs, from the workings of blockchain to the mechanics of smart contracts, to understand how they collectively ensure copyright protection. Thus, in this paper, we propose a quantum based NFT solution that can secure Metaverse and copyright contents in an advanced manner.

A Life Browser based on Probabilistic and Semantic Networks for Visualization and Retrieval of Everyday-Life (일상생활 시각화와 검색을 위한 확률망과 의미망 기반 라이프 브라우저)

  • Lee, Young-Seol;Hwang, Keum-Sung;Kim, Kyung-Joong;Cho, Sung-Bae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.3
    • /
    • pp.289-300
    • /
    • 2010
  • Recently, diverse information which are location, call history, SMS history, photographs, and video can be collected constantly from mobile devices such as cellular phone, smart phone, and PDA. There are many researchers who study services for searching and abstraction of personal daily life with contextual information in mobile environment. In this paper, we introduce MyLifeBrowser which is developed in our previous work. Also, we explain LPS and correction of GPS coordinates as extensions of previous work and show LPS performance test and evaluate the performance of expanded keywords. MyLifeBrowser which provides searching personal information in mobile device and support of detecting related information according to a fragmentary keyword and common knowledge in ConceptNet. It supports the functionality of searching related locations using Bayesian network that is designed by the authors. In our experiment, we visualize real data through MyLifeBrowser and show the feasibility of LPS server and expanded keywords using both Bayesian network and ConceptNet.