This study was conducted for the purpose of improving the usability of the product through the usability evaluation of the voice tag reader to improve the life convenience of the visually impaired. Perceived usability evaluation was conducted for 19 evaluation items based on the evaluation model considering the usability principle and the characteristics of the visually impaired. A total of 50 participants were included for the analysis. As a result of the perceived usability evaluation of the visually impaired, the safety of the voice tag reader, voice and sound quality, and accuracy of voice information were relatively satisfactory. It was found that the reader received a low evaluation in terms of efficiency in use, including the size and weight of the reader, and the convenience of carrying and storing. For the usability improvement, the procedure for using a product needs to be more simplified, and it would be helpful to input and supply tags for commonly used objects in advance.
Smoothing is to creating a transmission plan consisting of sections of frames that can be sent at the same transmission rate for compressed and stored video data. Various algorithms have been studied for the smoothing to minimize the number of transmission rate changes, the number of transmission rate changes, and the amount of transmission rate increase. This study evaluates the performance of a smoothing algorithm that minimizes the increase in transmission rates and maximizes the increase in transmission rates when the transmission rate is required to maximize the excess bandwidth to be secured by the server in an environment with limited server bandwidth. The available transmission rates and buffer sizes available in the server are set in various ways and evaluated by the number of fps changes, the minimum fps, the average fps, and fps variability. As a result of the comparison, the proposed algorithm showed excellent average fps and fps variability.
The importance of barrier free is being highlighted worldwide. This study attempted to identify barrier-free research trends using text mining. Through this, it was intended to help with research and policies to create a barrier free environment. The analysis data is 227 papers published in domestic academic journals from 1996 when barrier free research began to 2022. The researcher converted the title, keywords, and abstract of an academic thesis into text, and then analyzed the pattern of the thesis and the meaning of the data. The summary of the research results is as follows. First, barrier-free research began to increase after 2009, with an annual average of 17.1 papers being published. This is related to the implementation guidelines for the barrier-free certification system that took effect on July 15, 2008. Second, results of barrier-free text mining i) As a result of word frequency analysis of top keywords, important keywords such as barrier free, disabled, design, universal design, access, elderly, certification, improvement, evaluation, and space, facility, and environment were searched. ii) As a result of TD-IDF analysis, the main keywords were universal design, design, certification, house, access, elderly, installation, disabled, park, evaluation, architecture, and space. iii) As a result of N-Ggam analysis, barrier free+certification, barrier free+design, barrier free+barrier free, elderly+disabled, disabled+elderly, disabled+convenience facilities, the disabled+the elderly, society+the elderly, convenience facilities+installation, certification+evaluation index, physical+environment, life+quality, etc. appeared in a related language. Third, as a result of the CONCOR analysis, cluster 1 was barrier-free issues and challenges, cluster 2 was universal design and space utilization, cluster 3 was Improving Accessibility for the Disabled, and cluster 4 was barrier free certification and evaluation. Based on the analysis results, this study presented policy implications for vitalizing barrier-free research and establishing a desirable barrier free environment.
This study was aimed at examining the effects of aroma blending oil inhalation on academic stress and class concentration in nursing students. The research design was a nonequivalent placebo control group nonsynchronized. The subjects of the study were 24 students in the treatment group and 24 placebo control group. Data collection was from November 4, 2022 to December 3, 2022, and the data were analyzed chi-square test, independent t-test, paired t-test using the SPSS 23.0 Program. The treatment group inhaled aroma blending oil for 10 days showed a significant decrease in academic stress (t=-8.79, p<.001) and a significant increase in class concentration (t=24.44, p<.001).
Smart factory construction projects are continuously being carried out domestically and abroad. In particular, in times of increasing uncertainty, interest in smart factories is increasing to improve corporate productivity. Currently, the government-led smart factory construction project is continuously being promoted in Korea. The tangible results of this construction project are very positive in indicators such as productivity improvement, quality improvement, and cost reduction. On the other hand, various contents are revealed in the survey to identify operational difficulties after building a smart factory. In this study, we analyzed difficulties (problems) in operation after establishing the system shown in the survey conducted in 2017 and 2020, and derived improvement plans for them. If these improvement measures are implemented in the relevant process of the smart factory construction project, it is expected that the operational difficulties felt by companies will be reduced, and a system with higher satisfaction than before will be established.
The MyData service makes anyone possible to apply the personal information for the personal credit management or the financial management by proactive managing his/her own information. The MyData means that the anyone is able to control or manage the its own information by changing from the company-oriented or the organization-oriented information to his/her own information. It is mandatory to develop the API G/W which transforms the different user format to the standard format to support the MyData service. This study is to design the API G/W for the MyData service and the designed API G/W supports the 4 major functions - Validation function, Throttling function, Authentication&Authorization function, Mediation function. The designed API G/W make it possible to support the safely and efficient MyData service by serving the various queries with the different formats.
Recently, demand for cloud computing has increased and remote access due to home work and external work has increased. In addition, a new security paradigm is required in the current situation where the need to be vigilant against not only external attacker access but also internal access such as internal employee access to work increases and various attack techniques are sophisticated. As a result, the network security model applying Zero-Trust, which has the core principle of doubting everything and not trusting it, began to attract attention in the security industry. Zero Trust Security monitors all networks, requires authentication in order to be granted access, and increases security by granting minimum access rights to access requesters. In this paper, we explain zero trust and zero trust architecture, and propose a new cloud security system for strengthening access control that overcomes the limitations of existing security systems using zero trust and blockchain and can be used by various companies.
In recent years, due to heightened environmental awareness, Electric Power Steering (EPS) has been increasingly adopted as the steering control unit in manufactured vehicles. This has had numerous benefits, such as improved steering power, elimination of hydraulic hose leaks and reduced fuel consumption. However, for EPS systems to respond to actions, sensors must be employed; this means that the consistency of the sensor's linear variation is integral to the stability of the steering response. To ensure quality control, a reliable method for detecting defects and assessing linearity is required to assess the sensitivity of the EPS sensor to changes in the internal design characters. This paper proposes a data-driven defect and linearity assessment monitoring system, which can be used to analyze EPS component defects and linearity based on vehicle speed interval division. The approach is validated experimentally using data collected from an EPS test jig and is further enhanced by the inclusion of a Graphical User Interface (GUI). Based on the design, the developed system effectively performs defect detection with an accuracy of 0.99 percent and obtains a linearity assessment score at varying vehicle speeds.
In this paper, we propose a smoothed received signal strength indicator (RSSI)-based distance estimation using deep neural network (DNN) for accurate distance estimation in an environment where a single receiver is used. The proposed scheme performs a data preprocessing consisting of data splitting, missing value imputation, and smoothing steps to improve distance estimation accuracy, thereby deriving the smoothed RSSI values. The derived smoothed RSSI values are used as input data of the Multi-Input Single-Output (MISO) DNN model, and are finally returned as an estimated distance in the output layer through input layer and hidden layer. To verify the superiority of the proposed scheme, we compared the performance of the proposed scheme with that of the linear regression-based distance estimation scheme. As a result, the proposed scheme showed 29.09% higher distance estimation accuracy than the linear regression-based distance estimation scheme.
As the method of collecting and utilizing structured and unstructured data develops due to the influence of the Fourth Industrial Revolution, unwanted personal information data is also being collected and utilized, and hackers are attempting various attacks to steal information. As a result, the importance of information protection has increased, and various protection techniques have emerged, among which many studies have been conducted using decentralized techniques of blockchain and various algorithms to strengthen the security of biometric authentication techniques. This paper proposed a public blockchain biometric authentication system that allows users to protect their data in a safer biometric authentication method in the public blockchain and use it in the blockchain through signature with authenticated information.