바로가기메뉴

본문 바로가기 주메뉴 바로가기

Vol.9 No.2

초록보기
Abstract

This study was conducted for the purpose of improving the usability of the product through the usability evaluation of the voice tag reader to improve the life convenience of the visually impaired. Perceived usability evaluation was conducted for 19 evaluation items based on the evaluation model considering the usability principle and the characteristics of the visually impaired. A total of 50 participants were included for the analysis. As a result of the perceived usability evaluation of the visually impaired, the safety of the voice tag reader, voice and sound quality, and accuracy of voice information were relatively satisfactory. It was found that the reader received a low evaluation in terms of efficiency in use, including the size and weight of the reader, and the convenience of carrying and storing. For the usability improvement, the procedure for using a product needs to be more simplified, and it would be helpful to input and supply tags for commonly used objects in advance.

초록보기
Abstract

Smoothing is to creating a transmission plan consisting of sections of frames that can be sent at the same transmission rate for compressed and stored video data. Various algorithms have been studied for the smoothing to minimize the number of transmission rate changes, the number of transmission rate changes, and the amount of transmission rate increase. This study evaluates the performance of a smoothing algorithm that minimizes the increase in transmission rates and maximizes the increase in transmission rates when the transmission rate is required to maximize the excess bandwidth to be secured by the server in an environment with limited server bandwidth. The available transmission rates and buffer sizes available in the server are set in various ways and evaluated by the number of fps changes, the minimum fps, the average fps, and fps variability. As a result of the comparison, the proposed algorithm showed excellent average fps and fps variability.

초록보기
Abstract

세계적으로 장애물 없는 생활 환경, 즉 배리어 프리의 중요성이 부각되고 있다. 이에 본 연구는 텍스트 마이닝기법을 활용하여 배리어 프리 연구 동향을 파악해 봄으로써 배리어 프리 환경 조성을 위한 연구의 방향성, 정책의 방향성 제시에 도움을 주고자 했다. 분석 자료는 배리어 프리 관련 연구가 시작된 1996년부터 2022년 현재까지 국내 전문학술지에 개재된 227편의 논문이다. 연구자는 학술 논문의 제목과 주제어, 초록을 텍스트로 전환한 후 논문의 패턴과데이터의 의미를 분석했다. 연구결과를 요약하면 다음과 같다. 첫째, 2009년 이후 배리어 프리 연구가 증가하기 시작했고, 연평균 17.1편의 논문이 게재됐다. 이는 2008년 7월 15일에 장애물 없는 생활환경(Barrier Free) 인증제도 시행지침 시행과 관련성을 가진다. 둘째, 배리어 프리 텍스트 마이닝 결과 ⅰ) 상위 주요 키워드 단어 빈도분석 결과 배리어프리, 장애인, 디자인, 유니버설 디자인, 접근, 노인, 인증, 개선, 평가, 공간, 시설, 환경 등이 중요 키워드로 나타났다. ⅱ) TD-IDF 분석결과는 유니버설 디자인, 디자인, 인증, 주택, 접근, 노인, 설치, 장애인, 공원, 평가, 건축물, 공간 등이주요 키워드로 나타났다. ⅲ) N-Ggam 분석결과 배리어프리+인증, 배리어프리+디자인, 배리어프리+배리어프리, 노인+장애인, 장애인+노약자, 장애인+편의시설, 장애인+노인, 사회+노약자, 편의시설+설치, 인증+평가지표, 물리+환경, 삶+질 등이 주요 연관어로 나타났다. 셋째, CONCOR 분석결과 군집 1은 배리어 프리의 현안과 과제, 군집 2는 유니버설 디자인과 공간 활용, 군집 3은 장애인 활용 가능성 제고, 군집 4는 배리어 프리 인증과 평가로 나타났다. 본 연구는이상의 분석결과에 기반하여 배리어 프리 연구의 활성화와 바람직한 배리어 프리 환경 구축을 위한 정책적 함의를 제시하였다.

초록보기
Abstract

This study was aimed at examining the effects of aroma blending oil inhalation on academic stress and class concentration in nursing students. The research design was a nonequivalent placebo control group nonsynchronized. The subjects of the study were 24 students in the treatment group and 24 placebo control group. Data collection was from November 4, 2022 to December 3, 2022, and the data were analyzed chi-square test, independent t-test, paired t-test using the SPSS 23.0 Program. The treatment group inhaled aroma blending oil for 10 days showed a significant decrease in academic stress (t=-8.79, p<.001) and a significant increase in class concentration (t=24.44, p<.001).

초록보기
Abstract

Methods to Improve Problems in The Smart Factory Operation Process

초록보기
Abstract

마이데이터 서비스를 이용하여 정보 주체인 개인이 본인의 정보를 적극적으로 관리 및 통제하여 이를 신용관리, 자산 관리 등에 능동적으로 활용할 수 있다. 마이데이터는 기업과 기관 중심의 개인 데이터 생태계를 데이터의 주인인개인에게 자신의 데이터를 통제하고 관리하여 활용할 수 있는 권한을 부여하는 것이다. 마이데이터 서비스를 성공적으로 제공하기 위해서는 다양한 기관에서 제공되는 서로 다른 형식의 데이터를 표준 규격 형태로 변환하기 위한 API G/W의 개발이 필수적인 요소이다. 본 논문에서는 마이데이타 서비스의 API G/W 개발을 위해 검증(Validation) 기능, 관리(Throttling) 기능, 인증 및권한(Authentication & Authorization) 기능, 중재(Mediation) 기능으로 주요 기능들을 도출하고 각 세부 기능별로해당 서비스를 설계하였다. 설계된 API G/W의 기능들을 통해 다양한 형식의 요구들을 서비스할 수 있는 마이데이터서비스를 안전하고 효율적으로 지원할 수 있었다.

초록보기
Abstract

Recently, demand for cloud computing has increased and remote access due to home work and external work has increased. In addition, a new security paradigm is required in the current situation where the need to be vigilant against not only external attacker access but also internal access such as internal employee access to work increases and various attack techniques are sophisticated. As a result, the network security model applying Zero-Trust, which has the core principle of doubting everything and not trusting it, began to attract attention in the security industry. Zero Trust Security monitors all networks, requires authentication in order to be granted access, and increases security by granting minimum access rights to access requesters. In this paper, we explain zero trust and zero trust architecture, and propose a new cloud security system for strengthening access control that overcomes the limitations of existing security systems using zero trust and blockchain and can be used by various companies.

초록보기
Abstract

In recent years, due to heightened environmental awareness, Electric Power Steering (EPS) has been increasingly adopted as the steering control unit in manufactured vehicles. This has had numerous benefits, such as improved steering power, elimination of hydraulic hose leaks and reduced fuel consumption. However, for EPS systems to respond to actions, sensors must be employed; this means that the consistency of the sensor's linear variation is integral to the stability of the steering response. To ensure quality control, a reliable method for detecting defects and assessing linearity is required to assess the sensitivity of the EPS sensor to changes in the internal design characters. This paper proposes a data-driven defect and linearity assessment monitoring system, which can be used to analyze EPS component defects and linearity based on vehicle speed interval division. The approach is validated experimentally using data collected from an EPS test jig and is further enhanced by the inclusion of a Graphical User Interface (GUI). Based on the design, the developed system effectively performs defect detection with an accuracy of 0.99 percent and obtains a linearity assessment score at varying vehicle speeds.

초록보기
Abstract

In this paper, we propose a smoothed received signal strength indicator (RSSI)-based distance estimation using deep neural network (DNN) for accurate distance estimation in an environment where a single receiver is used. The proposed scheme performs a data preprocessing consisting of data splitting, missing value imputation, and smoothing steps to improve distance estimation accuracy, thereby deriving the smoothed RSSI values. The derived smoothed RSSI values are used as input data of the Multi-Input Single-Output (MISO) DNN model, and are finally returned as an estimated distance in the output layer through input layer and hidden layer. To verify the superiority of the proposed scheme, we compared the performance of the proposed scheme with that of the linear regression-based distance estimation scheme. As a result, the proposed scheme showed 29.09% higher distance estimation accuracy than the linear regression-based distance estimation scheme.

초록보기
Abstract

As the method of collecting and utilizing structured and unstructured data develops due to the influence of the Fourth Industrial Revolution, unwanted personal information data is also being collected and utilized, and hackers are attempting various attacks to steal information. As a result, the importance of information protection has increased, and various protection techniques have emerged, among which many studies have been conducted using decentralized techniques of blockchain and various algorithms to strengthen the security of biometric authentication techniques. This paper proposed a public blockchain biometric authentication system that allows users to protect their data in a safer biometric authentication method in the public blockchain and use it in the blockchain through signature with authenticated information.

Journal of The Korea Internet of Things Society