• Title/Summary/Keyword: 5사물인터넷

Search Result 362, Processing Time 0.028 seconds

Design of Operation Management Check Items of Efficient Information System for Improvement of Business Continuity based on ISO 22301 (ISO22301 기반 비지니스 연속성 증대를 위한 효율적인 정보시스템 운영감리 점검항목 설계)

  • Joo, Nak Wan;Kim, Dong Soo;Kim, Hee Wan
    • Journal of Service Research and Studies
    • /
    • v.9 no.2
    • /
    • pp.31-40
    • /
    • 2019
  • In this paper, we have studied the improvement of operational control for the enhancement of business continuity of information system becoming more important with the development of information technology such as big data, Iot, and artificial intelligence. The operational management and audit guidance of the current information system, which is coming in the fourth industrial age, where various services, data and industries are converged, is based on the existing general information system pattern and needs to be improved. The provision of services at fixed times is linked to the survival of enterprises and countries and serves as a key element. Therefore, it is necessary to study the application of optimized check items of the operation audits to minimize the service interruption damage of the information system and to provide the stable service in terms of business continuity management. To accomplish this, the check items presented in the operational control of the information system were derived by combining the PDCA step contents and 8 resource requirements provided in ISO 22301. From the point of view of increasing the business continuity according to the derivation criteria of the inspection items, the operational inspection check items were derived by exemplifying the improved check items and review items of the information system operation audit and the products to be checked during the operational audit. The check items were divided into management audit improvement check items for service continuity management, and operational audit improvement check items for performance and availability management. The average score of the IT professionals' survey on the suitability of the proposed checklist was 4.63, which was concluded to be appropriate.

Design and Implementation of Automatic Fan On/Off for Energy Saving (에너지 절감을 위한 선풍기 자동 ON/OFF 기능의 설계 및 구현)

  • Jang, Junewoo;Park, Seongjin;Ko, Hyeon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.5-8
    • /
    • 2018
  • Recently, global warming and tropical nights have caused the use of electric fans to explode. Under these circumstances, running the fan for long periods of time is not only a risk of explosion due to overloading the power but also a small amount of electricity and environmental pollution. Therefore, the research was conducted to develop devices that automatically turn fans on and off according to room temperature, reducing the risk of explosion as well as saving energy. This study suggested that electric fans turn on and off automatically and display temperature in mobile applications. The ability to turn on and off allows the fan to turn on itself if the indoor temperature rises above a certain level. Conversely, if the indoor temperature drops below a certain level, the fan should be turned off. Second, the temperature display function checks indoor temperature through mobile applications. The automatic on/off capabilities proposed in this study could contribute to reducing the risk of explosion and saving energy. However, if the indoor temperature rises above a certain temperature even though there is no one inside, the fan can be turned on. The expectation from this study is that the ability of fans to operate and turn off at appropriate temperatures can reduce the risk of explosion, electrical charges, and environmental pollution.

  • PDF

Fourth industrial revolution of Women's University Students and change of intelligent information technology

  • Hwang, Eui-Chul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.11
    • /
    • pp.235-243
    • /
    • 2019
  • Universities are opening related majors and subjects to nurture the problem-solving fusion that businesses want. The time has come when rapid technological. On this thesis, we analyzed three years (2017-2019) of survey result of Women University students in order to figuring out and dealing with the change in 4th industrial revolution and intellectual information technology. It turns out that 1) there was an increase of interest in 4th industrial revolution from 59% in 2017 to 80% in 2019, 2) IoT, ICT, Artificial Intelligence, and Education Research System became top priority in technical strategy, 3)the prime keyword is AI, robot, job, 4)the expectation on increasing of the opportunity and the number of jobs in science technology field was 50%, 5)the importance of universities and companies was 50%, 80% each, 6) the information needed for science technology were educational discipline, change in future science, prospective future information in order, and 7)the most needed education were education on creativity, coding, cross-subject, engineering in order. In the era of the fourth industrial revolution, it is essential to expand the SW manpower base in various fields. University education, which should provide connectivity for super-fusion, should provide curriculum optimized for industrial demands such as, fusion and connected education, creative thinking, self-directed problem solving and etc.

A Study on People Counting in Public Metro Service using Hybrid CNN-LSTM Algorithm (Hybrid CNN-LSTM 알고리즘을 활용한 도시철도 내 피플 카운팅 연구)

  • Choi, Ji-Hye;Kim, Min-Seung;Lee, Chan-Ho;Choi, Jung-Hwan;Lee, Jeong-Hee;Sung, Tae-Eung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.2
    • /
    • pp.131-145
    • /
    • 2020
  • In line with the trend of industrial innovation, IoT technology utilized in a variety of fields is emerging as a key element in creation of new business models and the provision of user-friendly services through the combination of big data. The accumulated data from devices with the Internet-of-Things (IoT) is being used in many ways to build a convenience-based smart system as it can provide customized intelligent systems through user environment and pattern analysis. Recently, it has been applied to innovation in the public domain and has been using it for smart city and smart transportation, such as solving traffic and crime problems using CCTV. In particular, it is necessary to comprehensively consider the easiness of securing real-time service data and the stability of security when planning underground services or establishing movement amount control information system to enhance citizens' or commuters' convenience in circumstances with the congestion of public transportation such as subways, urban railways, etc. However, previous studies that utilize image data have limitations in reducing the performance of object detection under private issue and abnormal conditions. The IoT device-based sensor data used in this study is free from private issue because it does not require identification for individuals, and can be effectively utilized to build intelligent public services for unspecified people. Especially, sensor data stored by the IoT device need not be identified to an individual, and can be effectively utilized for constructing intelligent public services for many and unspecified people as data free form private issue. We utilize the IoT-based infrared sensor devices for an intelligent pedestrian tracking system in metro service which many people use on a daily basis and temperature data measured by sensors are therein transmitted in real time. The experimental environment for collecting data detected in real time from sensors was established for the equally-spaced midpoints of 4×4 upper parts in the ceiling of subway entrances where the actual movement amount of passengers is high, and it measured the temperature change for objects entering and leaving the detection spots. The measured data have gone through a preprocessing in which the reference values for 16 different areas are set and the difference values between the temperatures in 16 distinct areas and their reference values per unit of time are calculated. This corresponds to the methodology that maximizes movement within the detection area. In addition, the size of the data was increased by 10 times in order to more sensitively reflect the difference in temperature by area. For example, if the temperature data collected from the sensor at a given time were 28.5℃, the data analysis was conducted by changing the value to 285. As above, the data collected from sensors have the characteristics of time series data and image data with 4×4 resolution. Reflecting the characteristics of the measured, preprocessed data, we finally propose a hybrid algorithm that combines CNN in superior performance for image classification and LSTM, especially suitable for analyzing time series data, as referred to CNN-LSTM (Convolutional Neural Network-Long Short Term Memory). In the study, the CNN-LSTM algorithm is used to predict the number of passing persons in one of 4×4 detection areas. We verified the validation of the proposed model by taking performance comparison with other artificial intelligence algorithms such as Multi-Layer Perceptron (MLP), Long Short Term Memory (LSTM) and RNN-LSTM (Recurrent Neural Network-Long Short Term Memory). As a result of the experiment, proposed CNN-LSTM hybrid model compared to MLP, LSTM and RNN-LSTM has the best predictive performance. By utilizing the proposed devices and models, it is expected various metro services will be provided with no illegal issue about the personal information such as real-time monitoring of public transport facilities and emergency situation response services on the basis of congestion. However, the data have been collected by selecting one side of the entrances as the subject of analysis, and the data collected for a short period of time have been applied to the prediction. There exists the limitation that the verification of application in other environments needs to be carried out. In the future, it is expected that more reliability will be provided for the proposed model if experimental data is sufficiently collected in various environments or if learning data is further configured by measuring data in other sensors.

Cluster Management Scheme for Safety Message Dissemination in a VANET Environment (VANET 환경에서 안전 메시지 배포를 위한 클러스터 관리 기법)

  • Pyun, Do-Woong;Lim, Jongtae;Bok, Kyoung-Soo;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.5
    • /
    • pp.26-36
    • /
    • 2022
  • Recently, studies have been conducted to cluster vehicles and disseminate safety messages in a VANET environment for driver safety and smoothy traffic. This paper proposes cluster management scheme for safety message dissemination through V2V communication and V2I communication in a VANET environment with high vehicle density and mobility. The proposed scheme reduces packet loss by selecting CH considering reception quality, total data owned by vehicles, moving speed, and connected vehicles, and maintaining cluster head candidates, which are the main agents of message dissemination, considering frequent cluster departures and subscriptions. In addition, the proposed scheme reduces duplicate messages by utilizing clusters by collaborating with a Road side unit(RSU). To prove the excellence of the proposed scheme, various performance evaluations are performed in terms of message packet loss and the number of RSU processing requests. As a result of performance evaluation, the cluster management scheme proposed in this paper shows better performance than the existing scheme.

Entity Authentication Scheme for Secure WEB of Things Applications (안전한 WEB of Things 응용을 위한 개체 인증 기술)

  • Park, Jiye;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.5
    • /
    • pp.394-400
    • /
    • 2013
  • WoT (Web of Things) was proposed to realize intelligent thing to thing communications using WEB standard technology. It is difficult to adapt security protocols suited for existing Internet communications into WoT directly because WoT includes LLN(Low-power, Lossy Network) and resource constrained sensor devices. Recently, IETF standard group propose to use DTLS protocol for supporting security services in WoT environments. However, DTLS protocol is not an efficient solution for supporting end to end security in WoT since it introduces complex handshaking procedures and high communication overheads. We, therefore, divide WoT environment into two areas- one is DTLS enabled area and the other is an area using lightweight security scheme in order to improve them. Then we propose a mutual authentication scheme and a session key distribution scheme for the second area. The proposed system utilizes a smart device as a mobile gateway and WoT proxy. In the proposed authentication scheme, we modify the ISO 9798 standard to reduce both communication overhead and computing time of cryptographic primitives. In addition, our scheme is able to defend against replay attacks, spoofing attacks, select plaintext/ciphertext attacks, and DoS attacks, etc.

Energy Big Data Pre-processing System for Energy New Industries (에너지신산업을 위한 에너지 빅데이터 전처리 시스템)

  • Yang, Soo-Young;Kim, Yo-Han;Kim, Sang-Hyun;Kim, Won-Jung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.5
    • /
    • pp.851-858
    • /
    • 2021
  • Due to the increase in renewable energy and distributed resources, not only traditional data but also various energy-related data are being generated in the new energy industry. In other words, there are various renewable energy facilities and power generation data, system operation data, metering and rate-related data, as well as weather and energy efficiency data necessary for new services and analysis. Energy big data processing technology can systematically analyze and diagnose data generated in the first half of the power production and consumption infrastructure, including distributed resources, systems, and AMI. Through this, it will be a technology that supports the creation of new businesses in convergence between the ICT industry and the energy industry. To this end, research on the data analysis system, such as itemized characteristic analysis of the collected data, correlation sampling, categorization of each feature, and element definition, is needed. In addition, research on data purification technology for data loss and abnormal state processing should be conducted. In addition, it is necessary to develop and structure NIFI, Spark, and HDFS systems so that energy data can be stored and managed in real time. In this study, the overall energy data processing technology and system for various power transactions as described above were proposed.

Design of Geo-fence-based Smart Attendance System (지오펜스 기반 스마트 출결시스템 설계)

  • Hong, Seong-Pyo;Kim, Tae-Yeun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.496-502
    • /
    • 2020
  • The electronic attendance management system is being introduced and operated on a pilot basis by some universities and educational institutions. However, most of the related systems have installed and operated the existing barcode and magnetic card systems. Classroom attendance is managed by introducing RF cards, but it causes problems such as recognition distance (less than 5cm) and the need for a check process in which students have to read the card each time with a reader for attendance. Also, it is not possible to respond in real time to the situation of midterm (early leave, absence from the second lecture time, etc.) because it is used in the lecture time of one subject with the record checked once. In order to solve these problems, the various mobile attendance systems proposed to solve these problems are also unable to fundamentally solve problems such as interim attendance and proxy attendance because they check attendance using only the application of a smartphone. In this paper, we use geofencing technology, which is a positioning-based technology that detects the entry and exit of people, objects, etc. in areas separated by virtual boundaries. The proposed system solves the problem of intermediate attendance and alternate attendance by setting the student to automatically record the access record when entering and leaving the classroom set as a geofence with a smartphone. In addition, it also provides a function to prevent unintentional mistakes that occur through the smartphone by limiting some of the functions of the smartphone such as silence, vibration, and Internet use when entering the classroom.

A Study on Cell-Broadcasting Based Security Authentication System and Business Models (셀 브로드캐스팅 보안 인증시스템 및 비즈니스 모델에 관한 연구)

  • Choi, Jeong-Moon;Lee, Jungwoo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.5
    • /
    • pp.325-333
    • /
    • 2021
  • With the rapidly changing era of the fourth industrial revolution, the utilization of IT technology is increasing. In addition, the demand for security authentication is increasing as shared services or IoT technologies are being developed as new business models. Security authentication is becoming increasingly important for all intelligent devices such as self-driving cars. However, most location-based security authentication technologies are being developed mainly with technologies that utilize server proximity or satellite location tracking, which limits the scope of their physical use. Location-based security authentication technology has recently been developed as a complementary replacement technology. In this study, we introduce location-based security authentication technology using cell broadcasting technology, which has a wider range of applications and is more convenient and business-friendly than existing location-based security authentication technologies. We also introduced application cases and business models related to this. In addition to the current status of technology development, we analyzed current changes in business models being employed. Based on our analysis results, this study draws the implication that technology diversification is necessary to improve the performance of innovative technologies. It is meaningful that it has found and studied advanced technologies other than existing location authentication methods and systems.

A Review on Solution Plans for Preventing Environmental Contamination as the Trend Changes of Cryptocurrency (암호화폐의 트랜드 변화에 따른 환경오염 방지 해결방안에 대한 고찰)

  • Kim, Jeong-hun;Song, Sae-hee;Ko, Lim-hwan;Nam, Hak-hyun;Jang, Jae-hyuck;Jung, Hoi-yun;Choi, Hyuck-jae
    • Journal of Venture Innovation
    • /
    • v.5 no.1
    • /
    • pp.91-106
    • /
    • 2022
  • Cryptocurrency, stood out the sharp cost rising of Bitcoin has been spotlighted by means of the solution for stagflation because it is decentralized with an existing currency differently. Especially getting into 4th industrial revolution, technologies using block chain and internet of things have been used in the many fields, and the power of influence is also widespread. Nevertheless like a remark of Elon Musk of Tesla CEO, the problems of environmental contamination for cryptocurrency have been pointed out continuously and the most representative of them is an enormous electric usage as the use of fossil fuels. Also the amount generated of carbon dioxide result in the acceleration of global warming mainly based on the climate changes of earth if the existing mining method is continued. On the other hand, review researches have been conducted restrictively as the connection with environmental contamination as the mining of cryptocurrency. In this study, it intended to review problems for environmental contamination as the diversification of ecological system of cryptocurrency concretely. Upon investigation existing prior documents on the putting recent data first, the mining of cryptocurrency has affected on the environmental contamination conflicting with carbon neutrality as increasement of the electric usage and electronic wastes. And POS method without the mining process appeared, but it had a demerit collapsing a decentralization and then we met turning point on appearing various environmental-friendly cryptocurrency. Finally the appearance of cryptocurrency using new renewable energy acted on the opportunity of the usage maximization of energy storage apparatus and the birth of national government intervention. Based on these results, we mention clearly that hereafter cryptocurrency will regress if not go abreast the value of currency as well as environmental approach.