• Title/Summary/Keyword: Cloud of Things

Search Result 293, Processing Time 0.024 seconds

Aesthetics of Ugliness Expressed on Contemporary Women's Hair Styles

  • Lee, Su-in;Park, Kil-Soon
    • The International Journal of Costume Culture
    • /
    • v.6 no.2
    • /
    • pp.117-125
    • /
    • 2003
  • Aesthetics of ugliness enlarged aesthetic field and brought back the repressed, estranged things. Hair style is not an exception. So I intended to examine the contemporary(1995-2002) women's hair styles on the basis of Rosenkranz' concept of ugliness. The results are as follows: First, extrinsic aspect contains formlessness and disfiguration. Among characteristics of formlessness, discord means appearing on a stage with a hair style derailed from our common sense or an incomplete hair style. Asymmetry means hair decoration or hair dressing which violates the principles of design. Disharmony means excessiveness beyond the concept of accent. Disfiguration has characteristics of vulgarity, disgust and caricature, and means cruelty, grimness or ridiculousness instead of pleasing beauty. Second, intrinsic aspect has incorrectness. As minority ethnic groups, estranged classes, children and women which in the previous field of absolute aesthetics were never considered as beauty appeared as subject matters of hair styles, the repressed things returned and a new genre was created thereby enlarging true aesthetic field. Like this, 1 cloud confirm that aesthetics of ugliness organized today's characteristic, peculiar hair styles, and enlarged aesthetic field.

  • PDF

Analysis of Priority of Technical Factors for Enabling Cloud Computing Services (클라우드 컴퓨팅 서비스 활성화를 위한 기술적 측면 특성요인의 중요도 우선순위 분석)

  • Kang, Da-Yeon;Hwang, Jong-Ho
    • Journal of Digital Convergence
    • /
    • v.17 no.8
    • /
    • pp.123-130
    • /
    • 2019
  • The advent of the full-fledged Internet of Things era will bring together various types of information through Internet of Things devices, and the vast amount of information collected will be generated as new information by the analysis process. To effectively store this generated information, a flexible and scalable cloud computing system is advantageous. Therefore, the main determinants for effective client system acceptance are viewed as motivator factor (economics, efficiency, etc.) and hindrance factor (transitional costs, security issues, etc.) and the purpose of this study is to determine which detailed factors play a major role in making new system acceptance decisions around harm. The factors required to determine the major priorities are defined as the system acceptance determinants from the technical point of view obtained through the literature review, and the questionnaire is prepared based on the factors derived, and the survey is conducted on the experts concerned. In addition, the AHP analysis aims to achieve a final priority by performing a bifurcation between components for measuring a decision unit. Furthermore, the results of this study will serve as an important basis for making decisions based on acceptance (enabling) of technology.

Analyses of Trend of Threat of Security in Internet of Things (사물 인터넷망에서의 보안 위협 기술 동향 분석)

  • Shin, Yoon-gu;Jung, Sungha;Do, Tahoon;Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.895-896
    • /
    • 2015
  • With the development of sensor, wireless mobile communication, embedded system and cloud computing, the technologies of Internet of Things have been widely used in logistics, Smart devices security, intelligent building and o on. Bridging between wireless sensor networks with traditional communication networks or Internet, IoT gateway plays n important role in IoT applications, which facilitates the integration of wireless sensor networks and mobile communication networks or Internet, and the management and control with wireless sensor networks. The IoT Gateway is a key component in IoT application systems but It has lot of security issues. We analyzed the trends of security and privacy matters.

  • PDF

Trends in Edge Computing Technology (엣지 컴퓨팅 기술 동향)

  • Hong, J.H.;Lee, K.C.;Lee, S.Y.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.6
    • /
    • pp.78-87
    • /
    • 2020
  • With the evolution of the Internet of Things (IoT), a computing paradigm shift from cloud to edge computing is rapidly taking place to effectively manage the rapidly increasing volume of data generated by various IoT devices. Edge computing is computing that occurs at or near the physical location of a user or data source. Placing computing services closer to these locations allows users to benefit from faster and more reliable services, and enterprises can take advantage of the flexibility of hybrid cloud computing. This paper describes the concept and main benefits of edge computing and presents the trends and future prospects for edge computing technology.

Study on the MQTT protocol design for the application of the real-time HVAC System

  • Jung, Hun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.1
    • /
    • pp.19-26
    • /
    • 2016
  • In this paper, the existing domestic HVAC systems, devices TCP / IP does not support the most, thereby, not performed remote management, it is necessary to regularly field service, inefficiency and cost bring a burden. This is through a comparison of the IoT-based primary, real-time protocol of what has become a hot topic recently, to be able to control and real-time monitoring through the CCU device in the HVAC system. Compare for this Internet of Things device for real-time monitoring and control of the XMPP, CoAP, MQTT main real-time protocol is used on. Finally, flexibility, light weight, based on MQTT a two-way messaging protocols with reliable message delivery, implements the protocol on the real-time HVAC system in the cloud platform.

Research Trend Analysis by using Text-Mining Techniques on the Convergence Studies of AI and Healthcare Technologies (텍스트 마이닝 기법을 활용한 인공지능과 헬스케어 융·복합 분야 연구동향 분석)

  • Yoon, Jee-Eun;Suh, Chang-Jin
    • Journal of Information Technology Services
    • /
    • v.18 no.2
    • /
    • pp.123-141
    • /
    • 2019
  • The goal of this study is to review the major research trend on the convergence studies of AI and healthcare technologies. For the study, 15,260 English articles on AI and healthcare related topics were collected from Scopus for 55 years from 1963, and text mining techniques were conducted. As a result, seven key research topics were defined : "AI for Clinical Decision Support System (CDSS)", "AI for Medical Image", "Internet of Healthcare Things (IoHT)", "Big Data Analytics in Healthcare", "Medical Robotics", "Blockchain in Healthcare", and "Evidence Based Medicine (EBM)". The result of this study can be utilized to set up and develop the appropriate healthcare R&D strategies for the researchers and government. In this study, text mining techniques such as Text Analysis, Frequency Analysis, Topic Modeling on LDA (Latent Dirichlet Allocation), Word Cloud, and Ego Network Analysis were conducted.

Trend of Edge Machine Learning as-a-Service (서비스형 엣지 머신러닝 기술 동향)

  • Na, J.C.;Jeon, S.H.
    • Electronics and Telecommunications Trends
    • /
    • v.37 no.5
    • /
    • pp.44-53
    • /
    • 2022
  • The Internet of Things (IoT) is growing exponentially, with the number of IoT devices multiplying annually. Accordingly, the paradigm is changing from cloud computing to edge computing and even tiny edge computing because of the low latency and cost reduction. Machine learning is also shifting its role from the cloud to edge or tiny edge according to the paradigm shift. However, the fragmented and resource-constrained features of IoT devices have limited the development of artificial intelligence applications. Edge MLaaS (Machine Learning as-a-Service) has been studied to easily and quickly adopt machine learning to products and overcome the device limitations. This paper briefly summarizes what Edge MLaaS is and what element of research it requires.

Risk of Attack through an Open Wireless Network of IoT Devices (IoT 장치의 개방형 무선 네트워크를 통한 공격 위험)

  • Lee, Geonwoo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.10-14
    • /
    • 2019
  • The number of security incidents is increasing as the Internet of Things(IoT) is distributed widely. The security incidents of IoT can cause financial damages. Moreover, It can become direct threats to humans. In order to prevent these problems, the security installation for IoT devices is important. This paper describes the definition of IoT devices, security incident case, architecture, and the security threats that can occur when a device is connected to network without security installation.

  • PDF

Smart Fog : Advanced Fog Server-centric Things Abstraction Framework for Multi-service IoT System (Smart Fog : 다중 서비스 사물 인터넷 시스템을 위한 포그 서버 중심 사물 추상화 프레임워크)

  • Hong, Gyeonghwan;Park, Eunsoo;Choi, Sihoon;Shin, Dongkun
    • Journal of KIISE
    • /
    • v.43 no.6
    • /
    • pp.710-717
    • /
    • 2016
  • Recently, several research studies on things abstraction framework have been proposed in order to implement the multi-service Internet of Things (IoT) system, where various IoT services share the thing devices. Distributed things abstraction has an IoT service duplication problem, which aggravates power consumption of mobile devices and network traffic. On the other hand, cloud server-centric things abstraction cannot cover real-time interactions due to long network delay. Fog server-centric things abstraction has limits in insufficient IoT interfaces. In this paper, we propose Smart Fog which is a fog server-centric things abstraction framework to resolve the problems of the existing things abstraction frameworks. Smart Fog consists of software modules to operate the Smart Gateway and three interfaces. Smart Fog is implemented based on IoTivity framework and OIC standard. We construct a smart home prototype on an embedded board Odroid-XU3 using Smart Fog. We evaluate the network performance and energy efficiency of Smart Fog. The experimental results indicate that the Smart Fog shows short network latency, which can perform real-time interaction. The results also show that the proposed framework has reduction in the network traffic of 74% and power consumption of 21% in mobile device, compared to distributed things abstraction.

Performance Evaluation of an IoT Platform (듀티사이클 환경의 무선센서네크워크에서 분산 브로드캐스트 스케줄링 기법)

  • Dang, Thien-Binh;Tran, Manh-Hung;Le, Duc-Tai;Yeom, Sanggil;Choo, Hyunseung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.673-676
    • /
    • 2017
  • Accompanying the Internet of Things (IoT) is a demand of advanced applications and services utilizing the potential of the IoT environment. Monitoring the environment for a provision of context-aware services to the human beings is one of the new trends in our future life. The IoTivity Cloud is one of the most notable open-source platform bringing an opportunity to collect, analyze, and interpret a huge amount of data available in the IoT environment. Based on the IoTivity Cloud, we aim to develop a novel platform for comprehensive monitoring of a future network, which facilitates on-demand data collection to enable the network behavior prediction and the quality of user experience maintenance. In consideration of performance evaluation of the monitoring platform, this paper presents results of a preliminary test on the data acquisition/supply process in the IoTivity Cloud.