• Title/Summary/Keyword: Convergence technologies

Search Result 1,781, Processing Time 0.026 seconds

Cattle Shed Management System Based on Wireless Sensor Network with Bio and Environmental Sensors (바이오 및 환경센서를 활용한 무선센서 네트워크 기반의 축사관리 시스템)

  • Kim, Hong-Kyu;Moon, Seung-Jin;Lee, Jong-Dae;Choi, Sun-O
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.7
    • /
    • pp.573-586
    • /
    • 2013
  • Recently, the research, utilizing bio and environment sensors in agricultural and cattle industries, are drawing attention among the various IT convergence technologies. Among such research IT convergence techniques which aim to improve the quality of cattle industry management are necessary in particular. Real-time monitoring of the cattles health condition, identification of the cause of the diseases and timely response to such epidemic based on IT convergence techniques are among them. In order to achieve the better management of cattle industry, we propose a cattles management system which based on various bio environment sensors and wireless network technologies. The system consists of wireless environmental sensor data acquisition nodes, sensor data processing nodes, the gateway and the server. The proposed system is able to actively monitor the cattle field, to respond quickly in the case of massive cattle diseases and to control the environment of the cattle fields. We believe the proposed system will demonstrate the successful application of IT technologies to an applied field such as farming industries because of real-time crisis management capability in case of epidemic and optimal management of cattle industry.

A Design of Secure Communication for Device Management Based on IoT (사물인터넷 기반 디바이스 관리를 위한 안전한 통신 프로토콜 설계)

  • Park, Jung-Oh;Choi, Do-Hyeon;Hong, Chan-Ki
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.55-63
    • /
    • 2020
  • The IoT technology is a field that applies and converges the technologies in the existing industrial environment, instead of new technologies. The IoT technology is releasing various application services converged with other industries such as smart home, healthcare, construction, and automobile, and it is also possible to secure the work efficiency and convenience of users of IoT-based technologies. However, the security threats occurring in the IoT-based technology environment are succeeding to the vulnerability of the existing wireless network environment. And the occurrence of new and variant attacks in the combination with the ICT convergence environment, is causing damages. Thus, in the IoT technology-based environment, it would be necessary to have researches on the safe transmission of messages in the communication environment between user and device, and device and device. This thesis aims to design a safe communication protocol in the IoT-based technology environment. Regarding the suggested communication protocol, this thesis performed the safety analysis on the attack techniques occurring in the IoT technology-based environment. And through the performance evaluation of the existing PKI-based certificate issuance system and the suggested communication protocol, this thesis verified the high efficiency(about 23%) of communication procedure. Also, this thesis verified the reduced figure(about 65%) of the issued quantity of certificate compared to the existing issuance system and the certificate management technique.

Trends in the use of big data and artificial intelligence in the sports field (스포츠 현장에서의 빅데이터와 인공지능 활용 동향)

  • Seungae Kang
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.115-120
    • /
    • 2022
  • This study analyzed the recent trends in the sports environment to which big data and AI technologies, which are representative technologies of the 4th Industrial Revolution, and approached them from the perspective of convergence of big data and AI technologies in the sports field. And the results are as follows. First, it is being used for player and game data analysis and team strategy establishment and operation. Second, by combining big data collected using GPS, wearable equipment, and IoT with artificial intelligence technology, scientific physical training for each player is possible through user individual motion analysis, which helps to improve performance and efficiently manage injuries. Third, with the introduction of an AI-based judgment system, it is being used for judge judgment. Fourth, it is leading the change in marketing and game broadcasting services. The technology of the 4th Industrial Revolution is bringing innovative changes to all industries, and the sports field is also in the process. The combination of big data and AI is expected to play an important role as a key technology in the rapidly changing future in a sports environment where scientific analysis and training determine victory or defeat.

An Analysis of the US 3rd Offset Strategy (미국의 제3차 국방과학기술 상쇄전략에 대한 분석)

  • Kim, Jong Ryul
    • Convergence Security Journal
    • /
    • v.16 no.3_1
    • /
    • pp.27-35
    • /
    • 2016
  • This thesis analyzes the backgrounds of the third offset strategy of the US Department of Defense. The key technology areas to be developed and the implications of the 3rd strategy are also examined. The potential great powers, China and Russia have catched up with US in the certain areas of military technologies. The technological superiority of US military is found to have been eroded. The US DOD needs a new defense policy called the 3rd offset strategy to meet this new challenge. The 5 basic technology areas were identified; learning machines, human-machine collaboration, machine-assisted human operations, human-machine combat teaming, and autonomous weapons. The 3rd offset strategy should be managed not to move to the new arms race with rivalries. The defense acquisition system also needs to be improved for the smooth flow of the advanced commercial technologies to the defense sector. Korea needs to figure out the possible technologies of co-research and development with US.

6th Industrialization of Agriculture Utilizing the Technology of 4th Industrial Revolution (4차 산업혁명 기술을 활용한 농업의 6차 산업화)

  • Jung, Jin-Sup;Khoe, Kyung-Il
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.211-217
    • /
    • 2018
  • The purpose of this paper is to explore the possibility and strategic directions of Korean agriculture in the future by analyzing domestic and foreign successful cases leading to the 6th industrialization of agriculture by utilizing 4th Industrial Revolution technologies. To do this, we surveyed the key technologies of the 4th Industrial Revolution, and examined successful cases of the US, Korea and China. As results of these case studies, we recognized that 4th Industrial Revolution technologies could play important roles in the 6th industrialization of agriculture, and suggested meaningful strategic implications using ABCD model.

An Investigation Study to Reduce Security Threat in the Internet of Things Environment (IoT 환경에서 보안위협을 최소화하기 위한 방안 연구)

  • Shin, Seung-Soo;Chae, Gyoo-Soo;Lee, Tae-Hyun
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.4
    • /
    • pp.31-36
    • /
    • 2015
  • Recently, the necessity of Internet of Things in conjunction between devices is increasing. However, there are increasing security threats while applying various communication technologies in the Internet of Things. In this paper, we propose a security countermeasures to minimize damage to the security of a variety of security technologies used in the Internet of Things in order to improve the efficiency of the Internet of Things. The proposed method defined the environment to minimize security damage between home devices such as TV, washing machine, refrigerator, boiler and medical devices such as Analyzers, blood glucose meters, blood pressure monitors that are used in daily life. In addition, a variety of technologies(Zigbee, Wi-Fi, NFC, RFID, etc.) that are used in the Internet of Things may be under integrated management.

  • PDF

Exploring the Technology Fit of Digital Media on Product Shopping Task (디지털 매체 기술과 제품 구매 태스크의 적합성 탐색)

  • Han, Hyun-Soo;Joung, Seok-In
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.283-299
    • /
    • 2011
  • In this paper, we draw upon Task-Technology Fit theory to investigate the fit attributes which impacted on customer preference over three virtual shopping channels which included TV home shopping, Internet shopping, and broadband applications, i.e. IPTV. The fit attributes also reflected the product category contingency, which is classified based on the degree of quality assessing difficulty on the web, such as quasi-commodity, look and feel goods, and look and feel with variable quality goods. Using the collected survey data, we employed stepwise regression analysis to validate the fit attributes in the context of performing virtual shopping task via those three distinctive media technologies. Furthermore, through ANOVA test with Duncan statistics, we reported comparative intensity of the valid fit attributes across the product categories and distinct media technologies. The results validated four critical fit attributes and significant distinctions among product categories and three virtual shopping channels. The findings provide practical insights in distribution channel design exploiting digital convergence technologies.

A Suggestion of Baseball Simulation Game Using High Speed Camera Sensor (초고속카메라 센서를 활용한 야구시뮬레이션 게임 제안)

  • Kim, Do-Goan;Jin, Chan-Yong;Shin, Seong-Yoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.3
    • /
    • pp.535-540
    • /
    • 2014
  • Due to the recent popularity of sports, business items which combine IT technologies with sports have appeared. 'Sportainment' which combines the elements of sports and entertainment have a lot of potential and development as new business items in the view of overcoming many limitations such as time and place in real sports. For suggesting a baseball simulation game 'sportainment', this paper is to review the technologies in the existing indoor baseball ranges and to provide the possibility of indoor baseball simulation using various sensor technologies. This baseball simulation game is expected to develop as one of successful indoor 'sportainment' businesses such as Golfzon.

A method of sensor data stream processing based on RFID middleware (RFID 미들웨어 기반 센서 데이터 스트림 처리 방법)

  • Yang, Moon-Seok;Byun, Yung-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.2
    • /
    • pp.231-239
    • /
    • 2008
  • USN and RFID, as new technologies for realization of ubiquitous computing, are closely related with each other technically. Nevertheless, these technologies are recognized as a separate research topic, and there are few researches on technical convergence of the two research areas. In this paper, we propose an efficient processing method of various kinds of sensor data which are used in USN environment to provide efficiency from the view point of not only convergence of USN and RFID technologies but also cost and extensibility. Especially, we propose a method of conversion of various sensor data into EPC data format which can be handled in a RFID middleware. Using the proposed method, RFID middleware systems based on international standard specification can handle not only RFID tag data but also general sensor data efficiently, and various types of ubiquitous application services can be implemented at low cost and in a short time.

The Analysis of CCTV Hacking and Security Countermeasure Technologies: Survey (CCTV 해킹에 대한 분석 및 보안 대응책 연구: 서베이)

  • Hong, Sunghyuck;Jeong, Sae-Young
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.129-134
    • /
    • 2018
  • This is about the CCTV hacking which is one of the recently emerging privacy-spilling crime. Recently, the usage of CCTV is being increased, and Black Hat Hackers spill the individual's privacy by hacking it. However, That crime is being increased. However, most users rarely fulfill the security management, and the government's measures are insufficient. Therfore, this research report implies some security technologies including user authentication protocols such as SSH Tunneling and Media Encryption Algorithm. and recently developed technologies including Wookyeong Information Technology's SecuWatcher for CCTV, Norma's CCTV Care App, and MarkAny's Password SAFERTM for CCTV.