• Title/Summary/Keyword: Internet of Media Things

Search Result 160, Processing Time 0.02 seconds

Learning Algorithms in AI System and Services

  • Jeong, Young-Sik;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.15 no.5
    • /
    • pp.1029-1035
    • /
    • 2019
  • In recent years, artificial intelligence (AI) services have become one of the most essential parts to extend human capabilities in various fields such as face recognition for security, weather prediction, and so on. Various learning algorithms for existing AI services are utilized, such as classification, regression, and deep learning, to increase accuracy and efficiency for humans. Nonetheless, these services face many challenges such as fake news spread on social media, stock selection, and volatility delay in stock prediction systems and inaccurate movie-based recommendation systems. In this paper, various algorithms are presented to mitigate these issues in different systems and services. Convolutional neural network algorithms are used for detecting fake news in Korean language with a Word-Embedded model. It is based on k-clique and data mining and increased accuracy in personalized recommendation-based services stock selection and volatility delay in stock prediction. Other algorithms like multi-level fusion processing address problems of lack of real-time database.

A Study on the Iptables Ruleset Against DoS Attacks (DoS 공격에 대비한 Iptables의 정책에 관한 연구)

  • Jung, Sung-Jae;Sung, Kyung
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.3
    • /
    • pp.257-263
    • /
    • 2015
  • Although a variety of preparation methods for DoS attacks and DDoS attacks are presented, it is still being exploited, the vulnerability with networks and protocols. In particular, When was built environment that can be used anywhere in the Internet, Internet of Things is entering era. Thus, the conventional computer, as well as household appliances, etc. DoS attack targets or are likely to do the attacker role is increasing. In this paper, we first find out about the type and characteristics of DoS attacks. Open source operating system, Linux has iptables that packet filtering tool and firewall programs. Using iptables to set the policy ruleset against DoS attacks.

A Study on Hardware Implementation of 128-bit LEA Encryption Block (128비트 LEA 암호화 블록 하드웨어 구현 연구)

  • Yoon, Gi Ha;Park, Seong Mo
    • Smart Media Journal
    • /
    • v.4 no.4
    • /
    • pp.39-46
    • /
    • 2015
  • This paper describes hardware implementation of the encryption block of the '128 bit block cipher LEA' among various lightweight encryption algorithms for IoT (Internet of Things) security. Round function blocks and key-schedule blocks are designed by parallel circuits for high throughput. The encryption blocks support secret-key of 128 bits, and are designed by FSM method and 24/n stage(n=1, 2, 3, 4, 8, 12) pipeline methods. The LEA-128 encryption blocks are modeled using Verilog-HDL and implemented on FPGA, and according to the synthesis results, minimum area and maximum throughput are provided.

A Study of Lightening Super-Resolution Networks Using Self-Distillation (자가증류를 이용한 초해상화 네트워크 경량화 연구)

  • Lee, Yeojin;Park, Hanhoon
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2022.06a
    • /
    • pp.221-223
    • /
    • 2022
  • 최근 CNN(Convolutional Neural Network)은 초해상화(super-resolution)를 포함한 다양한 컴퓨터 비전 분야에서 우수한 성능을 보이며 널리 사용되고 있다. 그러나 CNN은 계산 집약적이고 많은 메모리가 요구되어 한정적인 하드웨어 자원인 모바일이나 IoT(Internet of Things) 기기에 적용하기 어렵다는 문제가 있다. 이런 한계를 해결하기 위해, 기 학습된 깊은 CNN 모델의 성능을 최대한 유지하며 네트워크의 깊이나 크기를 줄이는 경량화 연구가 활발히 진행되고 있다. 본 논문은 네트워크 경량화 기술인 지식증류(knowledge distillation) 중 자가증류(self-distillation)를 초해상화 CNN 모델에 적용하여 성능을 평가, 분석한다. 실험 결과, 정량적 평가지표를 통하여 자가증류를 통해서도 성능이 우수한 경량화된 초해상화 모델을 얻을 수 있음을 확인하였다.

  • PDF

A Realtime Traffic Shaping Method for VPN Tunneling on Smart Gateway Supporting IoT (사물인터넷지원 스마트게이트웨이의 VPN 터널링 실시간 속도제어 방법)

  • Yang, Seungeui;Kang, Inshik;Goh, Byungoh;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.6
    • /
    • pp.1121-1126
    • /
    • 2017
  • Recently, the importance of smart gateways that link these with the big data and the development of the Internet of things is getting bigger. The smart gateway includes a network function such as a router and a router, and a sensor network function that links various objects such as a sensor. As the internet market has expanded, network stability and security problems have arisen and VPN technology has been proposed as one of the ways to solve these security problems. Efficient design is needed to implement VPN in low-end smart gateway and SOHO-level Internet environment with poor line quality. In this paper, we propose the concept and principle of VPN tunneling implementation and real - time traffic shaping method according to internet line condition in the Smart Gateway that supports IOT developed based on OpenWRT, the implementation and measured performance indicators are presented.

A study on the digital transformation strategy of a fashion brand - Focused on the Burberry case - (패션 브랜드의 디지털 트랜스포메이션 전략에 관한 연구 - 버버리 사례를 중심으로 -)

  • Kim, Soyoung;Ma, Jin Joo
    • The Research Journal of the Costume Culture
    • /
    • v.27 no.5
    • /
    • pp.449-460
    • /
    • 2019
  • Today, the fashion business environment of the 4.0 generation is changing based on fashion technology combined with advanced digital technologies such as AI (Artificial Intelligence), big data and IoT (Internet of Things). "Digital Transformation" means a fundamental change and innovation in a digital paradigm including corporate strategy, organization, communication, and business model, based on the utilization of digital technology. Thus, this study examines digital transformation strategies through the fashion brand Burberry. The study contents are as follows. First, it examines the theoretical concept of digital transformation and its utilization status. Second, it analyzes the characteristics of Burberry's digital transformation based on its strategies. For the research methodology, a literature review was performed on books and papers, aligning with case studies through websites, social media, and news articles. The result showed that first, Burberry has reset their main target to Millennials who actively use mobile and social media, and continues to communicate with them by utilizing digital strategy in the entire management. Second, Burberry is quickly delivering consistent brand identity to consumers by internally creating and providing social media-friendly content. Third, they have started real-time product sales and services by using IT to enhance access to brands and to lead consumers towards more active participation. In this study, Burberry's case shows that digital transformation can contribute to increased brand value and sales, keeping up with the changes in the digital paradigm. Therefore, the study suggests that digital transformation will serve as an important business strategy for fashion brands in the future.

Implementation of CoAP/6LoWPAN over BLE Networks for IoT Services (BLE 네트워크 상에서 사물인터넷 서비스 제공을 위한 CoAP과 6LoWPAN 구현)

  • Kim, Cheol-Min;Kang, Hyung-Woo;Choi, Sang-Il;Koh, Seok-Joo
    • Journal of Broadcast Engineering
    • /
    • v.21 no.3
    • /
    • pp.298-306
    • /
    • 2016
  • With the advent of Internet of Things (IoT) technology that allows the communications between things and devices over the Internet, a lot of researches on the IoT services, such as smart home or healthcare, have been progressed. In the existing machine-to-machine (M2M) communications, however, since the underlying link-layer technologies, such as Bluetooth or ZigBee, do not use the Internet Protocol (IP) communication, those technologies are not suitable to provide the IoT services. Accordingly, this paper discusses how to provide the Internet services in the M2M communication, and propose an implementation of the Constrained Application Protocol (CoAP) over 6LoWPAN for providing IoT services in the BLE networks. Based on the implementation, we compared the performance between HTTP and CoAP for IoT communications. From the experimental results, we can see that the CoAP protocol gives better performance than the HTTP protocol with two times higher throughput, 21% faster transmission time, and 22% smaller amount of generated packets.

Trend Analysis of Fraudulent Claims by Long Term Care Institutions for the Elderly using Text Mining and BIGKinds (텍스트 마이닝과 빅카인즈를 활용한 노인장기요양기관 부당청구 동향 분석)

  • Youn, Ki-Hyok
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.2
    • /
    • pp.13-24
    • /
    • 2022
  • In order to explore the context of fraudulent claims and the measures for preventing them targeting the long-term care institutions for the elderly, which is increasing every year in Korea, this study conducted the text mining analysis using the media report articles. The media report articles were collected from the news big data analysis system called 'BIG KINDS' for about 15 years from July 2008 when the Long-Term Care Insurance for the Elderly took effect, to February 28th 2022. During this period of time, total 2,627 articles were collected under keywords like 'elderly care+fraudulent claims' and 'long-term care+fraudulent claims', and among them, total 946 articles were selected after excluding overlapped articles. In the results of the text mining analysis in this study, first, the top 10 keywords mentioned in the highest frequency in every section(July 1st 2008-February 28th 2022) were shown in the order of long-term care institution for the elderly, fraudulent claims, National Health Insurance Service, Long-Term Care Insurance for the Elderly, long-term care benefits(expenses), elderly care facilities, The Ministry of Health & Welfare, the elderly, report, and reward(payment). Second, in the results of the N-gram analysis, they were shown in the order of long-term care benefits(expenses) and fraudulent claims, fraudulent claims and long-care institution for the elderly, falsehood and fraudulent claims, report and reward(payment), and long-term care institution for the elderly and report. Third, the analysis of TF-IDF was similar to the results of the frequency analysis while the rankings of report, reward(payment), and increase moved up. Based on such results of the analysis above, this study presented the future direction for the prevention of fraudulent claims of long-term care institutions for the elderly.

A Study on the Prediction of Strawberry Production in Machine Learning Infrastructure (머신러닝 기반 시설재배 딸기 생산량 예측 연구)

  • Oh, HanByeol;Lim, JongHyun;Yang, SeungWeon;Cho, YongYun;Shin, ChangSun
    • Smart Media Journal
    • /
    • v.11 no.5
    • /
    • pp.9-16
    • /
    • 2022
  • Recently, agricultural sites are automating into digital agricultural smart farms by applying technologies such as big data and Internet of Things (IoT). These smart farms aim to increase production and improve crop quality by measuring the environment of crops, investigating and processing data. Production prediction is an important study in smart farm digital agriculture, which is a high-tech agriculture, and it is necessary to analyze environmental data using big data and further standardized research to manage the quality of growth information data. In this paper, environmental and production data collected from smart farm strawberry farms were analyzed and studied. Based on regression analysis, crop production prediction models were analyzed using Ridge Regression, LightGBM, and XGBoost. Among the three models, the optimal model was XGBoost, and R2 showed 82.5 percent explanatory power. As a result of the study, the correlation between the amount of positive fluid absorption and environmental data was confirmed, and significant results were obtained for the production prediction study. In the future, it is expected to contribute to the prevention of environmental pollution and reduction of sheep through the management of sheep by studying the amount of sheep absorption, such as information on the growing environment of crops and the ingredients of sheep.

Design and Implementation of Fruit harvest time Predicting System based on Machine Learning (머신러닝 적용 과일 수확시기 예측시스템 설계 및 구현)

  • Oh, Jung Won;Kim, Hangkon;Kim, Il-Tae
    • Smart Media Journal
    • /
    • v.8 no.1
    • /
    • pp.74-81
    • /
    • 2019
  • Recently, machine learning technology has had a significant impact on society, particularly in the medical, manufacturing, marketing, finance, broadcasting, and agricultural aspects of human lives. In this paper, we study how to apply machine learning techniques to foods, which have the greatest influence on the human survival. In the field of Smart Farm, which integrates the Internet of Things (IoT) technology into agriculture, we focus on optimizing the crop growth environment by monitoring the growth environment in real time. KT Smart Farm Solution 2.0 has adopted machine learning to optimize temperature and humidity in the greenhouse. Most existing smart farm businesses mainly focus on controlling the growth environment and improving productivity. On the other hand, in this study, we are studying how to apply machine learning with respect to harvest time so that we will be able to harvest fruits of the highest quality and ship them at an excellent cost. In order to apply machine learning techniques to the field of smart farms, it is important to acquire abundant voluminous data. Therefore, to apply accurate machine learning technology, it is necessary to continuously collect large data. Therefore, the color, value, internal temperature, and moisture of greenhouse-grown fruits are collected and secured in real time using color, weight, and temperature/humidity sensors. The proposed FPSML provides an architecture that can be used repeatedly for a similar fruit crop. It allows for a more accurate harvest time as massive data is accumulated continuously.