• Title/Summary/Keyword: Internet of Things Environment

Search Result 734, Processing Time 0.024 seconds

A Study on Merchant Server Construction based on the Personalization (개별화를 기반으로 한 Merchant Server 구축에 관한 연구)

  • 황병연
    • The Journal of Society for e-Business Studies
    • /
    • v.3 no.2
    • /
    • pp.95-112
    • /
    • 1998
  • With the advent and proliferation of the Internet, Electronic Commerce(EC) on the Internet has become one of the most rapidly growing area and has been the subject of much research lately. EC is commercial transactions using computers in virtual environment through computer networks. The computer system deals with various ranges of things such as products, services, and information on EC. In this paper we describe the construction methods of web site based on the personalization, Also, we present the personalization technology and architecture of the P-Commerce proposed in this paper. Finally, we describe the methods constructing EC site using P-Commerce solution.

  • PDF

PowMash: End-User Service Mashup Using a Presentation-Authoring Scheme (PowMash: 프레젠테이션 작성 스킴 기반 최종 사용자 서비스 매쉬업)

  • Nam, Sanggyu;Dominguez, Noe;Ko, In-Young
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.12
    • /
    • pp.684-690
    • /
    • 2017
  • Researchers have suggested several methods for utilizing various kinds of services in an Internet of Things (IoT) environment. These methods require users to learn some new kinds of tools or expertise in programming. In this paper, we propose a new paradigm, which allows end-users to build IoT-service mashups based on a presentation-authoring scheme. We have also included a framework for this procedure. The design of a mashup model in this framework was based on a task-oriented service framework. Users can build a mashup of this framework in the presentation-file format, convert it into a service flow, and deploy it for running in an IoT environment. In addition, we use a case study to show how PowMash supports end-users' service mashups in an IoT environment.

A Study on Pipeline Design Methods for Providing Secure Container Image Registry (안전한 컨테이너 이미지 레지스트리 제공을 위한 파이프라인 설계 방안에 관한 연구)

  • Seong-Jae Ko;Sun-Jib Kim
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.3
    • /
    • pp.21-26
    • /
    • 2023
  • The development and distribution approach of applications is transitioning from a monolithic architecture to microservices and containerization, a lightweight virtualization technology, is becoming a core IT technology. However, unlike traditional virtual machines based on hypervisors, container technology does not provide concrete security boundaries as it shares the same kernel. According to various preceding studies, there are many security vulnerabilities in most container images that are currently shared. Accordingly, attackers may attempt exploitation by using security vulnerabilities, which may seriously affect the system environment. Therefore, in this study, we propose an efficient automated deployment pipeline design to prevent the distribution of container images with security vulnerabilities, aiming to provide a secure container environment. Through this approach, we can ensure a safe container environment.

Seeking an Approach to Youth Job Search Allowance Support Project using IoT in the Untact Era (비대면 시대에 IoT를 활용한 청년 구직활동수당 지원사업 접근 방안 모색)

  • Lee, Sangho;Cho, Kwangmoon
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.3
    • /
    • pp.21-30
    • /
    • 2020
  • The purpose of this paper is to verify the differences of the effect of the support between the number of employment of those who have experienced employment and the unemployment period of those who have not experienced employment for the participants of the Jeollanam-do Youth Job Search Allowance Support Project. In addition, this study attempted to find out the ways to develop the system using the Internet of Things by figure out how to use the allowance, the field of help, the average investment time per day, the average monthly expenditure, the difficulties of job search activities, and the differences in the youth job search activities for the required programs. In this study, 602 people who participated in the Jeollanam-do Youth Job Search Allowance Support Project from February 19 to March 9, 2020 are surveyed. The collected data was processed using the SPSS 21.0 program. The research results are as follows. First, there was a difference in satisfaction according to the number of jobs employed. Second, there was a difference in the effectiveness according to the number of employment. Third, there was a difference in satisfaction according to the period of unemployment. Fourth, there was a difference in effectiveness according to the period of unemployment. In order to enhance the effectiveness of the youth job search allowance support project, the Edutech industry and technology that can share various information using the Internet of Things environment in the untact era must be improved together.

A Study of Data Communication Between the Web and the IoT Platform in WoT (WoT 환경에서 웹과 IoT 플랫폼 사이의 데이터 통신 연구)

  • Phyo, Gyung-soo;Park, Jin-tae;Moon, Il-young
    • Journal of Advanced Navigation Technology
    • /
    • v.20 no.4
    • /
    • pp.374-379
    • /
    • 2016
  • Recently, IoT(Internet of Things) to connect the objects and people has attracted attention. And it is rapidly developing. IoT is to develop, experts are predicting that the device is connected to the Internet to break through around 100 billion within 10 years. However, the current IoT companies are having a difficult state to the other each other IoT platform for interaction between data silos effects. These silos effects will limit the IoT grow to a larger market. Thus, the IoT service supplier shall develop an open platform for interaction IoT data between each IoT platform. These web technologies for current open IoT platform has emerged. If developers are using familiar, easy-to-learn Web technologies, developers can take advantage of a variety of services for the collected data, and found the IoT devices can be bypassed if there is a problem on the network. In this paper, we investigate the data communications technology that can be used in WoT environment to overcome these silos effects. As a result, the polling method that can simply send the IoT information the fastest.

A Study on Developing Policy Indicators of Personal Information Protection for Expanding Secure Internet of Things Service (안전한 사물인터넷 서비스 확산을 위한 개인정보보호정책평가지표 개발에 관한 연구)

  • Shin, Young-Jin
    • Informatization Policy
    • /
    • v.25 no.3
    • /
    • pp.29-51
    • /
    • 2018
  • As the core technology of the Fourth Industrial Revolution, the Internet of Things has been developed and has enabled various services, and personal information has been handled freely in the process. However, the infringement threat of personal information is increasing as more convenient services are provided and more information devices including smart devices are connected to the network. Therefore, this study is to analyze prioritizing personal information protection policy indicators in order to provide IoT services by constructing secure environment for implementing the Internet of things as the core technology of the 4th Industrial Revolution. This study reviewed personal information protection policy indicators based on the literature survey, and identified 3 fields, 9 areas, and 25 indicators through Delphi analysis for experts. The weights were calculated based on the AHP survey for 66 experts and the results were used to present the relative importance and priority of the policy indexes. The results of this study found the policy field was the most important, followed by the technical field, and the administrative field. Of the three areas of the policy field, strengthening the personal information protection laws related to IoT is the most important, while among the indicators, promoting and revising the personal information protection law related to IoT is the most important. Comparisons of the fields, areas, and indicators of IoT-related personal information protection policies found consistent values. The personal information protection policy indicators derived this way will contribute to the nation's competitiveness by expanding secure IoT policies in the future.

Delayed offloading scheme for IoT tasks considering opportunistic fog computing environment (기회적 포그 컴퓨팅 환경을 고려한 IoT 테스크의 지연된 오프로딩 제공 방안)

  • Kyung, Yeunwoong
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.4
    • /
    • pp.89-92
    • /
    • 2020
  • According to the various IoT(Internet of Things) services, there have been lots of task offloading researches for IoT devices. Since there are service response delay and core network load issues in conventional cloud computing based offloadings, fog computing based offloading has been focused whose location is close to the IoT devices. However, even in the fog computing architecture, the load can be concentrated on the for computing node when the number of requests increase. To solve this problem, the opportunistic fog computing concept which offloads task to available computing resources such as cars and drones is introduced. In previous fog and opportunistic fog node researches, the offloading is performed immediately whenever the service request occurs. This means that the service requests can be offloaded to the opportunistic fog nodes only while they are available. However, if the service response delay requirement is satisfied, there is no need to offload the request immediately. In addition, the load can be distributed by making the best use of the opportunistic fog nodes. Therefore, this paper proposes a delayed offloading scheme to satisfy the response delay requirements and offload the request to the opportunistic fog nodes as efficiently as possible.

A Study on Space Utilization according to Changes in Non-face-to-Face Consumer Use : Focused on bank offices

  • Hwang, Sungi;Ryu, Gihwan;Yun, Daiyeol;Kim, Heeyoung
    • International Journal of Advanced Culture Technology
    • /
    • v.8 no.4
    • /
    • pp.271-278
    • /
    • 2020
  • Modern financial services go beyond the stage of internet banking, and new concepts of financial transactions such as Internet of Things, mobile banking, electronic payments, and fintech have emerged. As a result, banks are less influential in financial transactions, and changes are being demanded. In the present era, the basic business of banks has decreased, and it is transforming into a space where both consumer finance work and reside. The bank office stands for the brand image of the bank, and it is represented by trust with customers in the basic business of financial transactions, and the rise in real estate value is a natural social phenomenon due to the nature of the location and location of real estate owned by the bank. The business method and space of the bank office that meets the new paradigm of the modern society is an inefficient space only for the convenience and rest of consumers, but it must be used as a variety of spaces suitable for the region to increase the functional value of the bank office. Through this study, as a convenience space for consumers, various service facilities should be introduced to understand the characteristics of the region as a convenience space for consumers, and various service facilities should be introduced to meet the needs of consumers, and the bank office should be improved as a complex service space for local residents.

IoT Enabled Smart Emergency LED Exit Sign controller Design using Arduino

  • Jung, Joonseok;Kwon, Jongman;Mfitumukiza, Joseph;Jung, Soonho;Lee, Minwoo;Cha, Jaesang
    • International journal of advanced smart convergence
    • /
    • v.6 no.1
    • /
    • pp.76-81
    • /
    • 2017
  • This paper presents a low cost and flexible IoT enabled smart LED controller using Arduino that is used for emergency exit signs. The Internet of Things (IoT) is become a global network that put together physical objects using network communications for the purpose of inter-communication of devices, access information on internet, interaction with users as well as permanent connected environment. A crucial point in this paper, is underlined on the potential key points of applying the Arduino platform as low cost, easy to use microcontroller with combination of various sensors applied in IoT technology to facilitate and establishment of intelligent products. To demonstrate the feasibility and effectiveness of the system, devices such as LED strip, combination of various sensors, Arduino, power plug and ZigBee module have been integrated to setup smart emergency exit sign system. The general concept of the proposed system design discussed in this paper is all about the combination of various sensor such as smoke detector sensor, humidity, temperature sensor, glass break sensors as well as camera sensor that are connected to the main controller (Arduino) for the purpose of communicating with LED exit signs displayer and dedicated PC monitors from integrated system monitoring (controller room) through gateway devices using Zig bee module. A critical appraisal of the approach in the area concludes the paper.

Service Architecture Models For Fog Computing: A Remedy for Latency Issues in Data Access from Clouds

  • Khalid, Adnan;Shahbaz, Muhammad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2310-2345
    • /
    • 2017
  • With the emergence of the Internet of Things (IoT) the world is projecting towards a scenario where every object in the world (including humans) acts as a sender and receiver of data and if we were to see that concept mature we would soon be talking of billions more users of the cloud networks. The cloud technology is a very apt alternative to permanent storage when it comes to bulk storage and reporting. It has however shown weaknesses concerning real-time data accessibility and processing. The bandwidth availability of the cloud networks is limited and combined with the highly centralized storage structure and geographical vastness of the network in terms of distance from the end user the cloud just does not seem like a friendly environment for real-time IOT data. This paper aims at highlighting the importance of Flavio Bonomi's idea of Fog Computing which has been glamorized and marketed by Cisco but has not yet been given a proper service architecture that would explain how it would be used in terms of various service models i-e IaaS, PaaS and SaaS, of the Cloud. The main contribution of the paper would be models for IaaS, PaaS and SaaS for Fog environments. The paper would conclude by highlighting the importance of the presented models and giving a consolidated overview of how they would work. It would also calculate the respective latencies for fog and cloud to prove that our models would work. We have used CloudSim and iFogSim to show the effectiveness of the paradigm shift from traditional cloud architecture to our Fog architecture.