• Title/Summary/Keyword: IoT:Internet of Things

Search Result 1,866, Processing Time 0.033 seconds

A Study on the Signal Processing Techiques for Pattern Classification of Electrical Loads (전기부하 패턴분류를 위한 신호처리 기법에 관한 연구)

  • Lim, Young Bae;Kim, Dong Woo;Jin, Sangmin;Cho, Seongwon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.26 no.5
    • /
    • pp.409-415
    • /
    • 2016
  • Recently several techniques for disaster prevention based on IoT(Internet of Things) are being developed. In this paper, a new smart pattern classification method for electric loads is proposed. CT(Current Transformer) data are extracted from electric loads, and then the sampled CT data are converted using FFT and MFCC. FFT and FMCC data are used for the input data of neural networks. Experiments were conducted using FFT and MFCC data for 7 kinds of electric loads. Experiments results indicate the superiority of MFCC in comparison to FFT.

A Case Study of the Impact of a Cybersecurity Breach on a Smart Grid Based on an AMI Attack Scenario (AMI 공격 시나리오에 기반한 스마트그리드 보안피해비용 산정 사례)

  • Jun, Hyo-Jung;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.809-820
    • /
    • 2016
  • The smart grid, a new open platform, is a core application for facilitating a creative economy in the era of the Internet of Things (IoT). Advanced Metering Infrastructure (AMI) is one of the components of the smart grid and a two-way communications infrastructure between the main utility operator and customer. The smart meter records consumption of electrical energy and communicates that information back to the utility for monitoring and billing. This paper investigates the impact of a cybersecurity attack on the smart meter. We analyze the cost to the smart grid in the case of a smart meter attack by authorized users based on a high risk scenario from NESCOR. Our findings could be used by policy makers and utility operators to create investment decision-making models for smart grid security.

Neural Network and Cloud Computing for Predicting ECG Waves from PPG Readings

  • Kosasih, David Ishak;Lee, Byung-Gook;Lim, Hyotaek
    • Journal of Multimedia Information System
    • /
    • v.9 no.1
    • /
    • pp.11-20
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.

The Intelligent Blockchain for the Protection of Smart Automobile Hacking

  • Kim, Seong-Kyu;Jang, Eun-Sill
    • Journal of Multimedia Information System
    • /
    • v.9 no.1
    • /
    • pp.33-42
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.

Data Collection Management Program for Smart Factory (스마트팩토리를 위한 데이터 수집 관리 프로그램 개발)

  • Kim, Hyeon-Jin;Kim, Jin-Sa
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.35 no.5
    • /
    • pp.509-515
    • /
    • 2022
  • As the 4th industrial revolution based on ICT is progressing in the manufacturing field, interest in building smart factories that can be flexible and customized according to customer demand is increasing. To this end, it is necessary to maximize the efficiency of factory by performing an automated process in real time through a network communication between engineers and equipment to be able to link the established IT system. It is also necessary to collect and store real-time data from heterogeneous facilities and to analyze and visualize a vast amount of data to utilize necessary information. Therefore, in this study, four types of controllers such as PLC, Arduino, Raspberry Pi, and embedded system, which are generally used to build a smart factory that can connect technologies such as artificial intelligence (AI), Internet of Things (IoT), and big data, are configured. This study was conducted for the development of a program that can collect and store data in real time to visualize and manage information. For communication verification by controller, data communication was implemented and verified with the data log in the program, and 3D monitoring was implemented and verified to check the process status such as planned quantity for each controller, actual quantity, production progress, operation rate, and defect rate.

Design of the protocol for reporting sensor data on passenger ship (여객선 센서 및 장비 정보 전송을 위한 ASM 설계)

  • Kim, Kil-Yong;Jo, Gi-Jong;Lee, Seo-Jeong
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2016.05a
    • /
    • pp.62-63
    • /
    • 2016
  • A variety of sensors and equipment are installed on passenger ships. Data collection from these sensors and associated equipment is required for the safe navigation and behavior analysis of ships, but when the ship sails out of the area where it is not possible to use the LTE communication, other types of networks have to be able to support to transmit these information. such as AIS, satellite communication and MF/HF. In this paper, we survey data protocol of onboard sensors and design ASM messages to transfer sensor data on board to the shore-side system.

  • PDF

A Multi-Scale Parallel Convolutional Neural Network Based Intelligent Human Identification Using Face Information

  • Li, Chen;Liang, Mengti;Song, Wei;Xiao, Ke
    • Journal of Information Processing Systems
    • /
    • v.14 no.6
    • /
    • pp.1494-1507
    • /
    • 2018
  • Intelligent human identification using face information has been the research hotspot ranging from Internet of Things (IoT) application, intelligent self-service bank, intelligent surveillance to public safety and intelligent access control. Since 2D face images are usually captured from a long distance in an unconstrained environment, to fully exploit this advantage and make human recognition appropriate for wider intelligent applications with higher security and convenience, the key difficulties here include gray scale change caused by illumination variance, occlusion caused by glasses, hair or scarf, self-occlusion and deformation caused by pose or expression variation. To conquer these, many solutions have been proposed. However, most of them only improve recognition performance under one influence factor, which still cannot meet the real face recognition scenario. In this paper we propose a multi-scale parallel convolutional neural network architecture to extract deep robust facial features with high discriminative ability. Abundant experiments are conducted on CMU-PIE, extended FERET and AR database. And the experiment results show that the proposed algorithm exhibits excellent discriminative ability compared with other existing algorithms.

Designing a Vehicles for Open-Pit Mining with Optimized Scheduling Based on 5G and IoT

  • Alaboudi, Abdulellah A.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.145-152
    • /
    • 2021
  • In the Recent times, various technological enhancements in the field of artificial intelligence and big data has been noticed. This advancement coupled with the evolution of the 5G communication and Internet of Things technologies, has helped in the development in the domain of smart mine construction. The development of unmanned vehicles with enhanced and smart scheduling system for open-pit mine transportation is one such much needed application. Traditional open-pit mining systems, which often cause vehicle delays and congestion, are controlled by human authority. The number of sensors has been used to operate unmanned cars in an open-pit mine. The sensors haves been used to prove the real-time data in large quantity. Using this data, we analyses and create an improved transportation scheduling mechanism so as to optimize the paths for the vehicles. Considering the huge amount the data received and aggregated through various sensors or sources like, the GPS data of the unmanned vehicle, the equipment information, an intelligent, and multi-target, open-pit mine unmanned vehicle schedules model was developed. It is also matched with real open-pit mine product to reduce transport costs, overall unmanned vehicle wait times and fluctuation in ore quality. To resolve the issue of scheduling the transportation, we prefer to use algorithms based on artificial intelligence. To improve the convergence, distribution, and diversity of the classic, rapidly non-dominated genetic trial algorithm, to solve limited high-dimensional multi-objective problems, we propose a decomposition-based restricted genetic algorithm for dominance (DBCDP-NSGA-II).

New Mathematical Model for Travel Route Recommendation Service (여행경로 추천 서비스를 위한 최적화 수리모형)

  • Hwang, Intae;Kim, Heungseob
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.40 no.3
    • /
    • pp.99-106
    • /
    • 2017
  • With the increased interest in the quality of life of modern people, the implementation of the five-day working week, the increase in traffic convenience, and the economic and social development, domestic and international travel is becoming commonplace. Furthermore, in the past, there were many cases of purchasing packaged goods of specialized travel agencies. However, as the development of the Internet improved the accessibility of information about the travel area, the tourist is changing the trend to plan the trip such as the choice of the destination. Web services have been introduced to recommend travel destinations and travel routes according to these needs of the customers. Therefore, after reviewing some of the most popular web services today, such as Stubby planner (http://www.stubbyplanner.com) and Earthtory (http://www.earthtory.com), they were supposed to be based on traditional Traveling Salesman Problems (TSPs), and the travel routes recommended by them included some practical limitations. That is, they were not considered important issues in the actual journey, such as the use of various transportation, travel expenses, the number of days, and lodging. Moreover, although to recommend travel destinations, there have been various studies such as using IoT (Internet of Things) technology and the analysis of cyberspatial Big Data on the web and SNS (Social Networking Service), there is little research to support travel routes considering the practical constraints. Therefore, this study proposes a new mathematical model for applying to travel route recommendation service, and it is verified by numerical experiments on travel to Jeju Island and trip to Europe including Germany, France and Czech Republic. It also expects to be able to provide more useful information to tourists in their travel plans through linkage with the services for recommending tourist attractions built in the Internet environment.

Intention to Adopt Cloud Accounting: A Conceptual Model from Indonesian MSMEs Perspectives

  • HAMUNDU, Ferdinand Murni;HUSIN, Mohd Heikal;BAHARUDIN, Ahmad Suhaimi;KHALEEL, Muhammad
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.12
    • /
    • pp.749-759
    • /
    • 2020
  • Over the years, numerous Micro, Small, and Medium Enterprises (MSMEs) have been vigorously established across many countries. Even though the Internet of Things (IoT) has enabled companies to anchorage business returns, most Indonesian MSMEs are highly susceptible to failure and one of the main issues is the inability to manage their financials effectively. The literature on accounting points out that the success of MSMEs owing to the usage of cloud-based Accounting Information Systems (AIS) or Cloud Accounting (CA) could reduce the rate of failure by managing multiple accounting information at a low cost. Although many benefits exist, Indonesian MSMEs are not adopting these platforms in their daily business activities. This study investigates the factors that influence Indonesian MSMEs' intention to adopt CA. The study is directed by unstructured in-depth interviews with seven bestseller MSMEs where a thematic analysis technique was employed to identify them. The interview findings and prevailing literature on the influencing factors based on the TOE (technological, organizational, and environmental) framework to adopt CA in Indonesian MSMEs context are perceived benefits outweighing the cost, perceived compatibility, perceived complexity, owner-manager knowledge on accounting, organization size, competitive pressure, and informal network. The conceptual model further includes government intervention as a moderator in the model.