• Title/Summary/Keyword: IoT (internet of things)

Search Result 1,916, Processing Time 0.029 seconds

The Fourth Industrial Revolution and Changes of Pharmacists' Roles in the Future (제4차 산업혁명과 미래 약사 직능의 변화)

  • Kim, Yookyeong;Yoon, Jeong-Hyun
    • Korean Journal of Clinical Pharmacy
    • /
    • v.30 no.4
    • /
    • pp.217-225
    • /
    • 2020
  • The fourth industrial revolution, with its characteristics of "hyper-connectivity", "hyper-intelligence" and "automation", is a hot topic worldwide. It will fundamentally change industry, economy, and business models through technological innovations, such as big data, cloud computing, Internet of Things (IoT), artificial intelligence (AI), and 3D printing. In particular, the development of highly advanced information technology (IT) and AI is expected to replace human roles, thereby changing employment and occupation prospects in the future. Based on this, some predict that the profession of the pharmacist will soon disappear. To counter this, pharmacists' attention and efforts are required to seek innovative transformations in their functions by responding sensitively and promptly to changes of the fourth industrial revolution. It is also necessary to recognize the new roles of pharmacists and to develop the competencies to perform them. The fourth industrial revolution is an inevitable change of the times. At this time, we should take comprehensive and open perspectives on how the future society will change economically, culturally, and socially, and use it as an opportunity to shape the new future of pharmacists.

A Deep Learning Approach for Identifying User Interest from Targeted Advertising

  • Kim, Wonkyung;Lee, Kukheon;Lee, Sangjin;Jeong, Doowon
    • Journal of Information Processing Systems
    • /
    • v.18 no.2
    • /
    • pp.245-257
    • /
    • 2022
  • In the Internet of Things (IoT) era, the types of devices used by one user are becoming more diverse and the number of devices is also increasing. However, a forensic investigator is restricted to exploit or collect all the user's devices; there are legal issues (e.g., privacy, jurisdiction) and technical issues (e.g., computing resources, the increase in storage capacity). Therefore, in the digital forensics field, it has been a challenge to acquire information that remains on the devices that could not be collected, by analyzing the seized devices. In this study, we focus on the fact that multiple devices share data through account synchronization of the online platform. We propose a novel way of identifying the user's interest through analyzing the remnants of targeted advertising which is provided based on the visited websites or search terms of logged-in users. We introduce a detailed methodology to pick out the targeted advertising from cache data and infer the user's interest using deep learning. In this process, an improved learning model considering the unique characteristics of advertisement is implemented. The experimental result demonstrates that the proposed method can effectively identify the user interest even though only one device is examined.

Cutting-edge Piezo/Triboelectric-based Wearable Physical Sensor Platforms

  • Park, Jiwon;Shin, Joonchul;Hur, Sunghoon;Kang, Chong-Yun;Cho, Kyung-Hoon;Song, Hyun-Cheol
    • Journal of Sensor Science and Technology
    • /
    • v.31 no.5
    • /
    • pp.301-306
    • /
    • 2022
  • With the recent widespread implementation of Internet of Things (IoT) technology driven by Industry 4.0, self-powered sensors for wearable and implantable systems are increasingly gaining attention. Piezoelectric nanogenerators (PENGs) and triboelectric nanogenerators (TENGs), which convert biomechanical energy into electrical energy, can be considered as efficient self-powered sensor platforms. These are energy harvesters that are used as low-power energy sources. However, they can also be used as sensors when an output signal is used to sense any mechanical stimuli. For sensors, collecting high-quality data is important. However, the accuracy of sensing for practical applications is equally important. This paper provides a brief review of the performance advanced by the materials and structures of the latest PENG/TENG-based wearable sensors and intelligent applications applied using artificial intelligence (AI)

A hybrid deep neural network compression approach enabling edge intelligence for data anomaly detection in smart structural health monitoring systems

  • Tarutal Ghosh Mondal;Jau-Yu Chou;Yuguang Fu;Jianxiao Mao
    • Smart Structures and Systems
    • /
    • v.32 no.3
    • /
    • pp.179-193
    • /
    • 2023
  • This study explores an alternative to the existing centralized process for data anomaly detection in modern Internet of Things (IoT)-based structural health monitoring (SHM) systems. An edge intelligence framework is proposed for the early detection and classification of various data anomalies facilitating quality enhancement of acquired data before transmitting to a central system. State-of-the-art deep neural network pruning techniques are investigated and compared aiming to significantly reduce the network size so that it can run efficiently on resource-constrained edge devices such as wireless smart sensors. Further, depthwise separable convolution (DSC) is invoked, the integration of which with advanced structural pruning methods exhibited superior compression capability. Last but not least, quantization-aware training (QAT) is adopted for faster processing and lower memory and power consumption. The proposed edge intelligence framework will eventually lead to reduced network overload and latency. This will enable intelligent self-adaptation strategies to be employed to timely deal with a faulty sensor, minimizing the wasteful use of power, memory, and other resources in wireless smart sensors, increasing efficiency, and reducing maintenance costs for modern smart SHM systems. This study presents a theoretical foundation for the proposed framework, the validation of which through actual field trials is a scope for future work.

Smart Aquaculture Industrialization Model and Technology Development Direction Considering Technology, Economy and Environment (기술·경제·환경적 측면에서의 스마트양식 산업화 모델과 기술개발 방향)

  • Donggil Lee;Hae Seung Jeong;Junhyuk Seo;Hyeong Su Kim;Jeonghwan Park
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.56 no.6
    • /
    • pp.759-765
    • /
    • 2023
  • Owing to the increase in the elderly population at aquaculture farm and decrease in the number of aquaculture farmers, the need to improve aquaculture production system is increasing. In addition, asvirtual interactions become new normal after COVID-19 pandemic, the speed at which science and technology such as the internet of things (IoT), information and communications technology (ICT), and artificial intelligence (AI) are applied to each field is accelerating. Efforts are being made to enhance the quality of life of aquaculture farmer and competitiveness of the aquaculture industry by incorporating digital technology. This study analyzed national and global aquaculture technology development and policy trends, smart aquaculture terminology application scenarios, and prior research cases to propose smart aquaculture industrialization models and technology development directions considering technology, economy, and environment. This study can also provide valuable reference for promoting smart and efficient development of aquaculture.

A Design and Implementation of 32-bit Pipeline RISC-V Processor Supporting Compressed Instructions for Memory Efficiency (메모리 효율성을 높이기 위한 압축 명령어를 지원하는 32-비트 파이프라인 RISC-V프로세서 설계 및 구현)

  • Hyeonjin Sim;Yongwoo Kim
    • Journal of the Semiconductor & Display Technology
    • /
    • v.23 no.3
    • /
    • pp.7-13
    • /
    • 2024
  • With the development of technologies such as the Internet of Things (IoT) and autonomous vehicles, research is being conducted on embedded processors that meet high performance, low power, and memory efficiency. The "C" expansion of the RISC-V processor is required to increase memory efficiency. In this paper, we propose an RV32IC processor and compare the benchmark performance score of the RV32I processor with the code size generated by the GCC compiler. In addition, we propose memory access and combination methods to support 16-bit compression commands, and command extension methods. The proposed RV32IC processor satisfies the maximum operating frequency of 50 MHz on the Artix-7 FPGA. The performance was checked using the benchmark programs of the Dhrystone and Coremark, and the code sizes of the RV32I and RV32IC generated by the GCC compiler were compared. The proposed processor RV32IC decreased DMIPS/MHz by 2.72% and Coremark/MHz by 0.61% compared to RV32I, but Coremark's code size decreased by 14.93%.

  • PDF

Multi-Objective Optimization for a Reliable Localization Scheme in Wireless Sensor Networks

  • Shahzad, Farrukh;Sheltami, Tarek R.;Shakshuki, Elhadi M.
    • Journal of Communications and Networks
    • /
    • v.18 no.5
    • /
    • pp.796-805
    • /
    • 2016
  • In many wireless sensor network (WSN) applications, the information transmitted by an individual entity or node is of limited use without the knowledge of its location. Research in node localization is mostly geared towards multi-hop range-free localization algorithms to achieve accuracy by minimizing localization errors between the node's actual and estimated position. The existing localization algorithms are focused on improving localization accuracy without considering efficiency in terms of energy costs and algorithm convergence time. In this work, we show that our proposed localization scheme, called DV-maxHop, can achieve good accuracy and efficiency. We formulate the multi-objective optimization functions to minimize localization errors as well as the number of transmission during localization phase. We evaluate the performance of our scheme using extensive simulation on several anisotropic and isotropic topologies. Our scheme can achieve dual objective of accuracy and efficiency for various scenarios. Furthermore, the recently proposed algorithms require random uniform distribution of anchors. We also utilized our proposed scheme to compare and study some practical anchor distribution schemes.

A Study on the Signal Processing Techiques for Pattern Classification of Electrical Loads (전기부하 패턴분류를 위한 신호처리 기법에 관한 연구)

  • Lim, Young Bae;Kim, Dong Woo;Jin, Sangmin;Cho, Seongwon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.26 no.5
    • /
    • pp.409-415
    • /
    • 2016
  • Recently several techniques for disaster prevention based on IoT(Internet of Things) are being developed. In this paper, a new smart pattern classification method for electric loads is proposed. CT(Current Transformer) data are extracted from electric loads, and then the sampled CT data are converted using FFT and MFCC. FFT and FMCC data are used for the input data of neural networks. Experiments were conducted using FFT and MFCC data for 7 kinds of electric loads. Experiments results indicate the superiority of MFCC in comparison to FFT.

A Case Study of the Impact of a Cybersecurity Breach on a Smart Grid Based on an AMI Attack Scenario (AMI 공격 시나리오에 기반한 스마트그리드 보안피해비용 산정 사례)

  • Jun, Hyo-Jung;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.809-820
    • /
    • 2016
  • The smart grid, a new open platform, is a core application for facilitating a creative economy in the era of the Internet of Things (IoT). Advanced Metering Infrastructure (AMI) is one of the components of the smart grid and a two-way communications infrastructure between the main utility operator and customer. The smart meter records consumption of electrical energy and communicates that information back to the utility for monitoring and billing. This paper investigates the impact of a cybersecurity attack on the smart meter. We analyze the cost to the smart grid in the case of a smart meter attack by authorized users based on a high risk scenario from NESCOR. Our findings could be used by policy makers and utility operators to create investment decision-making models for smart grid security.

Neural Network and Cloud Computing for Predicting ECG Waves from PPG Readings

  • Kosasih, David Ishak;Lee, Byung-Gook;Lim, Hyotaek
    • Journal of Multimedia Information System
    • /
    • v.9 no.1
    • /
    • pp.11-20
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.