• Title/Summary/Keyword: IoT (internet of things)

Search Result 1,916, Processing Time 0.032 seconds

Development of User-customized Device Intelligent Character using IoT-based Lifelog data in Hyper-Connected Society (초연결사회에서 IoT 기반의 라이프로그 데이터를 활용한 사용자 맞춤형 디바이스 지능형 캐릭터 개발)

  • Seong, Ki Hun;Kim, Jung Woo;Sul, Sang Hun;Kang, Sung Pil;Choi, Jae Boong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.21-31
    • /
    • 2018
  • In Hyper-Connected Society, IoT-based Lifelog data is used throughout the Internet and is an important component of customized services that reflect user requirements. Also, Users are using social network services to easily express their interests and feelings, and various life log data are being accumulated. In this paper, Intelligent characters using IoT based lifelog data have been developed and qualitative/quantitative data are collected and analyzed in order to systematically grasp emotions of users. For this, qualitative data through the social network service used by the user and quantitative data through the wearable device are collected. The collected data is verified for reliability by comparison with the persona through esnography. In the future, more intelligent characters will be developed to collect more user life log data to ensure data reliability and reduce errors in the analysis process to provide personalized services.

Drone Force Deployment Optimization Algorithm For Efficient Military Drone Operations (효율적 군용 드론 작전 운영을 위한 Drone Force Deployment Optimization 알고리즘)

  • Song, Ju-Young;Jang, Hyeon-Deok;Chung, Jong-Moon
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.211-219
    • /
    • 2020
  • One of the major advancements of the Fourth Industrial Revolution is the use of Internet of Drones (IoD), which combines the Internet of Things (IoT) and drone technology. IoD technology is especially important for efficiently and economically operating C4ISR operations in actual battlefields supporting various combat situations. The purpose of this study is to solve the problems of limited battery capacity of drones and lack of budgeting criteria for military drone transcription, introduction, and operation. If the mission area is defined and corresponding multi-drone hovering check points and mission completion time limits are set, then an energy and time co-optimized scheduling and operation control scheme is needed. Because such a scheme does not exist, in this paper, a Drone Force Deployment Optimization (DFDO) scheme is proposed to help schedule multi-drone operation scheduling and networked based remote multi-drone control.

CNN-Based Hand Gesture Recognition for Wearable Applications (웨어러블 응용을 위한 CNN 기반 손 제스처 인식)

  • Moon, Hyeon-Chul;Yang, Anna;Kim, Jae-Gon
    • Journal of Broadcast Engineering
    • /
    • v.23 no.2
    • /
    • pp.246-252
    • /
    • 2018
  • Hand gestures are attracting attention as a NUI (Natural User Interface) of wearable devices such as smart glasses. Recently, to support efficient media consumption in IoT (Internet of Things) and wearable environments, the standardization of IoMT (Internet of Media Things) is in the progress in MPEG. In IoMT, it is assumed that hand gesture detection and recognition are performed on a separate device, and thus provides an interoperable interface between these modules. Meanwhile, deep learning based hand gesture recognition techniques have been recently actively studied to improve the recognition performance. In this paper, we propose a method of hand gesture recognition based on CNN (Convolutional Neural Network) for various applications such as media consumption in wearable devices which is one of the use cases of IoMT. The proposed method detects hand contour from stereo images acquisitioned by smart glasses using depth information and color information, constructs data sets to learn CNN, and then recognizes gestures from input hand contour images. Experimental results show that the proposed method achieves the average 95% hand gesture recognition rate.

A Study on Accounting Information and Stock Price of IoT-related Companies after COVID-19 (코로나-19 이후 IoT 관련 기업의 회계정보와 주가에 관한 연구)

  • Lee, Sangho;Cho, Kwangmoon
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.1
    • /
    • pp.1-10
    • /
    • 2022
  • The purpose of this study is to establish a foundation for IoT-related industries to secure financial soundness and to dominate the global market after COVID-19. Through this study, the quantitative management status of IoT-related companies was checked. It also was attempted to preemptively prepare for corporate insolvency by examining the relationship between financial ratios in accordance with stock price fluctuations and designation of management items. This study selected 502 companies that were listed on the KOSPI and KOSDAQ in the stock market from 2019 to 2020. For statistical analysis, multiple regression analysis, difference analysis and logistic regression analysis were performed. The research results are as follows. First, it was found that the impact of IoT company accounting information on stock prices differs depending on before and after COVID-19. Second, it was found that there is a difference in the closing stock prices of IoT companies before and after COVID-19. Third, it was found that financial ratios according to stock price fluctuations exist differently after COVID-19. Fourth, it was found that the financial ratios according to the designation of management items after COVID-19 exist differently. Through these studies, some suggestions were made to secure the financial soundness of IoT companies and to lay the groundwork for leaping into the global market after COVID-19. Through the results of this study, it is expected that it will lead the growth of IoT companies and contribute to growth as a decacorn company of the future that can guarantee financial soundness in the changing financial market.

Analysis on the Security threat factors of the Internet of Things (사물 인터넷의 보안 위협 요인들에 대한 분석)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.47-53
    • /
    • 2015
  • Recently, the Internet of Things is an important technology with a Cloud computing services and a Big data in the IT fields. and The Internet of Things is widely used in various industries. This trend may be referred to as the emergence of significant based technologies for realizing a ubiquitous times. But the security problems of Internet of things are expected to increase with being realized in a variety of industries. and it will be have to provide a corresponding technology to the security threat for this. Therefore, this paper will be analyzed to the security threats of the Internet of Things by the cases. Thereby this is expected to be utilized as a basis for the countermeasure of Internet of Things in a future.

User Value Factors of Internet of Things(IoT) Service (사물인터넷 서비스의 사용자 가치 요인)

  • Park, Joo Hyun;Ryoo, Han Young
    • Journal of the HCI Society of Korea
    • /
    • v.11 no.2
    • /
    • pp.23-30
    • /
    • 2016
  • The Internet of Things(IoT) market is growing exponentially as a core growth engine of the future. Major companies of the world are competitively providing the IoT services to dominate the IoT market first and create ecosystem around their companies. In order to establish the IoT services and contribute to the related industry, they will need to make efforts to provide the IoT services that the users desire, and which the users can have new experiences with. Thus, we attempted to draw out the user value factors to help successful IoT service development. For this purpose, we explored the meaning and concept of IoT, drew out a trend matrix of IoT through the literature review related to IoT and conducted a survey through the user values established by the literature related to IoT and the focus group interviews. As a result, we identified thirteen user value factors of the IoT services, which are manageability, relationship, familiarity, expandability, simplicity, entertainment, safety, economic feasibility, compensation, automation, rapidity, informativity and environment-friendliness. This study is expected to be used as a basic material in understanding the IoT services and as standards or assessment items to develop the IoT services that the users want.

Multi-blockchain model ensures scalability and reliability based on intelligent Internet of Things (지능형 사물인터넷 기반의 확장성과 신뢰성을 보장하는 다중 블록체인 모델)

  • Jeong, Yoon-Su;Kim, Yong-Tae
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.3
    • /
    • pp.140-146
    • /
    • 2021
  • As the environment using intelligent IoT devices increases, various studies are underway to ensure the integrity of information sent and received from intelligent IoT devices. However, all IoT information generated in heterogeneous environments is not fully provided with reliable protocols and services. In this paper, we propose an intelligent-based multi-blockchain model that can extract only critical information among various information processed by intelligent IoT devices. In the proposed model, blockchain is used to ensure the integrity of IoT information sent and received from IoT devices. The proposed model uses the correlation index of the collected information to trust a large number of IoT information to extract only the information with a high correlation index and bind it with blockchain. This is because the collected information can be extended to the n-tier structure as well as guaranteed reliability. Furthermore, since the proposed model can give weight information to the collection information based on blockchain, similar information can be selected (or bound) according to priority. The proposed model is able to extend the collection information to the n-layer structure while maintaining the data processing cost processed in real time regardless of the number of IoT devices.

A Study on Vulnerability Analysis and Memory Forensics of ESP32

  • Jiyeon Baek;Jiwon Jang;Seongmin Kim
    • Journal of Internet Computing and Services
    • /
    • v.25 no.3
    • /
    • pp.1-8
    • /
    • 2024
  • As the Internet of Things (IoT) has gained significant prominence in our daily lives, most IoT devices rely on over-the-air technology to automatically update firmware or software remotely via the network connection to relieve the burden of manual updates by users. And preserving security for OTA interface is one of the main requirements to defend against potential threats. This paper presents a simulation of an attack scenario on the commoditized System-on-a-chip, ESP32 chip, utilized for drones during their OTA update process. We demonstrate three types of attacks, WiFi cracking, ARP spoofing, and TCP SYN flooding techniques and postpone the OTA update procedure on an ESP32 Drone. As in this scenario, unpatched IoT devices can be vulnerable to a variety of potential threats. Additionally, we review the chip to obtain traces of attacks from a forensics perspective and acquire memory forensic artifacts to indicate the SYN flooding attack.

Prototype Design of Mass Distributed Storage System based on PC using Ceph for SMB

  • Cha, ByungRae;Kim, Yongil
    • Smart Media Journal
    • /
    • v.4 no.3
    • /
    • pp.62-67
    • /
    • 2015
  • The trend keywords in ICT sector will be Big Data, Internet of Things, and Cloud Computing. The rear end to support those techniques requires a large-capacity storage technology of low-cost. Therefore, we proposed the prototype of low-cost and mass distributed storage system based on PC using open-source Ceph FS for SMB.

Development of a Fault-tolerant IoT System Based on the EVENODD Method (EVENODD 방법 기반 결함허용 사물인터넷 시스템 개발)

  • Woo, Min-Woo;Park, KeeHyun;An, Donghyeok
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.3
    • /
    • pp.263-272
    • /
    • 2017
  • The concept of Internet of Things (IoT) has been increasingly popular these days, and its areas of application have been broadened. However, if the data stored in an IoT system is damaged and cannot be recovered, our society would suffer considerable damages and chaos. Thus far, most of the studies on fault-tolerance have been focused on computer systems, and there has not been much research on fault-tolerance for IoT systems. In this study, therefore, a fault-tolerance method in IoT environments is proposed. In other words, based on the EVENODD method, one of the traditional fault-tolerance methods, a fault-tolerance storage and recovery method for the data stored in the IoT server is proposed, and the method is implemented on an oneM2M IoT system. The fault-tolerance method proposed in this paper consists of two phases - fault-tolerant data storage and recovery. In the fault-tolerant data storage phase, some F-T gateways are designated and fault-tolerant data are distributed in the F-T gateways' storage using the EVENODD method. In the fault-tolerant recovery phase, the IoT server initiates the recovery procedure after it receives fault-tolerant data from non-faulty F-T gateways. In other words, an EVENODD array is reconstructed and received data are merged to obtain the original data.