• Title/Summary/Keyword: IoT 결함

Search Result 645, Processing Time 0.033 seconds

AI-based Bridge Safety Monitoring System Model (AI 기반의 교량 안전 모니터링 시스템 모델)

  • Yeong-Hwi Ahn;Hyoung-Min Ham;Jong-Su Park;Dong-Hyun Kim
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.107-108
    • /
    • 2023
  • 본 논문에서는 교량의 변위를 IoT 장치를 이용하여 실시간 측정하고 추출된 데이터를 이용하여 교량의 이상징후를 AI 기반으로 진단 및 모니터링 하는 방법을 제안한다. AI 모델 학습 학습을 위해서 비정상 상태의 교량이 필요하지만, 실제 교량에 인위적으로 비정상 상태를 만들 수 없으므로, 탄성 받침을 이용하여 모의 교량을 제작하였다. 탄성 받침을 이용하여 제작에 반영 및 모의교량에 적합한 모의 차량도 제작하여 정상적 데이터와 비정상적 데이터를 수집하였다. 수집된 데이터를 전처리 과정을 통해 AI 분석을 통해 교량의 이상 징후를 진단 및 모니터링하였으며, 제안 모델을 실험한 결과 96.7%의 정확도가 도출되었다.

  • PDF

An Integrated Detection and Response System Using YARA and RNN Based on the Distributed Structure and Traffic Patterns of the Mozi Botnet (Mozi Botnet의 분산 구조와 트래픽 특징에 기반한 YARA와 RNN의 통합적인 탐지 및 대응 시스템)

  • Min-AH Kwon;Jung-Eun Lee;Yu-Rim Yoe;Sung-Hwan Jeon;Dong-Young Yoo
    • Annual Conference of KIPS
    • /
    • 2024.05a
    • /
    • pp.306-307
    • /
    • 2024
  • 이 연구에서는 IoT 보안을 강화하기 위해 Mozi 봇넷의 분산 구조와 트래픽 특징을 기반으로 YARA와 RNN을 통합한 탐지 및 대응 시스템을 제안한다. Mozi 봇넷의 분산 구조와 트래픽 특징을 분석한 후, 이를 기반으로 YARA 규칙과 RNN을 결합하여 악성 코드를 탐지하는 시스템을 설계한다. 실험 결과를 통해 이 시스템이 높은 정확도와 효율성을 보일 것으로 예상되며, 향후 연구에서는 다양한 딥러닝 기술을 활용하여 보다 효과적인 보안 대응 시스템을 개발할 것으로 기대된다.

The Effect of Empathy Value of Chinese Female University Students on Affection with Sustainable Fashion Products on Affection and Purchase Intention (중국 여대생의 지속가능한 패션제품에 대한 공감가치가 호감도와 구매의사에 미치는 영향)

  • Yi-Fei Wu;Young-Sook Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.3
    • /
    • pp.35-48
    • /
    • 2024
  • This study analyzed the value empathy of environmentally sustainable fashion products, encompassing environmental, economic, and social values, drawing from existing literature. We sought to verify the relationship between empathic value and the likability and purchase intention towards these products. To validate these relationships, we formulated research hypotheses and conducted an online survey targeting female college students residing in Guangzhou, Guangdong Province, China, who have experience purchasing environmentally sustainable fashion products. The survey was conducted from August 10th to August 20th, 2023, with a total distribution of 352 questionnaires. Among the collected responses, 313 valid responses were utilized for data analysis. The collected survey data underwent frequency analysis, exploratory factor analysis, reliability and validity analysis, correlation analysis, and multiple regression analysis using SPSS 26.0 software. The analysis yielded the following results. First, the empathy value of environmentally sustainable fashion products was classified into environmental protection values, economic values, and social values. Second, the economic and social values of environmentally sustainable fashion products were found to have a positive effect on favorability. Third, it was found that the environmental protection value and social value of environmentally sustainable fashion products had a positive effect on purchase intention. Fourth, it was found that Chinese female college students' favorability toward environmentally sustainable fashion products had a positive effect on their purchase intention. Based on these results, it is judged that companies need to emphasize the characteristics of products such as environmental protective value, economic value, and social value in order to promote consumers' purchase of environmentally sustainable fashion products. The purpose of this study is to help develop marketing strategies for environmentally sustainable fashion products by providing basic data, development ideas, and methods useful for environmentally sustainable fashion-related industries and companies by analyzing the relationship between empathy value, favorability, and purchase intention.

A Study on the Competitive Analysis of Digital Healthcare in Korea through Patent Analysis (특허분석을 통한 한국의 디지털 헬스케어 분야 경쟁력 분석연구)

  • Kim, Dosung;Cho, Sung Han;Lee, Jungsoo;KIM, Min Seok;Kim, Nam-Hyun
    • Journal of Digital Convergence
    • /
    • v.16 no.9
    • /
    • pp.229-237
    • /
    • 2018
  • As IoT and AI have recently developed, interest in digital healthcare is increasing. Therefore, this study aims to identify technology trends through a patent analysis on digital healthcare and present future promising areas by analyzing domestic and foreign technology competitiveness and keywords. The detailed technologies to be analyzed were designated as Health Information Measurement Technology, Healthcare Platform Technology and Healthcare Remote Service Technology, and 61,166 patents were analyzed to identify the patent trends of the world's major patent offices and major patent applications. In addition, the analysis of the technological competitiveness of each detailed technology and Korea's technological competitiveness based on its patent activity, the rate of major market securing, and the uses of the patents showed that Korea's technological competitiveness was lower than global technology. In addition, the key keyword analysis showed that the core promising areas of digital healthcare were expected to require a focused strategy for fostering health care platform technologies in Korea.

Extended TAM Analysis of a Residential DR Pilot Program (확장된 기술수용모델을 이용한 가정용 에너지 수요반응 프로그램 실증분석)

  • Jung, Euna;Lee, Kyungeun;Kim, Hwayoung;Jeong, Sora;Lee, Hyoseop;Suh, Bongwon;Rhee, Wonjong
    • Journal of the HCI Society of Korea
    • /
    • v.12 no.4
    • /
    • pp.65-73
    • /
    • 2017
  • While electricity demand is generally increasing, stably controlling supply is becoming a serious challenge because renewable energies are becoming popular and often their productions are dependent on the weather. The 'demand response' programs can be used to complement the problems of renewable energies, and therefore their role is becoming increasingly important. This study provides an analysis of a demand response pilot that was conducted in Korea. The study first focused on questionnaire surveys and in-depth interviews, and the data was used to perform a Technology Acceptance Model (TAM) analysis. The goal of the pilot was to have the residential users reduce their power consumptions when an energy reduction mission is issued during peak load hours. The experimental subjects consisted of two groups with different characteristics. Subjects in group A obtained smart meters as an optional function of IoT platform service provided by a mobile service company, and received a charge deduction as their compensation. Subjects in group B either voluntarily purchased smart meters as individuals or received them by participating in an energy self-sufficient village program that was run by a local government, and were entitled to a donation as their compensation. With the analysis, group A was found to fit the extended technology acceptance model that includes perceived playfulness in addition to perceived ease of use and perceived usefulness. On the contrary, group B failed to fit the model well, but perceived usefulness was found to be relatively more important compared to group A. The results indicate that the residential energy groups' behavior changes are dependent on each group's characteristics, and group-specific DR design should be considered to improve the effectiveness of DR.

Performance Analysis of Peer Aware Communications with CSMA/CA Based on Overhearing (Overhearing을 적용한 CSMA/CA 기반 대상인식통신 성능 분석)

  • Lee, Jewon;Ahn, Jae Min;Lee, Keunhyung;Park, Tae-Joon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.5
    • /
    • pp.251-259
    • /
    • 2014
  • In this paper, we propose Low Energy Service Discovery (LESD) protocol for common discovery mode of IEEE 802.15.8 Peer Aware Communications (PAC). In order to minimize power consumption, Basic Repetition Block (BRB) is defined. Device is able to select operating mode and synchronize other devices through it. Proposed MAC procedure is Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) based on overhearing technique. Even if device has not been received response signal since transmitted request signal, it is able to discover other devices of same group through the overhearing technique. IEEE 802.15.8 PAC has required that performances of common discovery mode are presented about discovered devices during the simulation time, discovery latency and average power consumption. By considering the number of devices per group and channel environment, two scenarios are evaluated through system level simulation and the simulation results of proposed scheme are compared with CSMA/CA in same simulation conditions. As a result, proposed scheme is able to get high energy efficiency of devices as well as increase the number of discovered devices during simulation time when the longer the number of devices is distributed over a limited area.

The study on the diagnosis and measurement of post-information society by ANP (ANP를 활용한 후기정보사회의 수준진단과 측정에 관한 연구)

  • Song, Young-Jo;Kwak, Jeong-Ho
    • Informatization Policy
    • /
    • v.23 no.2
    • /
    • pp.73-97
    • /
    • 2016
  • Social changes due to ICT like Big Data, IoT, Cloud and Mobile is progressing rapidly. Now, we get out of the old-fashioned frame was measured at the level of the information society through the introduction of PC, Internet speed and Internet subscribers etc and there is a need for a new type of diagnostic information society framework. This study is the study for the framework established to diagnose and measure post-information society. The framework and indicators were chosen in accordance with the technological society coevolution theory and information society-related indicators presented from authoritative international organizations. Empirical results utilizing the indicators and framework developed in this study were as follows: First, the three sectors, six clusters (items), 25 nodes (indicators) that make up the information society showed that all strongly connected. Second, it was diagnosed as information society development (50.34%), technology-based expansion (25.03%) and ICT effect (24.63%) through a network analysis (ANP) for the measurement of importance of the information society. Third, the result of calculating the relative importance of the cluster and nodes showed us (1)social development potential (26.04%), (2)competitiveness (15.9%), (3)ICT literacy (15.5%) (4) (social)capital (24.3 %), (5)ICT acceptance(9.54%), (6)quality of life(8.7%). Consequently, We should take into account the effect of the economy and quality of life beyond ICT infrastructure-centric when we measure the post-information society. By applying the weighting we should performs a comparison between countries and we should diagnose the level of Korea and provide policy implications for the preparation of post-information society.

Evaluation of Distributed Intrusion Detection System Based on MongoDB (MongoDB 기반의 분산 침입탐지시스템 성능 평가)

  • Han, HyoJoon;Kim, HyukHo;Kim, Yangwoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.12
    • /
    • pp.287-296
    • /
    • 2019
  • Due to the development and increased usage of Internet services such as IoT and cloud computing, a large number of packets are being generated on the Internet. In order to create a safe Internet environment, malicious data that may exist among these packets must be processed and detected quickly. In this paper, we apply MongoDB, which is specialized for unstructured data analysis and big data processing, to intrusion detection system for rapid processing of big data security events. In addition, building the intrusion detection system(IDS) using some of the private cloud resources which is the target of protection, elastic and dynamic reconfiguration of the IDS is made possible as the number of security events increase or decrease. In order to evaluate the performance of MongoDB - based IDS proposed in this paper, we constructed prototype systems of IDS based on MongoDB as well as existing relational database, and compared their performance. Moreover, the number of virtual machine has been increased to find out the performance change as the IDS is distributed. As a result, it is shown that the performance is improved as the number of virtual machine is increased to make IDS distributed in MongoDB environment but keeping the overall system performance unchanged. The security event input rate based on distributed MongoDB was faster as much as 60%, and distributed MongoDB-based intrusion detection rate was faster up to 100% comparing to the IDS based on relational database.

A Study on the Ransomware Detection System Based on User Requirements Analysis for Data Restoration (데이터 복원이 가능한 사용자 요구사항 분석기반 랜섬웨어 탐지 시스템에 관한 연구)

  • Ko, Yong-Sun;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.4
    • /
    • pp.50-55
    • /
    • 2019
  • Recently Ransomware attacks are continuously increasing, and new Ransomware, which is difficult to detect just with a basic vaccine, continuously has its upward trend. Various solutions for Ransomware have been developed and applied. However, due to the disadvantages and limitations of existing solutions, damage caused by Ransomware has not been reduced. Ransomware is attacking various platforms no matter what platform it is, such as Windows, Linux, servers, IoT devices, and block chains. However, most existing solutions for Ransomware are difficult to apply to various platforms, and there is a limit that they are dependent on only some specific platforms while operating. This study analyzes the problems of existing Ransomware detection solutions and proposes the onboard module based Ransomware detection system; after the system defines the function of necessary elements through analyzing requirements that can actually reduce the damage caused by the Ransomware from the viewpoint of users, it supports various OS without pre-installation and is able to restore data even after being infected. We checked the feasibility of each function of the proposed system through the analysis of the existing technology and verified the suitability of the proposed techniques to meet the user's requirements through the questionnaire survey of a total of 264 users of personal and corporate PC users. As a result of statistical analysis of the questionnaire results, it was found that the score of intent to introduce the system was at 6.3 or more which appeared to be good, and the score of intent to change from existing solution to the proposed system was at 6.0 which appeared to be very high.

Frequent Origin-Destination Sequence Pattern Analysis from Taxi Trajectories (택시 기종점 빈번 순차 패턴 분석)

  • Lee, Tae Young;Jeon, Seung Bae;Jeong, Myeong Hun;Choi, Yun Woong
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.39 no.3
    • /
    • pp.461-467
    • /
    • 2019
  • Advances in location-aware and IoT (Internet of Things) technology increase the rapid generation of massive movement data. Knowledge discovery from massive movement data helps us to understand the urban flow and traffic management. This paper proposes a method to analyze frequent origin-destination sequence patterns from irregular spatiotemporal taxi pick-up locations. The proposed method starts by conducting cluster analysis and then run a frequent sequence pattern analysis based on identified clusters as a base unit. The experimental data is Seoul taxi trajectory data between 7 a.m. and 9 a.m. during one week. The experimental results present that significant frequent sequence patterns occur within Gangnam. The significant frequent sequence patterns of different regions are identified between Gangnam and Seoul City Hall area. Further, this study uses administrative boundaries as a base unit. The results based on administrative boundaries fails to detect the frequent sequence patterns between different regions. The proposed method can be applied to decrease not only taxis' empty-loaded rate, but also improve urban flow management.