• Title/Summary/Keyword: IoT 결함

Search Result 645, Processing Time 0.025 seconds

Classification of Environmental Industry and Technology Competitiveness Evaluation (환경산업기술 분류체계 및 기술 경쟁력 평가)

  • Han, Daegun;Bae, Young Hye;Kim, Tae-Yong;Jung, Jaewon;Lee, Choongke;Kim, Hung Soo
    • Journal of Wetlands Research
    • /
    • v.22 no.4
    • /
    • pp.245-256
    • /
    • 2020
  • The purpose of this study is to evaluate the technological competitiveness of the environmental industry with developed countries in order to establish an international market expansion strategy of the Korean environmental industry and technology. In order to evaluate the competitiveness of the environmental industry and technology, core technologies were classified by the environmental industry sectors based on the classification system of the domestic and international environmental industry and technology. After developing the evaluation index data, the Delphi analysis, journal and patent analysis, as well as the export and import analysis were carried out and the standardization analysis was performed on the index data. Moreover, the weights of each evaluation index were calculated using the AHP(Analytic Hierarchy Process) method and the evaluation results of competitiveness of the environmental industry and technology in Korea, the United States, the United Kingdom, Germany, and France were derived. As a result of the evaluation, the United States was rated with the highest technological competitiveness in all the environmental industry sectors, while Korea got the lowest technological competitiveness rating compared to the 4 developed countries. In particular, Korea got the lowest level of technological competitiveness in the sector of multi-media environmental management and development for a sustainable social system. Therefore, in order for the Korean environmental industry and technology to enter the global advanced market, it is necessary to strengthen the competitiveness through the development of the fourth environmental industry based on IoT(Internet of Things), cloud, big data, mobile, and AI(Artificial Intelligence), which are currently the country's domestic strengths.

A Study on the Improvement of Fire Alarm System in Special Buildings Using Beacons in Edge Computing Environment (에지 컴퓨팅 환경에서 비콘을 활용한 특수건물 화재 경보 시스템 개선 방안 연구)

  • Lee, Tae Gyu;Choi, Kyeong Seo;Shin, Youn Soon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.7
    • /
    • pp.217-224
    • /
    • 2022
  • Today, with the development of technology and industry, fire accidents in special buildings are increasing as special buildings increase. However, despite the rapid development of information and communication technology, human casualties are steadily occurring due to the underdeveloped and ineffective indoor fire alarm system. In this study, we confirmed that the existing indoor fire alarm system using acoustic alarm could not deliver a sufficiently large alarm to the in-room personnel. To improve this, we designed and implemented a fire alarm system using edge computing and beacons. The proposed improved fire alarm system consists of terminal sensor nodes, edge nodes, a user application, and a server. The terminal sensor nodes collect indoor environment data and send it to the edge node, and the edge node monitors whether a fire occurs through the transmitted sensor value. In addition, the edge node continuously generate beacon signals to collect information of smart devices with user applications installed within the signal range, store them in a server database, and send application push-type fire alarms to all in-room personnel based on the collected user information. As a result of conducting a signal valid range measurement experiment in a university building with dense lecture rooms, it was confirmed that device information was normally collected within the beacon signal range of the edge node and a fire alarm was quickly sent to specific users. Through this, it was confirmed that the "blind spot problem of the alarm" was solved by flexibly collecting information of visitors that changes time to time and sending the alarm to a smart device very adjacent to the people. In addition, through the analysis of the experimental results, a plan to effectively apply the proposed fire alarm system according to the characteristics of the indoor space was proposed.

LSTM-based Fire and Odor Prediction Model for Edge System (엣지 시스템을 위한 LSTM 기반 화재 및 악취 예측 모델)

  • Youn, Joosang;Lee, TaeJin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.2
    • /
    • pp.67-72
    • /
    • 2022
  • Recently, various intelligent application services using artificial intelligence are being actively developed. In particular, research on artificial intelligence-based real-time prediction services is being actively conducted in the manufacturing industry, and the demand for artificial intelligence services that can detect and predict fire and odors is very high. However, most of the existing detection and prediction systems do not predict the occurrence of fires and odors, but rather provide detection services after occurrence. This is because AI-based prediction service technology is not applied in existing systems. In addition, fire prediction, odor detection and odor level prediction services are services with ultra-low delay characteristics. Therefore, in order to provide ultra-low-latency prediction service, edge computing technology is combined with artificial intelligence models, so that faster inference results can be applied to the field faster than the cloud is being developed. Therefore, in this paper, we propose an LSTM algorithm-based learning model that can be used for fire prediction and odor detection/prediction, which are most required in the manufacturing industry. In addition, the proposed learning model is designed to be implemented in edge devices, and it is proposed to receive real-time sensor data from the IoT terminal and apply this data to the inference model to predict fire and odor conditions in real time. The proposed model evaluated the prediction accuracy of the learning model through three performance indicators, and the evaluation result showed an average performance of over 90%.

Application of Responsive Identity Design in Sejong City: Focusing on Minimalism (세종특별자치시 반응형 아이덴티티 디자인 적용: 미니멀리즘을 중심으로)

  • Cha, Hyun-Ji
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.11
    • /
    • pp.656-668
    • /
    • 2020
  • The Sejong City was launched in July 2012 and was initially focused on the relocation of central administrative agencies, but it has been changing from an administrative city to a fourth industrial city since 2019 to a smart city and the implementation of Korea's New Deal in 2020. Identity design needs to be reevaluated accordingly. In particular, the web environment is also calling for an optimized identity design due to rapid changes in information technology such as various wearables and the Internet of Things. As the number of responsive web sites where information and communication technologies can be developed and optimized screens can be viewed increased, identity was intuitively communicated to users and designs were applied to make them more distinct and empathetic to other cities. Prior to the study, we looked at prior studies on the changing times in the web environment and the reactive web, and analyzed the identity design of the reactive web and applied minimalism characteristics step by step. Based on this, we surveyed experts and non-experts on the proposed survey by applying minimalist characteristics (simple, repeatability, and spatiality) of reactive identity and found that it was easily and intuitively recognizable in a small web environment such as mobile. Therefore, we hope that Sejong City's identity will continue to be studied in various ways and efficient management so that identity can be established in accordance with the changes of the times.

A Study on Automatic Classification Technique of Malware Packing Type (악성코드 패킹유형 자동분류 기술 연구)

  • Kim, Su-jeong;Ha, Ji-hee;Lee, Tae-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1119-1127
    • /
    • 2018
  • Most of the cyber attacks are caused by malicious codes. The damage caused by cyber attacks are gradually expanded to IoT and CPS, which is not limited to cyberspace but a serious threat to real life. Accordingly, various malicious code analysis techniques have been appeared. Dynamic analysis have been widely used to easily identify the resulting malicious behavior, but are struggling with an increase in Anti-VM malware that is not working in VM environment detection. On the other hand, static analysis has difficulties in analysis due to various packing techniques. In this paper, we proposed malware classification techniques regardless of known packers or unknown packers through the proposed model. To do this, we designed a model of supervised learning and unsupervised learning for the features that can be used in the PE structure, and conducted the results verification through 98,000 samples. It is expected that accurate analysis will be possible through customized analysis technology for each class.

Consumers' preference about the attributes of 3rd generation device (3세대 디바이스의 속성별 소비자 선호 분석)

  • Jung, Jae-Young;Lee, Joo-Suk;Kwak, Seung-Jun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.703-710
    • /
    • 2017
  • Third-generation (3G) devicesare next-generation devices that allow the use of intelligent services and applications through the Internet of Things (IoT). As the market forexisting smart devices like smartphones and tablet PCs enters the stage of stagnation, the world is now focusing on 3G devices, parts, and services. This study is intended to measure the user's benefits from the various attributes of 3G devices by applying an economic valuation method. For this purpose, the conjoint analysis method was applied, which is one of the representative valuation methods. To apply conjoint analysis, the following attributes of 3G devicesare considered: mode of use, power efficiency, life care, and price. By applying the mixed logit model, the marginal willingness-to-pay(WTP) for each attribute was derived. The results are statistically significant. Respondents showed a high preference or complete flexibility in the mode of use attribute. And they were also found to have WTP for improvements in the life care attribute. The implications and quantitative results of this study are expected to be useful for policies and strategies in the 3G device market.

A Development of Fusion Processor Architecture for Efficient Main Memory Access in CPU-GPU Environment (CPU-GPU환경에서 효율적인 메인메모리 접근을 위한 융합 프로세서 구조 개발)

  • Park, Hyun-Moon;Kwon, Jin-San;Hwang, Tae-Ho;Kim, Dong-Sun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.2
    • /
    • pp.151-158
    • /
    • 2016
  • The HSA resolves an old problem with existing CPU and GPU architectures by allowing both units to directly access each other's memory pools via unified virtual memory. In a physically realized system, however, frequent data exchanges between CPU and GPU for a virtual memory block result bottlenecks and coherence request overheads. In this paper, we propose Fusion Processor Architecture for efficient access of main memory from both CPU and GPU. It consists of Job Manager, Re-mapper, and Pre-fetcher to control, organize, and distribute work loads and working areas for GPU cores. These components help on reducing memory exchanges between the two processors and improving overall efficiency by eliminating faulty page table requests. To verify proposed algorithm architectures, we develop an emulator based on QEMU, and compare several architectures such as CUDA(Compute Unified Device Architecture), OpenMP, OpenCL. As a result, Proposed fusion processor architectures show 198% faster than others by removing unnecessary memory copies and cache-miss overheads.

A Study on IoT and Cloud-based Real-time Bridge Height Measurement Service (사물인터넷과 클라우드 기반의 실시간 교량 높이 계측 서비스 연구)

  • Choi, Cha-Hwan;Cheon, Young-Man;Jeong, Seung-Hun;Tcha, Dek-Kie;Lee, Young-Jae
    • Journal of Cadastre & Land InformatiX
    • /
    • v.47 no.2
    • /
    • pp.145-157
    • /
    • 2017
  • Currently, the height of ships that can pass under Busan Harbor Bridge is limited to 60m or shorter, so that large-sized ships of 60m or taller cannot use Busan Harbor international passenger terminal. Accordingly, this study has developed a service which measures continuously the change of bridge height by water level changes and provides such in real-time for safe bridge passage of large-sized ships of 60m or taller. The measurement system comprised of high-precision laser distance measurement device, GPS sensor, optical module, and damping structure is used to measure the bridge height change according to tide level changes, and the measured information is provided in real-time through cloud-based mobile app. Also, in order to secure objective bridge height data for changes to height limits and navigation supports, the observation data was analyzed and forecast model was drawn. As a result, it became an objective evidence to revise the passage height rules of the Busan Port Bridge from 60 meters to 63 meters.

Analysis on Energy Consumption Required for Building DTLS Session Between Lightweight Devices in Internet of Things (사물인터넷에서 경량화 장치 간 DTLS 세션 설정 시 에너지 소비량 분석)

  • Kwon, Hyeokjin;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.8
    • /
    • pp.1588-1596
    • /
    • 2015
  • In the Internet of Things (IoT), resource-constrained devices such as sensors are capable of communicating and exchanging data over the Internet. The IETF standard group has specified an application protocol CoAP, which uses UDP as a transport protocol, allows such a lightweight device to transmit data. Also, the IETF recommended the DTLS binding for securing CoAP. However, additional features should be added to the DTLS protocol to resolve several problems such as packet loss, reordering, fragmentation and replay attack. Consequently, performance of DTLS is worse than TLS. It is highly required for lightweight devices powered by small battery to design and implement a security protocol in an energy efficient manner. This paper thus discusses about DTLS performance in the perspective of energy consumption. To analyze the performance, we implemented IEEE 802.15.4 based test network consisting of constrained sensor devices in the Cooja simulator. We measured energy consumptions required for each of DTLS client and server in the test network. This paper compares the energy consumption and amount of transmitted data of each flight of DTLS handshake, and the processing and receiving time. We present the analyzed results with regard to code size, cipher primitive and fragmentation as well.

Framing Effect of Energy Consumption Information on Consumers' Attitude (에너지 소비정보의 프레이밍이 소비자 태도에 미치는 효과)

  • Kim, Bora
    • Journal of Digital Convergence
    • /
    • v.15 no.5
    • /
    • pp.129-138
    • /
    • 2017
  • Faced with the era of the IoT (Internet of Things) and smart homes, this study aims to explore the type of information loaded on smart devices that can lead to consumer's efficient energy use. 105 Americans participated in the survey with eight different versions according to two energy consumption levels (Above or Below condition) by four information frames (Finance, security, environment, or health). It was found that frames can make significant differences in consumers' attitudes; (1) Those in the Below condition worried about environments more than those in the Above condition; (2) Finance-framed information in the Above condition was the least effective to increase consumers' energy saving motivation; (3) In the Below condition, those receiving finance and security framed information revealed more environmental concerns than those receiving other types of informations. This study can contribute to the field by providing with basic research findings that smart device developers can refer to in the future. Also, follow-up studies need to be conducted to examine effective messages for Korean energy consumers.