• Title/Summary/Keyword: IoT 결함

Search Result 645, Processing Time 0.034 seconds

PMS/EMS IoT Platform for ESS Operations (ESS 운영을 위한 PMS/EMS IoT 플랫폼)

  • Kim, Ju-Young;Kim, Seong-Yoon
    • Proceedings of the KIPE Conference
    • /
    • 2019.11a
    • /
    • pp.234-235
    • /
    • 2019
  • 최근 국내 ESS 시장은 정부의 강력한 지원에 힘입어 민간의 투자, 운영 수요가 크게 늘어나고 있으며, 연평균 27% 성장하여 20년 민간 544MWh, 한전 320MWh로 총 864MWh 확대 전망이다. 특히, ESS는 태양광 연계를 통한 매전수익, 피크컷 기능을 통한 전력요금 절감, 독립전원 공급 등 다양한 분야에 활용되고 있다. ESS의 활용이 다양해짐에 따라 PMS/EMS를 통한 PCS제어 및 모니터링 기능, 피크컷 기능이 중요해지고 있다. 이렇듯 사이트 특성에 따른 커스터마이징이 편리한 PMS/EMS IoT 플랫폼 구축이 필요하다. 따라서 본 논문에서는 사이트 특성에 따른 커스터마이징이 편리한 PMS/EMS IoT 플랫폼을 설계하고 개발하였다. 그 결과 운전 스케줄링, 실시간 모니터링, 피크컷, 수익분석, 독립전원 등의 기술이 적용 가능한 PMS/EMS IoT 플랫폼을 통해 최적의 운영으로 수익을 극대화할 것으로 기대한다.

  • PDF

HTML5 based-Visualization Component Building Regression Analysis Chart from Distributed IoT Sensors (HTML5를 활용한 IoT 센서 데이터의 회귀분석 차트)

  • Park, Moo-Young;Kim, Sung-Ki
    • Annual Conference of KIPS
    • /
    • 2015.10a
    • /
    • pp.1800-1803
    • /
    • 2015
  • 기존의 센서가 컴퓨팅과 통신기능을 갖추게 되면서, 분산된 센서가 통신망을 통해 전달하는 현장의 물리량 변화를 직관적으로 판단할 수 있게 돕는 재사용 가능한 데이터 시각화 컴포넌트의 수요가 높다. 본 연구에서는 라즈베리파이를 IoT센서로 보고, 분산된 복수의 IoT센서들로부터 현장의 온도 값을 웹 서버에서 모아, 사용자가 클라이언트 단말을 통해 현장의 온도변화 상황을 직관성 있게 판단할 수 있도록 돕는 회귀분석 시각화컴포넌트를 개발하였다. 본 연구에서는 이종분산의 IoT 환경에서 다양한 브라우저를 지원할 수 있도록 Non-ActiveX 기반 데이터 시각화 컴포넌트 개발을 논한다. 본 연구의 결과는 단일의 온도센서가 보고하는 온도값을 현장의 온도값이라고 대표할 수 없는 항온항습 시설의 온도 감시제어 응용에서 본 연구 결과가 널리 활용될 것으로 본다.

Implementation of a Component for Visualization of Proximity using IoT Ultrasonic Sensors (IoT 초음파 센서를 이용한 인접거리의 시각화 컴포넌트 구현)

  • Kim, Jun-Young;Kim, Sung-Ki
    • Annual Conference of KIPS
    • /
    • 2015.10a
    • /
    • pp.1830-1833
    • /
    • 2015
  • 모든 사물이 통신으로 연결되는 사물인터넷(IoT) 시대가 도래 하면서, IoT센서를 통한 데이터 시각화에 대한 요구가 증가 하고 있다. 본 연구에서는 전문적인 지식이 없는 사람도 쉽게 방대한 센서 데이터를 저장, 수집 후 쉽게 데이터 시각화할 수 있는 시스템을 구성 하였다. 본 논문에서는 데이터 시각화를 접근성이 용이한 웹 브라우저에서 구현하였고, 웹 브라우저에서 이를 구현하기 위해서는 웹의 다양한 비표준 플러그인(Flash, SilverLight, ActiveX 등)을 사용해야하는 불편함있다. 이를 개선하기 위해 HTML5, CSS, Javascript를 사용해 플러그인을 설치하지 않고 초음파 센서를 사용한 데이터의 실시간 차트 구현을 하였다. 본연구의 결과는 향후, 초음파 센서데이터를 활용한 전후방 장애물 감지 센서, 도난 경보 시스템, IoT센서 데이터 시각화 서비스 등에 활용 될 것으로 기대된다.

A Study on CoAP Protocol Based on Resource Directory for Hyper Connectivity IoT in Mobile Environments (초연결 사물 네트워크를 위한 모바일 환경에서 자원 디렉토리 기반의 CoAP 프로토콜에 관한 연구)

  • Hang, Lei;Jin, Wenquan;Kim, Do-Hyeun
    • Annual Conference of KIPS
    • /
    • 2015.10a
    • /
    • pp.566-568
    • /
    • 2015
  • 최근 IETF(Internet Engineering Task Force) CoRE(Constrained RESTful Environment) 워킹그룹에서 IoT 프로토콜로 CoAP(Constrained Application Protocol)을 표준으로 채택하였다. 본 논문에서는 모바일 환경에서 CoAP 프로토콜을 이용한 자원 디렉토리 기반의 IoT 노드와 스마트폰 연결 구조를 제시한다. 스마트폰과 IoT(Internet of Things) 노드 사이에 자원 디렉토리를 두고, 이를 통해 스마트폰은 IoT 노드를 검색하고 상황 정보를 습득할 수 있도록 하고 있다.

Mobile-based Big Data Processing and Monitoring Technology in IoT Environment (IoT 환경에서 모바일 기반 빅데이터 처리 및 모니터링 기술)

  • Lee, Seung-Hae;Kim, Ju-Ho;Shin, Dong-Youn;Shin, Dong-Jin;Park, Jeong-Min;Kim, Jeong-Joon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.1-9
    • /
    • 2018
  • In the fourth industrial revolution, which has become an issue now, we have been able to receive instant analysis results faster than the existing slow speed through various Big Data technologies, and to conduct real-time monitoring on mobile and web. First, various irregular sensor Data is generated using IoT device, Raspberry Pi. Sensor Data is collected in real time, and the collected data is distributed and stored using several nodes. Then, the stored Sensor Data is processed and refined. Visualize and output the analysis result after analysis. By using these methods, we can train the human resources required for Big Data and mobile related fields using IoT, and process data efficiently and quickly. We also provide information that can confirm the reliability of research results through real time monitoring.

Analysis on Big data, IoT, Artificial intelligence using Keyword Network (빅데이터, IoT, 인공지능 키워드 네트워크 분석)

  • Koo, Young-Duk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.6
    • /
    • pp.1137-1144
    • /
    • 2020
  • This paper aims to provide strategic suggestions by analyzing technology trends related to big data, IoT, and artificial intelligence. To this end, analysis was performed using the 2018 national R&D information, and major basic analysis and language network analysis were performed. As a result of the analysis, research and development related to big data, IoT, and artificial intelligence are being conducted by focusing on the basic and development stages, and it was found that universities and SMEs have a high proportion. In addition, as a result of the language network analysis, it is judged that the related fields are mainly research for use in the smart farm and healthcare fields. Based on these research results, first, big data is essential to use artificial intelligence, and personal identification research should be conducted more actively. Second, they argued that full-cycle support is needed for technology commercialization, not simple R&D activities, and the need to expand application fields.

A Study on the Applicability of IoT for Container Terminal (컨테이너 터미널의 사물인터넷(IoT) 적용가능성에 관한 연구)

  • Jeon, Sang-Hyeon;Kang, Dal-Won;Min, Se-Hong;Kim, Si-Hyun
    • Journal of Korea Port Economic Association
    • /
    • v.36 no.2
    • /
    • pp.1-18
    • /
    • 2020
  • The Internet of things (IoT) has been applied to a variety of industrial uses such as public service sectors, medical industries, automotive industries, and so on. Led by smart cities, this is typical. However, from a logistics perspective, the level of application is insufficient. This study examines the applicability of IoT-related technology in a container terminal, an object of the present invention, to derive an applicable plan. Analytic network process (ANP) analysis reveals the following results for IoT applications in container terminals: operating systems (26.7%), safety/environmental/security systems (26.4%), equipment maintenance systems (25.3%), and facility maintenance systems (21.6 %). The second ANP analysis reveals the following results: Economy (40.2%), productivity (21.1%), service level (19.5%), and utilizing technology level (19.2%). The application or standard of evaluation is important when applying IoT technology to container terminals; however, it is not concentrated in a certain area. It is desirable to build each container system with linkage and efficiency from a macroscopic view.

Service Mobility Support Scheme in SDN-based Fog Computing Environment (SDN 기반 Fog Computing 환경에서 서비스 이동성 제공 방안)

  • Kyung, Yeun-Woong;Kim, Tae-Kook
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.3
    • /
    • pp.39-44
    • /
    • 2020
  • In this paper, we propose a SDN-based fog computing service mobility support scheme. Fog computing architecture has been attracted because it enables task offloading services to IoT(Internet of Things) devices which has limited computing and power resources. However, since static as well as mobile IoT devices are candidate service targets for the fog computing service, the efficient task offloading scheme considering the mobility should be required. Especially for the IoT services which need low-latency response, the new connection and task offloading delay with the new fog computing node after handover can occur QoS(Quality of Service) degradation. Therefore, this paper proposes an efficient service mobility support scheme which considers both task migration and flow rule pre-installations. Task migration allows for the service connectivity when the fog computing node needs to be changed. In addition, the flow rule pre-installations into the forwarding nodes along the path after handover enables to reduce the connection delay and service interruption time.

Vulnerability analysis on the ARMv7 Thumb Architecture (ARMv7 Thumb Architecture 취약성 분석)

  • Kim, Si-Wan;Seong, Ki-Taek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.5
    • /
    • pp.1003-1008
    • /
    • 2017
  • The Internet of Things has attracted considerable research attention in recent years. In order for the new IoT technology to be widely used, the reliability and protection of information is required. IoT systems are very vulnerable to physical security due to their easy accessibility. Along with the development of SoC technology, many operating systems have been developed and many new operating systems have been introduced. In this paper, we describe the vulnerability analysis results for operating systems running on the ARMv7 Thumb Architecture hardware platform. For the recently introduced "Windows 10 IoT Core" operating system, I implemented the Zero-Day Attack by implanting the penetration code developed through the research into a specific IoT system. The virus detection test for the resulting penetration code was validated by referral to the "virustotal" site.

Implementation of Automatic Authentication System using ECG Sensor based on Beacon (비콘 기반의 심전도 센서를 이용한 자동 인증 시스템 구현)

  • Lee, Jae-Kyu;Kim, Yei-Chang
    • Journal of Digital Convergence
    • /
    • v.15 no.5
    • /
    • pp.217-223
    • /
    • 2017
  • With the development of sensor networks and Internet of Things (IoT) technology, personalized context information has been collected and customized services can be provided to related users. Currently, the context information system is at the level of analyzing and recognizing user specific behavioral characteristics and generating events.In the IoT environment, IoT products themselves should provide the required services with minimal user intervention, rather than acting for a specific purpose. In this paper, to minimize the user intervention in the IoT environment, we implemented an automatic attendance recognition system using context information from the ECG based on beacon. Environment of provided specific Context information, we compared and analyzed the degree of user intervention among the authentication method using ECG sensor in this paper and the existing authentication method. As a result of the analysis, we confirmed that the system implemented in this paper minimizes user intervention.