• Title/Summary/Keyword: IoT Data

Search Result 1,763, Processing Time 0.034 seconds

New Mathematical Model for Travel Route Recommendation Service (여행경로 추천 서비스를 위한 최적화 수리모형)

  • Hwang, Intae;Kim, Heungseob
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.40 no.3
    • /
    • pp.99-106
    • /
    • 2017
  • With the increased interest in the quality of life of modern people, the implementation of the five-day working week, the increase in traffic convenience, and the economic and social development, domestic and international travel is becoming commonplace. Furthermore, in the past, there were many cases of purchasing packaged goods of specialized travel agencies. However, as the development of the Internet improved the accessibility of information about the travel area, the tourist is changing the trend to plan the trip such as the choice of the destination. Web services have been introduced to recommend travel destinations and travel routes according to these needs of the customers. Therefore, after reviewing some of the most popular web services today, such as Stubby planner (http://www.stubbyplanner.com) and Earthtory (http://www.earthtory.com), they were supposed to be based on traditional Traveling Salesman Problems (TSPs), and the travel routes recommended by them included some practical limitations. That is, they were not considered important issues in the actual journey, such as the use of various transportation, travel expenses, the number of days, and lodging. Moreover, although to recommend travel destinations, there have been various studies such as using IoT (Internet of Things) technology and the analysis of cyberspatial Big Data on the web and SNS (Social Networking Service), there is little research to support travel routes considering the practical constraints. Therefore, this study proposes a new mathematical model for applying to travel route recommendation service, and it is verified by numerical experiments on travel to Jeju Island and trip to Europe including Germany, France and Czech Republic. It also expects to be able to provide more useful information to tourists in their travel plans through linkage with the services for recommending tourist attractions built in the Internet environment.

The Impacts of Project Governance, Agency Conflicts on the Project Success : From the Perspective of Agency Theory (프로젝트 거버넌스가 대리인 갈등 및 프로젝트 성공에 미치는 영향 : 대리인 이론 관점)

  • Jeong, Eun-Joo;Kim, Bo-Ram;Jeong, Seung-Ryul
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.41 no.3
    • /
    • pp.11-20
    • /
    • 2018
  • Recently companies have increased the new projects to improve and innovate the business process in order to adopt the advanced technologies such as IoT (Internet of Things), Big Data Analysis, Cloud Computing, mobile and artificial intelligence technologies for sustainable competitive advantages under rapid technological and socioeconomic external environmental changes. However, there are obstacles to achieve the project goals, corporate's strategy and objectives due to various kind of risks based on characteristics of projects and conflicts of stakeholders participated on projects. Hence, the solutions are required to resolve the various kind of risks and conflicts of stakeholders. The objectives of this study are to investigate the impact of the project governance, agency conflicts on the project success based on agency theory by using the statistical hypothesis testing the relationship among those variables. As a result of hypothesis testing, we could find that the project governance impacts positively on project success and negatively on the agency conflicts. Further, the agency conflicts impacts negatively on the project success. Finally, we could find that the agency conflicts such as goal conflict, different risk attitude and information asymmetry between project manager and team members impact negatively on the project success. Meanwhile, the project governance impact positively on the project success, negatively impact on the agency conflicts such as goal conflict, different risk attitude and information asymmetry between project manager and project team members. In order to increase the project success rate, the project governance institutions such as PGB (Project Governance Board), EPMO (Enterprise Project Management Office), PSC (Project Steering Committee) are needed to prevent or reduce the agency conflicts between project manager and team members.

Performance Evaluation of Semi-Persistent Scheduling in a Narrowband LTE System for Internet of Things (사물인터넷을 위한 협대역 LTE 시스템에서의 준지속적 스케줄링의 성능 평가)

  • Kim, Sunkyung;Cha, Wonjung;So, Jaewoo;Na, Minsoo;Choi, Changsoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.9
    • /
    • pp.1001-1009
    • /
    • 2016
  • In LTE networks, the base station transmits control information over the physical downlink control channel (PDCCH) including scheduling grants, which are used to indicate the resources that the user equipment uses to send data to the base station. Because the size of the PDCCH message and the number of the PDCCH transmissions increase in proportion to the number of user equipments, the overhead of the PDCCH may cause serious network congestion problems in the narrowband LTE (NB-LTE) system. This paper proposes the compact PDCCH information bit allocation to reduce the size of the PDCCH message and evaluates the performance of the semi-persistent scheduling (SPS) in the NB-LTE system. The simulation results show that the SPS can significantly reduce the signaling overhead of the PDCCH and therefore increase the system utilization.

An Approach to Constructing an Efficient Entropy Source on Multicore Processor (멀티코어 환경에서 효율적인 엔트로피 원의 설계 기법)

  • Kim, SeongGyeom;Lee, SeungJoon;Kang, HyungChul;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.61-71
    • /
    • 2018
  • In the Internet of Things, in which plenty of devices have connection to each other, cryptographically secure Random Number Generators (RNGs) are essential. Particularly, entropy source, which is the only one non-deterministic part in generating random numbers, has to equip with an unpredictable noise source(or more) for the required security strength. This might cause an requirement of additional hardware extracting noise source. Although additional hardware resources has better performance, it is needed to make the best use of existing resources in order to avoid extra costs, such as area, power consumption. In this paper, we suggest an entropy source which uses a multi-threaded program without any additional hardware. As a result, it reduces the difficulty when implementing on lightweight, low-power devices. Additionally, according to NIST's entropy estimation test suite, the suggested entropy source is tested to be secure enough for source of entropy input.

The Study of System Visibility of Universal Middleware Pervasive Memorial Engine (시스템가시성평가를 위한 유니버설미들웨어기반 Pervasive Memorial Engine 연구)

  • Lee, Hae-Jun;Hwang, Chi-Gon;Yoon, Chang-Pyo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.335-338
    • /
    • 2017
  • Presently, the collaboration hardware system and software technology that promoted commercializing ICBMS for integrated system visibility evaluation. This variation will move on the next pervasive period that mixed with cultural and technology convergence. There is possibility for the period system can invoke unpredictable confusing blank state. The blank state systems have ecosystem characteristics that are supplied, maintained and operated through the complex interactions of technology and culture. Using universal middleware can support the life-cycle model and increase the visibility of complex systems and prepare for confusing situations. In this study, based on universal middleware, data and service dynamic standardized modules were evaluated to support stable system visibility platform. The system visibility module consists of Intelligent Pervasive Cloud module, Memorial Service module and Life Cycler connection module. each module reflects various requirements of system visibility requested by external system. In addition, the analysis results are supported by various network application service standards through platform independent system and architecture.

  • PDF

A Study on Fault Classification of Machining Center using Acceleration Data Based on 1D CNN Algorithm (1D CNN 알고리즘 기반의 가속도 데이터를 이용한 머시닝 센터의 고장 분류 기법 연구)

  • Kim, Ji-Wook;Jang, Jin-Seok;Yang, Min-Seok;Kang, Ji-Heon;Kim, Kun-Woo;Cho, Young-Jae;Lee, Jae-Wook
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.18 no.9
    • /
    • pp.29-35
    • /
    • 2019
  • The structure of the machinery industry due to the 4th industrial revolution is changing from precision and durability to intelligent and smart machinery through sensing and interconnection(IoT). There is a growing need for research on prognostics and health management(PHM) that can prevent abnormalities in processing machines and accurately predict and diagnose conditions. PHM is a technology that monitors the condition of a mechanical system, diagnoses signs of failure, and predicts the remaining life of the object. In this study, the vibration generated during machining is measured and a classification algorithm for normal and fault signals is developed. Arbitrary fault signal is collected by changing the conditions of un stable supply cutting oil and fixing jig. The signal processing is performed to apply the measured signal to the learning model. The sampling rate is changed for high speed operation and performed machine learning using raw signal without FFT. The fault classification algorithm for 1D convolution neural network composed of 2 convolution layers is developed.

Plans to Improve Smart Village and Its Challenges (스마트 빌리지, 그 계획과 도전)

  • Eom, Seong-Jun;Kim, Sang-Bum;Cho, Suk-Yeong;An, Phil-Gyun
    • Journal of Agricultural Extension & Community Development
    • /
    • v.27 no.4
    • /
    • pp.173-184
    • /
    • 2020
  • Is the Fourth Industrial Revolution a revolution for cities only? Through the Fourth Industrial Revolution, Korea has entered quickly in the influence area of intelligent information technology such as IoT, AI, Big data, Cloud, ICT, Digital twin. However, as the information gap between the rural zone and the urban zone worsens, a policy was needed to reduce such a gap. Therefore, this research analyzed EU's smart village project, and investigated the problem and improvement of the actual smart village through the interview and field study with the person in charge of the actual smart village project in Korea. Based on the analytic result, 5 plans were deduced to improve Korea's smart village project. First, make the realistic adjustment of project period to assure the sustainability of smart village; second, make the new establishment of the department in charge of smart village project; third, construct the system of integrating and cooperating the policy that can embrace all the rural zone and the urban zone; the fourth, expand the application area of customized ICT technology according to the new rural policy environment; and finally introduce the residents' capacity development project through the rural guidance project.

Proposal of Network Security Solution based on Software Definition Perimeter for Secure Cloud Environment (안전한 클라우드 환경을 위한 소프트웨어 정의 경계 기반의 네트워크 보안 솔루션 제안)

  • Cha, Wuk-Jae;Shin, Jae-In;Lee, Dong-Bum;Kim, Hyeob;Lee, Dae-Hyo
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.12
    • /
    • pp.61-68
    • /
    • 2018
  • As the smartphone and mobile environment develop, the time and space constraints for individual work performance are disappearing. Companies can reduce costs and expand their business quickly through cloud computing. As the use of various cloud expands, the boundaries of users, data, and applications are disappearing. Traditional security approaches based on boundaries (Perimeter) are losing their utility in the cloud environment. This paper describes the limitations of existing network access control (NAC) in a cloud environment and suggests network security technology that complements it. The study explains the SDP and combines SDP(Software Defined Perimeter) to overcome the limitations of NAC, while at the same time explaining its role as a new framework for supporting the cloud environment. The new framework proposed in this paper suggests a software-based network security solution that supports physical and software parts, providing identity-based access control, encrypted segment management, and dynamic policy management, not IP-based.

A Study on Malware Identification System Using Static Analysis Based Machine Learning Technique (정적 분석 기반 기계학습 기법을 활용한 악성코드 식별 시스템 연구)

  • Kim, Su-jeong;Ha, Ji-hee;Oh, Soo-hyun;Lee, Tae-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.775-784
    • /
    • 2019
  • Malware infringement attacks are continuously increasing in various environments such as mobile, IOT, windows and mac due to the emergence of new and variant malware, and signature-based countermeasures have limitations in detection of malware. In addition, analytical performance is deteriorating due to obfuscation, packing, and anti-VM technique. In this paper, we propose a system that can detect malware based on machine learning by using similarity hashing-based pattern detection technique and static analysis after file classification according to packing. This enables more efficient detection because it utilizes both pattern-based detection, which is well-known malware detection, and machine learning-based detection technology, which is advantageous for detecting new and variant malware. The results of this study were obtained by detecting accuracy of 95.79% or more for benign sample files and malware sample files provided by the AI-based malware detection track of the Information Security R&D Data Challenge 2018 competition. In the future, it is expected that it will be possible to build a system that improves detection performance by applying a feature vector and a detection method to the characteristics of a packed file.

A Study on the Safety Monitoring of Bridge Facilities based on Smart Sensors (스마트 센서 기반의 교량 시설물 안전 모니터링 기법 연구)

  • YEON, Sang-Ho;KIM, Joon-Soo;YEON, Chun-Hum
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.22 no.2
    • /
    • pp.97-106
    • /
    • 2019
  • Today, many smart sensor's measurement instruments are used to check the safety situation of various medium and large bridge structures that should be maintained in the construction facilities, but most of them use the method of measuring and confirming the displacement behavior of the bridge at regular intervals. In order to continuously check the safety situation, various measuring instruments are used, but most of them are not able to measure and measure the displacement and behavior of main construction structures at regular intervals. In this study, GNSS and environment smart sensors and drone's image data are transmitted to wireless network so that risk of many bridge's structures can be detected beforehand. As a result, by diagnosing the fine displacement of the bridge in real time and its condition, reinforcement, repair and disaster prevention measures for the structural parts of the bridges, which are expected to be dangerous, and various disasters and accidents can be prevented, and disaster can be prevented could suggest a new alternative.