• Title/Summary/Keyword: IoT applications

Search Result 472, Processing Time 0.024 seconds

Implementation of Dynamic Situation Authentication System for Accessing Medical Information (의료정보 접근을 위한 동적상황인증시스템의 구현)

  • Ham, Gyu-Sung;Seo, Own-jeong;Jung, Hoill;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.19 no.6
    • /
    • pp.31-40
    • /
    • 2018
  • With the development of IT technology recently, medical information systems are being constructed in an integrated u-health environment through cloud services, IoT technologies, and mobile applications. These kinds of medical information systems should provide the medical staff with authorities to access patients' medical information for emergency status treatments or therapeutic purposes. Therefore, in the medical information systems, the reliable and prompt authentication processes are necessary to access the biometric information and the medical information of the patients in charge of the medical staff. However, medical information systems are accessing with simple and static user authentication mechanism using only medical ID / PWD in the present system environment. For this reason, in this paper, we suggest a dynamic situation authentication mechanism that provides transparency of medical information access including various authentication factors considering patient's emergency status condition and dynamic situation authentication system supporting it. Our dynamic Situation Authentication is a combination of user authentication and mobile device authentication, which includes various authentication factor attributes such as emergency status, role of medical staff, their working hours, and their working positions and so forth. We designed and implemented a dynamic situation authentication system including emergency status decision, dynamic situation authentication, and authentication support DB construction. Finally, in order to verify the serviceability of the suggested dynamic situation authentication system, the medical staffs download the mobile application from the medical information server to the medical staff's own mobile device together with the dynamic situation authentication process and the permission to access medical information to the patient and showed access to medical information.

Developments of Local Festival Mobile Application and Data Analysis System Applying Beacon (비콘을 활용한 위치기반 지역축제 모바일 애플리케이션과 데이터 분석 시스템 개발)

  • Kim, Song I;Kim, Won Pyo;Jeong, Chul
    • Korea Science and Art Forum
    • /
    • v.31
    • /
    • pp.21-32
    • /
    • 2017
  • Local festivals form the regional cultures and atmosphere of communication; they increase the demand of domestic tourism businesses and thus, have an important role in ripple effects (e.g. regional image improvement, tourist influx, job creation, regional contents development, and local product sales) and economic revitalization. IoT (Internet of Thing) technologies have been developed especially, beacon-one of the IoT services has been applied as plenty of types and forms both domestically and internationally. However, notwithstanding expansion of current digital mobile technologies, it still remains as difficult for the individual to track the information about all the local festivals and to fulfill the tourists' needs of enjoying festivals given the weak strategic approaches and advertisement activities. Furthermore, current festival-related mobile applications don't function well as delivering information and have numerous contents issues (e.g. ways of information delivery within the festival places, independent application usage for each festival, one time usage due to one time event). This research, based on the background mentioned above, aims to develop the local festival mobile application and data analysis system applying beacon technology. First of all, three algorithms were developed, namely, 'festival crowding algorithm', 'visitor stats algorithm', and 'customized information algorithm', and then beta test was followed with the developed application and data analysis system. As a result, they could form the database of visitors' types and behaviors, and provide functions and services, such as personalized information, waiting time for festival contents, and 'hot place' function. Besides, in Google Play store, they also got the titles given with more than 13,000 downloads within first three months and as the most exposed application related with festivals; and, thus, got credited with their marketability and excellence. This research follows this order: chapter 2 shows the literature review of local festival related with technology development, beacon service, and festival application. In Chapter 3, design plans and conditions are described of developing local festival mobile application and data analysis system with beacon. Chapter 4 evaluates the results of the beta performance test to verify applicability of the developed application and data analysis system, and lastly, chapter 5 explains the conclusion and suggests the future research.

Acoustic Event Detection and Matlab/Simulink Interoperation for Individualized Things-Human Interaction (사물-사람 간 개인화된 상호작용을 위한 음향신호 이벤트 감지 및 Matlab/Simulink 연동환경)

  • Lee, Sanghyun;Kim, Tag Gon;Cho, Jeonghun;Park, Daejin
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.10 no.4
    • /
    • pp.189-198
    • /
    • 2015
  • Most IoT-related approaches have tried to establish the relation by connecting the network between things. The proposed research will present how the pervasive interaction of eco-system formed by touching the objects between humans and things can be recognized on purpose. By collecting and sharing the detected patterns among all kinds of things, we can construct the environment which enables individualized interactions of different objects. To perform the aforementioned, we are going to utilize technical procedures such as event-driven signal processing, pattern matching for signal recognition, and hardware in the loop simulation. We will also aim to implement the prototype of sensor processor based on Arduino MCU, which can be integrated with system using Arduino-Matlab/Simulink hybrid-interoperation environment. In the experiment, we use piezo transducer to detect the vibration or vibrates the surface using acoustic wave, which has specific frequency spectrum and individualized signal shape in terms of time axis. The signal distortion in time and frequency domain is recorded into memory tracer within sensor processor to extract the meaningful pattern by comparing the stored with lookup table(LUT). In this paper, we will contribute the initial prototypes for the acoustic touch processor by using off-the-shelf MCU and the integrated framework based on Matlab/Simulink model to provide the individualization of the touch-sensing for the user on purpose.

S-FEAR: Secure-Fuzzy Energy Aware Routing Protocol for Wireless Sensor Networks

  • Almomani, Iman;Saadeh, Maha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1436-1457
    • /
    • 2018
  • Secure routing services in Wireless Sensor Networks (WSNs) are essential, especially in mission critical fields such as the military and in medical applications. Additionally, they play a vital role in the current and future Internet of Things (IoT) services. Lightness and efficiency of a routing protocol are not the only requirements that guarantee success; security assurance also needs to be enforced. This paper proposes a Secure-Fuzzy Energy Aware Routing Protocol (S-FEAR) for WSNs. S-FEAR applies a security model to an existing energy efficient FEAR protocol. As part of this research, the S-FEAR protocol has been analyzed in terms of the communication and processing costs associated with building and applying this model, regardless of the security techniques used. Moreover, the Qualnet network simulator was used to implement both FEAR and S-FEAR after carefully selecting the following security techniques to achieve both authentication and data integrity: the Cipher Block Chaining-Message Authentication Code (CBC-MAC) and the Elliptic Curve Digital Signature Algorithm (ECDSA). The performance of both protocols was assessed in terms of complexity and energy consumption. The results reveal that achieving authentication and data integrity successfully excluded all attackers from the network topology regardless of the percentage of attackers. Consequently, the constructed topology is secure and thus, safe data transmission over the network is ensured. Simulation results show that using CBC-MAC for example, costs 0.00064% of network energy while ECDSA costs about 0.0091%. On the other hand, attacks cost the network about 4.7 times the cost of applying these techniques.

Analysis of facial expression recognition (표정 분류 연구)

  • Son, Nayeong;Cho, Hyunsun;Lee, Sohyun;Song, Jongwoo
    • The Korean Journal of Applied Statistics
    • /
    • v.31 no.5
    • /
    • pp.539-554
    • /
    • 2018
  • Effective interaction between user and device is considered an important ability of IoT devices. For some applications, it is necessary to recognize human facial expressions in real time and make accurate judgments in order to respond to situations correctly. Therefore, many researches on facial image analysis have been preceded in order to construct a more accurate and faster recognition system. In this study, we constructed an automatic recognition system for facial expressions through two steps - a facial recognition step and a classification step. We compared various models with different sets of data with pixel information, landmark coordinates, Euclidean distances among landmark points, and arctangent angles. We found a fast and efficient prediction model with only 30 principal components of face landmark information. We applied several prediction models, that included linear discriminant analysis (LDA), random forests, support vector machine (SVM), and bagging; consequently, an SVM model gives the best result. The LDA model gives the second best prediction accuracy but it can fit and predict data faster than SVM and other methods. Finally, we compared our method to Microsoft Azure Emotion API and Convolution Neural Network (CNN). Our method gives a very competitive result.

Fishberry: A Remote Fishbowl Management System (원격 어항 관리 시스템)

  • Shin, Je-Woo;Cha, Hae-Wun;Kim, Byeong-Gab;Kong, Ki-sok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.6
    • /
    • pp.95-102
    • /
    • 2019
  • As the number of fish keepers increases, fishbowl-related convenience products are on the rise. Existing products are not welcomed by consumers because of their lack of functions or high price. In this paper, we deal with a system that remotely controls sensors and motors of fish bowl based on Raspberry Pi and Arduino. In Android applications, you can use the following functions. firstly, feeding. Second, water changing. Third, it measures, visualizes temperature and pH values including alert function. Through the several experiments, it was verified that the system can be quickly accessed from the outside, and when it is appropriate to change water. This system allows the user to keep the fish more comfortable and safe.

A Study on the Design of Hiking Boots Equipped with GPS and its Midsole Manufactured by 3D Porous Polymer Printing Method (위치추적기를 내장한 산악용 신발 디자인 및 3D 다공성 폴리머 프린팅을 이용한 중창 제작에 관한 연구)

  • Pyo, Jeong-Hee;Yoo, Chan-Ju;Shin, Jong-Kuk;Lee, Tae-Gu;Shin, Bo-Sung
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.15 no.6
    • /
    • pp.83-88
    • /
    • 2016
  • Over the last five years, 568 people have died while hiking according to 2015 statistics from the public safety ministry. Among those deaths, approximately 33% were due to loss of footing or falling. In this respect, the highly advanced functions of hiking boots should be considered to prevent these unfortunate accidents. For example, by utilizing the Internet of Things (IoT) and Information and Communications Technology (ICT), hiking boots equipped with a Global Positioning System (GPS) or vital signs monitoring systems should be considered. In addition, many challenges remain for the production of 3D printed hiking boots, because the functions of hiking boots are variable, which is important when handling changing terrains and situations. The design of customized hiking boots was introduced in this paper, and 3D printing applications for midsoles using a Porous Polymer Printing (PPP) method was also suggested to verify the possibility of manufacturing hiking boots.

A Design on Error Tracking System for Enhanced-Reliable IoT Service (사물인터넷 서비스의 신뢰성 강화를 위한 오류 추적 시스템 설계)

  • Lim, Ho-Seung;Choi, Chang-Won
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.3
    • /
    • pp.15-20
    • /
    • 2020
  • In this paper, an error tracking platform is designed for enhanced-reliable IOT system. The platform is designed to enhance reliability of IOT system by analysing additional informations(OS, Browser, Device) and by notifying error detection to developers. Especially, in the case of an error in the service which it is difficult for developers to recognize it, The platform also supports notification services through various communication media(Email, Slack, SMS). The common interface is designed to accommodate many languages(typescript, Swift, and Android) in the development process, and the interface allows users to analyze errors that occur on various platforms, including mobile/web/desktop applications. By presenting each error in groups through issues, developers can easily identify issues in the service. The visualizing function is included to recognize various error type by dashboard.

Analysis of NCS Curriculum for Computer Science Major in the 4th Industrial Revolution (4차 산업혁명 시대의 컴퓨터과학 전공자를 위한 NCS 교육과정 분석)

  • Jung, Deok-gil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.6
    • /
    • pp.855-860
    • /
    • 2018
  • The IT technologies applying to IoT(Internet of Things), Big Data, and AI(Artificial Intelligence) are needed in the era of 4th industrial revolution. So, the IT convergence courses of computer science major which will be required in the companies in order to prepare the crises of 4th industry revolution are necessary. And, one approach to cope with this problem is the training of IT convergence man power based on NCS(National Competency Standard) education. In this paper, we propose and analyze the NCS education courses for computer science major in order to teach the students who are needed in the Korean domestic companies preparing the 4th industrial revolution. The skills and applications of Chatbot, Blockchain, and CPS(Cyber Physical System) for the post mobile and post Internet technologies are included in the proposed courses.

The Development of Remodeling Process for Visual Content's Story by Big Data (빅데이터를 활용한 영상콘텐츠 스토리 리모델링 프로세스 개발)

  • Lee, Hye-Won;Park, Sung-Won;Kim, Lee-Kyung
    • Journal of Information Technology Applications and Management
    • /
    • v.26 no.3
    • /
    • pp.121-134
    • /
    • 2019
  • The Fourth Industrial Revolution has differentiated technologies such as artificial intelligence, IoT(Internet of things), big data, and mobile. As the civilization develops more and more, humanity enjoy the cultural activities more than economic activity for the food and shelter. The platform structure based on the advanced information technology of the present will expand the cultural contents area in a variety of ways. Cultural contents respond sensitively to changes in consumer and will be useful experiences of human activities. Therefore, it should be noted again that the contents industry should not be limited to the discussion of the application of the fourth technology, but should be produced with emphasis on useful experiences of human being. In other words, the discussion of human activities around cultural contents should be focused on how to apply beyond the use of fourth industrial technology. Therefore, it is necessary to analyze the basis of the successful storytelling of the planning stage to connect the fourth industrial technology and human useful experience as a method for developing cultural contents, and to build and propose a model as a strategic method. This study analyzes domestic and foreign cases made by using big data among the visual contents which show continuous increase of consumption among culture industry field, and draws success factors and limit points. Next, we extract what is the successful matching factor that influenced consumer 's consciousness, and find out that the structure of culture prototype has been applied in the long history of mankind, and presents it as a storytelling model. Through the above research, this study aims to present a new interpretation and creative activity of cultural contents by presenting a storytelling model as a methodology for connecting creative knowledge, away from the general interpretation of social phenomenon applied with big data.