• Title/Summary/Keyword: IoT applications

Search Result 477, Processing Time 0.028 seconds

A Design on Error Tracking System for Enhanced-Reliable IoT Service (사물인터넷 서비스의 신뢰성 강화를 위한 오류 추적 시스템 설계)

  • Lim, Ho-Seung;Choi, Chang-Won
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.3
    • /
    • pp.15-20
    • /
    • 2020
  • In this paper, an error tracking platform is designed for enhanced-reliable IOT system. The platform is designed to enhance reliability of IOT system by analysing additional informations(OS, Browser, Device) and by notifying error detection to developers. Especially, in the case of an error in the service which it is difficult for developers to recognize it, The platform also supports notification services through various communication media(Email, Slack, SMS). The common interface is designed to accommodate many languages(typescript, Swift, and Android) in the development process, and the interface allows users to analyze errors that occur on various platforms, including mobile/web/desktop applications. By presenting each error in groups through issues, developers can easily identify issues in the service. The visualizing function is included to recognize various error type by dashboard.

Analysis of NCS Curriculum for Computer Science Major in the 4th Industrial Revolution (4차 산업혁명 시대의 컴퓨터과학 전공자를 위한 NCS 교육과정 분석)

  • Jung, Deok-gil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.6
    • /
    • pp.855-860
    • /
    • 2018
  • The IT technologies applying to IoT(Internet of Things), Big Data, and AI(Artificial Intelligence) are needed in the era of 4th industrial revolution. So, the IT convergence courses of computer science major which will be required in the companies in order to prepare the crises of 4th industry revolution are necessary. And, one approach to cope with this problem is the training of IT convergence man power based on NCS(National Competency Standard) education. In this paper, we propose and analyze the NCS education courses for computer science major in order to teach the students who are needed in the Korean domestic companies preparing the 4th industrial revolution. The skills and applications of Chatbot, Blockchain, and CPS(Cyber Physical System) for the post mobile and post Internet technologies are included in the proposed courses.

The Development of Remodeling Process for Visual Content's Story by Big Data (빅데이터를 활용한 영상콘텐츠 스토리 리모델링 프로세스 개발)

  • Lee, Hye-Won;Park, Sung-Won;Kim, Lee-Kyung
    • Journal of Information Technology Applications and Management
    • /
    • v.26 no.3
    • /
    • pp.121-134
    • /
    • 2019
  • The Fourth Industrial Revolution has differentiated technologies such as artificial intelligence, IoT(Internet of things), big data, and mobile. As the civilization develops more and more, humanity enjoy the cultural activities more than economic activity for the food and shelter. The platform structure based on the advanced information technology of the present will expand the cultural contents area in a variety of ways. Cultural contents respond sensitively to changes in consumer and will be useful experiences of human activities. Therefore, it should be noted again that the contents industry should not be limited to the discussion of the application of the fourth technology, but should be produced with emphasis on useful experiences of human being. In other words, the discussion of human activities around cultural contents should be focused on how to apply beyond the use of fourth industrial technology. Therefore, it is necessary to analyze the basis of the successful storytelling of the planning stage to connect the fourth industrial technology and human useful experience as a method for developing cultural contents, and to build and propose a model as a strategic method. This study analyzes domestic and foreign cases made by using big data among the visual contents which show continuous increase of consumption among culture industry field, and draws success factors and limit points. Next, we extract what is the successful matching factor that influenced consumer 's consciousness, and find out that the structure of culture prototype has been applied in the long history of mankind, and presents it as a storytelling model. Through the above research, this study aims to present a new interpretation and creative activity of cultural contents by presenting a storytelling model as a methodology for connecting creative knowledge, away from the general interpretation of social phenomenon applied with big data.

Design of Wireless Power Transmission Antennas for Railway High-Speed Transponder System (철도교통용 고속 트랜스폰더 시스템 무선전력전송 안테나 설계)

  • Lee, Jae-Ho;Park, Sungsoo;Kim, Seong Jin;Ahn, IL Yeup
    • Journal of the Korean Society for Railway
    • /
    • v.20 no.5
    • /
    • pp.602-611
    • /
    • 2017
  • In railway systems, the exchange of information between running trains and wayside equipment is a very important role in various applications such as position detection and train control. Track circuits have been used as the medium for information transmission between trains and wayside. However, track circuits must be installed continuously along the track on the ground, resulting in an inevitable increase in installation and maintenance costs. One of the most promising solutions to reduce these costs is to mix continuous information transmission (via wireless communication) and discontinuous information transmission (via transponder). In this study, we designed antennas of railway high-speed transponder readers and tags for wireless power transmission, which can be used to transmit information from ground to high-speed trains with a maximum speed of 400km/h. We also verified system performance through computational simulation and prototyping.

Access Control Mechanism for Secure CoAP Applications Based on DTLS (DTLS 기반의 안전한 CoAP 응용을 위한 접근제어 메커니즘)

  • Jeong, Yeon-seong;Park, Chang-seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1307-1315
    • /
    • 2017
  • While the PSK mode of the DTLS is the most efficient in terms of the performance, it is not easy to pre-distribute and manage the symmetric key pairs as the number of sensor devices increases. On the other hand, both the RPK and certificate modes offer a convenient key management tool, but they do not guarantee a good computational performance. In this paper, the end-to-end security protocol suitable for the constrained devices is proposed, based on both the ECQV certificate and the PSK mode. Namely, the initial DTLS handshake is performed using the ECQV certificate, and the subsequent DTLS handshakes with the other CoAP servers in the same group are performed using the PSK mode for the purpose of reducing the overall computational load. Furthermore, a fine-grained access control for the CoAP client can be enforced to allow access to the limited number of CoAP servers.

Proposal of Network Security Solution based on Software Definition Perimeter for Secure Cloud Environment (안전한 클라우드 환경을 위한 소프트웨어 정의 경계 기반의 네트워크 보안 솔루션 제안)

  • Cha, Wuk-Jae;Shin, Jae-In;Lee, Dong-Bum;Kim, Hyeob;Lee, Dae-Hyo
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.12
    • /
    • pp.61-68
    • /
    • 2018
  • As the smartphone and mobile environment develop, the time and space constraints for individual work performance are disappearing. Companies can reduce costs and expand their business quickly through cloud computing. As the use of various cloud expands, the boundaries of users, data, and applications are disappearing. Traditional security approaches based on boundaries (Perimeter) are losing their utility in the cloud environment. This paper describes the limitations of existing network access control (NAC) in a cloud environment and suggests network security technology that complements it. The study explains the SDP and combines SDP(Software Defined Perimeter) to overcome the limitations of NAC, while at the same time explaining its role as a new framework for supporting the cloud environment. The new framework proposed in this paper suggests a software-based network security solution that supports physical and software parts, providing identity-based access control, encrypted segment management, and dynamic policy management, not IP-based.

Small-Scale Wind Energy Harvester Using PZT Based Piezoelectric Ceramic Fiber Composite Array (PZT계 압전 세라믹 파이버 어레이 복합체를 이용한 미소 풍력 에너지 하베스터)

  • Lee, Min-Seon;Na, Yong-Hyeon;Park, Jin-Woo;Jeong, Young-Hun
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.32 no.5
    • /
    • pp.418-425
    • /
    • 2019
  • A piezoelectric ceramic fiber composite (PCFC) was successfully fabricated using $0.69Pb(Zr_{0.47}Ti_{0.53})O_3-0.31[Pb(Zn_{0.4}Ni_{0.6})_{1/3}Nb_{2/3}]O_3$ (PZT-PZNN) for use in small-scale wind energy harvesters. The PCFC was formed using an epoxy matrix material and an array of Ag/Pd-coated PZT-PZNN piezo-ceramic fibers sandwiched by Cu interdigitated electrode patterned polyethylene terephthalate film. The energy harvesting performance was evaluated in a custom-made wind tunnel while varying the wind speed and resistive load with two types of flutter wind energy harvesters. One had a five-PCFC array vertically clamped with a supporting acrylic rod while the other used the same structure but with a five-PCFC cantilever array. Stainless steel (thickness: $50{\mu}m$) was attached onto one side of the PCFC to form the PZT-PZNN cantilever. The output power, in general, increased with an increase in the wind speed from 2 m/s to 10 m/s for both energy harvesters. The highest output power of $15.1{\mu}W$ at $14k{\Omega}$ was obtained at a wind speed of 10 m/s for the flutter wind energy harvester with the PZT-PZNN cantilever array. The results presented here reveal the strong potential for wind energy harvester applications to supply sustainable power to various IoT micro-devices.

Application of 4th Industrial Revolution Technology to Records Management (제4차 산업혁명 기술의 기록관리 적용 방안)

  • An, Dae-jin;Yim, Jin-hee
    • The Korean Journal of Archival Studies
    • /
    • no.54
    • /
    • pp.211-248
    • /
    • 2017
  • This study examined ways to improve records management by using the new technology of the Fourth Industrial Revolution. To do this, we selected four technologies that have a huge impact on the production and management of records such as cloud, big data, artificial intelligence, and the Internet of Things. We tested these technologies and summarized their concepts, characteristics, and applications. The characteristics of the changed production records were analyzed by each technology. Because of new technology, the production of records has rapidly increased and the types of records have become diverse. With this, there is also a need for solutions to explain the quality of data and the context of production. To effectively introduce each technology into records management, a roadmap should be designed by classifying which technology should be applied immediately and which should be applied later depending on the maturity of the technology. To cope with changes in the characteristics of production records, a flexible data structure must be produced in a standardized format. Public authorities should also be able to procure Software as a Service (SaaS) products and use digital technology to improve the quality of public services.

Prerequisites on Smart Healthcare in the Perspective of Service Design : Focusing on the Elderly Experience Case (서비스 디자인 관점에서 본 스마트 헬스케어의 선행 조건 : 고령자 경험 사례를 중심으로)

  • Kim, Ho-Da;Joo, Ae-Ran
    • Journal of Information Technology Applications and Management
    • /
    • v.28 no.3
    • /
    • pp.49-58
    • /
    • 2021
  • Due to the increasing interest in wellness aroused by the aging population and the pursuing feature of active old age, Korean elderly set importance on long life with their healthy condition. Following the change in the paradigm of the medical delivery system from hospital-oriented, treatment-oriented to personal-centered and self-care, Service design application of Smart Healthcare for the elderly became valuable. Smart Healthcare is a healthcare service provided through the fusion of ICT technologies including mobile/wearable devices, IoT, big data, and information technology, and it is utilized to prevent diseases managing abundant health information and living habits. As a methodology for delivering such Smart Healthcare to the elderly, Service design can be adopted. Therefore, this study would like to present the perquisites of Smart Healthcare design for the elderly through analyzing the results from in-depth interview methods between the elderly and medical staff. As a result of this study, guidelines for Service design application of health vulnerability management for the elderly utilizing smart phones were presented. Therefore, this study presented four prerequisites composed of 'high level of supplementation and ethical decision making', 'improvement of inequality in accessibility and experience', 'resolving problems in policy implementation' and 'user-friendliness' for the Smart Healthcare service design for the elderly. Overall, Service design is expected to play an innovative role in improving the quality of life for the elderly through the process of collecting and delivering information on Smart Healthcare centered on the experience of the elderly.

Efficient Object Recognition by Masking Semantic Pixel Difference Region of Vision Snapshot for Lightweight Embedded Systems (경량화된 임베디드 시스템에서 의미론적인 픽셀 분할 마스킹을 이용한 효율적인 영상 객체 인식 기법)

  • Yun, Heuijee;Park, Daejin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.6
    • /
    • pp.813-826
    • /
    • 2022
  • AI-based image processing technologies in various fields have been widely studied. However, the lighter the board, the more difficult it is to reduce the weight of image processing algorithm due to a lot of computation. In this paper, we propose a method using deep learning for object recognition algorithm in lightweight embedded boards. We can determine the area using a deep neural network architecture algorithm that processes semantic segmentation with a relatively small amount of computation. After masking the area, by using more accurate deep learning algorithm we could operate object detection with improved accuracy for efficient neural network (ENet) and You Only Look Once (YOLO) toward executing object recognition in real time for lightweighted embedded boards. This research is expected to be used for autonomous driving applications, which have to be much lighter and cheaper than the existing approaches used for object recognition.