• Title/Summary/Keyword: IoT environments

Search Result 321, Processing Time 0.071 seconds

A Scheme on Object Tracking Techniques in Multiple CCTV IoT Environments (다중 CCTV 사물인터넷 환경에서의 객체 추적 기법)

  • Hong, Ji-Hoon;Lee, Keun-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.5 no.1
    • /
    • pp.7-11
    • /
    • 2019
  • This study suggests a methodology to track crime suspects or anomalies through CCTV in order to expand the scope of CCTV use as the number of CCTV installations continues to increase nationwide in recent years. For the abnormal behavior classification, we use the existing studies to find out suspected criminals or abnormal actors, use CNN to track objects, and connect the surrounding CCTVs to each other to predict the movement path of objectified objects CCTVs in the vicinity of the path were used to share objects' sample data to track objects and to track objects. Through this research, we will keep track of criminals who can not be traced, contribute to the national security, and continue to study them so that more diverse technologies can be applied to CCTV.

Service Architecture Models For Fog Computing: A Remedy for Latency Issues in Data Access from Clouds

  • Khalid, Adnan;Shahbaz, Muhammad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2310-2345
    • /
    • 2017
  • With the emergence of the Internet of Things (IoT) the world is projecting towards a scenario where every object in the world (including humans) acts as a sender and receiver of data and if we were to see that concept mature we would soon be talking of billions more users of the cloud networks. The cloud technology is a very apt alternative to permanent storage when it comes to bulk storage and reporting. It has however shown weaknesses concerning real-time data accessibility and processing. The bandwidth availability of the cloud networks is limited and combined with the highly centralized storage structure and geographical vastness of the network in terms of distance from the end user the cloud just does not seem like a friendly environment for real-time IOT data. This paper aims at highlighting the importance of Flavio Bonomi's idea of Fog Computing which has been glamorized and marketed by Cisco but has not yet been given a proper service architecture that would explain how it would be used in terms of various service models i-e IaaS, PaaS and SaaS, of the Cloud. The main contribution of the paper would be models for IaaS, PaaS and SaaS for Fog environments. The paper would conclude by highlighting the importance of the presented models and giving a consolidated overview of how they would work. It would also calculate the respective latencies for fog and cloud to prove that our models would work. We have used CloudSim and iFogSim to show the effectiveness of the paradigm shift from traditional cloud architecture to our Fog architecture.

A Study on Malware Identification System Using Static Analysis Based Machine Learning Technique (정적 분석 기반 기계학습 기법을 활용한 악성코드 식별 시스템 연구)

  • Kim, Su-jeong;Ha, Ji-hee;Oh, Soo-hyun;Lee, Tae-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.775-784
    • /
    • 2019
  • Malware infringement attacks are continuously increasing in various environments such as mobile, IOT, windows and mac due to the emergence of new and variant malware, and signature-based countermeasures have limitations in detection of malware. In addition, analytical performance is deteriorating due to obfuscation, packing, and anti-VM technique. In this paper, we propose a system that can detect malware based on machine learning by using similarity hashing-based pattern detection technique and static analysis after file classification according to packing. This enables more efficient detection because it utilizes both pattern-based detection, which is well-known malware detection, and machine learning-based detection technology, which is advantageous for detecting new and variant malware. The results of this study were obtained by detecting accuracy of 95.79% or more for benign sample files and malware sample files provided by the AI-based malware detection track of the Information Security R&D Data Challenge 2018 competition. In the future, it is expected that it will be possible to build a system that improves detection performance by applying a feature vector and a detection method to the characteristics of a packed file.

Building a New Smart City: Integrating Local Culture and Technology (지역문화와 기술이 융합된 새로운 스마트시티 구축)

  • Sim, Keebaik;Hwang, Woo-Sung;Choi, Myung-Ryul
    • Journal of Digital Convergence
    • /
    • v.17 no.9
    • /
    • pp.193-198
    • /
    • 2019
  • In smart cities around the world, urban environments have become more convenient due to information and communication technology(ICT). However, extant studies reveal that the level of life satisfaction of citizens has not improved compared to that of the pre-smart city and citizens are skeptical about the role of the smart city. This is largely because local culture and needs were neglected during the planing and development of the smart city. The research was conducted on Cambodia as a pilot site and our findings indicate that middle age group's population is significantly small and the society is at risk of losing its culture. Therefore, this paper opens up various ways of embedding cultural programs using technology in order to pass down cultural heritage to young generation, provide an emotional attachment to the inhabitants and further build up a new phase of cultural legacy. This will engender cultural uniqueness to the city and intrigue tourists around the world resulting in the growth of the tourist industry. This research will contribute locally by providing a sense of community to the public and globally by suggesting applicable methodology to other cities that are under the similar context.

Machine learning application for predicting the strawberry harvesting time

  • Yang, Mi-Hye;Nam, Won-Ho;Kim, Taegon;Lee, Kwanho;Kim, Younghwa
    • Korean Journal of Agricultural Science
    • /
    • v.46 no.2
    • /
    • pp.381-393
    • /
    • 2019
  • A smart farm is a system that combines information and communication technology (ICT), internet of things (IoT), and agricultural technology that enable a farm to operate with minimal labor and to automatically control of a greenhouse environment. Machine learning based on recently data-driven techniques has emerged with big data technologies and high-performance computing to create opportunities to quantify data intensive processes in agricultural operational environments. This paper presents research on the application of machine learning technology to diagnose the growth status of crops and predicting the harvest time of strawberries in a greenhouse according to image processing techniques. To classify the growth stages of the strawberries, we used object inference and detection with machine learning model based on deep learning neural networks and TensorFlow. The classification accuracy was compared based on the training data volume and training epoch. As a result, it was able to classify with an accuracy of over 90% with 200 training images and 8,000 training steps. The detection and classification of the strawberry maturities could be identified with an accuracy of over 90% at the mature and over mature stages of the strawberries. Concurrently, the experimental results are promising, and they show that this approach can be applied to develop a machine learning model for predicting the strawberry harvesting time and can be used to provide key decision support information to both farmers and policy makers about optimal harvest times and harvest planning.

User Dynamic Access Control Mechanism Using Smart Contracts in Blockchain Environment (블록체인 환경에서 스마트 컨트랙트를 활용한 사용자 동적 접근제어 메커니즘)

  • Cho, Do-Eun
    • Journal of Platform Technology
    • /
    • v.9 no.1
    • /
    • pp.46-57
    • /
    • 2021
  • Recently, research has been actively conducted to utilize blockchain technology in various fields. In particular, blockchain-based smart contracts are applied to various automation systems that require reliability as they have the characteristics of recording data in a distributed ledger environment to verify the integrity and validity of data. However, blockchain does not provide data access control and information security because data is shared among network participants. In this paper, we propose a user dynamic access control mechanism utilizing smart contracts in blockchain environments. The proposed mechanism identifies the user's contextual information when accessing data, allocating the user's role and dynamically controlling the data access range. This can increase the security of the system and the efficiency of data management by granting data access dynamically at the time of user authentication, rather than providing the same services in roles assigned to each user group of the network system. The proposed mechanism is expected to provide flexible authentication capabilities through dynamic data access control by users to enhance the security of data stored within blockchain networks.

Implementation of Automatic Identification Monitoring System for Fishing Gears based on Wireless Communication Network and Establishment of Test Environment (무선통신망 기반 어구자동식별 모니터링 시스템 구현 및 시험환경 구축)

  • Joung, JooMyeong;Park, HyeJung;Kim, MinSeok;Kwak, Myoung-Shin;Seon, Hwi-Joon
    • Journal of IKEEE
    • /
    • v.25 no.1
    • /
    • pp.193-200
    • /
    • 2021
  • In order to prevent illegal fishing and reduce lost fishing gear, it is necessary to develop a constant and continuous fishing gear monitoring system in the marine environment. In this paper, we design a long-term operational, reliable system model with communication coverage of more than 25Km considering the reality of gradually expanding fishing activity due to the depletion of fishery resources and marine environments. The design results are implemented to verify the operability of the system by separating the communication success rate of SKT and private LoRa networks and verifying the control function of each control system through the collected location information, respectively.

Application of Urban Computing to Explore Living Environment Characteristics in Seoul : Integration of S-Dot Sensor and Urban Data

  • Daehwan Kim;Woomin Nam;Keon Chul Park
    • Journal of Internet Computing and Services
    • /
    • v.24 no.4
    • /
    • pp.65-76
    • /
    • 2023
  • This paper identifies the aspects of living environment elements (PM2.5, PM10, Noise) throughout Seoul and the urban characteristics that affect them by utilizing the big data of the S-Dot sensors in Seoul, which has recently become a hot topic. In other words, it proposes a big data based urban computing research methodology and research direction to confirm the relationship between urban characteristics and living environments that directly affect citizens. The temporal range is from 2020 to 2021, which is the available range of time series data for S-Dot sensors, and the spatial range is throughout Seoul by 500mX500m GRID. First of all, as part of analyzing specific living environment patterns, simple trends through EDA are identified, and cluster analysis is conducted based on the trends. After that, in order to derive specific urban planning factors of each cluster, basic statistical analysis such as ANOVA, OLS and MNL analysis were conducted to confirm more specific characteristics. As a result of this study, cluster patterns of environment elements(PM2.5, PM10, Noise) and urban factors that affect them are identified, and there are areas with relatively high or low long-term living environment values compared to other regions. The results of this study are believed to be a reference for urban planning management measures for vulnerable areas of living environment, and it is expected to be an exploratory study that can provide directions to urban computing field, especially related to environmental data in the future.

A Scoping Review of Information and Communication Technology (ICT)-Based Health-Related Intervention Studies for Children & Adolescents in South Korea (아동·청소년 대상 정보통신기술(ICT) 기반 국내 건강관련 중재연구의 주제범위 문헌고찰)

  • Park, Jiyoung;Bae, Jinkyung;Won, Seohyun
    • Journal of Korean Public Health Nursing
    • /
    • v.37 no.1
    • /
    • pp.5-24
    • /
    • 2023
  • Purpose: The objective of this review was to identify the research trends in Information and Communication Technology (ICT)-based health-related intervention studies for children and adolescents published in South Korea over the past 10 years. Methods: A scoping review was performed in accordance with the Preferred Reporting Items for Systematic Reviews and Meta Analyses (PRISMA) and the system classification framework for digital health intervention 1.0 of the World Health Organization (WHO) was applied to analyze how technology was being used to support the needs of the health system. Results: A total of 18 studies were included in the final analysis. The participants were mainly children with a variety of diseases. No studies had used innovative technology platforms such as artificial intelligence (AI), the Internet of Things (IoT), and robotics. In addition, the scope of application of the WHO classification criteria was quite limited. Finally, no intervention study considered technical operational indicators, such as the number of website visits and streaming as outcome measurements. Conclusions: Researchers should introduce advanced technology-based strategies to provide customized and professional healthcare services to children and adolescents in South Korea and continue efforts to integrate innovative ICT for various research purposes, subjects, and environments.

Cases Analysis in Smart, Connected Toys Based on the Characteristics of ICBM Technologies (ICBM 기술 특성 기반 스마트, 커넥티드 완구의 사례 분석)

  • Jeon, Bienil;Park, Jae Wan
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.9
    • /
    • pp.27-35
    • /
    • 2016
  • Today, with the advance of Information and communication technology, 'Smart, connected' toys, which apply technologies related to IoT (Internet of Things) to traditional toys, are emerging and rapidly growing. This research aims to analyze the tendencies and limitations of smart, connected toys through exploring the representative cases of smart, connected toys based on characteristics of ICBM (Internet of Things, Cloud, Big-data, and Mobile) technology. For this study, we begin by understanding literature research about smart, connected toys and ICBM technology. Then, we extracted the characteristics of ICBM technology for connecting physical and digital environments through investigating cases to which ICBM technologies are applied. Based on the extracted characteristics, the case studies of smart, connected toys were conducted. In this research, we explore the level of ICBM technology application and limitation to smart, connected toys. We expect this research will contribute to providing guidelines for developing smart, connected toys based on the characteristics of the latest technology.