• Title/Summary/Keyword: M2M platform

Search Result 431, Processing Time 0.031 seconds

IoT Platform Service to Support Characters (캐릭터를 지원하기 위한 IoT 플랫폼 서비스)

  • Oh, Won-Hwan;Nam, Kang-Hyun;Pak, Sang-Hyon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.3
    • /
    • pp.643-650
    • /
    • 2018
  • This service uses beacon with BLE technology, and USER APP has priority with Anchor IPS which secures location and device. Since then, it has been linked with character beacons that can be used in various places. The character beacon which is recognized as a service is able to confirm the user's location through API key of the LBS CMS server, and receives various contents services of the UESR CMS server. The service network consists of character beacon, Anchor IPS, USER APP, LBS CMS server, and USER CMS server. The purpose of the service is to promote local tourism and local culture to tourists through local unique characters.

Scientometric Analysis for Internet of Things of Service Concentration and Smart Device of Next-Generation (서비스 중심의 IoT와 차세대 Smart Device에 대한 계량 정보 분석)

  • Shon, Young-Woo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.6
    • /
    • pp.721-728
    • /
    • 2015
  • IOT has evolved from the internet for human oriented, therefore our life is more advanced growth smartly. IoT is the network of physical objects or things embedded with electronics, software, sensors and connectivity to enable it to achieve greater value and service by exchanging data with the manufacturer, operator or other connected devices. Until now many researches have been studied for centering keyword for detecting emerging technology of future and scientometric analysis among the papers. This paper propose searching method of emerging technology for the IOT (internet of things) and smart device which are recently interesting area via dynamic analysis for keyword mapping.

A Study on Context-aware Beacon Services Connecting Smart TV (Smart TV 상황 인지형 Beacon서비스 연구)

  • Nam, Kang-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.5
    • /
    • pp.499-504
    • /
    • 2016
  • The Service had a purpose to be heard through the Smart Phone APP and Smart TV Broadcasting Contents to Foreigner's Language in The Asia Culture Center. This Paper explained how to realize foreigner with Beacon's Signal and IoT gateway provided the voice service with selected his language using AllJoyn Protocol Interface function. IoT Service Platform received the Registration of foreigner's identifier, there sent messages to all devices, which were all IoT gateways, IoT gateway could connect to foreigner's Smart Phone App and heard the Broadcasting contents. If a foreigner went out of Beacon's management distance, the voice App service were released.

Current Status and Applications of Integrated Safety Assessment and Simulation Code System for ISA

  • Izquierdo, J.M.;Hortal, J.;Sanchez Perea, M.;Melendez, E.;Queral, C.;Rivas-Lewicky, J.
    • Nuclear Engineering and Technology
    • /
    • v.49 no.2
    • /
    • pp.295-305
    • /
    • 2017
  • This paper reviews current status of the unified approach known as integrated safety assessment (ISA), as well as the associated SCAIS (simulation codes system for ISA) computer platform. These constitute a proposal, which is the result of collaborative action among the Nuclear Safety Council (CSN), University of Madrid (UPM), and NFQ Solutions S.L, aiming to allow independent regulatory verification of industry quantitative risk assessments. The content elaborates on discussions of the classical treatment of time in conventional probabilistic safety assessment (PSA) sequences and states important conclusions that can be used to avoid systematic and unacceptable underestimation of the failure exceedance frequencies. The unified ISA method meets this challenge by coupling deterministic and probabilistic mutual influences. The feasibility of the approach is illustrated with some examples of its application to a real size plant.

Evaluation of Recent Data Processing Strategies on Q-TOF LC/MS Based Untargeted Metabolomics

  • Kaplan, Ozan;Celebier, Mustafa
    • Mass Spectrometry Letters
    • /
    • v.11 no.1
    • /
    • pp.1-5
    • /
    • 2020
  • In this study, some of the recently reported data processing strategies were evaluated and modified based on their capabilities and a brief workflow for data mining was redefined for Q-TOF LC-MS based untargeted metabolomics. Commercial pooled human plasma samples were used for this purpose. An ultrafiltration procedure was applied on sample preparation. Sample set was analyzed through Q-TOF LC/MS. A C18 column (Agilent Zorbax 1.8 µM, 50 × 2.1 mm) was used for chromatographic separation. Raw chromatograms were processed using XCMS - R programming language edition and Isotopologue Parameter Optimization (IPO) was used to optimize XCMS parameters. The raw XCMS table was processed using MS Excel to find reliable and reproducible peaks. Totally 1650 reliable and reproducible potential metabolite peaks were found based on the data processing procedures given in this paper. The redefined dataset was upload into MetaboAnalyst platform and the identified metabolites were matched with 86 metabolic pathways. Thus, two list were obtained and presented in this study as supplement files. The first list is to present the retention times and m/z values of detected metabolite peaks. The second list is the metabolic pathways related with the identified metabolites. The briefly described data processing strategies and dataset presented in this study could be beneficial for the researchers working on untargeted metabolomics for processing their data and validating their results.

PROCL:A Process Log Clustering System (PROCL:프로세스 로그 클러스터링 시스템)

  • Jung, Jae-Yoon
    • The Journal of Society for e-Business Studies
    • /
    • v.13 no.2
    • /
    • pp.181-194
    • /
    • 2008
  • Process mining aims at extracting useful information from system log of business process execution. As process-aware information systems, such as BPMS, ERP, and SCM, spread, researches on process mining get more significance. In this paper, we propose the methodology of clustering process log before process mining and also present the prototype system. The proposed methodology can be used in accompany with the existing process mining algorithms to improve their performance. The process log clustering system PROCLE, presented in this paper, supports to classify the process instances in the system log in order to extract the appropriate level of process model according to the users' need. The proposed methodology was implemented on the open platform for process mining, ProM.

  • PDF

A Study on The Personal Wallet Management System Using Beacon Signal Processing (비콘 신호 처리를 활용한 개인소지품 지갑 관리 시스템에 대한 연구)

  • Kim, Dong-Ik;Nam, Kang-Hyun;Lee, Hyeon-Yeong;Ahn, Tae-Uk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.5
    • /
    • pp.1109-1116
    • /
    • 2018
  • The purpose of this study is to solve the loss of personal belongings by utilizing monitoring function of IoT platform. The beacon to combined with personal belongings are registered with the application server, the trigger processing function according to the occurrence of the lost event is performed intelligently through the device, the app, the IoT network, and the application server.

A Survey of Trust Management in WSNs, Internet of Things and Future Internet

  • Chang, Kai-Di;Chen, Jiann-Liang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.5-23
    • /
    • 2012
  • Nowadays, most researchers and manufacturers always pay attention on wireless sensor networks (WSNs) due to its potential applications in many regions such as military, industrial and civilian areas. WSNs are the basic components of Internet of Things (IoT) and the key to machine-to-machine communications and the future Internet. Also, the security is an essential element for deploying WSNs. Recently the concept of trust-based mechanism was proposed in WSNs such as traditional cryptographic and authentication mechanisms. However, there is lack a survey on trust management for WSNs, IoT even future Internet. In this paper, we discuss the concept and potential application areas of trust management for WSNs and IoT worlds. Furthermore, we survey different trust management issues (i.e., cluster, aggregation, reputation). Finally, future research directions with respect to trust management in WSNs and future IoT world are provided. We give not only simple WSNs for IoT environments but also a simulated bootstrap platform to provide the discussion of open challenges and solutions for deploying IoT in Future Internet.

A Study on AI-based Autonomous Traffic Cone Tracking Algorithm for 1/5 scale Car Platform (인공지능기반 1/5 스케일 콘 추종 자율 주행 기법에 관한 연구)

  • Tae Min KIM;Seong Bin MA;Ui Jun SONG;Yu Bin WON;Jae Hyeok LEE;Kuk Won KO
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.283-284
    • /
    • 2023
  • 자율주행 경진대회에서 학생들의 장애물 후에 경로를 생성 능력을 검정하는 라바콘 추종 종목은 중요한 항목 중의 하나이다. 라바콘의 위치를 알기 위해서는 라이다 센서가 필요하다. 실내의 경우 저가의 2D 라이다 센서를 사용하여 콘의 위치 검출이 가능하지만, 실외의 경우에는 고가의 3D 라이다 센서 또는 고가의 3차원 카메라가 필요하다. 이러한 고가의 기자재는 실습의 대중화에 걸림돌이 되고 있으므로, 1개의 카메라와 인공지능을 이용한 라이다 콘의 검출하는 방법을 개발하였고, 이를 활용하여 경로 생성 및 제어를 수행하였다. 그 결과 0.4m 이내의 정밀도로 콘의 위치 추정과 주행을 성공적으로 수행하였다.

Determination of buildup factors for some human tissues using both MCNP5 and Phy-X / PSD

  • Mohammad M. Alda'ajeh;J.M. Sharaf;H.H. Saleh;Mefleh S. Hamideen
    • Nuclear Engineering and Technology
    • /
    • v.55 no.12
    • /
    • pp.4426-4430
    • /
    • 2023
  • In this article, Exposure Buildup Factor(EBF) and the Energy Absorption Buildup Factor(EABF) have been determined for blood, brain, and muscle using the Monte Carlo method which is represented by MCNP5 codes and compared with geometric progression(G-P) fitting method which is represented by Phy-X/PSD online platform. The novelty of the present work is used an energy source of less than 0.1 MeV to determine buildup factors using MCNP5 and using Phy-X/PSD for some human tissues. thus, the energy range used in this case study was 0.06-3 MeV for penetration depths covered 0.5-3 MFP. Results of MCNP5 and Phy-X/PSD are validated against reference values of water that were reported at ANS-6.4.3. present results of EABFs and EBFs for the previously mentioned human tissues appeared good agreement between MCNP5 in comparison with Phy-X/PSD, whereas, the maximum average relative deviation did not exceed 2.37%. results of our article can be used in different medical applications, such as brachytherapy, radiotherapy, and diagnostics.