• Title/Summary/Keyword: Mobile IoT

Search Result 478, Processing Time 0.03 seconds

Design of Voice Control Solution for Industrial Articulated Robot (산업용 다관절로봇 음성제어솔루션 설계)

  • Kwak, Kwang-Jin;Kim, Dae-Yeon;Park, Jeongmin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.2
    • /
    • pp.55-60
    • /
    • 2021
  • As the smart factory progresses, the use of automation facilities and robots is increasing. Also, with the development of IT technology, the utilization of the system using voice recognition is also increasing. Voice recognition technology is a technology that stands out in smart home and various IoT technologies, but it is difficult to apply to factories due to the specificity of factories. Therefore, in this study, a method to control an industrial articulated robot was designed using voice recognition technology that considers the situation at the manufacturing site. It was confirmed that the robot could be controlled through network protocol and command conversion after receiving voice commands for robot operation through mobile.

The Study on the Software Safety Maturity Model using CMMI and TMMi (CMMI와 TMMi를 이용한 소프트웨어 Safety 성숙도 모델에 대한 연구)

  • Lee, Seung-Mok;Kim, Young-Gon;An, Kyung-Soo
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.87-98
    • /
    • 2020
  • Recently, IoT, artificial intelligence, cloud, big data, and mobile fields have converged, leading to a new industrial era called the 4th industrial revolution. This 4th industrial revolution has been expanded to all industry area and Software has been taken as important role in this revolution. Thus Software Safety is the huge factor because Software is highly relevant to human safety in accordance with Software expansion. However this Software Safety has been focused on not organization improvement activities but current design/development, In this paper, to solve this issue, Software Safety Maturity level and relevant Process Area is defined. This study is expected to contribute to systematic software safety activities.

Deep Neural Network-Based Critical Packet Inspection for Improving Traffic Steering in Software-Defined IoT

  • Tam, Prohim;Math, Sa;Kim, Seokhoon
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.1-8
    • /
    • 2021
  • With the rapid growth of intelligent devices and communication technologies, 5G network environment has become more heterogeneous and complex in terms of service management and orchestration. 5G architecture requires supportive technologies to handle the existing challenges for improving the Quality of Service (QoS) and the Quality of Experience (QoE) performances. Among many challenges, traffic steering is one of the key elements which requires critically developing an optimal solution for smart guidance, control, and reliable system. Mobile edge computing (MEC), software-defined networking (SDN), network functions virtualization (NFV), and deep learning (DL) play essential roles to complementary develop a flexible computation and extensible flow rules management in this potential aspect. In this proposed system, an accurate flow recommendation, a centralized control, and a reliable distributed connectivity based on the inspection of packet condition are provided. With the system deployment, the packet is classified separately and recommended to request from the optimal destination with matched preferences and conditions. To evaluate the proposed scheme outperformance, a network simulator software was used to conduct and capture the end-to-end QoS performance metrics. SDN flow rules installation was experimented to illustrate the post control function corresponding to DL-based output. The intelligent steering for network communication traffic is cooperatively configured in SDN controller and NFV-orchestrator to lead a variety of beneficial factors for improving massive real-time Internet of Things (IoT) performance.

Community Health Center Digital Transition (마을 건강센터 디지털 전환)

  • Han, Jeong-won;Han, June-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.514-516
    • /
    • 2022
  • Busan Metropolitan City runs Community Health Center which aims to health care service based on the community, besides the established health medical service towards people with low-income. 71 centers are run in 2021, therefore, this papear explores the way of digital transition of these centers. Digital Technologies possibly adopted inside the centers are: First, smart devices to advance the management system of chronical diseases based on health index; Second, IoT with mobile tech to manage health index; Third, AI Robot to care lone elderly people and to warn the emergency.

  • PDF

A study on Strengthening Cyber Capabilities According to the Digital Transformation in the Defense Sector (국방 디지털 전환에 따른 사이버역량 강화 방안 연구)

  • InJung Kim;Soojin Lee
    • Convergence Security Journal
    • /
    • v.21 no.4
    • /
    • pp.3-13
    • /
    • 2021
  • As new technologies such as artificial intelligence (AI), cloud, Internet of Things (IoT), big data, and mobile become organically integrated, a new era of digital transformation is emerging. As a result of this digital transformation, cybersecurity issues have surfaced as a negative side effect. Cyberspace, unlike physical space, has no clear limits, which leads to additional side effects and hazards. While promoting digital transformation in defense, conventional customs and behavioral approaches make it difficult to alter the cybersecurity strategy, even if it is vital to comprehend and prepare the attributes associated with time and technology trends. As a result, in this study, we will look at the direction of technology application in the defense as a result of digital transformation and analyze how to correlate from the standpoint of cybersecurity.

Ontology-based Positioning Systems for Indoor LBS (온톨로지 기반의 실내 LBS를 위한 위치 추적 시스템)

  • Hwang, Chi-Gon;Yoon, Chang-Pyo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.6
    • /
    • pp.1123-1128
    • /
    • 2016
  • Recently BLE beacon has been widely used as a method for measuring the indoor location in the IoT Technique. But it requires a filtering technique for the measurement of the correct position. It is used the most fixed beacon. It is not accurate that calculates the position information through the identification of the beacon signal. Therefore, filtering is important. So it takes a lot of time, position measurement and filtering. Thus, we is to measure the exact position at the indoor using a mobile beacon. The measured beacon signal is composed of an ontology for reuse in the same pattern. RSSI is measured the receiver is the distance of the beacon. And this value configure the location ontology to be normalized by the relationship analysis between the values. The ontology is a method for calculating the position information of the moving beacon. It can detect fast and accurate indoor position information and provide the service.

Priority Analysis of Information Security Policy in the ICT Convergence Industry in South Korea Using Cross-Impact Analysis (교차영향분석을 이용한 국내 ICT 융합산업의 정보보호정책 우선순위 분석)

  • Lee, Dong-Hee;Jun, Hyo-Jung;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.695-706
    • /
    • 2018
  • In recent years, industrial convergence centered on ICBM (internet of things (IoT), cloud, big data, mobile) has been experiencing rapid development in various fields such as agriculture and the financial industry. In order to prepare for cyber threats, one of the biggest problems facing the convergence industry in the future, the development of the industry must proceed in tandem with a framework of information security. In this study, we analyze the details of the current industrial development policy and related information protection policies using cross impact analysis and present policy priorities through the expert questionnaire. The aim of the study was to clarify the priorities and interrelationships within information security policy as a first step in suggesting effective policy direction. As a result, all six information security policy tasks derived from this study belong to key drivers. Considering the importance of policies, policies such as improving the constitution of the security industry and strengthening of support, training of information protection talent, and investing in the information security industry need to be implemented relatively first.

Development of an Interface for Data Visualization and Controlling of Classified Objects based on User Conditions (사용 상황에 맞게 분류된 사물의 데이터 시각화와 제어를 위한 인터페이스 개발)

  • Park, Heesung;Han, Minseok;Choi, Yuri
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.7
    • /
    • pp.320-325
    • /
    • 2016
  • By developing the IoT(Internet of Things) technology, devices for smart home environment have rapidly increased. With respect to mobiles, these applications are used to control and manage the various smart devices effectively. However, the existing mechanisms only provide simple information, and hence a difficulty to search or control the smart devices persists, since there is no meaningful relationship between them. In this research, we suggest an interface which visualizes the device's data and controls them effectively, based on the user's device using pattern. As a solution for this problem, we classify the user pattern based on a timeline for the associated circumstance, and visualize the device's data to make a group or to control individually in an easier approach. Also, all meaningful information could be confirmed by summarizing all the data of smart devices.

A Dual Security Technique based on Beacon (비콘 기반의 이중 보안 기법)

  • Park, Sang-Min;Kim, Chul-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.8
    • /
    • pp.311-317
    • /
    • 2016
  • Many services have been developed that are based on smart devices, and security between devices is emphasized. A beacon on the current IoT(Internet of Things) services has been utilized in the commercial field and is being applied to the services of the home IoT. On the other hand, the beacon is weak to security using Bluetooth-based services. Therefore, it is important to strengthen the security of the beacon. This paper proposes a dual security technique that can enhance the security of beacon-based services. The dual security architecture and security process is proposed based on beacon and authentication service. In addition, mobile application was developed and validated based on the beacon for proving the suitability of the proposed technique. The experimental method for verification are the authentication failure case, such as 1st authentication fail, and authentication success case, such as 1st authentication success and 2nd authentication success. The components of the verification experiments consists of two beacons (matched with Beacon ID, mismatched with Beacon ID), one mobile device and authentication application. This was tested to verify the compatibility of the dual security architecture and 1st/2nd authentication process.

Design of Encryption/Decryption IP for Lightweight Encryption LEA (경량 블록암호 LEA용 암·복호화 IP 설계)

  • Sonh, Seungil
    • Journal of Internet Computing and Services
    • /
    • v.18 no.5
    • /
    • pp.1-8
    • /
    • 2017
  • Lightweight Encryption Algorithm(LEA) was developed by National Security Research Institute(NSRI) in 2013 and targeted to be suitable for environments for big data processing, cloud service, and mobile. LEA specifies the 128-bit message block size and 128-, 192-, and 256-bit key sizes. In this paper, block cipher LEA algorithm which can encrypt and decrypt 128-bit messages is designed using Verilog-HDL. The designed IP for encryption and decryption has a maximum throughput of 874Mbps in 128-bit key mode and that of 749Mbps in 192 and 656Mbps in 256-bit key modes on Xilinx Vertex5. The cryptographic IP of this paper is applicable as security module of the mobile areas such as smart card, internet banking, e-commerce and IoT.