• Title/Summary/Keyword: Mobile IoT

Search Result 478, Processing Time 0.028 seconds

A Fast and Scalable Image Retrieval Algorithms by Leveraging Distributed Image Feature Extraction on MapReduce (MapReduce 기반 분산 이미지 특징점 추출을 활용한 빠르고 확장성 있는 이미지 검색 알고리즘)

  • Song, Hwan-Jun;Lee, Jin-Woo;Lee, Jae-Gil
    • Journal of KIISE
    • /
    • v.42 no.12
    • /
    • pp.1474-1479
    • /
    • 2015
  • With mobile devices showing marked improvement in performance in the age of the Internet of Things (IoT), there is demand for rapid processing of the extensive amount of multimedia big data. However, because research on image searching is focused mainly on increasing accuracy despite environmental changes, the development of fast processing of high-resolution multimedia data queries is slow and inefficient. Hence, we suggest a new distributed image search algorithm that ensures both high accuracy and rapid response by using feature extraction of distributed images based on MapReduce, and solves the problem of memory scalability based on BIRCH indexing. In addition, we conducted an experiment on the accuracy, processing time, and scalability of this algorithm to confirm its excellent performance.

Implementation of Domain Separation-based Security Platform for Smart Device (안전한 스마트 단말을 위한 도메인 분리 기반 보안 플랫폼 구현)

  • Kim, Jeong Nyeo
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.471-476
    • /
    • 2016
  • Recently, important information related with smart work such as office and video conference are handled in smart device quite a lot compare with before. Also, execution environment of smart devices is getting developed as open software environment. It brought convenience to download and use any kind of application software. By that, security side of smart devices became vulnerable. This paper will discuss characteristics of smart device security technology based on virtualization that is a mobile device platform with isolated secure execution area based on TEE (Trusted Execution Environment). Also, this paper will suggest an implementation method about safe smart device security platform based on domain separation for application software which can be executed in smart devices. The domain separation based smart device security platform technology in this paper blocks unauthorized access and leakage of sensitive information in device. Also it will be the solution can block transmission and execution of malicious code in various area including variety of IoT devices in internet rather than just smart devices.

Privacy Vulnerability Analysis on Shuai et al.'s Anonymous Authentication Scheme for Smart Home Environment (Shuai등의 스마트 홈 환경을 위한 익명성 인증 기법에 대한 프라이버시 취약점 분석)

  • Choi, Hae-Won;Kim, Sangjin;Jung, Young-Seok;Ryoo, Myungchun
    • Journal of Digital Convergence
    • /
    • v.18 no.9
    • /
    • pp.57-62
    • /
    • 2020
  • Smart home based on Internet of things (IoT) is rapidly emerging as an exciting research and industry field. However, security and privacy have been critical issues due to the open feature of wireless communication channel. As a step towards this direction, Shuai et al. proposed an anonymous authentication scheme for smart home environment using Elliptic curve cryptosystem. They provided formal proof and heuristic analysis and argued that their scheme is secure against various attacks including de-synchronization attack, mobile device loss attack and so on, and provides user anonymity and untraceability. However, this paper shows that Shuai et al.'s scheme does not provide user anonymity nor untraceability, which are very important features for the contemporary IoT network environment.

A Study of Structural Relationship on Intention to Accept Technology of Potential Users in University Library Mobile Self Check-Out Service (대학도서관 이용자의 모바일 자가대출서비스 수용의도에 관한 구조적 관계 연구)

  • Park, Tae-Yeon;Nam, Jae-woo
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.28 no.4
    • /
    • pp.341-362
    • /
    • 2017
  • This study is to analyze the applicability of new technologies to be applied to the foreseeable future's library. For this purpose, we measured the users' intention to accept the service by using the NFC based self-check out service as a new technology applicable to the library. Based on the Unified Theory of Acceptance Use of Technology (UTAUT), research models were derived, and the structural relationships between performance expectations, effort expectations, facilitation conditions, and perceived risks were analyzed. As a result of the analysis, perceived threats in the library did not affect the intention to use, and the performance expectation, effort expectation, and facilitation condition partially affected the intention to use. The gender of the moderator variable, there were some significant difference in promoting conditions.

An Socio-Economic Effect Analysis of Using Open Spectrum in Korea (개방형 스펙트럼 이용의 사회경제적 파급 효과 분석)

  • Park, Seok-Ji;Park, Duk-Kyu;Kim, Chang-Joo;Kang, Young-Heung
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.25 no.10
    • /
    • pp.983-994
    • /
    • 2014
  • In this paper, we analyze the telecom services and their socio-economic effect of using open spectrum, which is to access sharing spectrum. For this, we suggest a concept and a classification of open spectrum as spectrum access model and make a survey for analyzing the socio-economic effect of spectrum, 2,605 MHz which is candidated for sharing between 2.9~5.925 Hz in Korea. From survey results, we propose Mobile Telecommunications Assist Service and WiFi as the most effective services and Smart Car Service and M2M, IoT, and RFID/USN Service as the effective services to open spectrum.

A Study on the Near Field IoT Medical Receipt System Based on Uncontact (언택트 기반의 근거리 무선 IoT 의료접수 시스템에 관한 연구)

  • Baek, Yu-Jin;Lee, Hyo-Seung;Oh, Jae-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.4
    • /
    • pp.785-790
    • /
    • 2020
  • In addition to the Fourth Industrial Revolution, interest and research on medical information are actively being conducted. As the technologies using short-range low-power wireless communication are applied in connection with mobile devices, the utilization of them in medical institutions is gradually increasing, and the demand of customers who want to receive high-quality services using IT technology is increasing in the medical environment according to the development and change of technology. In addition, modern people who are familiar with smart equipment and consider the value of time is important do not waste their time through rapid service. In addition, as the recent epidemics including Coronavirus Disease 2019 (COVID-19) have become popular, interest in untapped (non-face-to-face) has increased, and social distance is needed as a preliminary measure against infectious diseases. For this reason, this study studied the untapped-based medical reception system to provide quick service to patients using short-range low-power wireless communication and to provide safer and more comfortable environment for medical staff and visitors.

An Analysis on Building Steps of LFS Linux System (LFS 리눅스 시스템 구축 과정 분석)

  • Lee, Kyesang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.2
    • /
    • pp.316-321
    • /
    • 2017
  • With the recent wide adoption of Linux in the fields of IoT, embedded, mobile, desktop and server industries, the importances of understanding the Linux system architecture as well as customizing the Linux system are increasing very steeply. Accordingly, the capabilities of building every component of Linux system from source code files have been important. The LFS (Linux From Scratch) site[1] guides the steps of building the basic Linux system from source files. The steps consist of build host preparation step, temporary system building step, final system building step, and system configuration and boot preparation step. However, the underlying concepts behind the steps used in building LFS are difficult to understand, particularly to the beginner. This paper analyzes the LFS build steps and reveal the core build concepts and principles used in each step. Additionally, this paper shows the measured package build times obtained from our build experience.

Design and Implementation of Context Awareness Smart Jewelry Device (상황인식 스마트 주얼리 디바이스 설계 및 구현)

  • Kang, YunJeong;Choi, DongOun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2113-2118
    • /
    • 2016
  • Smart Jewelry is applied to the components of the Internet of Things. The process of obtaining the status information to the input of the sensor. And it controls the light color of the LED. Because to express the beauty of twinkling lights that can be felt in the jewelery and aesthetic functions were applied in order to feel the mystery. Smart Jewelry is capable of communication, interaction, wearable. Smart jewelery was equipped with a color, temperature, ambient light sensor. It was designed to allow interaction with a Bluetooth module. Applying an algorithm so that the light jewelry colors can vary depending on the circumstances of the smart jewelry wearer had been implemented by the mobile application. It can be realized in digital technology and the convergence of life. It presents the orientation development of the smart jewelery device on IoT environment.

The Method for Extracting Meaningful Patterns Over the Time of Multi Blocks Stream Data (시간의 흐름과 위치 변화에 따른 멀티 블록 스트림 데이터의 의미 있는 패턴 추출 방법)

  • Cho, Kyeong-Rae;Kim, Ki-Young
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.377-382
    • /
    • 2014
  • Analysis techniques of the data over time from the mobile environment and IoT, is mainly used for extracting patterns from the collected data, to find meaningful information. However, analytical methods existing, is based to be analyzed in a state where the data collection is complete, to reflect changes in time series data associated with the passage of time is difficult. In this paper, we introduce a method for analyzing multi-block streaming data(AM-MBSD: Analysis Method for Multi-Block Stream Data) for the analysis of the data stream with multiple properties, such as variability of pattern and large capacitive and continuity of data. The multi-block streaming data, define a plurality of blocks of data to be continuously generated, each block, by using the analysis method of the proposed method of analysis to extract meaningful patterns. The patterns that are extracted, generation time, frequency, were collected and consideration of such errors. Through analysis experiments using time series data.

A Study on Internet Technology Perspective Applicable in Industrial Environments (산업환경에서 적용 가능한 사물인터넷 기술 전망에 한 연구)

  • Hong, Sunghyuck
    • Journal of Industrial Convergence
    • /
    • v.17 no.2
    • /
    • pp.21-27
    • /
    • 2019
  • The Internet of things is the infrastructure that can communicate with each other by exchanging information by installing antennas that can communicate with all things in the world. The reason why the Internet of Things is the core of the Fourth Industrial Revolution is that data is collected through the Internet to be. Technology of things Internet and Trend of Things Internet IoT (Internet of Things) is a concept that enables internet connection and communication between devices equipped with various sensors. It is the core IT trend of lot, technology such as big data, mobile, cloud And to provide information for the development of the industrial environment through research on the importance of the Internet of things, the core of the Fourth Industrial Revolution and the processing and analysis techniques of Big Data. By providing various security measures and future technologies, This study was conducted to contribute to management.