• Title/Summary/Keyword: Smart LED

Search Result 473, Processing Time 0.022 seconds

Design of Trajectory Data Indexing and Query Processing for Real-Time LBS in MapReduce Environments (MapReduce 환경에서의 실시간 LBS를 위한 이동궤적 데이터 색인 및 검색 시스템 설계)

  • Chung, Jaehwa
    • Journal of Digital Contents Society
    • /
    • v.14 no.3
    • /
    • pp.313-321
    • /
    • 2013
  • In recent, proliferation of mobile smart devices have led to big-data era, the importance of location-based services is increasing due to the exponential growth of trajectory related data. In order to process trajectory data, parallel processing platforms such as cloud computing and MapReduce are necessary. Currently, the researches based on MapReduce are on progress, but due to the MapReduce's properties in using batch processing and simple key-value structure, applying MapReduce framework for real time LBS is difficult. Therefore, in this research we propose a suitable system design on efficient indexing and search techniques for real time service based on detailed analysis on the properties of MapReduce.

Security Vulnerability of Internet of Things and Its Solution (사물인터넷 보안 문제제기와 대안)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.1
    • /
    • pp.69-78
    • /
    • 2015
  • Internet of Things(IoT) is electronic devices and household appliances use wireless sensor network in environment of high speed wireless network and LTE mobile service. The combination of the development of Internet and wireless network led to development of new forms of service such as electronic devices and household appliances can connect to the Internet through various sensors and online servers such as a Home Network. Even though Internet of Things is useful, there are problems in Internet of Things. In environment of Internet of Things, information leakage could happens by illegal eavesdropping and spoofing. Also illegal devices of wireless communication interference can cause interfere in Internet of things service, physical damage and denial of service by modulation of data and sensor. In this thesis, it will analyze security threats and security vulnerability in environment of mobile services and smart household appliances, then it will suggest plan. To solve security issues, it is important that IT and RFID sensor related companies realize importance of security environment rather than focus on making profit. It is important to develop the standardized security model that applies to the Internet of Things by security-related packages, standard certification system and strong encrypted authentication.

Classifier Combination Based Source Identification for Cell Phone Images

  • Wang, Bo;Tan, Yue;Zhao, Meijuan;Guo, Yanqing;Kong, Xiangwei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.5087-5102
    • /
    • 2015
  • Rapid popularization of smart cell phone equipped with camera has led to a number of new legal and criminal problems related to multimedia such as digital image, which makes cell phone source identification an important branch of digital image forensics. This paper proposes a classifier combination based source identification strategy for cell phone images. To identify the outlier cell phone models of the training sets in multi-class classifier, a one-class classifier is orderly used in the framework. Feature vectors including color filter array (CFA) interpolation coefficients estimation and multi-feature fusion is employed to verify the effectiveness of the classifier combination strategy. Experimental results demonstrate that for different feature sets, our method presents high accuracy of source identification both for the cell phone in the training sets and the outliers.

Modeling of Ransomware using Colored Petri Net (칼라 페트리 네트를 이용한 랜섬웨어의 모델링)

  • Lee, Yo-Seob
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.2
    • /
    • pp.449-456
    • /
    • 2018
  • The advent of cryptography has become a means of obtaining real monetary benefits to hackers, which has recently led to a surge in the number of Ransomware and the associated damage has increased significantly. It is expected that malicious codes will be expanded to new areas by meeting passwords, and Ransomware will be further increased in the future. To solve these problems, we need a model that can detect and block intrusion of Ransomware by analyzing the intrusion path of Ransomware. In this paper, we collect and analyze the data of Ransomware, and create and analyze Ransomware's color Petri net model.

The Study on the Development Trend of the Times toward Digital Clothing (디지털 의류[Digital Clothing]의 시대적 개발 경향 연구)

  • Kwak, Tai-Gi
    • Journal of the Korean Society of Costume
    • /
    • v.59 no.4
    • /
    • pp.111-125
    • /
    • 2009
  • The period from the early years of the 21st Century, when the birth of Digital Clothing received as a kind of digital cultures in the modern information society, to the present time, the period is studied on as a social transition in the revolutionary digital technology in parallel with the fashion changes which have an effect on our thoughts and our life style. After the 2000's, when digital was perceived as a culture, information technology came into being owing to the technological development in the network and informative and communicative technology. This study tried to grasp the tendency of the times to Digital Clothing, which occurred in the new situation of Digital Technology, and then on the base of it, tried to classify the expressive characteristics in the Digital Clothing as the Cyberspace, Global Network, high functionality Smart Textiles and digital technology. The social reformation by the revolutionary digital technology is coming forth in the New Fashion of the digital Clothing, with the development of technology and network in the Cyberspace and real space. the Digital Clothing which led to the revolutionary change in New Fashion occurred, and by the same time, gradually the phenomena of Digital Consuming Culture is expansive.

A NoSQL data management infrastructure for bridge monitoring

  • Jeong, Seongwoon;Zhang, Yilan;O'Connor, Sean;Lynch, Jerome P.;Sohn, Hoon;Law, Kincho H.
    • Smart Structures and Systems
    • /
    • v.17 no.4
    • /
    • pp.669-690
    • /
    • 2016
  • Advances in sensor technologies have led to the instrumentation of sensor networks for bridge monitoring and management. For a dense sensor network, enormous amount of sensor data are collected. The data need to be managed, processed, and interpreted. Data management issues are of prime importance for a bridge management system. This paper describes a data management infrastructure for bridge monitoring applications. Specifically, NoSQL database systems such as MongoDB and Apache Cassandra are employed to handle time-series data as well the unstructured bridge information model data. Standard XML-based modeling languages such as OpenBrIM and SensorML are adopted to manage semantically meaningful data and to support interoperability. Data interoperability and integration among different components of a bridge monitoring system that includes on-site computers, a central server, local computing platforms, and mobile devices are illustrated. The data management framework is demonstrated using the data collected from the wireless sensor network installed on the Telegraph Road Bridge, Monroe, MI.

Effects of Consumer Self-Determination Motivation and Service Quality on Purchase Intention of Omni-Channel Service in Omni-Channel Environment (옴니채널 환경에서 소비자의 자기결정 동기와 서비스품질이 옴니채널 서비스 구매의도에 미치는 영향)

  • Park, Joonyong;Kim, Ji Su;Kim, Renee B.
    • Journal of Information Technology Services
    • /
    • v.18 no.4
    • /
    • pp.23-38
    • /
    • 2019
  • With the development of information and communication technology, logistics distribution systems and services have been improved, new types of services have been provided, and consumption patterns in consumer markets have also changed. In the domestic distribution market, the development of ICT technology, the spread of smart devices, and the growth of the e-commerce market have led to Omni-channel, a service that integrates offline channels and online channels. Omni-channel service aims to provide consumers with consistent and convenient service by integrating offline and online domain into one. Consumers can get integrated service on and offline. In this study, consumers' intention to use Omni-channel was examined by Self Determination Theory and SERVQUAL. The survey was conducted on Omni-channel user and the research model was composed of 2nd order factor model considering the characteristics of Omni-channel which provides integrated service based on the prior literature and PLS-SEM (partial least squares structural equation modeling).

Test on the anchoring components of steel shear keys in precast shear walls

  • Shen, Shao-Dong;Pan, Peng;Li, Wen-Feng;Miao, Qi-Song;Gong, Run-Hua
    • Smart Structures and Systems
    • /
    • v.24 no.6
    • /
    • pp.783-791
    • /
    • 2019
  • Prefabricated reinforced-concrete shear walls are used extensively in building structures because they are convenient to construct and environmentally sustainable. To make large walls easier to transport, they are divided into smaller segments and then assembled at the construction site using a variety of connection methods. The present paper proposes a precast shear wall assembled using steel shear keys, wherein the shear keys are fixed on the embedded steel plates of adjacent wall segments by combined plug and fillet welding. The anchoring strength of shear keys is known to affect the mechanical properties of the wall segments. Loading tests were therefore performed to observe the behavior of precast shear wall specimens with different anchoring components for shear keys. The specimen with insufficient strength of anchoring components was found to have reduced stiffness and lateral resistance. Conversely, an extremely high anchoring strength led to a short-column effect at the base of the wall segments and low deformation ability. Finally, for practical engineering purposes, a design approach involving the safety coefficient of anchoring components for steel shear keys is suggested.

Structural Optimization of Additive/Subtractive Hybrid Machines (3D적층/절삭 하이브리드가공기의 구조최적화에 관한 연구)

  • Park, Joon-Koo;Kim, Eun-Jung;Lee, Choon-Man
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.20 no.2
    • /
    • pp.45-50
    • /
    • 2021
  • In the recent fourth industrial revolution, the demand for additive processes has emerged rapidly in many mechanical industries, including the aircraft and automobile industries. Additive processes, in contrast to subtractive processes, can be used to produce complex-shaped products, such as three-dimensional cooling systems and aircraft parts that are difficult to produce using conventional production technologies. However, the limitations of additive processes include nonuniform surface quality, which necessitates the use of post-processing techniques such as subtractive methods and grinding. This has led to the need for hybrid machines that combine additive and subtractive processes. A hybrid machine uses additional additive and subtractive modules, so product deformation, for instance, deflection, is likely to occur. Therefore, structural analysis and design optimization of hybrid machines are essential because these defects cause multiple problems, such as reduced workpiece precision during processing. In this study, structural analysis was conducted before the development of an additive/subtractive hybrid processing machine. In addition, structural optimization was performed to improve the stability of the hybrid machine.

Intelligent Piracy Site Detection Technique with High Accuracy

  • Kim, Eui-Jin;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.285-301
    • /
    • 2021
  • Recently, with the diversification of media services and the development of smart devices, users have more opportunities to use digital content, such as movies, dramas, and music; consequently, the size of the copyright market expands simultaneously. However, there are piracy sites that generate revenue by illegal use of copyrighted works. This has led to losses for copyright holders, and the scale of copyrighted works infringed due to the ever-increasing number of piracy sites has increased. To prevent this, government agencies respond to copyright infringement by monitoring piracy sites using online monitoring and countermeasure strategies for infringement. However, the detection and blocking process consumes a significant amount of time when compared to the rate of generating new piracy sites. Hence, online monitoring is less effective. Additionally, given that piracy sites are sophisticated and refined in the same way as legitimate sites, it is necessary to accurately distinguish and block a site that is involved in copyright infringement. Therefore, in this study, we analyze features of piracy sites and based on this analysis, we propose an intelligent detection technique for piracy sites that automatically classifies and detects whether a site is involved in infringement.