• Title/Summary/Keyword: information and communications technology convergence

Search Result 300, Processing Time 0.031 seconds

A Study on Recognition of Artificial Intelligence Utilizing Big Data Analysis (빅데이터 분석을 활용한 인공지능 인식에 관한 연구)

  • Nam, Soo-Tai;Kim, Do-Goan;Jin, Chan-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.129-130
    • /
    • 2018
  • Big data analysis is a technique for effectively analyzing unstructured data such as the Internet, social network services, web documents generated in the mobile environment, e-mail, and social data, as well as well formed structured data in a database. The most big data analysis techniques are data mining, machine learning, natural language processing, and pattern recognition, which were used in existing statistics and computer science. Global research institutes have identified analysis of big data as the most noteworthy new technology since 2011. Therefore, companies in most industries are making efforts to create new value through the application of big data. In this study, we analyzed using the Social Matrics which a big data analysis tool of Daum communications. We analyzed public perceptions of "Artificial Intelligence" keyword, one month as of May 19, 2018. The results of the big data analysis are as follows. First, the 1st related search keyword of the keyword of the "Artificial Intelligence" has been found to be technology (4,122). This study suggests theoretical implications based on the results.

  • PDF

An Insight Study on Keyword of IoT Utilizing Big Data Analysis (빅데이터 분석을 활용한 사물인터넷 키워드에 관한 조망)

  • Nam, Soo-Tai;Kim, Do-Goan;Jin, Chan-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.146-147
    • /
    • 2017
  • Big data analysis is a technique for effectively analyzing unstructured data such as the Internet, social network services, web documents generated in the mobile environment, e-mail, and social data, as well as well formed structured data in a database. The most big data analysis techniques are data mining, machine learning, natural language processing, and pattern recognition, which were used in existing statistics and computer science. Global research institutes have identified analysis of big data as the most noteworthy new technology since 2011. Therefore, companies in most industries are making efforts to create new value through the application of big data. In this study, we analyzed using the Social Matrics which a big data analysis tool of Daum communications. We analyzed public perceptions of "Internet of things" keyword, one month as of october 8, 2017. The results of the big data analysis are as follows. First, the 1st related search keyword of the keyword of the "Internet of things" has been found to be technology (995). This study suggests theoretical implications based on the results.

  • PDF

The Research on Blockchain-based Secure loT Authentication (블록체인 기반 사물인터넷 인증 연구)

  • Hong, Sunghyuck;Park, Sanghee
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.11
    • /
    • pp.57-62
    • /
    • 2017
  • With various sensors and communications capabilities, the Internet is growing larger as the internet can communicate with the Internet. Given the growing vulnerability of the internet market, the development of security and security is increasing, and the development of the internet is actively evolving and the development of the internet is actively being carried out. In particular, it is required to introduce lightweight and secure authentication schemes, especially those that are difficult to use due to the difficulty of using authentication schemes. Thus, the safety of the secure authentication system of the Internet is becoming very important. Therefore, in this thesis, we propose certification technologies on secure objects to ensure correct, safe communication in the context of the internet context.

Design of Emergency Notification Smart Farm Service Model based on Data Service for Facility Cultivation Farms Management (시설 재배 농가 관리를 위한 데이터 서비스 기반의 비상 알림 스마트팜 서비스 모델 설계)

  • Bang, Chan-woo;Lee, Byong-kwon
    • Journal of Advanced Technology Convergence
    • /
    • v.1 no.1
    • /
    • pp.1-6
    • /
    • 2022
  • Since 2015, the government has been making efforts to distribute Korean smart farms. However, the supply is limited to large-scale facility vegetable farms due to the limitations of technology and current cultivation research data. In addition, the efficiency and reliability compared to the introduction cost are low due to the simple application of IT technology that does not consider the crop growth and cultivation environment. Therefore, in this paper, data analysis services was performed based on public and external data. To this end, a data-based target smart farm system was designed that is suitable for the situation of farms growing in facilities. To this end, a farm risk information notification service was developed. In addition, light environment maps were provided for proper fertilization. Finally, a disease prediction model for each cultivation crop was designed using temperature and humidity information of facility farms. Through this, it was possible to implement a smart farm data service by linking and utilizing existing smart farm sensor data. In addition, economic efficiency and data reliability can be secured for data utilization.

DLNA Protocol Inspection Tool for Compatibility Analysis

  • Park, Se-Ho;Park, Yong-Suk;Seo, Jeong-Wook;Choi, Jun-Rim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.6
    • /
    • pp.2104-2117
    • /
    • 2014
  • The propagation of smart devices and the rapid expansion of wireless mobile networks have increased the need for ubiquitous device connectivity and contents access. DLNA is currently being used as the de facto standard for connectivity of consumer devices in the digital home. The guidelines provided by DLNA are intended to facilitate device and contents discovery, management, sharing and distribution. However, consumer experience with DLNA has been rather poor and usability not up to speed. Different problems and issues in limited compatibility have been reported due to manufacturer customizations. Such compatibility issues are often difficult to identify by average consumers who are not savvy in information communications and multimedia technology. In this paper, the design and implementation of a DLNA protocol inspection tool is presented for compatibility analysis among DLNA certified devices. The tool monitors the home network and performs analysis of the underlying protocols used by DLNA. The tool can be used for diagnostics and troubleshooting, enabling the user to identify compatibility issues between devices or problems in the network.

Bidirectional Personalized Mobile Broadcasting System (양방향 개인맞춤형 모바일 방송 시스템)

  • Lee, Hee-Kyung;Yang, Seung-Jun;Lee, Han-Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2B
    • /
    • pp.361-371
    • /
    • 2010
  • To vitalize the terrestrial DMB market, we introduce a personalized DMB(PDMB) service model based on metadata, especially DMB ECG XML standardized by TTA, under the convergence of broadcasting and telecommunications. Also we introduce the personalized DMB service system developed to validate the conformance of DMB ECG XML standard and the usefulness of DMB ECG service. The personalized DMB service system is described in details from the authoring stage to the consumption stage of the contents. The results of experimental tests for the personalized DMB service system are also introduced in this paper. We finally address the possibility of making successful personalized DMB services in mobile multimedia broadcasting market.

The Popularization of True Self Tea Ceremony Using the Standard Web Protocol Technology (표준 웹 프로토콜 기술을 융합한 참나다례의 대중화)

  • Kim, In-Sook;Cho, Kwangmoon;Kim, Tae-Kook
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.2
    • /
    • pp.253-258
    • /
    • 2017
  • Urbanization, industrialization, and informatization raised quality of life in modern society. However, many people face with social maladjustment phenomena of human alienation and loss of true self due to mechanization, competition and stress. To alleviate the social maladjustment, people should look for their true self and the self. Drinking tea may play an important role in bringing your true self and the self and be a vehicle for them to meet in daily life. Therefore, this study uses the standard web protocol technology to popularize the True Self Tea Ceremony which helps to enhance true self and self-respect. The True Self Tea Ceremony uses the basic utensils. The paper proposes the popularization of the True Self Tea Ceremony using the standard web protocol technology. Using the standard web protocol technology enhances the accessibility of users.

A study on Biz Models Through the T-DMB Total Solution Developed by the Convergence of Communication and Broadcasting Technologies (통신.방송 융합기술 지상파 DMB Total Solution 비즈 모델 연구)

  • Eun, Jong-Won
    • Journal of Satellite, Information and Communications
    • /
    • v.6 no.2
    • /
    • pp.15-19
    • /
    • 2011
  • The T-DMB(Terrestrial Digital Multimedia Broadcasting) which was developed by the convergence of digital broadcasting technology and communication technology provides us with very good quality of music like CD, and provides TV services in a super express train like the KTX whose velocity is over 300 Km per hour. The T-DMB is diffusing toward the world as a technology which is be able to provide the various convergent services of broadcasting and communication through mobile phone, PDA, dedicated terminal, and so on. A business model needed for the diffusion of the T-DMB toward the world was established and utilized to expand the T-DMB into Vietnam in the paper. In addition, this paper describes not only some predicting methods for the technological valuation of the T-DMB Total Solution, but also a case study on the marketing related to establishing the T-DMB system in order to provide the paid services in Vietnam. Finally, A couple of business models needed to globally expand the T-DMB have been provided.

A Study on Green Drive control for fuel consumption reduction of the vehicle based on traffic information at the bottleneck (차량의 연료 소비 감소를 위한 병목 도로에서 도로 교통 정보 기반 Green Drive 제어에 관한 연구)

  • Cho, Dae-Hyun;Lee, Chung-Hoon;Lim, Myung-Seob
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.13 no.3
    • /
    • pp.162-165
    • /
    • 2012
  • In this paper, the method of controlling velocity between joining vehicles at the point of bottleneck using information and communications technology of WAVE method based V2V and V2I are proposed for the driving with high fuel efficiency. Using the derived fuel-efficiency comparative analysis model, it was shown that the proposed method's fuel efficiency is better than traffic light method demanding periodically vehicle's stop. Also, this method provides the derivation algorithm for deceleration and acceleration for controlling velocity between vehicles approaching bottleneck area.

Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems

  • Kang, Jin-Suk;Choi, Yong-Sik;Sung, Mee-Young;Shin, Seung-Ho;Jeong, Tai-Keong T.
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.3
    • /
    • pp.254-258
    • /
    • 2007
  • Recently, ubiquitous computing in being actively researched and one of the main technology in ubiquitous computing environments is recognized as RFID system. The RFID system has much benefits but simultaneously has some problems such as user's privacy violation. In this paper, in order to improve the survivability of its nodes, it should build available simulation surrounding sensor nodes. Also, In the proposed cryptosystems we use a new hash function for user authentication and a stream cipher based on LFSR(Linear Feedback Shift Register) for message encryption and decryption. Moreover, each algorithm is programmed with C language and simulated on IBM-PC system and we analyze the randomness properties of the proposed algorithms by using statistical tests.