• Title/Summary/Keyword: internet of things (IoT)

Search Result 1,866, Processing Time 0.032 seconds

Major Technologies and Introduction of Smart Factory (스마트 팩토리의 주요기술과 도입사례)

  • Woo, Sung-Hee;Cho, Young-Bok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.487-490
    • /
    • 2018
  • As the fourth industrial revolution 4.0 era arrives, the role of smart factory is emerging, which establishes a communication system between production devices and products through the Internet of Things and optimizes the entire production process. Germany wants to use smart factory technologies and data to upgrade and standardize the industry as a whole to create factories around the world, and the United States is aiming to create new business models and revenue streams by analyzing big data and improving productivity based on the technological prowess and innovation across ICT. In addition, Japan and China are also working to change and upgrade their manufacturing industries through smart factories. Accordingly, Korea is attempting to introduce smart factory based on the production industry 3.0. Therefore, this study describes the industrial trends of the fourth industrial revolution and smart factory and compares the major underlying technologies and introduction cases of smart factory.

  • PDF

Mobility Management for ILNP-based Tactical Network (전술 네트워크를 위한 ILNP 기반 환경에서의 이동성 관리 기술)

  • Sun, Kyoungjae;Kim, Younghan;Noh, Hongjun;Park, Hyungwon;Han, Myounghun;Kwon, Daehoon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.3
    • /
    • pp.246-256
    • /
    • 2020
  • In the future Network Centric Warfare(NCW), changing to IPv6 based network environment is required to enable various future technologies such as the Internet of Things(IoT) and cloud technology which are expected to be introduced to the tactical network evolution. With the change to the IPv6 network, an ID/LOC(Identifier/Location) separation protocol that decomposes context of the IP address to location and identifier can enhance network capacity of increasing number of device and provide efficient mobility management in the tactical network that changes topology dynamically. In this paper, we choose ILNP(Identifier-Locator Network Protocol) as an ID/LOC separation for tactical network environment. In addition to ILNP-based tactical network design, this paper proposes a network-based mobility management scheme for providing efficient mobility management. Through numerical performance analysis, we show that the proposed scheme can reduce network loads more effectively than the conventional IP-based mobility management scheme and common handover procedure in ILNP.

Evaluation Model Based on Machine Learning for Optimal O2O Services Layout(Placement) in Exhibition-space (전시공간 내 최적의 O2O 서비스 배치를 위한 기계학습 기반평가 모델)

  • Lee, Joon-Yeop;Kim, Yong-Hyuk
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.3
    • /
    • pp.291-300
    • /
    • 2016
  • The emergence of smart devices and IoT leads to the appearance of O2O service to blur the difference between online and offline. As online services' merits were added to the offline market, it caused a change in the dynamics of the offline industry, which means the offline-space's digitization. Unlike these changing aspects of the offline market, exhibition industry grows steadily in the industry, however it is also possible to create a new value added by combining O2O service. We conducted a survey targeting 20 spectators in '2015 Seoul Design Festival' at COEX. The survey was used to analysis of the spatial structure and generate the dataset for machine learning. We identified problems with the analysis study of the existing spatial structure, and based on this investigation we propose a new method for analyzing a spatial structure. Also by processing a machine learning technique based on the generated dataset, we propose a novel evaluation model of exhibition-space cells for O2O service layout.

A Study on User Interface and Control Method of Web-based Remote Control Platform (웹 기반 원격제어 플랫폼의 사용자 인터페이스와 제어 기법에 관한 연구)

  • Lee, Kangwon;Shin, Yejin;Lee, Yeonji;Seol, Soonuk
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.6
    • /
    • pp.827-837
    • /
    • 2017
  • Since the area of smart home has been attracting attention, researches have been conducted to control syntagmatically various electronic products with a single remote controller. Previous researches have developed a dedicated controller or an application that acts as a remote controller and controls electronic products by configuring control screen for each product. However, these approaches are not suitable for controlling various electronic products that should be controlled by configuring separate control screens for each product. In this paper, we propose a web-based remote control platform. We define universal user interfaces applicable to various devices by categorizing user interactions of electronic goods and implement them as APIs. By applying the APIs to IPTV and car navigation devices we show that it is possible to control them through only a web browser. We also propose a method to group multiple control requests in order to efficiently handle consecutive control requests and show the improved response time and data usage.

Analysis of Energy Preference in the 4th Industrial Revolution Based on Decision Making Methodology (의사결정 방법론 기반 4차 산업혁명 시대 에너지 선호도 분석)

  • Nam, Soo-Tai;Shin, Seong-Yoon;Jin, Chan-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.328-329
    • /
    • 2021
  • Newly, the fourth industrial revolution is a way of describing the blurring of boundaries between the physical, digital, and biological worlds. It's a fusion of advances in AI (artificial intelligence), robotics, the IoT (Internet of Things), 3d printing, genetic engineering, quantum computing, and other technologies. At the world economic forum in Davos, switzerland, in january 2016, chairman professor klaus schwab proposed the fourth industrial revolution for the first time. In order to apply the AHP (analytic hierarchy process) analysis method, the first stage factors were designed as Natural, Water, Earth and Atom energy. In addition, the second stage factors were organized into 9 detailed energies presented in the conceptual model. Thus, we present the theoretical and practical implications of these results.

  • PDF

Technology Trend Analysis of the 4th Industrial Revolution Using AHP (AHP 기법을 이용한 4차 산업혁명 기술 트렌드 분석)

  • Nam, Soo-Tai;Shin, Seong-Yoon;Jin, Chan-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.330-331
    • /
    • 2021
  • Newly, the fourth industrial revolution is a way of describing the blurring of boundaries between the physical, digital, and biological worlds. It's a fusion of advances in AI (artificial intelligence), robotics, the IoT (internet of things), 3d printing, genetic engineering, quantum computing, and other technologies. At the world economic forum in Davos, switzerland, in january 2016, chairman professor (klaus schwab) proposed the fourth industrial revolution for the first time. In order to apply the AHP (analytic hierarchy process) analysis method, the first stage factors were designed as Digital Technology, Physics Technology and Biological Technology. In addition, the second stage factors were organized into 8 detailed services presented in the conceptual model. Thus, we present the theoretical and practical implications of these results.

  • PDF

Blockchain (A-PBFT) Based Authentication Method for Secure Lora Network (안전한 Lora 네트워크를 위한 블록체인(A-PBFT) 기반 인증 기법)

  • Kim, Sang-Geun
    • Journal of Industrial Convergence
    • /
    • v.20 no.10
    • /
    • pp.17-24
    • /
    • 2022
  • Lora, a non-band network technology of the long-distance wireless standard LPWAN standard, uses ABP and OTTA methods and AES-128-based encryption algorithm (shared key) for internal terminal authentication and integrity verification. Lora's recent firmware tampering vulnerability and shared-key encryption algorithm structure make it difficult to defend against MITM attacks. In this study, the consensus algorithm(PBFT) is applied to the Lora network to enhance safety. It performs authentication and PBFT block chain creation by searching for node groups using the GPS module. As a result of the performance analysis, we established a new Lora trust network and proved that the latency of the consensus algorithm was improved. This study is a 4th industry convergence study and is intended to help improve the security technology of Lora devices in the future.

Implementation of a Remote Group Lighting Control System using ICT (ICT를 활용한 원격 그룹조명 제어시스템 구현)

  • Na, Cheol-hun;Boo, Su-il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.606-608
    • /
    • 2021
  • Humans and various devices are interconnected using the Internet of Things and are used in various ways. In this study, a synchronization control system with remote locations was constructed using ICT, and a signal system for pedestrians was implemented using the system. PLC circuits were used to implement controllers, through which wireless control signal transmission and reception, LED lamp emission control, and power control were performed. It was confirmed that signal synchronization from the main controller to the remote sub-controller was possible by establishing a controller and pedestrian traffic light system, and lamp signal synchronization of the pedestrian traffic light system installed on both sides of the road was implemented. As a result, it was confirmed that 1:1 remote control or 1:N remote group control was possible, and this result can be used in various fields.

  • PDF

Improvement of Smart Surveillance Service using Service Priority (서비스 우선순위를 이용한 스마트 관제 서비스의 개선)

  • Seong, Dong-Su
    • Journal of Digital Contents Society
    • /
    • v.19 no.5
    • /
    • pp.1003-1010
    • /
    • 2018
  • When an applicant requests the emergency situation call or safe return service using a smart device, the smart surveillance service can select the CCTV(closed circuit television) cameras around the applicant using applicant's location information, then automatically takes a photograph to track the applicant. Since the surrounding CCTV camera shoots the applicant continuously using location information and the applicant can be observed by the monitor agent in real time, this service can be very helpful in an applicant's emergency situation or safe return. The existing smart surveillance service does not consider the priority of the emergency situation call and safe return service. Therefore, there is the disadvantage that the applicant who requests an emergency situation call service can not be photographed when safe return service has already preoccupied CCTV cameras which are capable of taking a picture of the applicant. The proposed smart surveillance service improves this disadvantage by using service priority.

Study on the Femtocell Vulnerability Analysis Using Threat Modeling (위협 모델링 기법을 이용한 펨토셀 취약점 분석에 대한 연구)

  • Kim, Jae-ki;Shin, Jeong-Hoon;Kim, Seung-joo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.8
    • /
    • pp.197-210
    • /
    • 2016
  • Lately smartphone uasage is increasing and many Internet of Things (IoT) devices support wireless communications. Accordingly, small base stations which called femtocells are supplied to prevent saturation of existing base stations. However, unlike the original purpose of the femtocell with the advanced hacking technologies, Vulnerability such as gaining the administrator authority was discovered and this can cause serious problems such as the leakage of personal information of femtocell user. Therefore, identify security threats that may occur in the femtocell and it is necessary to ways for systematic vulnerability analysis. In this paper, We analyzed the security threats that can be generated in the femtocell and constructed a checklist for vulnerability analysis using the Threat Modeling method. Then, using the constructed checklist provides a scheme that can improve the safety of the femto cell through the actual analysis and taken the results of the femtocell vulnerabilities analysis.