• Title/Summary/Keyword: 디바이스융합

Search Result 388, Processing Time 0.024 seconds

Actual Cases for Smart Fusion Industry based on Internet of Thing (사물인터넷 기반의 스마트 융합 산업 사례 연구)

  • Lee, Seong-Hoon;Lee, Dong-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.2
    • /
    • pp.1-6
    • /
    • 2016
  • Internet has been used by the unique space that users share various informations. Due to the development of Information communication technology(ICT), many devices were introduced. These devices are connected by Internet each other. The Internet of Things(IoT) use the Internet for the interconnection of the things. Studies for 'Internet of Things' progress extensively on today. Therefore, we studied the smart industries domain related with Internet of things. In this paper, three domains among the smart industries were described. These three domains such as smart city, smart home and smart health are related with our life. Therefore, we described many actual cases in three domains based on Internet of Things.

A Study on N-Screen Convergence Application with Mobile WebApp Environment (모바일 웹앱 환경에서의 N-스크린 융합 활용에 관한 연구)

  • Lee, Myeong-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.2
    • /
    • pp.43-48
    • /
    • 2015
  • Web 2.0/3.0 in accordance with the evolution of information technology environment to meet the expansion needs to order, a wide range of mobile internet devices spread in mobile app, mobile web, mobile webapp and hybrid app environment that is based on all the information technology industry in the mobile painter been progressing rapidly. However, the need to gradually ensure compatibility of mobile services in the life cycle of the appearance and reality of these devices is becoming increasingly diverse mobile devices has emerged shortened. Therefore, in this study to suggest the best infographics design the structure and framework of the future mobile environment through a study of the use of the N-Screen convergence in mobile wepapp environment.

Proposal of IoT Platform Interworking framework model using blockchain technology (블록체인 기술을 활용한 사물 인터넷 플랫폼 인터워킹 프레임워크 모델 제안)

  • Kim, Dong-gyu;Kim, Yo-han;Kwon, Yool;Kim, Ho-Won
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.05a
    • /
    • pp.124-127
    • /
    • 2022
  • 최근 IoT 기술은 가전제품, 웨어러블 디바이스, 친환경 사업등 여러가지 분야에서 사용되고 있고 각 분야의 애플리케이션의 수와 애플리케이션에 연결된 장치 수가 증가함에 따라 엄청난 양의 데이터가 생성되고 있다. 수집된 많은 양의 데이터는 전송과 저장등의 과정을 거쳐야 하지만 현재 각기다른 여러가지 IoT 플랫폼들의 프로토콜들이 존재하고 있어 서로 다른 프로토콜 간의 데이터 전송이나 디바이스 연동이 힘들다는 문제점이 존재하고 있다[1]. 또한 센서로 수집된 데이터들이 중앙 집중식 구조로 저장되기 때문에 이 데이터들을 신뢰할수 있는가에 대한 문제가 존재한다. 이 문제들을 해결하기 위해 이 논문에서는 IoT 플랫폼에서의 서로다른 프로토콜간의 연동과 데이터들의 중앙 집중화 문제를 해결하기 위한 블록체인을 활용한 IoT 플랫폼 인터워킹 프레임워크 모델을 제안하고 이어 결론과 향후 연구방향을 제시한다.

ARP Spoofing attack scenarios and countermeasures using CoAP in IoT environment (IoT 환경에서의 CoAP을 이용한 ARP Spoofing 공격 시나리오 및 대응방안)

  • Seo, Cho-Rong;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.4
    • /
    • pp.39-44
    • /
    • 2016
  • Due to the dazzling development of IT in this IT-oriented era, information delivering technology among objects, between objects and humans, and among humans has been actively performed. As information delivery technology has been actively performed, IoT became closely related to our daily lives and ubiquitous at any time and place. Therefore, IoT has become a part of our daily lives. CoAp, a web-based protocol, is mostly used in IoT environment. CoAp protocol is mostly used in the network where transmission speed is low along with the huge loss. Therefore, it is mostly used in IoT environment. However, there is a weakness on IoT that it is weak in security. If security issue occurs in IoT environment, there is a possibility for secret information of individuals or companies to be disclosed. If attackers infect the targeted device, and infected device accesses to the wireless frequently used in public areas, the relevant device sends arp spoofing to other devices in the network. Afterward, infected devices receive the packet sent by other devices in the network after occupying the packet flow in the internal network and send them to the designated hacker's server. This study suggests counter-attacks on this issues and a method of coping with them.

Predicting User Profile based on user behaviors (모바일 사용자 행태 기반 프로파일 예측)

  • Sim, Myo-Seop;Lim, Heui-Seok
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.7
    • /
    • pp.1-7
    • /
    • 2020
  • As the performance of mobile devices has dramatically improved, users can perform many tasks in a mobile environment. This means that the use of behavior information stored in the mobile device can tell a lot of users. For example, a user's text message and frequently used application information (behavioral information) can be utilized to create useful information, such as whether the user is interested in parenting(profile prediction). In this study, I investigate the behavior information of the user that can be collected in the mobile device and propose the item that can profile the user. And I also suggest ideas about how to utilize profiling information.

A Design of Certificate Management Method for Secure Access Control in IoT-based Cloud Convergence Environment (IoT기반 클라우드 융합환경에서 안전한 접근제어를 위한 인증서 관리기법 설계)

  • Park, Jung-Oh
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.7
    • /
    • pp.7-13
    • /
    • 2020
  • IoT which is the core IT of the 4th industrial revolution, is providing various services from users in the conversion with other industries. The IoT convergence technology is leading the communication paradigm of communication environment in accordance with the increase of convenience for users. However, it is urgently needed to establish the security measures for the rapidly-developing IoT convergence technology. As IoT is closely related to digital ethics and personal information protection, other industries should establish the measures for coping with threatening elements in accordance with the introduction of IoT. In case when security incidents occur, there could be diverse problems such as information leakage, damage to image, monetary loss, and casualty. Thus, this paper suggests a certificate management technique for safe control over access in IoT-based Cloud convergence environment. This thesis designed the device/user registration, message communication protocol, and device renewal/management technique. On top of performing the analysis on safety in accordance with attack technique and vulnerability, in the results of conducting the evaluation of efficiency compared to the existing PKI-based certificate management technique, it showed about 32% decreased value.

Research on the Construction of an Automation Model for Maintenance Managers Based on Smart Devices (스마트 디바이스 기반 유지보수 관리자용 자동화 모델 구축에 관한 연구)

  • Park, Jihwan;Chung, Suwan;Lee, Seojoon;Song, Jinwoo;Kwon, Soonwook
    • Korean Journal of Construction Engineering and Management
    • /
    • v.22 no.1
    • /
    • pp.72-80
    • /
    • 2021
  • Based on the previous year's statistics, 37% of buildings in South Korea are aged over 30 years. As the number of the aging buildings increases, so does the need for maintenance. Building maintenance involves a significant number of works; the work of 'maintenance manager' accounting for the largest part. Currently, the maintenance history record is mostly in drawing or handwritten form which makes reviewing the data highly time consuming. Therefore, to improve the convenience of maintenance works and optimize historical data management, the existing maintenance process was analyzed. Problems were derived and a smart device-based automation model was established. In order to establish a smart device-based automation model, ① general flow of facility management process was analyzed and related articles were reviewed, ② current maintenance process was optimized, ③ functional block diagram of BIM Data, COBie Data, IoT, and AR-based automated maintenance management model was created, ④ a smart device-based automated maintenance management model was constructed, ⑤ finally, the above system was verified by testing the aforementioned model in the field site, evaluating the time required for the maintenance process and reviewing maintenance history data against the current one.

웨어러블/임플랜터블 스마트 의료기기

  • Kim, Mi-Gyeong;Lee, Hyeon-Ju
    • Information and Communications Magazine
    • /
    • v.33 no.6
    • /
    • pp.47-52
    • /
    • 2016
  • 의료기기는 다학제적 융합기술 분야이자 고 부가가치 산업으로 IT 기술의 발전과 초고령화 사회의 본격화로 높은 성장 가능성이 전망된다. 이 중 피부 부착형 (웨어러블) 및 인체 삽입형 (임플랜터블) 소형 의료기기는 포화된 스마트폰 시장에 새로운 성장 원동력으로 작용할 것이다. 따라서 본고에서는 생체삽입형 및 부착형 소형 의료기기 중 생체삽입형 전극 어레이, 스마트 콘택트 렌즈, 피부부착형 헬스 모니터링 디바이스의 개발 사례를 알아보고, 궁극적 소형 의료기기로 손꼽히는 복용형 디바이스에 대한 전망을 알아본다. 또한 각 유형별로 현재 극복해야 할 기술적 한계와 문제점을 짚어본다.

Artificial intelligence-based indoor positioning technology trends and prospects (인공지능 기반 실내 측위 기술 동향 및 전망)

  • An, Hyeon-U;Mun, Nam-Mi
    • Broadcasting and Media Magazine
    • /
    • v.25 no.1
    • /
    • pp.75-82
    • /
    • 2020
  • 디지털 트윈이나 증강현실, 가상현실, 자율주행 등과 같이 현실 좌표계의 위치를 다루거나 현실과 가상세계를 융합하는 기술들에 있어 측위 기술은 상당히 주요하게 작용한다. 측위 기술은 그 목적과 타겟 디바이스에 따라 매우 다양하게 존재하며, 기존 측위 기술들에 인공지능을 융합하여 정밀도와 측위 주기를 개선시키는 등 다양한 연구가 진행되고 있는 분야이다. 본 고에서는 기존의 다양한 측위 기술들의 동향과 인공지능을 융합하여 성능을 높인 사례들에 대해 설명한다.

An Embedded System for Sensor Networks (센서 네트워크를 위한 임베디드 시스템)

  • Lee, Jong-Chan;Park, Sang-Joon
    • Convergence Security Journal
    • /
    • v.10 no.2
    • /
    • pp.37-41
    • /
    • 2010
  • The object of this paper is to design a embedded system based on sensor networks. The proposed system can manage the heating by sensing and analyzing the temperature and humidity in apartment house and others. For implementing this system, we devide JAVA API into the platform-independent JAVA part and platform-dependent native part for the implementation of JAVA API to manage the linux based embedded system devices, and focus on the control of the embedded system devices using JAVA API.