• Title/Summary/Keyword: 사물인터넷과 게임

Search Result 32, Processing Time 0.022 seconds

IoT model to improve parent-child interaction -Focus on smart watch for kids- (부모-자녀 상호작용을 증진하는 IoT 모델 -유아용 스마트워치를 중심으로-)

  • Yee, Young-Hwan
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.6
    • /
    • pp.209-218
    • /
    • 2017
  • To propose a contents model for children's smart watch, this study interview 15mothers who have a child using smart watches. Most mothers purchase smart watches for children to warrant their security and manage their schedules, and they use them for sending a call or text to their children, tracking or managing children's location and schedule. Mothers were satisfied with a smart watch's function of communication and safety management, but dissatisfied learning-oriented contents and worrried about bad influenced on children development. Through in-depth interviews, this study propose a persona model for children's smart watch for enhancing parent-child interaction and physical cognitive language socioemotional convergence play contents.

Integrity Guarantee System in IoT Virtual Environment Platform: Through Hyperedfger Indy and MQTT (IoT 가상환경 플랫폼에서의 무결성 보장 시스템:Hyperledger Indy와 MQTT를 통하여)

  • Yoosung Hong;Geun-Hyung Kim
    • Smart Media Journal
    • /
    • v.13 no.4
    • /
    • pp.76-85
    • /
    • 2024
  • In this paper, we propose a system that improves the data integrity of IoT(Internet of Things) devices in the virtual environment by combining Hyperledger Indy and MQTT(Message Queuing Telemetry Transport). The system complements the limitations of the centralized system by realizing a DPKI(Decentralized Public Key Infrastructure) structure that utilizes a distributed network in publish-subscribe(pub/sub) pattern communication. Digital signature technology was applied to ensure the data integrity of IoT devices and communication scenarios between the four core components of the client, IoT device, broker, and blockchain, as well as a topic structure using a decentralized identifier to ensure safety in the virtual environment. We present a systematic method for transparent data exchange. To prove the performance of the proposed system, this paper conducted experiments on four scenarios and evaluated communication performance in a virtual environment. The experimental results confirmed that the proposed system provides a reliable IoT data communication structure in a virtual environment.

Design and Development of Moving Roulette System for Role Sharing (역할 분담을 위한 이동식 룰렛 시스템 설계 및 개발)

  • Park, Seongjin;Jang, Junewoo;Ko, Hyeon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.2-4
    • /
    • 2018
  • Most people cause disputes not to do things they do not want to do. Therefore, in this study, the mobile roulette system was studied to make role sharing easy and fun. The role sharing method is to rotate the roulette through the mobile application installed on the smartphone and throw the dart to check the result with the mobile application. Through this study, it is possible to set the role sharing that most people do not like to be as fun as the game, and the conflict due to the role sharing between family members can be reduced. It is also expected that it will contribute to leisure activities, not just unconditional roles.

  • PDF

Improvement of Electroforming Process System Based on Double Hidden Layer Network (이중 비밀 다층구조 네트워크에 기반한 전기주조 공정 시스템의 개선)

  • Byung-Won Min
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.3
    • /
    • pp.61-67
    • /
    • 2023
  • In order to optimize the pulse electroforming copper process, a double hidden layer BP (Back Propagation) neural network is constructed. Through sample training, the mapping relationship between electroforming copper process conditions and target properties is accurately established, and the prediction of microhardness and tensile strength of the electroforming layer in the pulse electroforming copper process is realized. The predicted results are verified by electrodeposition copper test in copper pyrophosphate solution system with pulse power supply. The results show that the microhardness and tensile strength of copper layer predicted by "3-4-3-2" structure double hidden layer neural network are very close to the experimental values, and the relative error is less than 2.32%. In the parameter range, the microhardness of copper layer is between 100.3~205.6MPa and the tensile strength is between 112~485MPa.When the microhardness and tensile strength are optimal,the corresponding process conditions are as follows: current density is 2A-dm-2, pulse frequency is 2KHz and pulse duty cycle is 10%.

A Study on the Design of a Test Item Framework for Securing Reliability of Laundry Home Appliances Using IoT Functions (IoT 기능을 적용한 세탁 가전제품의 신뢰성 확보를 위한 시험항목 프레임워크 설계에 관한 연구)

  • Cho, Kyoung-Rok;Park, Woo Jung;Lee, Eun-Ser
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.11 no.2
    • /
    • pp.67-80
    • /
    • 2022
  • Recently, many laundry home appliances have been released with Internet of Things (IoT) functions, but there are few quality evaluation tests for IoT functions. In particular, since IoT test items are not prepared for laundry home appliances applied with IoT functions, it is difficult to find the cause even if defects occur, and test institutions are limited in selecting test items related to IoT and conducting proper performance tests. In this paper, we design a test item framework that separates IoT test items into commonality and variability to identify product defects and causes for laundry home appliances with IoT features among products in the field of home appliances. Through the proposed research, manufacturers and test institutions can test the proper performance of laundry products with IoT functions, which can improve the completeness of the products and ensure reliability.

Blockchain-based Important Information Management Techniques for IoT Environment (IoT 환경을 위한 블록체인 기반의 중요 정보 관리 기법)

  • Yoon-Su Jeong
    • Advanced Industrial SCIence
    • /
    • v.3 no.1
    • /
    • pp.30-36
    • /
    • 2024
  • Recently, the Internet of Things (IoT), which has been applied to various industrial fields, is constantly evolving in the process of automation and digitization. However, in the network where IoT devices are built, research on IoT critical information-related data sharing, personal information protection, and data integrity among intermediate nodes is still being actively studied. In this study, we propose a blockchain-based IoT critical information management technique that is easy to implement without burdening the intermediate node in the network environment where IoT is built. The proposed technique allocates a random value of a random size to the IoT critical information arriving at the intermediate node and manages it to become a decentralized P2P blockchain. In addition, the proposed technique makes it easier to manage IoT critical data by creating licenses such as time limit and device limitation according to the weight condition of IoT critical information. Performance evaluation and proposed techniques have improved delay time and processing time by 7.6% and 10.1% on average compared to existing techniques.

Game Theoretic Optimization of Investment Portfolio Considering the Performance of Information Security Countermeasure (정보보호 대책의 성능을 고려한 투자 포트폴리오의 게임 이론적 최적화)

  • Lee, Sang-Hoon;Kim, Tae-Sung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.37-50
    • /
    • 2020
  • Information security has become an important issue in the world. Various information and communication technologies, such as the Internet of Things, big data, cloud, and artificial intelligence, are developing, and the need for information security is increasing. Although the necessity of information security is expanding according to the development of information and communication technology, interest in information security investment is insufficient. In general, measuring the effect of information security investment is difficult, so appropriate investment is not being practice, and organizations are decreasing their information security investment. In addition, since the types and specification of information security measures are diverse, it is difficult to compare and evaluate the information security countermeasures objectively, and there is a lack of decision-making methods about information security investment. To develop the organization, policies and decisions related to information security are essential, and measuring the effect of information security investment is necessary. Therefore, this study proposes a method of constructing an investment portfolio for information security measures using game theory and derives an optimal defence probability. Using the two-person game model, the information security manager and the attacker are assumed to be the game players, and the information security countermeasures and information security threats are assumed as the strategy of the players, respectively. A zero-sum game that the sum of the players' payoffs is zero is assumed, and we derive a solution of a mixed strategy game in which a strategy is selected according to probability distribution among strategies. In the real world, there are various types of information security threats exist, so multiple information security measures should be considered to maintain the appropriate information security level of information systems. We assume that the defence ratio of the information security countermeasures is known, and we derive the optimal solution of the mixed strategy game using linear programming. The contributions of this study are as follows. First, we conduct analysis using real performance data of information security measures. Information security managers of organizations can use the methodology suggested in this study to make practical decisions when establishing investment portfolio for information security countermeasures. Second, the investment weight of information security countermeasures is derived. Since we derive the weight of each information security measure, not just whether or not information security measures have been invested, it is easy to construct an information security investment portfolio in a situation where investment decisions need to be made in consideration of a number of information security countermeasures. Finally, it is possible to find the optimal defence probability after constructing an investment portfolio of information security countermeasures. The information security managers of organizations can measure the specific investment effect by drawing out information security countermeasures that fit the organization's information security investment budget. Also, numerical examples are presented and computational results are analyzed. Based on the performance of various information security countermeasures: Firewall, IPS, and Antivirus, data related to information security measures are collected to construct a portfolio of information security countermeasures. The defence ratio of the information security countermeasures is created using a uniform distribution, and a coverage of performance is derived based on the report of each information security countermeasure. According to numerical examples that considered Firewall, IPS, and Antivirus as information security countermeasures, the investment weights of Firewall, IPS, and Antivirus are optimized to 60.74%, 39.26%, and 0%, respectively. The result shows that the defence probability of the organization is maximized to 83.87%. When the methodology and examples of this study are used in practice, information security managers can consider various types of information security measures, and the appropriate investment level of each measure can be reflected in the organization's budget.

A Study on 3D Virtual Restoration and Convergence Utilization of Gas Masks for Digital Reproduction of War Cultural Heritage (전쟁 문화유산 디지털 재현을 위한 방독면 3D 가상 복원 및 융합 활용 연구)

  • Hyoung-Ki Ahn;Seung-Jun Oh;Ho-Yeon Lee;Young-Guy Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.1
    • /
    • pp.89-95
    • /
    • 2023
  • In January 2007, the Remains Excavation and Investigation Team of the Ministry of National Defense was established, and full-scale excavation of remains was promoted. Currently, the scope of the excavation is being expanded to Baekma Hill within the DMZ, where fierce battles were fought during the Korean War. Now, many remains and remains are being excavated in Baekma hill. Most are in damaged condition. Therefore, in this study, the original form of the excavated remains was restored using 3D scanning and 3D modeling. This digital restoration method can be an alternative to compensate for the disadvantages of the manual method. Currently, various digital restorations using 3D technology are active in the field of cultural heritage. Digitally restored materials can be used as basic data for digital heritage. Based on this, various contents related to excavation of remains and patriots and veterans can be developed. Furthermore, if digital human restoration is made based on the excavated remains, it will be possible to reproduce the appearance of the dead.

Research on ANN based on Simulated Annealing in Parameter Optimization of Micro-scaled Flow Channels Electrochemical Machining (미세 유동채널의 전기화학적 가공 파라미터 최적화를 위한 어닐링 시뮬레이션에 근거한 인공 뉴럴 네트워크에 관한 연구)

  • Byung-Won Min
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.3
    • /
    • pp.93-98
    • /
    • 2023
  • In this paper, an artificial neural network based on simulated annealing was constructed. The mapping relationship between the parameters of micro-scaled flow channels electrochemical machining and the channel shape was established by training the samples. The depth and width of micro-scaled flow channels electrochemical machining on stainless steel surface were predicted, and the flow channels experiment was carried out with pulse power supply in NaNO3 solution to verify the established network model. The results show that the depth and width of the channel predicted by the simulated annealing artificial neural network with "4-7-2" structure are very close to the experimental values, and the error is less than 5.3%. The predicted and experimental data show that the etching degree in the process of channels electrochemical machining is closely related to voltage and current density. When the voltage is less than 5V, a "small island" is formed in the channel; When the voltage is greater than 40V, the lateral etching of the channel is relatively large, and the "dam" between the channels disappears. When the voltage is 25V, the machining morphology of the channel is the best.

Cooperative Multi-Agent Reinforcement Learning-Based Behavior Control of Grid Sortation Systems in Smart Factory (스마트 팩토리에서 그리드 분류 시스템의 협력적 다중 에이전트 강화 학습 기반 행동 제어)

  • Choi, HoBin;Kim, JuBong;Hwang, GyuYoung;Kim, KwiHoon;Hong, YongGeun;Han, YounHee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.8
    • /
    • pp.171-180
    • /
    • 2020
  • Smart Factory consists of digital automation solutions throughout the production process, including design, development, manufacturing and distribution, and it is an intelligent factory that installs IoT in its internal facilities and machines to collect process data in real time and analyze them so that it can control itself. The smart factory's equipment works in a physical combination of numerous hardware, rather than a virtual character being driven by a single object, such as a game. In other words, for a specific common goal, multiple devices must perform individual actions simultaneously. By taking advantage of the smart factory, which can collect process data in real time, if reinforcement learning is used instead of general machine learning, behavior control can be performed without the required training data. However, in the real world, it is impossible to learn more than tens of millions of iterations due to physical wear and time. Thus, this paper uses simulators to develop grid sortation systems focusing on transport facilities, one of the complex environments in smart factory field, and design cooperative multi-agent-based reinforcement learning to demonstrate efficient behavior control.