• Title/Summary/Keyword: 사물인터넷 기술

Search Result 1,385, Processing Time 0.032 seconds

The analysis of technology of the connected car (커넥티드 카의 기술 분석)

  • Shim, Hyun-Bo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.211-215
    • /
    • 2015
  • It comes into the spotlight as the new Blue Ocean in which the connected car industry in which the car and mobile communication technology is convergence. All sorts of infortainments services connecting with the portable electronic device(Smart phone, tablet PC, and MP3 player) and car are rapidly grown. The Connected car emphasizes the vehicle connectivity with the concept that the car has communication with the around on a real time basis and it provides the safety and expedience to the operator and using the thing of Internet (IoT) in the car and supports the application, presently, the entertainment service including the real-time Navigation, parking assistant function, not only the remote vehicle control and management service but also Email, multimedia streaming service, SNS and with the platform. Intelligent vehicle network is studied as the kind according to MANET(Mobile Ad Hoc Network) for the safety operation of the cars of the road and improving the efficiency of the driving. The intelligent vehicle network is comprised for the driving information offering changing rapidly of the communication(V2V: Vehicle to Vehicle) between the car and the car, communication(V2I : Vehicle to Infrastructure) between the infrastructure and the car, and V2X (Vehicle to Nomadic).

  • PDF

A Study on Educational Facilities Resource Management System using Smart Devices (스마트 디바이스를 활용한 교육시설물 자원관리 시스템에 관한 연구)

  • Ryu, Chang-Su
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.1013-1014
    • /
    • 2015
  • Regardless of the strict enforcement of prevention education in accordance with the school facility management standard, safety accidents that lead to human and physical damages occur in current educational facilities because of teenagers with very low sense of responsibility and insensitivity toward fire and facility safety. To ensure educational facility safety, technology that will enable a fast work process and easy confirmation of electronic blueprints and related documents about the educational facility through smart devices at the site by various means is needed. This paper proposes a system design linked to the National Education Information System (NEIS) that uses the document conversion function, high efficiency resolution, and Internet of Things (IoT) to inspect and control the educational facility in the event of a safety accident through the Educational Facility Resource Management System (EFRMS) that manages the electronic blueprints, and various educational facility documents through various smart devices.

  • PDF

A Study on ICT Security Change and CPS Security System in the 4th Industry Age (4차 산업 시대의 ICT 보안 변화와 CPS 보안 시스템에 관한 연구)

  • Joo, Heon-Sik
    • Journal of Digital Contents Society
    • /
    • v.19 no.2
    • /
    • pp.293-300
    • /
    • 2018
  • This study explored the security of Industry 4.0 such as security trends and security threats in Industry 4.0, and security system in Industry 4.0. The threat elements in Industry 4.0 are changing from ICT to IoT and to CPS security, so security paradigm and security System should change accordingly. In particular, environmental and administrative security are more important to solve CPS security. The fourth industry-age security should change to customized security for individual systems, suggesting that the security technology that combines hardware and software in product production design should change from the beginning of development. The security system of the fourth industry proposes design and implementation as a CPS security system as a security system that can accommodate various devices and platforms from a security system in a single system such as a network to an individual system.

Development of IoT-based Safety Management Method through an Analysis of Risk Factors for Industrial Valves (산업용 밸브의 위험요소 분석을 통한 IoT 기반 안전관리 방안 개발)

  • Kim, Jung-Hoon;Kim, Young-Gu
    • Journal of the Korean Institute of Gas
    • /
    • v.23 no.5
    • /
    • pp.35-43
    • /
    • 2019
  • The safety of industrial valves, which are the core parts of plant facilities, are managed by manpower and there are difficulties because of side area for inspection and limited accessibility due to the nature of facilities. The industrial valves used in plant facilities cause problems such as interrupted production; a loss of life due to leak or explosion of poisonous material and flammable gases, and difficulty in locating accident positions in the event of leakage or failure. Therefore, safety management and control systems based on IoT technology are needed. This study is about the development of risk factor prediction technique among the safety management of industrial valves through IoT- based wireless communication and the development of actuator control system. We have developed IoT-based industrial valve safety management techniques to prevent accidents caused by main risk factors by conducting an analysis of the structural characteristics of valves and an analysis of the causes of main risk factors through review of failure data and literature and an analysis of accident scenarios.

Study on the Femtocell Vulnerability Analysis Using Threat Modeling (위협 모델링 기법을 이용한 펨토셀 취약점 분석에 대한 연구)

  • Kim, Jae-ki;Shin, Jeong-Hoon;Kim, Seung-joo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.8
    • /
    • pp.197-210
    • /
    • 2016
  • Lately smartphone uasage is increasing and many Internet of Things (IoT) devices support wireless communications. Accordingly, small base stations which called femtocells are supplied to prevent saturation of existing base stations. However, unlike the original purpose of the femtocell with the advanced hacking technologies, Vulnerability such as gaining the administrator authority was discovered and this can cause serious problems such as the leakage of personal information of femtocell user. Therefore, identify security threats that may occur in the femtocell and it is necessary to ways for systematic vulnerability analysis. In this paper, We analyzed the security threats that can be generated in the femtocell and constructed a checklist for vulnerability analysis using the Threat Modeling method. Then, using the constructed checklist provides a scheme that can improve the safety of the femto cell through the actual analysis and taken the results of the femtocell vulnerabilities analysis.

Development of flash flood guidance system for rural area based on deep learning (딥러닝 기반 농촌유역 돌발홍수 예경보 시스템 개발)

  • Ryu, Jeong Hoon;Kang, Moon Seong
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2018.05a
    • /
    • pp.309-309
    • /
    • 2018
  • 기후변화에 따른 강우의 규모와 발생빈도 증가로 농촌유역의 홍수 피해는 지속적으로 증가하고 있다. 하지만 우리나라의 홍수 피해 저감 대책은 도시지역의 대하천 주변으로 집중되어있으며, 소하천 및 농촌유역의 홍수 피해 저감에 대한 관리와 투자 노력은 부족한 실정이다. 특히, 최근 들어 갑작스런 집중호우 등으로 인한 농촌유역 돌발홍수 피해 사례가 증가하고 있으며, 이에 대응하기 위해서는 홍수 발생 등을 신속하게 파악하기 위한 돌발홍수 예경보 시스템 개발이 필요하다. 한편, 최근 산업의 혁신과 생산성 향상을 위한 새로운 패러다임으로 4차 산업혁명이 대두되고 있으며, 빅데이터와 인공지능 (Artificial Intelligence, AI)을 비롯하여 사물인터넷 (Internet of Things, IoT), 드론, 슈퍼컴퓨팅 등의 이른바 4차 산업혁명 기술을 활용한 연구가 수행되고 있다. 본 연구에서는 기후변화에 따른 농촌유역 홍수 피해를 저감하고 또한 사전에 대비하기 위해 빅데이터와 인공지능 등 4차 산업혁명 기술을 적용한 농촌유역 돌발홍수 예경보 시스템을 개발하고 그 적용성을 평가하고자 한다. 우선, 농촌유역의 홍수와 관련된 빅데이터 (기상 자료, 수문 자료, 기후변화 자료, 농업용 수리구조물 자료 등)를 토대로 정형 빅데이터와 비정형 빅데이터를 구분 추출하고 이를 연계 해석할 수 있는 시스템을 개발하였다. 추출한 정형 및 비정형 빅데이터를 활용하여 딥러닝을 기반으로 농촌유역의 홍수를 예측하고 홍수 예경보 기준에 따른 평가를 수행할 수 있는 시스템을 개발하였다. 과거 강우사상을 홍수 예경보 시스템에 적용하여 홍수 모의 결과를 도출하였으며, 재해연보 등과 비교 분석하여 시스템의 적용성을 분석하였다.

  • PDF

Development and Application of Real-Time Automatic Discharge Measurement System in Small Stream (실시간 소하천 자동유량계측 시스템 개발 및 적용)

  • Kim, Seojun;Yoon, Byungman;Cheong, Taesung;Im, Yunseong
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2019.05a
    • /
    • pp.82-82
    • /
    • 2019
  • 최근 사물인터넷 등의 IT기술의 발전과 함께 수리 계측 분야에서도 자동 유속 및 유량 측정장비들에 대한 연구와 적용이 활발하게 진행되고 있다. 하지만 최근 개발된 자동 유속 측정 장비들은 설치가 어려울 뿐만 아니라 비용이 많이 들기 때문에 쉽게 적용하기가 어려워 극히 소수의 지점에서만 운영 중에 있으며 전국 2만2,823개소에 달하는 소하천에 적용하기에는 무리가 있다. 이와 같은 문제점들을 해결하기 위해 보다 간편하고 경제적인 유속 측정 방법으로 주목을 받고 있는 방법이 표면영상유속계이다. 표면영상유속계는 일반 동영상 촬영 장비와 분석 소프트웨어만 있으면 유속을 측정할 수 있기 때문에 매우 경제적이고, 비접촉식으로 유속을 측정하기 때문에 흐름에 방해를 주지 않을뿐만 아니라 홍수 시 유속 측정의 위험성을 최소화 할 수 있다는 장점이 있어, 유량과 수위가 급격하게 변하는 국내 소하천의 유량측정에 적절하게 대응할 수 있다는 장점이 있다. 이에 본 연구에서는 기존의 표면영상유속계를 실시간 자동유량계측이 가능하도록 시스템화 하여 개선하였다. CCTV 기반의 실시간 소하천 자동유량계측 시스템의 구성은 CCTV, 초음파수위계, 현장제어함체 및 조명으로 구성되어 있고, 현장제어함체에는 CCTV 영상분석 S/W가 설치되어 있으며, 실시간으로 산정한 유속자료와 초음파수위계로 측정한 수위자료를 이용하여 유량을 자동으로 산정하도록 개발하였다. 또한 울주군에 위치한 중선필천에 설치하여 적용성 여부 및 현장검증을 실시하였으며, 2018년 홍수사상에 대한 유량계측을 실시한 결과 표면영상만으로 소하천의 유속을 매우 짧은 시간에 계측할 수 있어 소하천의 급격한 유량 변화를 매우 안정적으로 계측하여 온전한 홍수 사상을 확보 할 수 있었다. 또한, 현장 계측 인력 없이도 CCTV 영상으로 현장상황을 파악할 수 있어 홍수대응 지원도 가능한 장점이 있음을 확인하였다.

  • PDF

Implementation of Facility Movement Recognition Accuracy Analysis and Utilization Service using Drone Image (드론 영상 활용 시설물 이동 인식 정확도 분석 및 활용 서비스 구현)

  • Kim, Gwang-Seok;Oh, Ah-Ra;Choi, Yun-Soo
    • Journal of the Korean Institute of Gas
    • /
    • v.25 no.5
    • /
    • pp.88-96
    • /
    • 2021
  • Advanced Internet of Things (IoT) technology is being used in various ways for the safety of the energy industry. At the center of safety measures, drones play various roles on behalf of humans. Drones are playing a role in reaching places that are difficult to reach due to large-scale facilities and space restrictions that are difficult for humans to inspect. In this study, the accuracy and completeness of movement of dangerous facilities were tested using drone images, and it was confirmed that the movement recognition accuracy was 100%, the average data analysis accuracy was 95.8699%, and the average completeness was 100%. Based on the experimental results, a future-oriented facility risk analysis system combined with ICT technology was implemented and presented. Additional experiments with diversified conditions are required in the future, and ICT convergence analysis system implementation is required.

Task Migration in Cooperative Vehicular Edge Computing (협력적인 차량 엣지 컴퓨팅에서의 태스크 마이그레이션)

  • Moon, Sungwon;Lim, Yujin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.12
    • /
    • pp.311-318
    • /
    • 2021
  • With the rapid development of the Internet of Things(IoT) technology recently, multi-access edge computing(MEC) is emerged as a next-generation technology for real-time and high-performance services. High mobility of users between MECs with limited service areas is considered one of the issues in the MEC environment. In this paper, we consider a vehicle edge computing(VEC) environment which has a high mobility, and propose a task migration algorithm to decide whether or not to migrate and where to migrate using DQN, as a reinforcement learning method. The objective of the proposed algorithm is to improve the system throughput while satisfying QoS(Quality of Service) requirements by minimizing the difference between queueing delays in vehicle edge computing servers(VECSs). The results show that compared to other algorithms, the proposed algorithm achieves approximately 14-49% better QoS satisfaction and approximately 14-38% lower service blocking rate.

Utilization and Optimized Implementation of Format Preserving Encryption Algorithm for IoT and BLE Communications (IoT와 BLE 통신상의 형태보존암호 활용 및 최적화 구현 기법)

  • Lim, Ji-hwan;Kwon, Hyuk-dong;Woo, Jae-min;An, Kyu-hwang;Kim, Do-young;Seo, Hwa-jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1371-1378
    • /
    • 2018
  • Bluetooth is the key technology in the wireless connection of many Internet of Things (IoT) devices, especially focused on smartphones today. In addition, Bluetooth communication between the IoT device and the user is mainly performed via Bluetooth Low Energy (BLE), but as the Bluetooth technology gradually develops, the security vulnerability of the existing BLE is more prominent. Research on Bluetooth accessibility has been conducted steadily so far, but there is lack of research for data protection in Bluetooth communication. Therefore, in this paper, when sending and receiving data in BLE communication between IoT and users, we propose effective methods for communicating with each other through the Format Preserving Encryption Algorithm (FEA), not the plain text, and measures performance of FEA which is optimized in Arduino and PC.