• Title/Summary/Keyword: 사물인터넷 기술

Search Result 1,385, Processing Time 0.025 seconds

Analysis of Computer Simulated and Field Experimental Results of LoRa Considering Path Loss under LoS and NLoS Environment (LoS 및 NLoS 환경에서의 경로 손실을 고려한 LoRa의 모의실험 및 실측 결과 분석)

  • Yi, Dong Hee;Kim, Suk Chan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.2
    • /
    • pp.444-452
    • /
    • 2017
  • Recently, a demand of Internet-of-things (IoT) rises dramatically and an interest in Low Power Wide Area (LPWA) grows larger accordingly. In this paper, performance in LoRa which is included in LPWA standard is analyzed. Particularly, after measuring Received Signal Strength Indication (RSSI) of received signal on Line-of-sight (LoS) and Non-line-of-sight (NLoS) environment and it is compared with RSSI which theoretical path loss model is applied to. Among many path loss models, the simulation for theoretical RSSI use Log-distance, Two-ray model and Okumura-Hata model that is based on the test database. Consequently, the result of Okumura-Hata model is the most similar with the measured RSSI. When a network based on LoRa is built, this result can used to decide optimal node arrangement.

Research on Security Model and Requirements for Fog Computing: Survey (포그 컴퓨팅 보안 모델과 보안 요구사항 연구: 서베이)

  • Hong, Sunghyuck
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.5
    • /
    • pp.27-32
    • /
    • 2018
  • IoT technology is developing with various application areas in $4^{th}$ Industrial revolution. There are many users using the application services. Sensing data from various environment need to be transferred to cloud computing storage and store in the cloud storage. However, physical distance from the end node to cloud computing storage is far away, and it is not efficient to transfer data from sensors and store the sensing data in the cloud storage whenever sensing data happen. Therefore, Fog computing is proposed to solve these problems which can process and store the sensing data. However, Fog computing is new emerging technology, there is no standard security model and requirements. This research proposes to security requirements and security model for Fog computing to establish a secure and efficient cloud computing environment.

Investigation of Research Topic and Trends of National ICT Research-Development Using the LDA Model (LDA 토픽모델링을 통한 ICT분야 국가연구개발사업의 주요 연구토픽 및 동향 탐색)

  • Woo, Chang Woo;Lee, Jong Yun
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.7
    • /
    • pp.9-18
    • /
    • 2020
  • The research objectives investigates main research topics and trends in the information and communication technology(ICT) field, Korea using LDA(Latent Dirichlet Allocation), one of the topic modeling techniques. The experimental dataset of ICT research and development(R&D) project of 5,200 was acquired through matching with the EZone system of IITP after downloading R&D project dataset from NTIS(National Science and Technology Information Service) during recent five years. Consequently, our finding was that the majority research topics were found as intelligent information technologies such as AI, big data, and IoT, and the main research trends was hyper realistic media. Finally, it is expected that the research results of topic modeling on the national R&D foundation dataset become the powerful information about establishment of planning and strategy of future's research and development in the ICT field.

A Study on the Priority of 『Personal Information Safety Measure』 Using AHP Method: Focus on the Defferences between Financial Company and Consignee (AHP 기법을 이용한 금융회사 『개인정보의 안전성 확보조치 기준』 우선순위에 관한 연구: 금융회사 위·수탁자 간 인식 차이를 중심으로)

  • KIM, Seyoung;KIM, Inseok
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.4
    • /
    • pp.31-48
    • /
    • 2019
  • To survive in the trend of the fourth industrial revolution, companies are putting a lot of attention and effort into personalization services using the latest technologies such as big data, artificial intelligence and the Internet of Things, while entrusting third parties to handle personal information on the grounds of work efficiency, expertise and cost reduction. In such an environment, consignors need to check trustees on a more effective and reasonable basis to ensure personal information safety for trustees. This study used AHP techniques to derive the importance and priority of each item of "Personal Information Safety Assurance Measures" for financial companies and trustees, and objectively compared and analyzed differences in perceptions of importance between financial institutions and trustees. Based on this, the company recognizes the difference between self-inspection of financial institutions and inspection of trustees and presents policy grounds and implications for applying differentiated inspection standards that reflect the weights appropriate for the purpose.

LoRa LPWAN-based Wireless Measurement Sensor Installation and Maintenance Plan (LoRa LPWAN 기반의 무선 계측센서 설치 및 유지관리 방안)

  • Kim, Jong-Hoon;Park, Won-Joo;Park Sang-Hyun, Jin-Oh
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.33 no.1
    • /
    • pp.55-61
    • /
    • 2020
  • Social infrastructure facilities that have been under construction since the country's high-growth period are undergoing rapid aging, and, thus, safety assessments of large structures such as bridge tunnels, which can be directly linked to large-scale casualties in the event of an accident, are necessary. It is difficult to construct economical and efficient wireless smart sensor networks that improve structural health monitoring (SHM) because the existing wire sensors have a short signal reach. However, low-power wide-area networks (LPWANs) are becoming popular within the Internet of Things, and enable economical and efficient SHM. In this study, the technology trends of a wireless measuring sensor based on LoRa LPWANs were investigated, and an installation and maintenance plan for this type of sensor is proposed.

Design and Implementation of an IoT Device for the Effective Screening of Dementia and Mild Cognitive Impairment

  • Kim, Hansoo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.12
    • /
    • pp.119-126
    • /
    • 2019
  • Korea is rapidly becoming an aging society due to lower birth rate and longer life expectancy. As elderly diseases are of a serious concern, the number of patients with dementia has been increasing significantly. For now, it has become a nationwide problem, as dementia is difficult to manage and requires a lot of social costs. To solve this, an IoT device has been devised that efficiently screens Mild Cognitive Impairment(MCI), the early stage of dementia. To design and implement the device, the latest IoT technology is introduced, the optimized Korean Version of Hasegawa Dementia Scale Revised(K-HDS) is utilized, and convenient service scenario with user-friendly design is applied. As a result, the symptoms of MCI have been screened quickly with convenient operation, which lead to the healthier society by the prevention of dementia.

Design for Safety System get On or Off the Kindergarten Bus using User Authentication based on Deep-learning (딥러닝 기반의 사용자인증을 활용한 어린이 버스에서 안전한 승차 및 하차 시스템 설계)

  • Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.5
    • /
    • pp.111-116
    • /
    • 2020
  • Recently, many safety accidents involving children shuttle buses take place. Without a teacher for help, a safety accident occurs when the driver can't see a child who is getting off in the blind spot of both frontside and backside. A deep learning-based smart mirror allows user authentication and provides various services. Especially, It can be a role of helper for children, and prevent accidents that can occur when drivers or assistant teachers do not see them. User authentication is carried out with children's face registered in advance. Safety accidents can be prevented by an approximate sensor and a camera in frontside and backside of the bus. This study suggests a way of checking out whether children are missed in the process of getting in and out of the bus, designs a system that reduce blind spots in the front and back of the vehicle, and builds a safety system that provide various services using GPS.

Key Management for Secure Internet of Things(IoT) Data in Cloud Computing (클라우드 컴퓨팅에서 안전한 사물인터넷 데이터를 위한 키 관리)

  • Sung, Soon-hwa
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.353-360
    • /
    • 2017
  • The Internet of Things(IoT) security has more need than a technical problem as it needs series of regulations and faultless security system for common purposes. So, this study proposes an efficient key management in order that can be trusted IoT data in cloud computing. In contrast with a key distribution center of existing sensor networks, the proposed a federation key management of cloud proxy key server is not central point of administration and enables an active key recovery and update. The proposed key management is not a method of predetermined secret keys but sharing key information of a cloud proxy key server in autonomous cloud, which can reduce key generation and space complexity. In addition, In contrast with previous IoT key researches, a federation key of cloud proxy key server provides an extraction ability from meaningful information while moving data.

Constructing Effective Smart Crosswalk Traffic Light Mechanism Through Simulation Technique (시뮬레이션 기법을 통한 효율적 스마트 보행신호등 메커니즘 구축)

  • Lee, Hyeonjun;Moon, Soyoung;Kim, R.Youngchul;Son, Hyeonseung
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.2
    • /
    • pp.113-118
    • /
    • 2016
  • The walking speed of handicapped people generally is slower than that of normal people. So it is difficult for them to cross at crosswalks within the allotted time provided by the traffic light. This problem can be solved by expanding the time of the traffic light. However, if the latency of the traffic light is increased without distinguishing the handicapped among all other pedestrians, the efficiency of traffic signal lights will decrease. In this paper, we propose a smart traffic signal connecting mechanism between the previous pedestrian traffic signal and a pedestrian's device (smartphone). This Smart pedestrian traffic light, through this mechanism, minimizes traffic congestion by providing additional walking time only to the handicapped among pedestrians. This crosswalk traffic light recognizes the handicapped using a technique called Internet of things (IOT). In this paper, we extract the data necessary to build an effective smart crosswalk traffic light mechanism through simulation techniques. We have extracted different kinds of traffic signal times with our virtual simulation environment to verify the efficiency of the smart crosswalk pedestrian traffic light system. This approach can validate the effective delay time of the traffic signal time through a comparison based on number of pedestrians.

Implementation of Automatic Authentication System using ECG Sensor based on Beacon (비콘 기반의 심전도 센서를 이용한 자동 인증 시스템 구현)

  • Lee, Jae-Kyu;Kim, Yei-Chang
    • Journal of Digital Convergence
    • /
    • v.15 no.5
    • /
    • pp.217-223
    • /
    • 2017
  • With the development of sensor networks and Internet of Things (IoT) technology, personalized context information has been collected and customized services can be provided to related users. Currently, the context information system is at the level of analyzing and recognizing user specific behavioral characteristics and generating events.In the IoT environment, IoT products themselves should provide the required services with minimal user intervention, rather than acting for a specific purpose. In this paper, to minimize the user intervention in the IoT environment, we implemented an automatic attendance recognition system using context information from the ECG based on beacon. Environment of provided specific Context information, we compared and analyzed the degree of user intervention among the authentication method using ECG sensor in this paper and the existing authentication method. As a result of the analysis, we confirmed that the system implemented in this paper minimizes user intervention.