• Title/Summary/Keyword: 사물인터넷 기술

Search Result 1,394, Processing Time 0.028 seconds

Design and Implementation of Context Awareness Smart Jewelry Device (상황인식 스마트 주얼리 디바이스 설계 및 구현)

  • Kang, YunJeong;Choi, DongOun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2113-2118
    • /
    • 2016
  • Smart Jewelry is applied to the components of the Internet of Things. The process of obtaining the status information to the input of the sensor. And it controls the light color of the LED. Because to express the beauty of twinkling lights that can be felt in the jewelery and aesthetic functions were applied in order to feel the mystery. Smart Jewelry is capable of communication, interaction, wearable. Smart jewelery was equipped with a color, temperature, ambient light sensor. It was designed to allow interaction with a Bluetooth module. Applying an algorithm so that the light jewelry colors can vary depending on the circumstances of the smart jewelry wearer had been implemented by the mobile application. It can be realized in digital technology and the convergence of life. It presents the orientation development of the smart jewelery device on IoT environment.

Herausforderungen des Verwaltungsrechts für die Vierte Industrielle Revolution - Geschichtliche Perspektive und Digitalisierung - (4차 산업혁명과 행정법의 과제 - 산업혁명사와 디지털화를 중심으로 -)

  • Kay, In-kook
    • Journal of Legislation Research
    • /
    • no.53
    • /
    • pp.149-176
    • /
    • 2017
  • Ein Schlagwort "die Vierte Industrielle Revolution" ist mehrdeutig und sehr unterschiedlich verstanden. Die Fragestellung, was die wesentlichen und allgemein anerkannten Elemente der "vierten industriellen Revolution", bezieht sich bisher auf neue Technologie oder Produkten wie $K{\ddot{u}}nstliche$ Intelligenz(K.I), autonomes Fahren, Internet der Dinge(IdD), 3D-Drucker usw. Unter einem historischen Gesichtspunkt bzw. der Geschichte der Industiriellen Revolution gibt es jedoch eine $Parallelit{\ddot{a}}t$ der rechtlichen Fragen, bsw. die Gefahrenabwehr, technische Kodifikation, Selbstregulierung, Internationalisierung des Technikrechts. Der Versuch, die Vierte Industrielle Revolution nur mit den neuen Technologie oder Produkten zu verstehen, kann nicht die Differenzierung zwischen jeden Stufen der industriellen Revolution konsequent $erkl{\ddot{a}}ren$. Dass die rechtliche Fragen der Vierten Industriellen Revolution angemessen behandelt, verlangt $zun{\ddot{a}}chst$ einen $Schl{\ddot{u}}sselbegriff$. Die vorliegende Arbeit setzt Digitalisierung als $Schl{\ddot{u}}sselbegriff$ voraus. Mit diesem $Schl{\ddot{u}}sselbegriff$ beleuchtet hier die Herausforderung des Verwaltungsrechts in der Zeitwende, wie die $Anpassungsf{\ddot{a}}higkeit$ und $Steuerungsf{\ddot{a}}higkeit$ des Rechts.

An Exploratory Study to Respond to Industry 4.0 Dysfunction in Small and Medium Manufacturers (중소제조기업의 Industry 4.0 역기능 대응방안에 대한 탐색적 연구)

  • Lee, Ji-Young;Kim, Kyung-Ihl
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.3
    • /
    • pp.169-174
    • /
    • 2018
  • Today, the world has reached 'Industry 4.0'. Industry 4.0 has high uncertainty in various aspects because it is based on building a smart chain where the various elements that make up the industry can communicate with each other. Based on the above facts, based on the researches of the previous researchers, we have searched for the countermeasures of small and medium sized manufacturing companies in Korea in order to minimize the negative aspects of establishing the basic concepts and functioning of Industry 4.0. As a result, efforts to accurately identify and address the uncertainties of Industry 4.0 in a variety of ways will help to drive business growth and economic growth in the country through smart factories, which are at the heart of Industry 4.0.

A comparative study of the performance of machine learning algorithms to detect malicious traffic in IoT networks (IoT 네트워크에서 악성 트래픽을 탐지하기 위한 머신러닝 알고리즘의 성능 비교연구)

  • Hyun, Mi-Jin
    • Journal of Digital Convergence
    • /
    • v.19 no.9
    • /
    • pp.463-468
    • /
    • 2021
  • Although the IoT is showing explosive growth due to the development of technology and the spread of IoT devices and activation of services, serious security risks and financial damage are occurring due to the activities of various botnets. Therefore, it is important to accurately and quickly detect the activities of these botnets. As security in the IoT environment has characteristics that require operation with minimum processing performance and memory, in this paper, the minimum characteristics for detection are selected, and KNN (K-Nearest Neighbor), Naïve Bayes, Decision Tree, Random A comparative study was conducted on the performance of machine learning algorithms such as Forest to detect botnet activity. Experimental results using the Bot-IoT dataset showed that KNN can detect DDoS, DoS, and Reconnaissance attacks most effectively and efficiently among the applied machine learning algorithms.

A Study on the Safety Monitoring of Bridge Facilities based on Smart Sensors (스마트 센서 기반의 교량 시설물 안전 모니터링 기법 연구)

  • YEON, Sang-Ho;KIM, Joon-Soo;YEON, Chun-Hum
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.22 no.2
    • /
    • pp.97-106
    • /
    • 2019
  • Today, many smart sensor's measurement instruments are used to check the safety situation of various medium and large bridge structures that should be maintained in the construction facilities, but most of them use the method of measuring and confirming the displacement behavior of the bridge at regular intervals. In order to continuously check the safety situation, various measuring instruments are used, but most of them are not able to measure and measure the displacement and behavior of main construction structures at regular intervals. In this study, GNSS and environment smart sensors and drone's image data are transmitted to wireless network so that risk of many bridge's structures can be detected beforehand. As a result, by diagnosing the fine displacement of the bridge in real time and its condition, reinforcement, repair and disaster prevention measures for the structural parts of the bridges, which are expected to be dangerous, and various disasters and accidents can be prevented, and disaster can be prevented could suggest a new alternative.

A Study for Development Status of Functional Bedding -Focusing on Smart Bedding Based on Internet of Things- (국내외 기능성 침구 개발 현황에 관한 연구 -IoT(Internet of Things) 기술기반 스마트 침구를 중심으로-)

  • Yoon, Subin;Kim, Seongdal
    • Journal of Fashion Business
    • /
    • v.23 no.1
    • /
    • pp.14-24
    • /
    • 2019
  • Various types of functional bedding for inducing and maintaining sleep, are developed and launched with the importance of improving health through sleep emphasized currently. The purpose of this study is to examine development status and direction of functional bedding in the $4^{th}$ Industrial Revolution era, through systematic classification of elements of IoT-based smart bedding cases actively developed as functional bedding at home and abroad. Through previous research, literature and Internet data, characteristics and functional extension of smart bedding and the background of smart bed development was analyzed. And it was analyzed that smart bedding pursues recent functionalism and convergence of physical and digital concept such as IoT or AI, and also mental value to improve sleep quality. As bedroom where smart bedding place in has the private and limited characteristics and users are in sleep-conscious, that hard to ensure power and discomfort in carrying are moderated and the aesthetic elements are not very important, and that the smart bedding performance while sleeping were affected on developmental background. Based on CES case study and analysis on how smart beds are functionally expanded from conventional bedding, smart beds have gained information through digital sensing, and common properties that can be controlled anytime, anywhere, using a smart phone. Some set up the right environment and pose, while others stimulate nerves directly as active intervention. It is expected that smart bedding will be developed to cure user's body and mind, through active intervention when sleeping.

Scheduling Generation Model on Parallel Machines with Due Date and Setup Cost Based on Deep Learning (납기와 작업준비비용을 고려한 병렬기계에서 딥러닝 기반의 일정계획 생성 모델)

  • Yoo, Woosik;Seo, Juhyeok;Lee, Donghoon;Kim, Dahee;Kim, Kwanho
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.3
    • /
    • pp.99-110
    • /
    • 2019
  • As the 4th industrial revolution progressing, manufacturers are trying to apply intelligent information technologies such as IoT(internet of things) and machine learning. In the semiconductor/LCD/tire manufacturing process, schedule plan that minimizes setup change and due date violation is very important in order to ensure efficient production. Therefore, in this paper, we suggest the deep learning based scheduling generation model minimizes setup change and due date violation in parallel machines. The proposed model learns patterns of minimizing setup change and due date violation depending on considered order using the amount of historical data. Therefore, the experiment results using three dataset depending on levels of the order list, the proposed model outperforms compared to priority rules.

Design of Crypto-processor for Internet-of-Things Applications (사물인터넷 응용을 위한 암호화 프로세서의 설계)

  • Ahn, Jae-uk;Choi, Jae-Hyuk;Ha, Ji-Ung;Jung, Yongchul;Jung, Yunho
    • Journal of Advanced Navigation Technology
    • /
    • v.23 no.2
    • /
    • pp.207-213
    • /
    • 2019
  • Recently, the importance for internet of things (IoT) security has increased enormously and hardware-based compact chips are needed in IoT communication industries. In this paper, we propose low-complexity crypto-processor that unifies advanced encryption standard (AES), academy, research, institute, agency (ARIA), and CLEFIA protocols into one combined design. In the proposed crypto-processor, encryption and decryption processes are shared, and 128-bit round key generation process is combined. Moreover, the shared design has been minimized to be adapted in generic IoT devices and systems including lightweight IoT devices. The proposed crypto-processor was implemented in Verilog hardware description language (HDL) and synthesized to gate level circuit in 65nm CMOS process, which results in 11,080 gate counts. This demonstrates roughly 42% better than the aggregates of three algorithm implementations in the aspect of gate counts.

Methodology of Calibration for Falling Objects Accident-Risk-Zone Approach Detection Algorithm at Port Considering GPS Errors (GPS 오차를 고려한 항만 내 낙하물 사고위험 알고리즘 보정 방법론 개발)

  • Son, Seung-Oh;Kim, Hyeonseo;Park, Juneyoung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.19 no.6
    • /
    • pp.61-73
    • /
    • 2020
  • Real-time location-sensing technology using location information collected from IoT devices is being applied for safety management purposes in many industries, such as ports. On the other hand, positional error is always present owing to the characteristics of GPS. Therefore, accident-risk detection algorithms must consider positional error. This paper proposes an methodology of calibration for falling object accident-risk-zone approach detection algorithm considering GPS errors. A probability density function was estimated, with positional error data collected from IoT devices as a probability variable. As a result of the verification, the algorithm showed a detection accuracy of 93% and 77%. Overall, the analysis results derived according to the GPS error level will be an important criterion for upgrading algorithms and real-time risk managements in the future.

Analysis of Attacks and Security Level for Multivariate Quadratic Based Signature Scheme Rainbow (다변수 이차식 기반 서명 기법 Rainbow의 공격 기법 및 보안강도 분석)

  • Cho, Seong-Min;Kim, Jane;Seo, Seung-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.533-544
    • /
    • 2021
  • Using Shor algorithm, factoring and discrete logarithm problem can be solved effectively. The public key cryptography, such as RSA and ECC, based on factoring and discrete logarithm problem can be broken in polynomial time using Shor algorithm. NIST has been conducting a PQC(Post Quantum Cryptography) standardization process to select quantum-resistant public key cryptography. The multivariate quadratic based signature scheme, which is one of the PQC candidates, is suitable for IoT devices with limited resources due to its short signature and fast sign and verify process. We analyzes classic attacks and quantum attacks for Rainbow which is the only multivatiate quadratic based signature scheme to be finalized up to the round 3. Also we compute the attack complexity for the round 3 Rainbow parameters, and analyzes the security level of Rainbow, one of the PQC standardization candidates.