• Title/Summary/Keyword: 사물인터넷 기술

Search Result 1,385, Processing Time 0.024 seconds

A Study on the Implementation of Learning community of Chinese International Students Using Design-Based Convergence Exploration (디자인 기반 융합탐구를 활용한 중국 유학생들의 학습공동체 실행연구)

  • Kim, Mi-hee;Lee, Young-sook
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.5
    • /
    • pp.85-91
    • /
    • 2022
  • In the IOT social environment, which emphasizes the convergence of science and technology and emotion, this study aims to explore the experience and meaning of the experience while participating in the design convergence class based on the operation of the Learning community of Chinese graduate students majoring in design. To this end, an implementation study was conducted by visualizing various research problems using a design-based inquiry method for 12 graduate students attending T University. The design-oriented convergence class was conducted in a small group with content that was deepened into a visual strategy by the expression technique given by the external environment and the learner's own inner motivation. In order to express the perspective and intention of the research problem in the research, the convergence design research expressed using various visual strategies such as metaphorical use and analysis of visual data in the research process and sensory approach to the research problem was presented in a form that expresses the creative thinking process. As a way of exploration, the teaching method of presenting results based on various experiences suggests changes in new teaching formats, practical knowledge sharing by instructors, and community participation by learning participants.

The Relationship between COVID-19 related Knowledge & Preventive Health Behavior, Self-Efficacy, Anxiety and Perceived Stress among Nursing Students (간호대학생의 코로나19 관련 지식 및 예방적 건강행위, 자기효능감, 불안, 지각된 스트레스와의 관계)

  • Yang, Seung Ae
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.4
    • /
    • pp.65-76
    • /
    • 2022
  • The purpose of this study aimed to identify the level of knowledge & preventive health behaviors related to COVID-19, self-efficacy, anxiety, and perceived stress of students at a nursing college and to investigate the correlation between them. The data were collected from 133 students at a nursing college in Seoul, Korea, from April 15, 2022 to May 10, 2022 through a Google online questionnaire. The data were analyzed using SPSS/WIN 25.0 to perform descriptive statistics, t-test, one-way ANOVA, Pearson's Correlation Coefficients. As a result of analyzing the difference according to general characteristics, preventive health behavior showed a significant difference according to the necessity of COVID-19 infection control education, and self-efficacy showed a difference according to the subjective health status. The degree of instability of the subjects was shown to have significant differences according to grade and subjective health status, and perceived stress showed significant differences according to subjective health status. The result of analyzing the correlation between preventive health behavior and knowledge, self-efficacy, anxiety, and perceived stress showed that there was no significant correlation, but self-efficacy had a significant negative correlation with anxiety and perceived stress, and anxiety had a significant positive correlation with perceived stress. The results of this study will be used as basic data for education programs and countermeasures to prevent COVID-19 infections.

A Study on 3D Virtual Restoration and Convergence Utilization of Gas Masks for Digital Reproduction of War Cultural Heritage (전쟁 문화유산 디지털 재현을 위한 방독면 3D 가상 복원 및 융합 활용 연구)

  • Hyoung-Ki Ahn;Seung-Jun Oh;Ho-Yeon Lee;Young-Guy Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.1
    • /
    • pp.89-95
    • /
    • 2023
  • In January 2007, the Remains Excavation and Investigation Team of the Ministry of National Defense was established, and full-scale excavation of remains was promoted. Currently, the scope of the excavation is being expanded to Baekma Hill within the DMZ, where fierce battles were fought during the Korean War. Now, many remains and remains are being excavated in Baekma hill. Most are in damaged condition. Therefore, in this study, the original form of the excavated remains was restored using 3D scanning and 3D modeling. This digital restoration method can be an alternative to compensate for the disadvantages of the manual method. Currently, various digital restorations using 3D technology are active in the field of cultural heritage. Digitally restored materials can be used as basic data for digital heritage. Based on this, various contents related to excavation of remains and patriots and veterans can be developed. Furthermore, if digital human restoration is made based on the excavated remains, it will be possible to reproduce the appearance of the dead.

A study on the relationship between learning flow, learning satisfaction, academic self-efficacy, academic achievement, and academic stress of nursing college students who experienced online lectures in a non-face-to-face learning environment (비대면 학습환경에서 온라인 강의를 경험한 간호대학생들의 학습몰입, 학습만족도, 학업적 자기효능감, 학업성취도, 학업스트레스간의 관계연구)

  • Yang, Seung Ae
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.6
    • /
    • pp.63-73
    • /
    • 2023
  • The purpose of this study is to identify the level of learning flow, learning satisfaction, academic self-efficacy, academic achievement, and academic stress of nursing students who experienced non-face-to-face online lectures, and to investigate the correlation between variables and the factors affecting academic stress. The data of this study was collected from 143 students at a nursing college in Seoul, through a Google online questionnaire from September 1, 2023 to September 25, 2023, and descriptive statistics, Student's t-test, analysis of variance, Pearson's Correlation, and linear multiple regression were conducted using SPSS Statistics 25.0. Following an analysis of the difference according to general characteristics, academic stress showed significant difference according to Motivation for applying to department(F=4.465, p=.005) and Major satisfaction(F=36.499, p=.000) of the subjects. The result of analyzing the correlation academic stress was negatively correlated with learning flow (r=-.464, p<.010), academic self-efficacy (r=-.522, p<.010), and academic achievement (r=-.379, p<.010), but learning satisfaction was not correlated with academic stress. Variables affecting academic stress were major satisfaction (𝛽=.367, p<.01), learning flow (𝛽=-.186, p<.05), and academic self-efficacy (𝛽=-.241, p<.05), and the explanatory power for academic stress was 40%. The results of this study can be used as basic data for intervention programs for relieving academic stress of nursing students.

Design of IoT System for 3D PRINTER Multi-Management (3D 프린터 다중 관리를 위한 IoT 시스템 설계)

  • Jang, Dae-Sung;Lee, Hyo-Seung;Oh, Jae-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.4
    • /
    • pp.759-764
    • /
    • 2020
  • As the paradigm of manufacturing and production is also changing in line with the fourth industrial revolution, the social demands and directions for Industry 4.0 cannot be reversed, and the scalability and universality of 3D printing technology are attracting attention. 3D printer is a technology developed for the purpose of reducing product development costs, and with the recent expiration of 3D printer technology patent, related technology has been revealed and various technologies applied are being researched and developed, and various singularities have been discovered and supplemented. Thus, to compensate for the inconvenience of the current output method, which requires direct offline adjustment of the machine in the use of 3D printers and 3D printing through direct input of modeling data, the design of the IoT system is proposed to perform real-time online output requests for multiple 3D printers, monitoring functions that can expect normal outputs, and online real-time remote management functions for multiple 3D printers.

Reference Model for the Service of Smart City Platform through Case Study (사례 연구를 통한 스마트 시티 플랫폼의 서비스를 위한 참조 모델)

  • Kim, Young Soo;Mun, Hyung-Jin
    • Journal of Digital Convergence
    • /
    • v.19 no.8
    • /
    • pp.241-247
    • /
    • 2021
  • As a way to solve the side effects of urban development, a smart city with information and communication technology converges in the city is being built. For this, a smart city platform should support the development and integration of smart city services. Therefore, the underlying technology and the functional and non-functional requirements that the smart platform must support were analyzed. As a result of this, we classified the Internet of Things, cloud computing, big data and cyber-physical systems into four categories as the underlying technologies supported by the smart city platform, and derived the functional and non-functional requirements that can be implemented and the reference model of the smart city platform. The reference model of the smart city platform is used for decision-making on investment in infrastructure technology and the development scope of services according to functional or non-functional requirements to solve specific city problems for city managers. It provides platform developers with guidelines to identify and determine the functional and non-functional requirements and implementation technologies of software platforms for building smart cities.

Research on text mining based malware analysis technology using string information (문자열 정보를 활용한 텍스트 마이닝 기반 악성코드 분석 기술 연구)

  • Ha, Ji-hee;Lee, Tae-jin
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.45-55
    • /
    • 2020
  • Due to the development of information and communication technology, the number of new / variant malicious codes is increasing rapidly every year, and various types of malicious codes are spreading due to the development of Internet of things and cloud computing technology. In this paper, we propose a malware analysis method based on string information that can be used regardless of operating system environment and represents library call information related to malicious behavior. Attackers can easily create malware using existing code or by using automated authoring tools, and the generated malware operates in a similar way to existing malware. Since most of the strings that can be extracted from malicious code are composed of information closely related to malicious behavior, it is processed by weighting data features using text mining based method to extract them as effective features for malware analysis. Based on the processed data, a model is constructed using various machine learning algorithms to perform experiments on detection of malicious status and classification of malicious groups. Data has been compared and verified against all files used on Windows and Linux operating systems. The accuracy of malicious detection is about 93.5%, the accuracy of group classification is about 90%. The proposed technique has a wide range of applications because it is relatively simple, fast, and operating system independent as a single model because it is not necessary to build a model for each group when classifying malicious groups. In addition, since the string information is extracted through static analysis, it can be processed faster than the analysis method that directly executes the code.

A Study on Indoor Position-Tracking System Using RSSI Characteristics of Beacon (비콘의 RSSI 특성을 이용한 실내 위치 추적 시스템에 관한 연구)

  • Kim, Ji-seong;Kim, Yong-kab;Hoang, Geun-chang
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.5
    • /
    • pp.85-90
    • /
    • 2017
  • Indoor location-based services have been developed based on the Internet of Things technologies which measure and analyze users who are moving in their daily lives. These various indoor positioning technologies require separate hardware and have several disadvantages, such as a communication protocol which becomes complicated. Based on the fact that a reduction in signal strength occurs according to the distance due to the physical characteristics of the transmitted signal, RSSI technology that uses the received signal strength of the wireless signal used in this paper measures the strength of the transmitted signal and the intensity of the attenuated received signal and then calculates the distance between a transmitter and a receiver, which requires no separate costs and makes to implement simple measurements. It was applied calculating the value for the average RSSI and the RSSI filtering feedback. Filtering is used to reduce the error of the RSSI values that are measured at long distance.It was confirmed that the RSSI values through the average filtering and the RSSI values measured by setting the coefficient value of the feedback filtering to 0.5 were ranged from -61 dBm to - 52.5 dBm, which shows irregular and high values decrease slightly as much as about -2 dBm to -6 dBm as compared to general measurements.

Study on Trends and Strategies for Defense Blockchain and ICT Technologies (국방 블록체인 기술 동향 및 국방 ICT 융합 전략 연구)

  • Lee, K.Hyu;Park, H.Sook
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.1
    • /
    • pp.12-24
    • /
    • 2020
  • To keep pace with other powerful nations in this era of the era of digitalization and to emerge stronger in the world, the defense forces of South Korea aim to innovate and prepare themselves for digital battlefields of possible wars in the future. The resources in the defense sector, which is the core of defense intelligence, is based on an intelligent mission collaboration tactical network system via cyber, command, control, communication, and computer (C4), and military and non-human weapons. Defense intelligence depends on the degree of the convergence of advanced Information and communication technologies (ICTs). Considering this aspect of defense intelligence, We plan to determine the application status of defense blockchain technology and examine the feasibility of applying blockchain technology and the core of applied technology. Generally, a key feature of blockchain technology is its data integrity in untrusted environments. There are various types of core technologies for the blockchain depending on the target areas of application in the defense sector, and it is also essential to derive new application strategies for core technologies that are applied in combination with other ICT technologies. We plan to demonstrate new defense ICT converged technologies (DNAB2: Data, Network, AI, BigData, Blockchain) and DNAB2-As-Services in the defense strategy.

Dynamic Retransmission Scheme Using Retry Count in Constrained Application Protocol (CoAP) (CoAP 프로토콜에서 재전송 카운트를 이용한 능동적 전송 기법)

  • Lee, Jung June;Kim, Kyung Tae;Youn, Hee Yong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.01a
    • /
    • pp.243-246
    • /
    • 2015
  • 최근 사물 인터넷(Internet of things) 의 발달에 따라, 스마트 디바이스 간의 네트워크 및 이를 구축할 수 있는 기술에 대한 수요가 급증하고 있다. 이러한 스마트 디바이스 간의 저 전력 저 손실 네트워크(Low power and Lossy network) 환경에서 쓰이는 대표적인 프로토콜로 CoAP(Constrained Application Protocol)가 있으며, 해당 프로토콜은 다양한 네트워크 환경에 유연하게 적용할 수 있도록 패킷 재전송 주기 설정 옵션을 가진다. 하지만 하나의 디바이스에서 네트워크 환경이 패킷 손실 및 지연여부를 구분 할 수 없기 때문에, 네트워크 상태 파악을 위해서는 수신과 응답 양측 디바이스의 패킷 흐름을 확인해야 하는 문제점이 있다. 본 논문에서는 프로토콜의 정보를 기반으로 네트워크 상태를 파악 할 수 있는 새로운 필드 값을 적용하여 CoAP 패킷 재전송 주기를 네트워크 환경의 상태에 따라 동적으로 설정해주는 알고리즘을 제안한다. 제안된 기법은 동적으로 재전송 주기를 설정함으로써, 패킷 손실에 의한 서비스 장애 극복 및 패킷 지연 상황에서의 불필요한 패킷 재전송을 방지하여 에너지 효율성을 향상시키고 서비스 안정성을 보장한다.

  • PDF