• Title/Summary/Keyword: 사물인터넷 네트워크

Search Result 596, Processing Time 0.026 seconds

Performance of OFDM-QPSK System in Impulsive Noise Environment Based on Measurement Data (측정 데이터 기반의 임펄스 잡음 환경에서 OFDM-QPSK 시스템의 성능)

  • Roh, Jae-sung
    • Journal of Advanced Navigation Technology
    • /
    • v.24 no.6
    • /
    • pp.587-592
    • /
    • 2020
  • The giant information exchange enabled by the Internet of Things paradigm will likely exploit electrical lines as a ready-to-use infrastructure. The advantage of using the pre-installed infrastructure of wiring networks makes power line communication a competitive technology for broad-band communications. Therefore, there has been a growing interest towards the use of existing power line communication channels as an effective means for transmitting high speed data and Internet service. One of the main noise types affecting power line communication systems is the impulsive noise, and the focus of this work is on the impact of this impulsive noise on the performance of OFDM-QPSK systems. For the performance analysis of impulsive noise, data measured in three environments were used. Through the analysis, it is shown that OFDM-QPSK system outperforms QPSK system for most of the impulsive noise cases. Also, RS-coded OFDM-QPSK system can achieve good BER performance under 3 cases impulsive noise environment.

A Study on Smart Home Service System Design to Support Aging in Place (Aging in Place 지원을 위한 스마트 홈 서비스 시스템 설계에 관한 연구)

  • Sim, Sungho
    • Journal of Digital Convergence
    • /
    • v.17 no.12
    • /
    • pp.249-254
    • /
    • 2019
  • According to the recent expansion of the network environment, the spread of smart devices is continuously increasing. With the spread of smart devices such as smart phones, smart pads and wearables, changes are taking place in smart technologies and IT convergence technologies. The development of smart technology is a key element of the 4th industrial technology. The Fourth Industrial Revolution expanded the new service-based industry by adding intelligence to residential, industrial and production environments using IT convergence and smart devices. Research on providing various services using smart technologies, such as smart home, smart factory, smart farm, and smart healthcare, is being conducted in variety. In particular, There is a sharp rise in smart homes due to the proliferation of IoT devices and the growth of sensor technology, control technology, applications, data management, and cloud services. Smart home services using smart technology provide residents with convenient, beneficial services and environments. Smart home service has complemented the existing home network service, but there still are flaws to be modified. In other words, the spread of smart devices, the development of service provider-oriented services, and the interlocking of services have limitations in providing services in consideration of user environment and user state. In order to solve this problem, this study proposes a smart home service system that considers the situation of the elderly.

A Study on IoT/LPWA-based Low Power Solar Panel Monitoring System for Smart City (스마트 시티용 IoT/LPWA 기반 저전력 태양광 패널 모니터링 시스템에 관한 연구)

  • Trung, Pham Minh;Mariappan, Vinayagam;Cha, Jae Sang
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.18 no.1
    • /
    • pp.74-82
    • /
    • 2019
  • The revolution of industry 4.0 is enabling us to build an intelligent connection society called smart cities. The use of renewable energy in particular solar energy is extremely important for modern society due to the growing power demand in smart cities, but its difficult to monitor and manage in each buildings since need to be deploy low energy sensors and information need to be transfer via wireless sensor network (WSN). The Internet of Things (IoT) / low-power wide-area (LPWA) is an emerging WSN technology, to collect and monitor data about environmental and physical electrical / electronics devices conditions in real time. However, providing power to IoT sensor end devices and other public electrical loads such as street lights, etc is an important challenging role because the sensor are usually battery powered and have a limited life time. In this paper, we proposes an efficient solar energy-based power management scheme for smart city based on IoT technology using LoRa wide-area network (LoRaWAN). This approach facilitates to maintain and prevent errors of solar panel based energy systems. The proposed solution maximizing output the power generated from solar panels system to distribute the power to the load and the grid. In this paper, we proved the efficiency of the proposed system with Simulink based system modeling and real-time emulation.

Approaches to Applying Social Network Analysis to the Army's Information Sharing System: A Case Study (육군 정보공유체계에 사회관계망 분석을 적용하기 위한방안: 사례 연구)

  • GunWoo Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.597-603
    • /
    • 2023
  • The paradigm of military operations has evolved from platform-centric warfare to network-centric warfare and further to information-centric warfare, driven by advancements in information technology. In recent years, with the development of cutting-edge technologies such as big data, artificial intelligence, and the Internet of Things (IoT), military operations are transitioning towards knowledge-centric warfare (KCW), based on artificial intelligence. Consequently, the military places significant emphasis on integrating advanced information and communication technologies (ICT) to establish reliable C4I (Command, Control, Communication, Computer, Intelligence) systems. This research emphasizes the need to apply data mining techniques to analyze and evaluate various aspects of C4I systems, including enhancing combat capabilities, optimizing utilization in network-based environments, efficiently distributing information flow, facilitating smooth communication, and effectively implementing knowledge sharing. Data mining serves as a fundamental technology in modern big data analysis, and this study utilizes it to analyze real-world cases and propose practical strategies to maximize the efficiency of military command and control systems. The research outcomes are expected to provide valuable insights into the performance of C4I systems and reinforce knowledge-centric warfare in contemporary military operations.

Delayed offloading scheme for IoT tasks considering opportunistic fog computing environment (기회적 포그 컴퓨팅 환경을 고려한 IoT 테스크의 지연된 오프로딩 제공 방안)

  • Kyung, Yeunwoong
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.4
    • /
    • pp.89-92
    • /
    • 2020
  • According to the various IoT(Internet of Things) services, there have been lots of task offloading researches for IoT devices. Since there are service response delay and core network load issues in conventional cloud computing based offloadings, fog computing based offloading has been focused whose location is close to the IoT devices. However, even in the fog computing architecture, the load can be concentrated on the for computing node when the number of requests increase. To solve this problem, the opportunistic fog computing concept which offloads task to available computing resources such as cars and drones is introduced. In previous fog and opportunistic fog node researches, the offloading is performed immediately whenever the service request occurs. This means that the service requests can be offloaded to the opportunistic fog nodes only while they are available. However, if the service response delay requirement is satisfied, there is no need to offload the request immediately. In addition, the load can be distributed by making the best use of the opportunistic fog nodes. Therefore, this paper proposes a delayed offloading scheme to satisfy the response delay requirements and offload the request to the opportunistic fog nodes as efficiently as possible.

An Analysis on Media Trends in Public Agency for Social Service Applying Text Mining (텍스트 마이닝을 적용한 사회서비스원 언론보도기사 분석)

  • Park, Hae-Keung;Youn, Ki-Hyok
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.2
    • /
    • pp.41-48
    • /
    • 2022
  • This study tried to empirically explore which issues related to the social service agency for public(as below SSA), that is, social perceptions were formed, by using mess media related to the SSA. This study is meaningful in that it identifies the overall social perception and trend of SSA through public opinion. In order to extract media trend data, the search used the big data analysis system, Textom, to collect data from the representative portals Naver News and Daum News. The collected texts were 1,299 in 2020 and 1,410 in 2021, for a total of 2,709. As a result of the analysis, first, the most derived words in relation to the frequency of text appearance were 'SSA', 'establishment', and 'operation'. Second, as a result of the N-gram analysis, the pairs of words directly related to the SSA 'SSA and public', 'SSA and opening', 'SSA and launch', and 'SSA and Department Director', 'SSA and Staff', 'SSA and Caregiver' etc. Third, in the results of TF-IDF analysis and word network analysis, similar to the word occurrence frequency and N-gram results, 'establishment', 'operation', 'public', 'launch', 'provided', 'opened', ' 'Holding' and 'Care' were derived. Based on the above analysis results, it was suggested to strengthen the emergency care support group, to commercialize it in detail, and to stabilize jobs.

A Design of Secure Electronic Health Information Management Protocol in the Internet of Things Environment (사물 인터넷 환경에서 안전한 전자의료정보 관리 프로토콜 설계)

  • Park, Jeong Hyo;Kim, Nak Hyun;Jung, Yong Hoon;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.323-328
    • /
    • 2014
  • ZigBee based on the most vulnerable part of u-Healthcare system that uses the ZigBee communication is the wireless section. ZigBee communication sectors to identify vulnerabilities in this paper, we propose to compensate. ZigBee has been raised from the existing vulnerabilities organize and ZigBee also uses the 64bit address that uniquely identifies a vulnerability that was defined as exposure. And to prevent the exposure of a unique identifying address was used to address a temporary identification. ZigBee security services, the proposed system during the Network Key for encryption only use one mechanism of Residential Mode is used. Residential Mode on all nodes of the entire network because they use a common key, the key is stolen, your network's security system at a time are at risk of collapse. Therefore, in order to guard against these risks to the security policy Network Key updated periodically depending on the method used to. The proposed evaluation and comparative analysis of the system were exposed in the existing system can hide the address that uniquely identifies a public key Network Key also updated periodically, so that leaks can occur due to reduced risk.

Network Technology-based Aesthetic Practices: Focused on the Digital Activism of Electronic Disturbance Theater (네트워크 테크놀로지 기반의 미적 실천: 전자교란극단의 디지털 행동주의를 중심으로)

  • Shan Lim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.2
    • /
    • pp.215-220
    • /
    • 2023
  • Network technology used as a physical interface to retrieve, store, and exchange data is leading the era of data capitalism in the 21st century. The capacity of network technology dominates almost all communication in everyday life, and makes social understanding and experiences in the physical world visible in cyberspace. The movements of human bodies and objects in cyberspace are placed in a social context. This paper paid attention to these phenomena and examined the cases of activism that raised real problems through cyberspace. In particular, the focus of the study is the digital activism of the Electronic Disturbance Theater, which combines critical art and thinking for democracy with the realm of information and demonstrates aesthetic imagination. The first chapter of the main body briefly outlines the meaning activism as a social movement in cyberspace. The second chapter looks back on the alternatives of <FloodNet>, which represents the early activism performance of EDT. And then in the last chapter, the poetic significance of the <Transborder Immigrant Tool> is analyzed. Through this process, this paper demonstrates that the activism performance of the EDT is a critical aesthetics that encourages imagination for alternatives. It also argues that Electronic Disturbance Theater has contemporary value as an avant-garde art that actively utilizes the medium of network technology and integrates performance art and politics.

Supplementation of the Indoor Location Tracking Techniques Based-on Load-Cells Mechanism (로드셀 기반의 실내 위치추적 보완 기법)

  • YI, Nam-Su;Moon, Seung-Jin
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.1-8
    • /
    • 2016
  • Current indoor intrusion detection and location tracking methods have the weakness in seamless operations in tracking the objective because the object must possess a communicating device and the limitation of the single cell size (approximate $100cm{\times}100cm$) exits. Also, the utilization of CCTV technologies show the shortcomings in tracking when the object disappear the area where the CCTV is not installed or illumination is not enough for capturing the scene (e.g. where the context-awarded system is not installed or low illumination presents). Therefore, in this paper we present an improved in-door tracking system based on sensor networks. Such system is built on a simulated scenario and enables us to detect and extend the area of surveillance as well as actively responding the emergency situation. Through simulated studies, we have demonstrated that the proposed system is capable of supplementing the shortcomings of signal cutting, and of estimating the location of the moving object. We expect the study will improve the better analysis of the intruder behavior, the more effective prevention and flexible response to various emergency situations.

A Route Repair Scheme for Reducing DIO Poisoning Overhead in RPL-based IoT Networks (RPL 기반 IoT 네트워크에서 DIO Poisoning 오버헤드를 감소시키는 경로 복구 방법)

  • Lee, Sung-Jun;Chung, Sang-Hwa
    • Journal of KIISE
    • /
    • v.43 no.11
    • /
    • pp.1233-1244
    • /
    • 2016
  • In the IoT network environments for LLNs(Low power and Lossy networks), IPv6 Routing Protocol for Low Power and Lossy networks(RPL) has been proposed by IETF(Internet Engineering Task Force). The goal of RPL is to create a directed acyclic graph, without loops. As recommended by the IETF standard, RPL route recovery mechanisms in the event of a failure of a node should avoid loop, loop detection, DIO Poisoning. In this process, route recovery time and control message might be increased in the sub-tree because of the repeated route search. In this paper, we suggested RPL route recovery method to solve the routing overhead problem in the sub-tree during a loss of a link in the RPL routing protocol based on IoT wireless networks. The proposed method improved local repair process by utilizing a route that could not be selected as the preferred existing parents. This reduced the traffic control packet, especially in the disconnected node's sub tree. It also resulted in a quick recovery. Our simulation results showed that the proposed RPL local repair reduced the recovery time and the traffic of control packets of RPL. According to our experiment results, the proposed method improved the recovery performance of RPL.