• Title/Summary/Keyword: 산업 IoT

Search Result 780, Processing Time 0.029 seconds

A Study on Automated Stock Trading based on Volatility Strategy and Fear & Greed Index in U.S. Stock Market (미국주식 매매의 변동성 전략과 Fear & Greed 지수를 기반한 주식 자동매매 연구)

  • Sunghyuck Hong
    • Advanced Industrial SCIence
    • /
    • v.2 no.3
    • /
    • pp.22-28
    • /
    • 2023
  • In this study, we conducted research on the automated trading of U.S. stocks through a volatility strategy using the Fear and Greed index. Volatility in the stock market is a common phenomenon that can lead to fluctuations in stock prices. Investors can capitalize on this volatility by implementing a strategy based on it, involving the buying and selling of stocks based on their expected level of volatility. The goal of this thesis is to investigate the effectiveness of the volatility strategy in generating profits in the stock market.This study employs a quantitative research methodology using secondary data from the stock market. The dataset comprises daily stock prices and daily volatility measures for the S&P 500 index stocks. Over a five-year period spanning from 2016 to 2020, the stocks were listed on the New York Stock Exchange (NYSE). The strategy involves purchasing stocks from the low volatility group and selling stocks from the high volatility group. The results indicate that the volatility strategy yields positive returns, with an average annual return of 9.2%, compared to the benchmark return of 7.5% for the sample period. Furthermore, the findings demonstrate that the strategy outperforms the benchmark return in four out of the five years within the sample period. Particularly noteworthy is the strategy's performance during periods of high market volatility, such as the COVID-19 pandemic in 2020, where it generated a return of 14.6%, as opposed to the benchmark return of 5.5%.

A study on the Construction of a Big Data-based Urban Information and Public Transportation Accessibility Analysis Platforms- Focused on Gwangju Metropolitan City - (빅데이터 기반의 도시정보·접대중교통근성 분석 플랫폼 구축 방안에 관한 연구 -광주광역시를 중심으로-)

  • Sangkeun Lee;Seungmin Yu;Jun Lee;Daeill Kim
    • Smart Media Journal
    • /
    • v.11 no.11
    • /
    • pp.49-62
    • /
    • 2022
  • Recently, with the development of Smart City Solutions such as Big data, AI, IoT, Autonomous driving, and Digital twins around the world, the proliferation of various smart devices and social media, and the record of the deeds that people have left everywhere, the construction of Smart Cities using the "Big Data" environment in which so much information and data is produced that it is impossible to gauge the scale is actively underway. The Purpose of this study is to construct an objective and systematic analysis Model based on Big Data to improve the transportation convenience of citizens and formulate efficient policies in Urban Information and Public Transportation accessibility in sustainable Smart Cities following the 4th Industrial Revolution. It is also to derive the methodology of developing a Big Data-Based public transport accessibility and policy management Platform using a sustainable Urban Public DB and a Private DB. To this end, Detailed Living Areas made a division and the accessibility of basic living amenities of Gwangju Metropolitan City, and the Public Transportation system based on Big Data were analyzed. As a result, it was Proposed to construct a Big Data-based Urban Information and Public Transportation accessibility Platform, such as 1) Using Big Data for public transportation network evaluation, 2) Supporting Transportation means/service decision-making based on Big Data, 3) Providing urban traffic network monitoring services, and 4) Analyzing parking demand sources and providing improvement measures.

Development of Deep Learning Model for Detecting Road Cracks Based on Drone Image Data (드론 촬영 이미지 데이터를 기반으로 한 도로 균열 탐지 딥러닝 모델 개발)

  • Young-Ju Kwon;Sung-ho Mun
    • Land and Housing Review
    • /
    • v.14 no.2
    • /
    • pp.125-135
    • /
    • 2023
  • Drones are used in various fields, including land survey, transportation, forestry/agriculture, marine, environment, disaster prevention, water resources, cultural assets, and construction, as their industrial importance and market size have increased. In this study, image data for deep learning was collected using a mavic3 drone capturing images at a shooting altitude was 20 m with ×7 magnification. Swin Transformer and UperNet were employed as the backbone and architecture of the deep learning model. About 800 sheets of labeled data were augmented to increase the amount of data. The learning process encompassed three rounds. The Cross-Entropy loss function was used in the first and second learning; the Tversky loss function was used in the third learning. In the future, when the crack detection model is advanced through convergence with the Internet of Things (IoT) through additional research, it will be possible to detect patching or potholes. In addition, it is expected that real-time detection tasks of drones can quickly secure the detection of pavement maintenance sections.

Efficient QoS Policy Implementation Using DSCP Redefinition: Towards Network Load Balancing (DSCP 재정의를 통한 효율적인 QoS 정책 구현: 네트워크 부하 분산을 위해)

  • Hanwoo Lee;Suhwan Kim;Gunwoo Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.715-720
    • /
    • 2023
  • The military is driving innovative changes such as AI, cloud computing, and drone operation through the Fourth Industrial Revolution. It is expected that such changes will lead to a rapid increase in the demand for information exchange requirements, reaching all lower-ranking soldiers, as networking based on IoT occurs. The flow of such information must ensure efficient information distribution through various infrastructures such as ground networks, stationary satellites, and low-earth orbit small communication satellites, and the demand for information exchange that is distributed through them must be appropriately dispersed. In this study, we redefined the DSCP, which is closely related to QoS (Quality of Service) in information dissemination, into 11 categories and performed research to map each cluster group identified by cluster analysis to the defense "information exchange requirement list" on a one-to-one basis. The purpose of the research is to ensure efficient information dissemination within a multi-layer integrated network (ground network, stationary satellite network, low-earth orbit small communication satellite network) with limited bandwidth by re-establishing QoS policies that prioritize important information exchange requirements so that they are routed in priority. In this paper, we evaluated how well the information exchange requirement lists classified by cluster analysis were assigned to DSCP through M&S, and confirmed that reclassifying DSCP can lead to more efficient information distribution in a network environment with limited bandwidth.

Generative Adversarial Network Model for Generating Yard Stowage Situation in Container Terminal (컨테이너 터미널의 야드 장치 상태 생성을 위한 생성적 적대 신경망 모형)

  • Jae-Young Shin;Yeong-Il Kim;Hyun-Jun Cho
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2022.06a
    • /
    • pp.383-384
    • /
    • 2022
  • Following the development of technologies such as digital twin, IoT, and AI after the 4th industrial revolution, decision-making problems are being solved based on high-dimensional data analysis. This has recently been applied to the port logistics sector, and a number of studies on big data analysis, deep learning predictions, and simulations have been conducted on container terminals to improve port productivity. These high-dimensional data analysis techniques generally require a large number of data. However, the global port environment has changed due to the COVID-19 pandemic in 2020. It is not appropriate to apply data before the COVID-19 outbreak to the current port environment, and the data after the outbreak was not sufficiently collected to apply it to data analysis such as deep learning. Therefore, this study intends to present a port data augmentation method for data analysis as one of these problem-solving methods. To this end, we generate the container stowage situation of the yard through a generative adversarial neural network model in terms of container terminal operation, and verify similarity through statistical distribution verification between real and augmented data.

  • PDF

Design of Authentication Mechinism for Command Message based on Double Hash Chains (이중 해시체인 기반의 명령어 메시지 인증 메커니즘 설계)

  • Park Wang Seok;Park Chang Seop
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.51-57
    • /
    • 2024
  • Although industrial control systems (ICSs) recently keep evolving with the introduction of Industrial IoT converging information technology (IT) and operational technology (OT), it also leads to a variety of threats and vulnerabilities, which was not experienced in the past ICS with no connection to the external network. Since various control command messages are sent to field devices of the ICS for the purpose of monitoring and controlling the operational processes, it is required to guarantee the message integrity as well as control center authentication. In case of the conventional message integrity codes and signature schemes based on symmetric keys and public keys, respectively, they are not suitable considering the asymmetry between the control center and field devices. Especially, compromised node attacks can be mounted against the symmetric-key-based schemes. In this paper, we propose message authentication scheme based on double hash chains constructed from cryptographic hash function without introducing other primitives, and then propose extension scheme using Merkle tree for multiple uses of the double hash chains. It is shown that the proposed scheme is much more efficient in computational complexity than other conventional schemes.

Intelligent Transportation System (ITS) research optimized for autonomous driving using edge computing (엣지 컴퓨팅을 이용하여 자율주행에 최적화된 지능형 교통 시스템 연구(ITS))

  • Sunghyuck Hong
    • Advanced Industrial SCIence
    • /
    • v.3 no.1
    • /
    • pp.23-29
    • /
    • 2024
  • In this scholarly investigation, the focus is placed on the transformative potential of edge computing in enhancing Intelligent Transportation Systems (ITS) for the facilitation of autonomous driving. The intrinsic capability of edge computing to process voluminous datasets locally and in a real-time manner is identified as paramount in meeting the exigent requirements of autonomous vehicles, encompassing expedited decision-making processes and the bolstering of safety protocols. This inquiry delves into the synergy between edge computing and extant ITS infrastructures, elucidating the manner in which localized data processing can substantially diminish latency, thereby augmenting the responsiveness of autonomous vehicles. Further, the study scrutinizes the deployment of edge servers, an array of sensors, and Vehicle-to-Everything (V2X) communication technologies, positing these elements as constituents of a robust framework designed to support instantaneous traffic management, collision avoidance mechanisms, and the dynamic optimization of vehicular routes. Moreover, this research addresses the principal challenges encountered in the incorporation of edge computing within ITS, including issues related to security, the integration of data, and the scalability of systems. It proffers insights into viable solutions and delineates directions for future scholarly inquiry.

An Exploratory Study on Smart Wearable and Game Service Design for U-Silver Generation: U-Hospital Solution for the Induction of Interest to Carry Out Personalized Exercise Prescription (U-실버세대를 위한 스마트 웨어러블 및 연동 게임의 서비스 디자인 방안 탐색: 개인 맞춤형 운동처방 실행을 위한 흥미 유도 목적의 U-Hospital 솔루션)

  • Park, Su Youn;Lee, Joo Hyeon
    • Science of Emotion and Sensibility
    • /
    • v.22 no.1
    • /
    • pp.23-34
    • /
    • 2019
  • The U-Healthcare era has evolved with the development of the Internet of things (IoT) in the early stages of being connected as a society. Already, many changes such as increased well-being and the extension of human life are becoming evident across cultures. Korea entered the growing group of aging societies in 2017, and its silver industry is expected to grow rapidly by adopting the IoT of a super-connected society. In particular, the senior shift phenomenon has resulted in increased interest in the promotion of the health and well-being of the emergent silver generation which, unlike the existing silver generation, is highly active and wields great economic power. This study conducted in-depth interviews to investigate the characteristics of the new silver generation, and to develop the design for a wearable serious game that intends to boost the interest of the elderly in exercise and fitness activities according to their personalized physical training regimes as prescribed by the U-Hospital service. The usage scenario of this wearable serious game for the 'U-silver generation' is derived from social necessity. Medical professionals can utilize this technology to conduct health examinations and to monitor the rehabilitation of senior patients. The elderly can also use this tool to request checkups or to interface with their healthcare providers. The wearable serious game is further aimed at mitigating concerns about the deterioration of the physical functions of the silver generation by applying personalized exercise prescriptions. The present investigation revealed that it is necessary to merge the on / off line community activities to meet the silver generation's daily needs for connection and friendship. Further, the sustainability of the serious game must be enhanced through the inculcation of a sense of accomplishment as a player rises through the levels of the game. The proposed wearable serious game is designed specifically for the silver generation that is inexperienced in using digital devices: simple game rules are applied to a familiar interface grounded on the gourmet travels preferred by the target players to increase usability.

A Study on the Awareness and Preparation of the Forth Industrial Revolution of Some Health Department College Students (일부 보건계열학과 대학생의 4차 산업혁명 인식 및 준비도 연구)

  • Cho, Hye-Eun
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.12
    • /
    • pp.291-299
    • /
    • 2020
  • The purpose of this study was to be used as basic data for the development of future-type curriculum in health. The awareness and preparation of the forth industrial revolution were surveyed on 280 college students in health departments preparing medical technicians. A self-written structured questionnaire was used for data collection, and the recognition of the forth industry revolution was 2.74, 3D printing (3.59) was high, and neural network machine learning(2.33) was the lowest. Students majoring in Physiotherapy (3.00) had the highest perception, and those majored in Dental engineering(2.37) had the lowest perception, and there was a difference in the degree of perception of IoT by major (p=0.024). For the forth industrial revolution, 54.5% of students are preparing, and lack of interest (42.9%) is the most difficult reason to prepare, and 50.6% of educational experience and 60.9% of VR&AR game experience have experience. In the era of the forth industrial revolution, job loss (38.7%) was high, and the required competency was creative capacity (50.6%). Therefore, it is necessary to develop a curriculum related to the fourth industrial revolution and apply teaching methods that can increase the awareness and preparation of health college students in the era of the fourth industrial revolution.

Anomaly Detection Using Visualization-based Network Forensics (비정상행위 탐지를 위한 시각화 기반 네트워크 포렌식)

  • Jo, Woo-yeon;Kim, Myung-jong;Park, Keun-ho;Hong, Man-pyo;Kwak, Jin;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.25-38
    • /
    • 2017
  • Many security threats are occurring around the world due to the characteristics of industrial control systems that can cause serious damage in the event of a security incident including major national infrastructure. Therefore, the industrial control system network traffic should be analyzed so that it can identify the attack in advance or perform incident response after the accident. In this paper, we research the visualization technique as network forensics to enable reasonable suspicion of all possible attacks on DNP3 control system protocol, and define normal action based rules and derive visualization requirements. As a result, we developed a visualization tool that can detect sudden network traffic changes such as DDoS and attacks that contain anormal behavior from captured packet files on industrial control system network. The suspicious behavior in the industrial control system network can be found using visualization tool with Digital Bond packet.