• Title/Summary/Keyword: 정보통신 서비스

Search Result 10,440, Processing Time 0.044 seconds

One-stop Platform for Verification of ICT-based environmental monitoring sensor data (ICT 기반 환경모니터링 센서 데이터 검증을 위한 원스탑 플랫폼)

  • Chae, Minah;Cho, Jae Hyuk
    • Journal of Platform Technology
    • /
    • v.9 no.1
    • /
    • pp.32-39
    • /
    • 2021
  • Existing environmental measuring devices mainly focus on electromagnetic wave and eco-friendly product certification and durability test, and sensor reliability verification and verification of measurement data are conducted mainly through sensor performance evaluation through type approval and registration, acceptance test, initial calibration, and periodic test. This platform has established an ICT-based environmental monitoring sensor reliability verification system that supports not only performance evaluation for each target sensor, but also a verification system for sensor data reliability. A sensor board to collect sensor data for environmental information was produced, and a sensor and data reliability evaluation and verification service system was standardized. In addition, to evaluate and verify the reliability of sensor data based on ICT, a sensor data platform monitoring prototype using LoRa communication was produced, and the test was conducted in smart cities. To analyze the data received through the system, an optimization algorithm was developed using machine learning. Through this, a sensor big data analysis system is established for reliability verification, and the foundation for an integrated evaluation and verification system is provide.

Distributed Control Framework based on Mobile Agent Middleware

  • Lee, Yon-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.12
    • /
    • pp.195-202
    • /
    • 2020
  • The control system for the efficiency of resource utilization in sensor network environment based on object detection and environmental sensor requires active control function which based on sensor data acquisition and transmission functions and server's data analysis. Using active rule-based mobile agent middleware, this paper proposes a new distributed control framework that reduces the load of central sensor data server in sensor network environment by implementing remote data sensing and Zigbee-based communication with server and data analysis method of server. In addition, we implemented a power-saving system prototype using active rule-based distributed control methods that applied consumer's demand and environmental variables, and verified the validity of the proposed system through experiments and evaluations in the mobile agent middleware environment. The proposed system is a system framework that can efficiently autonomously control distributed objects in the sensor network environment, and it can be applied effectively to the development of demand response service based on optimal power control for the smart power system in the future.

Security Verification of Wireless Remote Control System Using CPN (CPN을 이용한 무선원격제어시스템의 안전성 검증)

  • 이문구
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.5
    • /
    • pp.81-90
    • /
    • 2003
  • Existing web-based system management software solutions show some limitations in time and space. Moreover, they possess such as shortcomings unreliable error message announcements and difficulties with real-time assistance suppers and emergency measures. In order to solve these deficiencies, Wireless Remote Control System was designed and implemented. Wireless Remote Control System is able to manage and monitor remote systems by using mobile communication devices for instantaneous control. The implementation of Wireless Remote Control System leads to these security Problems as well as solutions to aforementioned issues with existing web-based system management software solutions. Therefore, this paper has focused on the security matters related to Wireless Remote Control System. The designed security functions include mobile device user authentication and target system access control. For security verification of these security functions introduced CPN(Coloured Petri Nets) which is capable of expressing every possible state for each stage. And then in this paper was verified its security through PI(Place Invariant) based on CPN(Coloured Petri Nets). The CPN expression and analysis method of the proposed security function can also be a useful method for analyzing other services in the future.

A Group Key based Authentication Protocol Providing Fast Handoff in IEEE 802.11 (IEEE 802.11 환경에서 빠른 핸드오프를 제공하는 그룹키 기반의 인증 프로토콜)

  • Lee, Chang-Yong;Kim, Sang-Jin;Oh, Hee-Kuck;Park, Choon-Sik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.103-113
    • /
    • 2008
  • Reducing handoff latency is essential in providing seamless multimedia service in Wireless LAN based on the IEEE 802.11 standard. Reducing authentication delay is critical in reducing handoff latency. To this end, several authentication protocols for fBst handoff have been proposed. Mishra et al. used proactive key distribution to improve the authentication delay incurred in the current standard and Park et al. proposed a new authentication protocol based on Blom's key pre-distribution scheme. In this paper, we propose an enhanced authentication protocol based on Bresson et al.'s group key protocol. If a mobile node has previously access the network, our proposed protocol only requires simple hash operations in providing mutual authentication between a mobile node and access points. Our protocol is more efficient than Park et al.'s and Mishra et al.'s technique can be used in our protocol to further enhance our protocol.

Implementation of Real-time Wireless Remote Control System Based on Public Key Infrastructure (PKI를 기반으로 한 실시간 무선 원격제어 시스템의 구현)

  • 이문구
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.3
    • /
    • pp.71-79
    • /
    • 2003
  • Existing web-based system management software solutions show some limitations in time and space. Moreover, hey possess such as shortcomings unreliable error message announcements and difficulties with real-time assistance supports and emergency measures. In order to solve these deficiencies, Wireless Remote Control System(W-RCS) was designed and implemented. W-RCS is able to manage and monitor remote systems by using mobile communication devices for instantaneous control. The implementation of W-RCS leads to these security problems as well as solutions to aforementioned issues with existing web-based system management software solutions. Therefore, this paper has focused on the security matters related to W-RCS. The security functions based on public key infrastructure include mobile device user authentication and target system access control. The W-RCS allows real-time user authentication, increases the flexibility of resource administrators and mobile device non, and provides not only uninterrupted services, but also safe mobile office environments.

Analysis of User Experience and Usage Behavior of Consumers Using Artificial Intelligence(AI) Devices (인공지능(AI) 디바이스 이용 소비자의 사용행태 및 사용자 경험 분석)

  • Kim, Joon-Hwan
    • Journal of Digital Convergence
    • /
    • v.19 no.6
    • /
    • pp.1-9
    • /
    • 2021
  • Artificial intelligence (AI) devices are rapidly emerging as a core platform of next-generation information and communication technology (ICT), this study investigated consumer usage behavior and user experience through AI devices that are widely applied to consumers' daily lives. To this end, data was collected from 600 consumers with experience in using AI devices were derived to recognize the attributes and behavior of AI devices. The analysis results are as follows. First, music listening was the most used among various attributes and it was found that simple functions such as providing weather information were usefully recognized. Second, the main devices used by AI device users were identified as AI speakers, smartphone, PC and laptops. Third, associative images of AI devices appeared in the order of fun, useful, novel, smart, innovative, and friendly. Therefore, practical implications are suggested to contribute to provision of user services using AI devices in the future by analyzing usage behaviors that reflect the characteristics of AI devices.

Design of Intelligent Intrusion Context-aware Inference System for Active Detection and Response (능동적 탐지 대응을 위한 지능적 침입 상황 인식 추론 시스템 설계)

  • Hwang, Yoon-Cheol;Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.4
    • /
    • pp.126-132
    • /
    • 2022
  • At present, due to the rapid spread of smartphones and activation of IoT, malicious codes are disseminated using SNS, or intelligent intrusions such as intelligent APT and ransomware are in progress. The damage caused by the intelligent intrusion is also becoming more consequential, threatening, and emergent than the previous intrusion. Therefore, in this paper, we propose an intelligent intrusion situation-aware reasoning system to detect transgression behavior made by such intelligent malicious code. The proposed system was used to detect and respond to various intelligent intrusions at an early stage. The anticipated system is composed of an event monitor, event manager, situation manager, response manager, and database, and through close interaction between each component, it identifies the previously recognized intrusive behavior and learns about the new invasive activities. It was detected through the function to improve the performance of the inference device. In addition, it was found that the proposed system detects and responds to intelligent intrusions through the state of detecting ransomware, which is an intelligent intrusion type.

Smart Healthcare in the Era of the Covid-19 Pandemic: Strategies and Tasks for Mental Health Social Work (코로나시대 스마트헬스케어의 적용가능성과 과제: 정신건강 사회복지 분야를 중심으로)

  • Lee, Jieha;Lee, Hyunjin;Hong, Seunghye;Park, Young
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.679-688
    • /
    • 2022
  • This paper focuses on the usability of smart healthcare based on the development of Information and Communication Technology(ICT), briefly introduces concepts and the current status related to smart healthcare, and discusses strategies and future tasks in the field of mental health welfare in the COVID-19 era. This paper first introduces the smart healthcare programs of the National Mental Health Center and the Seoul Mental Health Welfare Center. Second, we introduce various smart healthcare programs used in Germany, China, the U.S., and Australia, review the actual examples, and examine both public and private responsiveness. Finally, we examine the possibility of using smart healthcare in the mental health social work system in South Korea and examine future tasks and implications. This paper would contribute to the growth of world-class mental health social work services.

A Study on Major Issues of Artificial Intelligence Using Keyword Analysis of Papers: Focusing on KCI Journals in the Field of Social Science (논문 키워드 분석을 통한 인공지능의 주요 이슈에 관한 고찰 : 사회과학 분야의 KCI 등재학술지를 중심으로)

  • Chung, Do-Bum;You, Hwasun;Mun, Hee Jin
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.7
    • /
    • pp.1-9
    • /
    • 2022
  • Today, artificial intelligence (AI) has emerged as a key driver of national competitiveness, but it is also causing unexpected side effects in society. This study intends to examine major social issues by collecting papers on AI targeting KCI journals in the field of social science. Therefore, we conducted keyword analysis of papers from 2016 to 2020. As a result of the analysis, the keywords for 'robot' and 'education' appeared the most, and the top six clusters (issues) were derived through the keyword network. The main issues are as follows: the background and/or basic concept of AI, AI education, side effects of AI, legal issues of AI-based creations, intention to use AI products/services, and AI ethics. The results of this study can be used to expand the discussion on the social aspects of AI and to find policy directions at the national level.

Performance Comparison of Task Partitioning Methods in MEC System (MEC 시스템에서 태스크 파티셔닝 기법의 성능 비교)

  • Moon, Sungwon;Lim, Yujin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.5
    • /
    • pp.139-146
    • /
    • 2022
  • With the recent development of the Internet of Things (IoT) and the convergence of vehicles and IT technologies, high-performance applications such as autonomous driving are emerging, and multi-access edge computing (MEC) has attracted lots of attentions as next-generation technologies. In order to provide service to these computation-intensive tasks in low latency, many methods have been proposed to partition tasks so that they can be performed through cooperation of multiple MEC servers(MECSs). Conventional methods related to task partitioning have proposed methods for partitioning tasks on vehicles as mobile devices and offloading them to multiple MECSs, and methods for offloading them from vehicles to MECSs and then partitioning and migrating them to other MECSs. In this paper, the performance of task partitioning methods using offloading and migration is compared and analyzed in terms of service delay, blocking rate and energy consumption according to the method of selecting partitioning targets and the number of partitioning. As the number of partitioning increases, the performance of the service delay improves, but the performance of the blocking rate and energy consumption decreases.