• Title/Summary/Keyword: Activation of IoT

Search Result 29, Processing Time 0.023 seconds

A Study on Activation Plan for Logistics Startups in Korea - Focused on Incheon Metropolitan City (물류 스타트업 육성방안에 관한 연구 -인천광역시를 중심으로-)

  • Dong-Joon Kang;Myeong-Hwa Lee;Hyo-Won Kang
    • Korea Trade Review
    • /
    • v.46 no.2
    • /
    • pp.263-280
    • /
    • 2021
  • With the advent of the era of the 4th Industrial Revolution, various support policies and programs are being introduced as the promotion of startups related to the 4th industry is promoted as a core policy of the government. Based on major technologies such as Artificial Intelligence(AI), Big Data, Internet of Things(IoT), Blockchain, and Automation leading the 4th industrial revolution, logistics and distribution companies are expanding the range of markets and services provided. The purpose of this study is to examine the current status of startups in the logistics field based on major technologies of the 4th Industrial Revolution, which are rapidly growing at home and abroad, and suggest implications for revitalizing logistics startups through a policy demand survey. As a result of the study, in order to foster domestic logistics startups, we propose policy support for integration of logistics startups, integrated management of information, provision of physical space, network platform, and practical education and mentoring.

Traffic-based reinforcement learning with neural network algorithm in fog computing environment

  • Jung, Tae-Won;Lee, Jong-Yong;Jung, Kye-Dong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.1
    • /
    • pp.144-150
    • /
    • 2020
  • Reinforcement learning is a technology that can present successful and creative solutions in many areas. This reinforcement learning technology was used to deploy containers from cloud servers to fog servers to help them learn the maximization of rewards due to reduced traffic. Leveraging reinforcement learning is aimed at predicting traffic in the network and optimizing traffic-based fog computing network environment for cloud, fog and clients. The reinforcement learning system collects network traffic data from the fog server and IoT. Reinforcement learning neural networks, which use collected traffic data as input values, can consist of Long Short-Term Memory (LSTM) neural networks in network environments that support fog computing, to learn time series data and to predict optimized traffic. Description of the input and output values of the traffic-based reinforcement learning LSTM neural network, the composition of the node, the activation function and error function of the hidden layer, the overfitting method, and the optimization algorithm.

Incremental Frequent Pattern Detection Scheme Based on Sliding Windows in Graph Streams (그래프 스트림에서 슬라이딩 윈도우 기반의 점진적 빈발 패턴 검출 기법)

  • Jeong, Jaeyun;Seo, Indeok;Song, Heesub;Park, Jaeyeol;Kim, Minyeong;Choi, Dojin;Bok, Kyoungsoo;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.2
    • /
    • pp.147-157
    • /
    • 2018
  • Recently, with the advancement of network technologies, and the activation of IoT and social network services, many graph stream data have been generated. As the relationship between objects in the graph streams changes dynamically, studies have been conducting to detect or analyze the change of the graph. In this paper, we propose a scheme to incrementally detect frequent patterns by using frequent patterns information detected in previous sliding windows. The proposed scheme calculates values that represent whether the frequent patterns detected in previous sliding windows will be frequent in how many future silding windows. By using the values, the proposed scheme reduces the overall amount of computation by performing only necessary calculations in the next sliding window. In addition, only the patterns that are connected between the patterns are recognized as one pattern, so that only the more significant patterns are detected. We conduct various performance evaluations in order to show the superiority of the proposed scheme. The proposed scheme is faster than existing similar scheme when the number of duplicated data is large.

A Study on Next-Generation Data Protection Based on Non File System for Spreading Smart Factory (스마트팩토리 확산을 위한 비파일시스템(None File System) 기반의 차세대 데이터보호에 관한 연구)

  • Kim, Seungyong;Hwang, Incheol;Kim, Dongsik
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.1
    • /
    • pp.176-183
    • /
    • 2021
  • Purpose: The introduction of smart factories that reflect the 4th industrial revolution technologies such as AI, IoT, and VR, has been actively promoted in Korea. However, in order to solve various problems arising from existing file-based operating systems, this research will focus on identifying and verifying non-file system-based data protection technology. Method: The research will measure security storage that cannot be identified or controlled by the operating system. How to activate secure storage based on the input of digital key values. Establish a control unit that provides input and output information based on BIOS activation. Observe non-file-type structure so that mapping behavior using second meta-data can be performed according to the activation of the secure storage. Result: First, the creation of non-file system-based secure storage's data input/output were found to match the hash function value of the sample data with the hash function value of the normal storage and data. Second, the data protection performance experiments in secure storage were compared to the hash function value of the original file with the hash function value of the secure storage after ransomware activity to verify data protection performance against malicious ransomware. Conclusion: Smart factory technology is a nationally promoted technology that is being introduced to the public and this research implemented and experimented on a new concept of data protection technology to protect crucial data within the information system. In order to protect sensitive data, implementation of non-file-type secure storage technology that is non-dependent on file system is highly recommended. This research has proven the security and safety of such technology and verified its purpose.

A study on the Activation Methods of Food Volume Meter by improving the Inlet Function (투입구 기능 개선을 통한 음식물쓰레기종량제 활성화 방안에 관한 연구)

  • Kim, Yongil;Kim, Seungcheon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.3
    • /
    • pp.75-81
    • /
    • 2022
  • Under the government's principle of paying for emissions, the RFID-based pay-as-you-go system, which charges fees in proportion to emissions, was fully implemented in 2012. As of the end of 2018, the penetration rate is about 40% based on 149 local governments and multi-family apartments nationwide. The introduction of equipment showed a reduction effect of about 20-30%. Problems with existing equipment also began to appear. This study tried to improve by applying and integrating the existing technologies to solve the fundamental problems of these inlets. In other words, the plan is to improve the environment around the food waste meter by changing the design so that the hopper goes deep into the food waste bin inside the food waste meter so that the food waste becomes full and is designed smoothly when replacing the collection container.

BLE Beacon Based Online Offline Tourism and Solutions for Regional Tourism Activation (지역관광 활성화를 위한 비콘 기반의 온오프라인 관광 솔루션)

  • Ryu, Gab-Sang
    • Journal of Internet of Things and Convergence
    • /
    • v.2 no.2
    • /
    • pp.21-26
    • /
    • 2016
  • In this paper, it is possible to update the tourist information in real time, on/off-line tour proposes a solution(BBTS) based on a bluetooth beacon can provide tourist information without the need for wireless data network. BBTS consists of a bluetooth based data of the low-power supply system and the beacons and interoperable smart applications. Data supply system consists of the BLE & Beacon Pairing-based / non-pairing data transmission module with integral hardware. Smart application modules that provide indoor location of users information, internal server module and tourist information collection and information guide around comprised of applications. The proposed BBTS is possible that indoor service tourism tourist demand due to utilizing the beacon technology. Outdoor tourist information is designed to be downloaded to the smartphone receives the information received from the beacon APK file to provide services. BBTS system is expected to make a big impact on the smart tourism services industry.

A Study on Improvement of Inspection Items for Activation of the Information Security Pre-inspection (정보보호 사전점검 활성화를 위한 점검항목 개선 연구)

  • Choi, Ju Young;Kim, JinHyung;Park, Jung-Sub;Park, Choon Sik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.933-940
    • /
    • 2015
  • IT environments such as IoT, SNS, BigData, Cloud computing are changing rapidly. These technologies add new technologies to some of existing technologies and increase the complexity of Information System. Accordingly, they require enhancing the security function for new IT services. Information Security Pre-inspection aims to assure stability and reliability for user and supplier of new IT services by proposing development stage which considers security from design phase. Existing 'Information Security Pre-inspection' (22 domains, 74 control items, 129 detail items) consist of 6 stage (Requirements Definition, Design, Training, Implementation, Test, Sustain). Pilot tests were executed for one of IT development companies to verify its effectiveness. Consequently, for some inspection items, some improvement requirements and reconstitution needs appeared. This paper conducts a study on activation of 'Information Security Pre-inspection' which aims to construct prevention system for new information system. As a result, an improved 'Information Security Pre-inspection' is suggested. This has 16 domains, 54 inspection items, 76 detail items which include some improvement requirements and reconstitution needs.

Effect of suspension plank exercise with hip abduction and modified bridge exercise on the trunk muscle thickness in healthy adults (건강한 성인의 엉덩관절 벌림 서스펜션 플랭크 운동과 수정된 브릿지 운동이 몸통근육 두께에 미치는 영향)

  • Yo-han Kim;Ji-heon Hong;Jae-ho Yu;Jin-seop Kim;Dong-yeop Lee
    • The Journal of Korean Academy of Orthopedic Manual Physical Therapy
    • /
    • v.29 no.1
    • /
    • pp.1-9
    • /
    • 2023
  • BACKGROUND: The purpose of this study was to find out which exercise is more effective for the activation of the trunk, when the suspension plank and modified bridge exercise are performed. Weakening of the trunk muscles can lead to secondary injuries such as back injuries. In order to prevent injury, trunk muscles must be strengthened, and representative trunk strengthening exercises include planks and bridges. Each has been developed with a modified method, but since there is no paper comparing which exercise is more effective for trunk muscle strength, it was written to compare the two exercises. METHODS: The subjects were a random sample of 30 healthy men who agreed to participate in the study. The subjects were divided into two groups of 15 people each, and the suspension plank and the modified bridge exercise were performed for six weeks. The thickness of the transverse abdominis (TrA), internal abdominal oblique (IO), external abdominal oblique (EO), rectus abdominis (RA), multifidus (MF) was measured before and after the exercise. The two groups were analyzed using an independent t-test and paired t-test to compare the muscle thickness and the difference before and after exercise. RESULTS: The trunk muscle thickness was increased in both groups with suspension plank and modified bridge exercise, and there was a statistically significant difference. When comparing the two groups, the suspension plank group also showed a significant difference in RA (p<.05). CONCLUSION: As a result of this study, suspension plank exercise can have a positive effect on activating the trunk muscles and strengthening the strength of RA. Therefore, it is considered that suspension plank exercise is a more effective intervention to strengthen trunk muscle than modified bridge exercise.

  • PDF

A Study on the Expected Effect of Mobile Prepaid Payment for the Activation of Food Waste Volume-Rate System (음식물 종량제 활성화를 위한 모바일 선불결제 적용에 따른 기대효과 연구)

  • Kim, YongIl;Kim, SeungCheon
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.47-54
    • /
    • 2020
  • This study proposes an NFC-based payment system that considers user convenience while expanding the existing payment method for RFID-based individual food and logistics waste equipment. In line with this trend, I proposed to apply NFC to the existing RFID-based food meter to release the food in the meantime and to address the problem of re-carrying due to card loss, card not possessed, and non-filling, and the question that could not be identified by various cumbersome procedures. NFC's function alone has been certified for its convenience, which led to its introduction and research in the period of time. Of course, we need to negotiate fees with the transportation card company, but if we see a market share related to transportation card soon, we think smooth negotiations will take place. NFC method will be expanded to all phones with iPhone NFC opening. Therefore, in the next study, we intend to apply the payment system in NFC by linking with local currency, mobile vouchers, and card companies, which are being paid as respective payment means according to the recent emergency support system for COVID-19.