• Title/Summary/Keyword: Big-Data Platform

Search Result 506, Processing Time 0.021 seconds

The Communication Protocol Model for Semiconductor Equipment with Internet of Things (사물인터넷을 이용한 반도체 장비 통신 프로토콜 모델)

  • Kim, Doo Yong;Kim, Kiwan
    • Journal of the Semiconductor & Display Technology
    • /
    • v.18 no.4
    • /
    • pp.40-45
    • /
    • 2019
  • The smart factory has developed with the help of several technologies such as automation, artificial intelligence, big data, smart sensors and communication protocols. The Internet of things(IOT) among communication protocols has become the key factor for the seamless integration of various manufacturing equipment. Therefore, it is important that the IOT cooperate with the standards of communication protocols proposed by the SEMI in the semiconductor industry. In this paper, we suggest a novel reference model of the communication protocols for semiconductor equipment by introducing an IOT service layer. With the IOT service layer, we can use the functions and the additional services provided by the IOT standards that give the inter-operability between factory machines and host computers. We implement the standard of the communication protocols for semiconductor equipment with the IOT service layer by using ns3 simulator. It concludes that it is necessary to provide the platform for the IOT service layer to deploy efficiently the proposed reference model of the communication protocols.

Apply Blockchain to Overcome Wi-Fi Vulnerabilities

  • Kim, Seong-Kyu (Steve)
    • Journal of Multimedia Information System
    • /
    • v.6 no.3
    • /
    • pp.139-146
    • /
    • 2019
  • This paper, wireless internet such as Wi-Fi has a vulnerability to security. Blockchain also means a 'Ledger' in which transaction information that occurs on a public or private network is encrypted and shared among the network participants. Blockchain maintains information integrity by making it impossible for a particular node to tamper with information arbitrarily, a feature that would result in changes in the overall blockchain hash value if any one transaction information that constitutes a block was changed. The complete sharing of information through a peer-to-peer network will also cripple hacking attempts from outside, targeting specialized nodes, and prepare for the "single point of failure" risk of the entire system being shut down. Due to the value of these Blockchain, various types of Blockchain are emerging, and related technology development efforts are also actively underway. Various business models such as public block chains such as Bitcoin, as well as private block chains that allow only certain authorized nodes to participate, or consortium block chains operated by a select few licensed groups, are being utilized. In terms of technological evolution, Blockchain also shows the potential to grow beyond cryptocurrency into an online platform that allows all kinds of transactions with the advent of 'Smart Contract'. By using Blockchain technology, the company makes suggestions to overcome the vulnerability of wireless Internet.

The Process for Deriving Research Area by Converging Heterogeneous field - Focused on ICT-Chemistry Safety (이종분야 융합을 통한 연구영역 도출 프로세스 수립 - ICT-화학안전을 중심으로)

  • Shim, We;Seo, Seongho;Chung, Hyunsang;Choi, Jaekyung;Kang, Jongseok
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.22 no.2
    • /
    • pp.201-208
    • /
    • 2019
  • Since the introduction of the open innovation at the beginning of the 2000s, various studies have been carried out on the convergence of technologies, such as the development of new technologies and the development of the business domain. while exploring the technologies necessary for the convergence of appropriate technologies in this research, we propose a discovery process of challengeable research areas by means of the integration of heterogeneous fields which are based on the strategic formulation of ICT and chemical safety industry. In this paper, we consequently propose the 103 detailed convergent technologies based on ICT, especially including artificial intelligent technology and smart big-data platform architecture, were derived from the research areas of the chemical safety field, We expect that research related to the safety field will be frustrated in the future.

The status of metaverse and digital twin technology development

  • CHUNG, Myung-Ae;KIM, Kyung-A;KANG, Min-Soo
    • Korean Journal of Artificial Intelligence
    • /
    • v.10 no.2
    • /
    • pp.19-24
    • /
    • 2022
  • Metaverse refers to a world that transcends reality. Metaverse is a compound word of meta (transcendence) and universe (universe). The impact of the corona pandemic has provided an opportunity to rapidly grow the metaverse based on realistic content along with online and non-face-to-face environments. Various content and service platforms reflecting the concepts of metaverse and digital twin are rapidly spreading around the world in line with the pandemic situation. As their needs accelerate in response to the COVID-19 situation, the technology of metaverse and digital twin is attracting attention again as an indispensable condition for business, culture and art, national industry, and public services. In particular, the metaverse requires the balanced development of ecosystem components based on various advanced convergence technologies. In this paper, the concept of metaverse and digital twin, types of platforms, and development status are examined, and trends of key element technologies are investigated and analyzed. As these key element technologies, XR sensory technology, avatar technology, and other XR devices and parts were examined. Through this, we want to clearly pinpoint the direction in which the metaverse will develop through future technologies, services, and follow-up research.

Analysis of Google's success factors and direction

  • LEE, Sang-Youn;KIM, Se-Jin
    • Korean Journal of Artificial Intelligence
    • /
    • v.8 no.2
    • /
    • pp.11-16
    • /
    • 2020
  • Among the innovative companies leading the era of the 4th industrial revolution, the world's largest Internet company is Google. Google has grown by providing convenient services such as Internet search, Android smartphone operating system, and video. Now, Google is leading the global IT industry by continuing to develop in various new business fields based on open service platforms, artificial intelligence, and big data. In this study, an exploratory discussion was conducted on Google's success factors and future directions. The purpose of the research is to understand the development process of the IT field from the successfactors of Google and to analyze the development direction of the future IT industry. Google's success factors were its open platform policy and successful acquisitions of external companies. In fact, most of the services Google offers come from companies that have acquired and acquired them. In addition, there was a corporate culture that values and supportsthe spirit of challenge and autonomy of members who are not afraid of failure. Based on this study's review of Google's direction analysis, the follow-up study will infer the direction of the IT industry in depth and look at the future technologies that IT majors need to prepare.

Neural Network and Cloud Computing for Predicting ECG Waves from PPG Readings

  • Kosasih, David Ishak;Lee, Byung-Gook;Lim, Hyotaek
    • Journal of Multimedia Information System
    • /
    • v.9 no.1
    • /
    • pp.11-20
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.

The Intelligent Blockchain for the Protection of Smart Automobile Hacking

  • Kim, Seong-Kyu;Jang, Eun-Sill
    • Journal of Multimedia Information System
    • /
    • v.9 no.1
    • /
    • pp.33-42
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.

Design of a Multi-Platform Omok Program for Artificial Intelligence Education (인공지능 교육을 위한 멀티 플랫폼 오목 프로그램 설계)

  • Cha, Joo Hyoung;Woo, Young Woon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.530-532
    • /
    • 2021
  • This paper deals with AI education service that enables developers who have completed basic programming education to program in C/C++ language in order to learn big data and artificial intelligence. In addition, a customized development environment configuration system according to the development environment and how the user implements and tests artificial intelligence are explained. And also it has a function to check the effect on artificial intelligence through manipulation of various internal parameters. It is expected that it will be possible to develop artificial intelligence education services without language restrictions through networks in the future.

  • PDF

A Study on Activation Plan for Logistics Startups in Korea - Focused on Incheon Metropolitan City (물류 스타트업 육성방안에 관한 연구 -인천광역시를 중심으로-)

  • Dong-Joon Kang;Myeong-Hwa Lee;Hyo-Won Kang
    • Korea Trade Review
    • /
    • v.46 no.2
    • /
    • pp.263-280
    • /
    • 2021
  • With the advent of the era of the 4th Industrial Revolution, various support policies and programs are being introduced as the promotion of startups related to the 4th industry is promoted as a core policy of the government. Based on major technologies such as Artificial Intelligence(AI), Big Data, Internet of Things(IoT), Blockchain, and Automation leading the 4th industrial revolution, logistics and distribution companies are expanding the range of markets and services provided. The purpose of this study is to examine the current status of startups in the logistics field based on major technologies of the 4th Industrial Revolution, which are rapidly growing at home and abroad, and suggest implications for revitalizing logistics startups through a policy demand survey. As a result of the study, in order to foster domestic logistics startups, we propose policy support for integration of logistics startups, integrated management of information, provision of physical space, network platform, and practical education and mentoring.

Mutual Authentication Scheme between Multiple Instances for Secure Data Share of Virtualized Environment (가상화 환경의 안전한 데이터 공유를 위한 다중 인스턴스간 상호인증 기법)

  • Choi, Dohyeon;Kim, Sangkun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.83-94
    • /
    • 2016
  • Recent cloud, big data, there is a problem for the architectural security vulnerability to the server platforms of various fields such as artificial intelligence occurs consistently, but using the virtualization technology. In addition, most secure virtualization technology is known to be dependent on the type is limited and the platform provider. This paper presents a method for mutual authentication for secure data between multiple instances of a shared virtualized environment. The proposed method was designing a security architecture in consideration of the mutual authentication between multiple independent instances, and enhance the safety of a security protocol for sharing data by applying a key chain techniques. Performance analysis results and the existing security architecture demonstrated that protect each virtualized instances of the session and the other way, a compliance effectiveness for each instance of the mutual authentication process.