• Title/Summary/Keyword: Convergence and Integration technologies

Search Result 87, Processing Time 0.03 seconds

A Web-GIS Based Monitoring Module for Illegal Dumping in Smart Cities

  • Han, Taek-Jin
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.25 no.6_1
    • /
    • pp.927-939
    • /
    • 2022
  • This study was conducted to develop a Web-GIS based monitoring module of smart city that can effectively respond, manage and improve situation in all stages of illegal dumping management on a city scale. First, five technologies were set for the core technical elements of the module configuration. Five core technical elements are as follows; video screening technology based on motion vector analysis, human behavior detection based on intelligent video analytics technology, mobile app for receiving civil complaints about illegal dumping, illegal dumping risk model and street cleanliness map, Web-GIS based situation monitoring technology. The development contents and results for each set of core technical elements were evaluated. Finally, a Web-GIS based 'illegal dumping monitoring module' was proposed. It is possible to collect and analyze city data at the local government level through operating the proposed module. Based on this, it is able to effectively detect illegal dumpers at relatively low cost and identify the tendency of illegal dumping by systematically managing habitual occurrence areas. In the future, it is expected to be developed in the form of an add-on module of the smart city integration platform operated by local governments to ensure interoperability and scalability.

Quantum Key Distribution System integrated with IPSec (양자키분배와 IPSec을 결합한 네트워크 보안 장치 연구)

  • Lee, Eunjoo;Sohn, Ilkwon;Shim, Kyuseok;Lee, Wonhyuk
    • Convergence Security Journal
    • /
    • v.21 no.3
    • /
    • pp.3-11
    • /
    • 2021
  • Most of the internet security protocols rely on classical algorithms based on the mathematical complexity of the integer factorization problem, which becomes vulnerable to a quantum computer. Recent progresses of quantum computing technologies have highlighted the need for applying quantum key distribution (QKD) on existing network protocols. We report the development and integration of a plug & play QKD device with a commercial IPSec device by replacing the session keys used in IPSec protocol with the quantum ones. We expect that this work paves the way for enhancing security of the star-type networks by implementing QKD with the end-to-end IP communication.

Analyses of Security Issues and Requirements Under Surroundings of Internet of Things (사물인터넷 환경하에서 보안 이슈 및 요구사항 분석)

  • Jung Tae Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.639-647
    • /
    • 2023
  • A variety of communications are developed and advanced by integration of wireless and wire connections with heterogeneous system. Traditional technologies are mainly focus on information technology based on computer techniques in the field of industry, manufacture and automation fields. As new technologies are developed and enhanced with traditional techniques, a lot of new applications are emerged and merged with existing mechanism and skills. The representative applications are IoT(Internet of Things) services and applications. IoT is breakthrough technologies and one of the innovation industries which are called 4 generation industry revolution. Due to limited resources in IoT such as small memory, low power and computing power, IoT devices are vulnerable and disclosed with security problems. In this paper, we reviewed and analyzed security challenges, threats and requirements under IoT service.

A Study on the Connective Validity of Technology Maturity and Industry for Core Technologies based on 4th Industrial Revolution (4차 산업혁명 기반 핵심기술에 대한 기술성숙도와 산업과 연계 타당성 연구)

  • Cho, Han-Jin;Jeong, Kyuman
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.3
    • /
    • pp.49-57
    • /
    • 2019
  • The core technology development of the Fourth Industrial Revolution is linked to the development of other core technologies, which will change the industrial structure in the future and create a new smart business model. In this paper, tried to analyze the technology maturity level and analyze the technology maturity. To do this, used technology trend information to investigate and integrate the market, policy, etc. Of core technology of the 4th Industrial Revolution to achieve a comprehensive maturity level. Because technology maturity measures are scored by technology developers, prejudices may be acted upon according to a person's tendency, which may be a subjective evaluation. It is also a measure of the maturity of individual technologies, and thus is not suitable for evaluating the overall system integration perspective. However, it is possible to evaluate the maturity before integrating the core element technologies constituting the whole system and to use it as a means to compare the effect of the whole system and its feasibility and play an important role in the planning of technology development.

Configuration of clustering and routing algorithms for energy efficiency by wireless sensor network in ship (선박 내 무선 센서 네트워크에서 에너지 효율을 위한 클러스터링 및 라우팅 알고리즘의 구성)

  • Kim, Mi-jin;Yu, Yun-Sik;Jang, Jong-wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.435-438
    • /
    • 2012
  • Today, In all fields, As combination of ubiquitous computing-based technologies between electronic space and physical space, has been active trend research about wireless integration sensor network between sensors and wireless technology. Also, but in ship is underway research about Ship Area Network(SAN) of intelligent ship to integrate wireless technology, ship is required SAN-bridge technology of a variety of wired, wireless network integration and heterogeneous sensor and interoperability of the controller and SAN configuration management technology of remote control. Ship keep safe of all the surrounding environment including crew besides structural safety and freight management monitoring. In this paper, for monitoring design such as on climate change detection and temperature, pressure about various structures, there identify technology trends for routing and data aggregation to use energy efficiency in wireless sensor network. And to analyze self-organizing clustering method, study For wireless sensor network configuration in ship.

  • PDF

Using ICT for Mongolia's sustainable development in energy industry

  • Tungalag, Azjargal;Kim, Yun Seon
    • Asia Pacific Journal of Business Review
    • /
    • v.2 no.1
    • /
    • pp.21-52
    • /
    • 2017
  • Nowadays every technology is becoming smarter. Consequently, intensive use of ICT in the whole industries and cities enables a sustainable approach to meet enormous productivity, efficiency, transparency and conservation of natural recourses. Likewise, the role of ICT in terms of controlling, monitoring in the energy industry allows integrating potential renewables, bulk energy conservation and reliable optimized operation in the entire system. In this paper outlines challenging issues in renewable energy integration in Mongolia and proposes potential recommendations and conclusions. The author investigated the main technologies used in energy industry mainly smart grid, challenges and policy aspect in Mongolian energy sector by using the primary and secondary approach with case studies and literature based methodologies. Based on the policy aspect and current implementation of smart grid, the paper tries to address the readiness for the main application and future potential ICT driven applications. Furthermore, it concluded that ICT convergence is demanded to overcome the current vulnerabilities and significant momentum to leave behind by using its potential energy recourses and favorable geographical state. Policymakers may find this study useful, as it answers the question of whether ICT investment can ultimately reduce energy consumption and may aid in future planning. Even tough, in order to develop a smart grid and integrating renewables firstly set an appropriate market structure, ICT will key enabler to make energy system more profitable and sustainable. Regarding the result of this study, ICT deployment contribution is a huge demand for future opportunities energy in Mongolia.

A Design of Authentication Mechanism for Secure Communication in Smart Factory Environments (스마트 팩토리 환경에서 안전한 통신을 위한 인증 메커니즘 설계)

  • Joong-oh Park
    • Journal of Industrial Convergence
    • /
    • v.22 no.4
    • /
    • pp.1-9
    • /
    • 2024
  • Smart factories represent production facilities where cutting-edge information and communication technologies are fused with manufacturing processes, reflecting rapid advancements and changes in the global manufacturing sector. They capitalize on the integration of robotics and automation, the Internet of Things (IoT), and the convergence of artificial intelligence technologies to maximize production efficiency in various manufacturing environments. However, the smart factory environment is prone to security threats and vulnerabilities due to various attack techniques. When security threats occur in smart factories, they can lead to financial losses, damage to corporate reputation, and even human casualties, necessitating an appropriate security response. Therefore, this paper proposes a security authentication mechanism for safe communication in the smart factory environment. The components of the proposed authentication mechanism include smart devices, an internal operation management system, an authentication system, and a cloud storage server. The smart device registration process, authentication procedure, and the detailed design of anomaly detection and update procedures were meticulously developed. And the safety of the proposed authentication mechanism was analyzed, and through performance analysis with existing authentication mechanisms, we confirmed an efficiency improvement of approximately 8%. Additionally, this paper presents directions for future research on lightweight protocols and security strategies for the application of the proposed technology, aiming to enhance security.

A Study on the Countermeasures of Shipping and Port Logistics Industry in Responding to the Progression of Fourth Industrial Revolution

  • Shin, Yong-John;Oh, Jin-Seok;Shin, Sang-Hoon;Jang, Ha-Lyong
    • Journal of Navigation and Port Research
    • /
    • v.42 no.5
    • /
    • pp.347-356
    • /
    • 2018
  • The presence of the Fourth Industrial Revolution is omniscient, led by full force emergence of technologies that make biological, physical, and digital worlds borderless. All industries which jump on the bandwagon, can observe convergence and merging of bushiness happening within, between and across industries. As the shipping and port logistics industry is said to be in eye of this storm, the purpose of this study is to investigate the shipping and port logistics industry's awareness regarding 4th IR, as well to identify necessary countermeasures in responding to progression of this trend. Analytic Hierarchy Process (AHP) methodology was then used to compare the importance of four phases of countermeasures, reviewed by experts in the field. Results showed that countermeasures should be first orchestrated to the 'Merging and Integration of Inter-industry', then followed by 'P reemptive Introduction of Advanced Technology', 'Expansion of Intra-industry Businesses', and eventually 'Automation, Unmanned Technology'. Last but not least, four phases of countermeasures which should be introduced and executed one phase after another, are outlined for the shipping and port logistics industry to boost its competitiveness in addressing this progressive trend.

Design and Implementation of a Directory System for Disease Services

  • Yeo, Myung-Ho;Lee, Yoon-Kyeong;Roh, Kyu-Jong;Park, Hyeong-Soon;Kim, Hak-Sin;Park, Jun-Ho;Kang, Tae-Ho;Kim, Hak-Yong;Yoo, Jae-Soo
    • International Journal of Contents
    • /
    • v.6 no.1
    • /
    • pp.59-64
    • /
    • 2010
  • Recently, biological researches are required to deal with a large scale of data. While scientists used classical experimental approaches for researches in the past, it is possible to get more sophisticated observations easily with the convergence of information technologies and biology. The study on diseases is one of the most important issues of the life science. Conventional services and databases provide users with information such as classification of diseases, symptoms, and medical treatments through the Web. However, it is hard to connect or develop them for other new services because they have independent and different criteria. It may be a factor that interferes the development of biology. In this paper, we propose integrated data structures for the disease databases. We also design and implement a novel directory system for diseases as an infrastructure for developing the new diseases services.

Applications and Concerns of Generative AI: ChatGPT in the Field of Occupational Health (산업보건분야에서의 생성형 AI: ChatGPT 활용과 우려)

  • Ju Hong Park;Seunghon Ham
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.33 no.4
    • /
    • pp.412-418
    • /
    • 2023
  • As advances in artificial intelligence (AI) increasingly approach areas once relegated to the realm of science fiction, there is growing public interest in using these technologies for practical everyday tasks in both the home and the workplace. This paper explores the applications of and implications for of using ChatGPT, a conversational AI model based on GPT-3.5 and GPT-4.0, in the field of occupational health and safety. After gaining over one million users within five days of its launch, ChatGPT has shown promise in addressing issues ranging from emergency response to chemical exposure to recommending personal protective equipment. However, despite its potential usefulness, the integration of AI into scientific work and professional settings raises several concerns. These concerns include the ethical dimensions of recognizing AI as a co-author in academic publications, the limitations and biases inherent in the data used to train these models, legal responsibilities in professional contexts, and potential shifts in employment following technological advances. This paper aims to provide a comprehensive overview of these issues and to contribute to the ongoing dialogue on the responsible use of AI in occupational health and safety.