• Title/Summary/Keyword: Hyper-Connected Society

Search Result 115, Processing Time 0.023 seconds

HEMICOMPACTNESS AND HEMICONNECTEDNESS OF HYPERSPACES

  • Baik, B.S.;Hur, K.;Lee, S.W.;Rhee, C.J.
    • Bulletin of the Korean Mathematical Society
    • /
    • v.37 no.1
    • /
    • pp.171-179
    • /
    • 2000
  • We prove the following: (1) For a Hausdorff space X, the hyperspace K(X) of compact subsets of X is hemicompact if and only if X is hemicompact. (2) For a regular space X, the hyperspace $C_K(X)$ of subcontinua of X is hemicompact (hemiconnected) if and only if X is hemicompact (hemiconnected). (3) For a locally compact Hausdorff space X, each open set in X is hemicompact if and only if each basic open set in the hyperspace K(X) is hemicompact. (4) For a connected, locally connected, locally compact Hausdorff space X, K(X) is hemiconnected if and only if X is hemiconnected.

  • PDF

The Study on Internet of Things(IoT) Ecosystem Analysis and Its Policy Direction in Gyeonggi Province (경기도 사물인터넷 생태계 분석을 통한 정책방향 수립에 관한 연구)

  • Kim, Myung Jin;Lee, Jihoon
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.19 no.1
    • /
    • pp.18-32
    • /
    • 2016
  • In the Hyper-connected society, each country set up its own policy and central government as well as provincial government makes a basic plan of developing IoT. Gyeonggi provincial government needs to cope actively with the changing international and national circumstances. The purpose of this paper is to frame policy as a provincial government with analysis IoT industry-academia-institute-governments ecosystem and in-depth interview. There are IoT related SMEs in Gyeonggi, especially manufacturing business and device fields. Universities are doing IoT researches by R&D funds from central as well as provincial governments. Central government-affiliated Institutions are researching. It is necessary for Gyeonggi provincial government to establish policy in order to actively operate IoT ecosystem while each innovation actors are cooperated in doing IoT; system/governce maintenance, environments and test-bed for the application.

  • PDF

Dynamic Analysis via Keyword Mapping for Internet of Things (사물 인터넷에 대한 키워드 매핑을 통한 동태적 분석)

  • Shon, Young-Woo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.7
    • /
    • pp.813-818
    • /
    • 2015
  • IoT is the network of physical objects or things embedded with electronics, software, sensors and connectivity to enable it to achieve greater value and service by exchanging data with the manufacturer, operator or other connected devices. Until now many researches have been studied for centering keyword for detecting emerging technology of future and scientometric analysis among the papers. This paper propose searching method of emerging technology for the IOT (internet of things) which is recently interesting area via dynamic analysis for keyword mapping.

5G service and universal service (5G시대 통신서비스의 공익성 제고 방안에 대한 모색)

  • Kim, Sung-Wook
    • Journal of Digital Convergence
    • /
    • v.18 no.2
    • /
    • pp.103-110
    • /
    • 2020
  • The fire incident of KT's Ahyun branch occurred last year indicates that hyper-connected society led by 5G technology would be a dystopia instead of a utopia unless seamless connection of 5G service is well secured. Looking backward on 1999, we could peacefully and happily greet the new millennium by making a great effort to prevent the millennium bugs(Y2K) from causing the catastrophe such as a shut-down of banking system. Likewise, we should make a great effort to keep 5G networks and 5G service continuously working without the disruption of even just a second, which would enable us to avoid facing any catastrophes caused by the disruption of 5G service. As a way to do so, it can be considered that 5G service is designated as universal service because it has the key features of public goods like telephone and high-speed internet services.

An Evaluation of the Suitability of Data Mining Algorithms for Smart-Home Intelligent-Service Platforms (스마트홈 지능형 서비스 플랫폼을 위한 데이터 마이닝 기법에 대한 적합도 평가)

  • Kim, Kilhwan;Keum, Changsup;Chung, Ki-Sook
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.40 no.2
    • /
    • pp.68-77
    • /
    • 2017
  • In order to implement the smart home environment, we need an intelligence service platform that learns the user's life style and behavioral patterns, and recommends appropriate services to the user. The intelligence service platform should embed a couple of effective and efficient data mining algorithms for learning from the data that is gathered from the smart home environment. In this study, we evaluate the suitability of data mining algorithms for smart home intelligent service platforms. In order to do this, we first develop an intelligent service scenario for smart home environment, which is utilized to derive functional and technical requirements for data mining algorithms that is equipped in the smart home intelligent service platform. We then evaluate the suitability of several data mining algorithms by employing the analytic hierarchy process technique. Applying the analytical hierarchy process technique, we first score the importance of functional and technical requirements through a hierarchical structure of pairwise comparisons made by experts, and then assess the suitability of data mining algorithms for each functional and technical requirements. There are several studies for smart home service and platforms, but most of the study have focused on a certain smart home service or a certain service platform implementation. In this study, we focus on the general requirements and suitability of data mining algorithms themselves that are equipped in smart home intelligent service platform. As a result, we provide a general guideline to choose appropriate data mining techniques when building a smart home intelligent service platform.

A Study on AI-Enabled Combat Cases of Ukrainian Armed Forces in the RMA (Revolution in Military Affairs) Aspect (군사혁신(RMA) 측면에서 바라본 우크라이나군의 지능화 전투사례 연구)

  • Sang Keun Cho;Andrii Zhytko;Ki Won Kim;In Keun Son;Sang Hyuk Park
    • The Journal of Korea Robotics Society
    • /
    • v.18 no.3
    • /
    • pp.308-315
    • /
    • 2023
  • Russia invaded Ukraine in February 2022. Many military experts predicted that Russia could defeat Ukraine within a week, but the Ukraine-Russia War has not been going as expected. Indeed, Ukraine military has been defending well and seems to fight more efficiently than Russian military. There are many reasons for this unexpected situation and one apparent thing is due to artificial intelligence (AI) technologies. This study focused on AI-enabled combats that the Armed Forces of Ukraine has carried out around Siverskyi Donets River, the Crimean Peninsula, and suburbs of Kyiv. For more systematic analysis, the revolution in military affairs (RMA) theory was applied. There are four significant implications inferred by studying current Ukraine-Russia War. First, AI technologies are effective even in the current status and seems to be more influential. Second, hyper-connected network by satellite communications must be needed to enhance the AI weapon effects. Third, military AI technologies should be based on the civil-military cooperation to keep up with pace of technological innovation. Fourth, AI ethics in military should be seriously considered and established in the use of AI technologies. We expect that this study could help ROK Armed Forces to be modernized in the revolutionary fashion, especially for manned and unmanned teaming (MUM-T) system.

Aesthetic's Influence on Ad Text for Hyper Connection Media and Consumers' Thinking Tendency (하이퍼 커넥션 미디어의 광고 텍스트유형과 사고방식에 따른 심미적 영향)

  • Park, Jinpyo;Kim, Jeayoung
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.3
    • /
    • pp.171-179
    • /
    • 2020
  • Media technologies that have made the hyper-connected age change the way people use communication text. Ads texts actively used by companies are storytelling and storydoing. These two advertising texts are very effective in inducing people's emotions and forming participatory behavior. People's thinking tendency also influence persuasion. The results of this study are as follows according to the type of ads text and the thinking tendency of consumers. Consumers' attitudes toward ads turned out to be more positive in synthetic thinking. In analytical thinking, the storytelling ads texts induced more favorable responses. On the other hand, in comprehensive thinking, the story doing text was effective. The same result was found in the perception of premium value, willingness to pay premium price, and repurchase intention.

A Scheme on Anomaly Prevention for Systems in IoT Environment (사물인터넷 환경에서 시스템에 대한 비정상행위 방지 기법)

  • Lee, Keun-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.5 no.2
    • /
    • pp.95-101
    • /
    • 2019
  • Entering the era of the 4th Industrial Revolution and the Internet of Things, various services are growing rapidly, and various researches are actively underway. Among them, research on abnormal behaviors on various devices that are being used in the IoT is being conducted. In a hyper-connected society, the damage caused by one wrong device can have a serious impact on the various connected systems. In this paper, We propose a technique to cope with the problem that the threats caused by various abnormal behaviors such as anti-debugging scheme, anomalous process detection method and back door detection method on how to increase the safety of the device and how to use the device and service safely in such IoT environment.

A Cooperative Security Gateway cooperating with 5G+ network for next generation mBcN (차세대 mBcN을 위한 5G+ 연동보안게이트웨이)

  • Nam, Gu-Min;Kim, Hyoungshick;Lee, Hyun-Jin;Cho, Hark-Su
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.129-140
    • /
    • 2021
  • The next generation mBcN should be built to cooperate with the wireless network to support hyper-speed and hyper-connectivity. In this paper, we propose a network architecture for the cooperation mBcN and 5G commercial network and architecture of the cooperative security gateway required for the cooperation. The proposed cooperative security gateway is between gNB and UPF to support LBO, SFC, and security. Our analysis shows that the proposed architecture has several advantages. First of all, user equipment connected with the mBcN can be easily connected through the 5G commercial radio network to the mBcN. Second, the military application traffic can be transmitted to mBcN without going through the 5G core network, reducing the end-to-end transmission delay without causing the traffic load on the 5G core network. In addition, the security level of the military application can effectively be maintained because the user equipment can be connected to the cooperative security gateway, and the traffic generated by the user equipment is transmitted to the mBcN without going through the 5G core network. Finally, we demonstrate that LBO, SFC, and security modules are essential functions of the proposed gateway in the 5G test-bed environment.

A Study on Zero Knowledge Proof Blockchain Personal Information Authentication Using Smartphone (스마트폰을 이용한 영지식증명 블록체인 개인정보 인증에 관한 연구)

  • Lee Kwangkyu
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.3
    • /
    • pp.37-44
    • /
    • 2023
  • In the future society, a means to verify the identity of the information owner is required at the beginning of most services that the information owner encounters, and the emergence and gradual spread of digital identification that proves the identity of the information owner is essential. In addition, as the utilization value of personal information increases, discussions on how to provide personal information are active. Therefore, there is a need for a personal information management method necessary for building a hyper-connected society that is safe from various hacking, forgery, alteration, and theft by allowing the owner to directly manage and provide personal information management. In this study, a decentralized identity information management model that overcomes the problems and limitations of the centralized identity management method of personal information and manages and selectively provides personal information by the information owner himself and implemented a smart personal information provision system(SPIPS: Smart Personal Information Provision System) using a smartphone.