• 제목/요약/키워드: IOT System

검색결과 145건 처리시간 0.024초

Development of the Fire Prevention Method related to Gas in the Area of Dense Energy Consumption (에너지 사용 밀집지역에서의 가스 관련 화재예방 기법 개발)

  • Kim, Jung-Hoon;Kim, Young-Gu;Jo, Young-Do
    • Journal of the Korean Institute of Gas
    • /
    • 제22권2호
    • /
    • pp.29-33
    • /
    • 2018
  • Accident likelihood is growing due to a correlation for gas and electricity installed in the area of dense energy consumption like traditional market and underground shopping center. In order to prevent and respond accident risks related to gas and electricity in this area, it should be monitored and predicted for factors of gas leak or electricity by developing safety management system. This study is about accident prediction model development considering fire risk factor related to gas accident. The temperature variation characteristic near a gas burner was analyzed. Also, accident prediction algorithm and related module were developed to prevent fire in the area of dense energy consumption.

Work Type Classification of Gas Safety Workers and Interaction Function Design for IoT-based App. Development (가스안전 작업자들의 IoT 기반 앱 개발을 위한 작업유형 분류 및 인터랙션 기능설계)

  • Lee, Joo ah;Kim, MI-Hye
    • Journal of the Korea Convergence Society
    • /
    • 제8권5호
    • /
    • pp.45-52
    • /
    • 2017
  • In this paper, we investigated the following items for the development of gas safety work mobile app. In this study, which is a follow-up study after the completion of the scenario design and the first, second image extraction of the mobile app based on the initial research that has been studied, 1) Suggested classification of gas works by type classification and risk classification 2) The research and proposal of interaction method for effective interworking of mobile app and worker in many industrial fields of two-hand work have been made. In particular, the development of a mobile app that interacts with the main system that manages not only the gas work but also the field of each industrial field is the first attempt in Korea and has helped the worker to work freely and safely through various interaction methods.

Development of the Location Mapping Content Services Platform (로케이션 매핑 영상 콘텐츠 서비스 플랫폼 개발)

  • Lee, Seong-Ho;Chang, Yoon-Seop;Ryu, Keun Ho
    • Journal of Digital Contents Society
    • /
    • 제19권8호
    • /
    • pp.1555-1564
    • /
    • 2018
  • In recent years, In recent years, research on geo-tagged image contents has defined a view frustum based on filming location and direction data and has studied indexes and various query search techniques for efficient search. The existing view frustum model has a limit of using the static visible distance and provides a simple service that displays the huge image contents on the digital map. We show a method to acquire filming location and attitude data and propose a view frustum model that can change the visible distance using geospatial object data. In addition, we describe the augmented reality service that combines the image matching technique so that it can be mapped in the scene where the image contents are captured.

Success Factors of O2O(Online-to-Offline) Commerce (O2O(Online-to-Offline) 상거래의 성공요인)

  • Kim, JaeKyung;Jang, YuRi;Jeong, HyeJin;Moon, Yun Ji
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 한국정보통신학회 2015년도 추계학술대회
    • /
    • pp.374-377
    • /
    • 2015
  • O2O(Online-to-offline) service is the new commerce system form that mixed information search and payment of products and services from online and receipt of goods from offline. O2O commerce combine advantage of existing electronic commerce and redeem the critical point of each commerce circulation method, but earnings model is still lacking compared to development speed of O2O technology. Therefore this study drew common factor applied to O2O service to search success factor of O2O commerce on the point of view as a customer Centered by existing B2C electronic commerce, Mobile commerce, and service quality model of offline commerce included O2O commerce method. Further we suggest O2O success factor model combined new O2O success factor additionally reflecting qualitative research result based on drew O2O success service Quality factor.

  • PDF

A Study on the Comparison of Reliability Between MQTT and CoAP (Confirmative Message) (MQTT와 CoAP(Confirmative message) 신뢰성 비교)

  • Ryu, Kuem-gang;Lee, Ki Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 한국정보통신학회 2017년도 춘계학술대회
    • /
    • pp.485-487
    • /
    • 2017
  • With the growth of the IoT, security is a growing concern. Things the risk of IoT security has been constantly raised, and there have been many cases of hacking. As a result, there is a growing concern and scale about security, but there is a lack of interest and research on the message protocols between Iot devices. With the development of the IoT, the importance of low-power, lightweight and accurate message delivery will become more important and more advanced message protocols will be needed. In this paper, it is aimed to construct the system for communication between client and server of MQTT and CoAP with Confirmative option, which are most used among IoT message protocols and compare the message reliability of each communication protocol to check efficiency.

  • PDF

Power Charge Scheduling and Charge-Ready Battery Allocation Algorithms for Real-Time Drones Services (실시간 드론 서비스를 위한 전원 충전 스케쥴링과 충전 배터리 할당 알고리즘)

  • Tajrian, Mehedi;Kim, Jai-Hoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • 제8권12호
    • /
    • pp.277-286
    • /
    • 2019
  • The Unmanned Aerial Vehicle (UAV) is one of the most precious inventions of Internet of things (IOT). UAV faces the necessity to charge battery or replace battery from the charging stations during or between services. We propose scheduling algorithms for drone power charging (SADPC). The basic idea of algorithm is considering both a deadline (for increasing deadline miss ratio) and a charging time (for decreasing waiting time) to decide priority on charging station among drones. Our simulation results show that our power charging algorithm for drones are efficient in terms of the deadline miss ratio as well as the waiting time in general in compare to other conventional algorithms (EDF or SJF). Also, we can choose proper algorithms for battery charge scheduling and charge ready battery allocation according to system parameters and user requirements based on our simulation.

The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment

  • Hu, Liang;Chi, Ling;Li, Hong-Tu;Yuan, Wei;Sun, Yuyu;Chu, Jian-Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권1호
    • /
    • pp.131-146
    • /
    • 2012
  • As one of the four basic technologies of IOT (Internet of Things), M2M technology whose advance could influence on the technology of Internet of Things has a rapid development. Mobile Payment is one of the most widespread applications in M2M. Due to applying wireless network in Mobile Payment, the security issues based on wireless network have to be solved. The technologies applied in solutions generally include two sorts, encryption mechanism and authentication mechanism, the focus in this paper is the authentication mechanism of Mobile Payment. In this paper, we consider that there are four vital things in the authentication mechanism of Mobile Payment: two-way authentication, re-authentication, roaming authentication and inside authentication. Two-way authentication is to make the mobile device and the center system trust each other, and two-way authentication is the foundation of the other three. Re-authentication is to re-establish the active communication after the mobile subscriber changes his point of attachment to the network. Inside authentication is to prevent the attacker from obtaining the privacy via attacking the mobile device if the attacker captures the mobile device. Roaming authentication is to prove the mobile subscriber's legitimate identity to the foreign agency when he roams into a foreign place, and roaming authentication can be regarded as the integration of the above three. After making a simulation of our proposed authentication mechanism and analyzing the existed schemes, we summarize that the authentication mechanism based on the mentioned above in this paper and the encryption mechanism establish the integrate security framework of Mobile Payment together. This makes the parties of Mobile Payment apply the services which Mobile Payment provides credibly.

Design and Implementation of CoAP Authorization Framework Based on OAuth 2.0 (OAuth 2.0 기반 CoAP 인증 프레임워크 설계 및 구현)

  • Kim, Kyoung-Han;Lim, Hyun-Kyo;Heo, Joo-Seong;Han, Youn-Hee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • 제6권8호
    • /
    • pp.329-342
    • /
    • 2017
  • Recently, interest and investment in the Internet of Things (IoT) have increased significantly, and security issues are constantly being raised. As a solution, the IETF ACE Working Group is establishing the ACE framework standard, which is a new security framework for various constrained IoT environments based on the existing OAuth 2.0. However, additional work is required to apply the ACE framework, which proposes a new lightweight security system, to the existing Internet environment, and this additional cost is a factor that hinders the application of OAuth 2.0 to the IOT environment. Therefore, we propose an IoT authentication framework based on OAuth 2.0's existing development motivation, and implement a proposal framework based on CoAPthon and analyze its performance.

Development of Smart Mirror System based on the Raspberry Pi (Raspberry Pi를 이용한 스마트 미러 개발)

  • Lin, Zhi-Ming;Kim, Chul-Won
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • 제16권2호
    • /
    • pp.379-384
    • /
    • 2021
  • With people's continuous research and exploration in the field of artificial intelligence, more relatively mature artificial intelligence technology is applied in people's daily life. Mirrors are the most commonly used daily necessities in life, and it should be applied to artificial intelligence. The research results of this paper show that the smart mirror designed based on the raspberry pi displays weather, temperature, greetings, and has a human-mirror interaction function. The research method of this paper uses the Raspberry pi 3B + as the core controller and Google Assistant as the intelligent control. When connected to the network via Raspberry Pi's own WiFi, the mirror can automatically display and update time, weather and news information features. You can wake up the Google Assistant using keywords, then control the mirror to play music, remind the time, It implements the function of smart mirror voice interaction. Also, all the hardware used in this study is modular assembly. Later, it is convenient for user to assemble by himself later. It is suitable for market promotion at an affordable price.

Intelligent & Predictive Security Deployment in IOT Environments

  • Abdul ghani, ansari;Irfana, Memon;Fayyaz, Ahmed;Majid Hussain, Memon;Kelash, Kanwar;fareed, Jokhio
    • International Journal of Computer Science & Network Security
    • /
    • 제22권12호
    • /
    • pp.185-196
    • /
    • 2022
  • The Internet of Things (IoT) has become more and more widespread in recent years, thus attackers are placing greater emphasis on IoT environments. The IoT connects a large number of smart devices via wired and wireless networks that incorporate sensors or actuators in order to produce and share meaningful information. Attackers employed IoT devices as bots to assault the target server; however, because of their resource limitations, these devices are easily infected with IoT malware. The Distributed Denial of Service (DDoS) is one of the many security problems that might arise in an IoT context. DDOS attempt involves flooding a target server with irrelevant requests in an effort to disrupt it fully or partially. This worst practice blocks the legitimate user requests from being processed. We explored an intelligent intrusion detection system (IIDS) using a particular sort of machine learning, such as Artificial Neural Networks, (ANN) in order to handle and mitigate this type of cyber-attacks. In this research paper Feed-Forward Neural Network (FNN) is tested for detecting the DDOS attacks using a modified version of the KDD Cup 99 dataset. The aim of this paper is to determine the performance of the most effective and efficient Back-propagation algorithms among several algorithms and check the potential capability of ANN- based network model as a classifier to counteract the cyber-attacks in IoT environments. We have found that except Gradient Descent with Momentum Algorithm, the success rate obtained by the other three optimized and effective Back- Propagation algorithms is above 99.00%. The experimental findings showed that the accuracy rate of the proposed method using ANN is satisfactory.