• Title/Summary/Keyword: Industrial Internet of Things

Search Result 440, Processing Time 0.023 seconds

Development of Deep Learning Model for Detecting Road Cracks Based on Drone Image Data (드론 촬영 이미지 데이터를 기반으로 한 도로 균열 탐지 딥러닝 모델 개발)

  • Young-Ju Kwon;Sung-ho Mun
    • Land and Housing Review
    • /
    • v.14 no.2
    • /
    • pp.125-135
    • /
    • 2023
  • Drones are used in various fields, including land survey, transportation, forestry/agriculture, marine, environment, disaster prevention, water resources, cultural assets, and construction, as their industrial importance and market size have increased. In this study, image data for deep learning was collected using a mavic3 drone capturing images at a shooting altitude was 20 m with ×7 magnification. Swin Transformer and UperNet were employed as the backbone and architecture of the deep learning model. About 800 sheets of labeled data were augmented to increase the amount of data. The learning process encompassed three rounds. The Cross-Entropy loss function was used in the first and second learning; the Tversky loss function was used in the third learning. In the future, when the crack detection model is advanced through convergence with the Internet of Things (IoT) through additional research, it will be possible to detect patching or potholes. In addition, it is expected that real-time detection tasks of drones can quickly secure the detection of pavement maintenance sections.

Design of Device Authentication Protocol Based on C-PBFT in a Smart Home Environment (스마트 홈 환경에서 C-PBFT 기반의 디바이스 인증 프로토콜 설계)

  • Kim, Jeong-Ho;Heo, Jae-Wook;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.5
    • /
    • pp.550-558
    • /
    • 2019
  • As the scale of the Internet of Things (IoT) environment grows and develops day by day, the information collected and shared through IoT devices becomes increasingly diverse and more common. However, because IoT devices have limitations on computing power and a low power capacity due to their miniaturized size, it is difficult to apply security technologies like encryption and authentication that have been directly applied in the previous Internet environment, making the IoT vulnerable to security threats. Because of this weakness, important information that needs to be delivered safely and accurately is exposed to the threat of malicious exploitation, such as data forgery, data leakage, and infringement of personal information. In order to overcome this threat, various security studies are being actively conducted to compensate for the weaknesses in IoT environment devices. In particular, since various devices interact, and share and communicate information collected in the IoT environment, each device should be able to communicate with reliability. With regard to this, various studies have been carried out on techniques for device authentication. This study examines the limitations and problems of the authentication techniques that have been studied thus far, and proposes technologies that can certify IoT devices for safe communication between reliable devices in the Internet environment.

Authentication and Key Management Techniques for Secure Communication in IP Camera (IoT 환경에서 IP카메라의 효율적 운용을 위한 키 관리 및 보안 설계 프로토콜)

  • Min, So-Yeon;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.10
    • /
    • pp.602-608
    • /
    • 2020
  • Development of Internet technology and the spread of various smart devices provide a convenient computing environment for people, which is becoming common thanks to the Internet of Things (IoT). However, attacks by hackers have caused various problems, such as leaking personal information or violating privacy. In the IoT environment, various smart devices are connected, and network attacks that are used in the PC environment are occurring frequently in the IoT. In fact, security incidents such as conducting DDoS attacks by hacking IP cameras, leaking personal information, and monitoring unspecified numbers of personal files without consent are occurring. Although attacks in the existing Internet environment are PC-oriented, we can now confirm that smart devices such as IP cameras and tablets can be targets of network attacks. Through performance evaluation, the proposed protocol shows 11% more energy efficiency on servers than RSA, eight times greater energy efficiency on clients than Kerberos, and increased efficiency as the number of devices increases. In addition, it is possible to respond to a variety of security threats that might occur against the network. It is expected that efficient operations will be possible if the proposed protocol is applied to the IoT environment.

The 4th Industrial Revolution and Job Transition of the People with Disabilities (제4차 산업혁명과 장애인 일자리 추이)

  • Na, Woon-Hwan
    • 재활복지
    • /
    • v.22 no.3
    • /
    • pp.23-39
    • /
    • 2018
  • The fourth industrial revolution and technological innovation will make the job factor of people with disabilities complicated and difficult. Thus, this study analyzed the technical factors influencing the job structure and tried to find a way to develop the job of the people with disabilities in response to the 4th Industrial Revolution by changing the labor market and changing the trend of the employment by industry. The methods for this study are literature research and FGI. First, technological factors affecting the job structure of the Fourth Industrial Revolution are artificial intelligence, Internet and networking of things, 3D printing, big data, Second, technological innovation due to the industrial revolution was a major factor in the job structure. As the industrial revolution and technological innovation progressed, the job structure shifted rapidly from the manufacturing industry to the service industry, Third, as the measures of the 4th Industrial Revolution and the change of the job structure, it is necessary to make preemptive investment for the development of competency to cope with technological innovation, Finally, in order to respond to the Fourth Industrial Revolution and the rapidly changing technological innovation, the basic data of people with disabilities should be able to be big data.

News Article Analysis of the 4th Industrial Revolution and Advertising before and after COVID-19: Focusing on LDA and Word2vec (코로나 이전과 이후의 4차 산업혁명과 광고의 뉴스기사 분석 : LDA와 Word2vec을 중심으로)

  • Cha, Young-Ran
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.9
    • /
    • pp.149-163
    • /
    • 2021
  • The 4th industrial revolution refers to the next-generation industrial revolution led by information and communication technologies such as artificial intelligence (AI), Internet of Things (IoT), robot technology, drones, autonomous driving and virtual reality (VR) and it also has made a significant impact on the development of the advertising industry. However, the world is rapidly changing to a non-contact, non-face-to-face living environment to prevent the spread of COVID 19. Accordingly, the role of the 4th industrial revolution and advertising is changing. Therefore, in this study, text analysis was performed using Big Kinds to examine the 4th industrial revolution and changes in advertising before and after COVID 19. Comparisons were made between 2019 before COVID 19 and 2020 after COVID 19. Main topics and documents were classified through LDA topic model analysis and Word2vec, a deep learning technique. As the result of the study showed that before COVID 19, policies, contents, AI, etc. appeared, but after COVID 19, the field gradually expanded to finance, advertising, and delivery services utilizing data. Further, education appeared as an important issue. In addition, if the use of advertising related to the 4th industrial revolution technology was mainstream before COVID 19, keywords such as participation, cooperation, and daily necessities, were more actively used for education on advanced technology, while talent cultivation appeared prominently. Thus, these research results are meaningful in suggesting a multifaceted strategy that can be applied theoretically and practically, while suggesting the future direction of advertising in the 4th industrial revolution after COVID 19.

Method of Generating Information Signals in the System Industrial Internet of Things

  • Aleksandr Serkov;Nina Kuchuk;Bogdan Lazurenko;Alla Horiuskina
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.206-210
    • /
    • 2024
  • Industrial facilities that use modern IT technologies require the ensured reliability and security of information in automated enterprise management. Concurrently, so as to ensure a high quality of communication, it is necessary to expand the bandwidth of communication channels, which are limited by the physical parameters of the radio frequency spectrum. In order to overcome this contradiction, we propose the application of technology fundamental to ultra-wideband signals, in which the ratio between the bandwidth and its central part is greater than "one". For this reason, the information signal is emitted without a carrier frequency - simultaneously within the entire frequency band - provided that the signal level is lower than the noise level. For the transmission of information content, the method of positional-time coding is used, in which each information bit is encoded by hundreds of ultrashort pulses that arrive within a certain sequence. Mathematical models of signals and values observed in wireless communication systems with autocorrelation reception of modulated ultra-wideband signals are furthermore recommended. These assist in identifying features of the dependence of the error probability on the normalized signal-to-noise ratio and the signal base. Comparative analysis has shown that the best noise immunity of the systems considered in this paper is the communication system, which uses the time separation of the reference and information signals. During the first half of the bit interval, the switch closes the output of the transmitter directly to the generator of the ultra-wideband signal - forming a reference signal. In the middle of the bit interval, the switch alternates the output to one of two possible positions depending on the encoding signal - "zero" or "one", forming the information part of the ultra-wideband signal. It should also be noted that systems with autocorrelation reception and separate transmission of reference and information signals, provide a high level of structural signal secrecy. Furthermore, they provide the reliable transmission of digital information, especially in interference conditions.

The Impacts of Project Governance, Agency Conflicts on the Project Success : From the Perspective of Agency Theory (프로젝트 거버넌스가 대리인 갈등 및 프로젝트 성공에 미치는 영향 : 대리인 이론 관점)

  • Jeong, Eun-Joo;Kim, Bo-Ram;Jeong, Seung-Ryul
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.41 no.3
    • /
    • pp.11-20
    • /
    • 2018
  • Recently companies have increased the new projects to improve and innovate the business process in order to adopt the advanced technologies such as IoT (Internet of Things), Big Data Analysis, Cloud Computing, mobile and artificial intelligence technologies for sustainable competitive advantages under rapid technological and socioeconomic external environmental changes. However, there are obstacles to achieve the project goals, corporate's strategy and objectives due to various kind of risks based on characteristics of projects and conflicts of stakeholders participated on projects. Hence, the solutions are required to resolve the various kind of risks and conflicts of stakeholders. The objectives of this study are to investigate the impact of the project governance, agency conflicts on the project success based on agency theory by using the statistical hypothesis testing the relationship among those variables. As a result of hypothesis testing, we could find that the project governance impacts positively on project success and negatively on the agency conflicts. Further, the agency conflicts impacts negatively on the project success. Finally, we could find that the agency conflicts such as goal conflict, different risk attitude and information asymmetry between project manager and team members impact negatively on the project success. Meanwhile, the project governance impact positively on the project success, negatively impact on the agency conflicts such as goal conflict, different risk attitude and information asymmetry between project manager and project team members. In order to increase the project success rate, the project governance institutions such as PGB (Project Governance Board), EPMO (Enterprise Project Management Office), PSC (Project Steering Committee) are needed to prevent or reduce the agency conflicts between project manager and team members.

Hybrid Simulated Annealing for Data Clustering (데이터 클러스터링을 위한 혼합 시뮬레이티드 어닐링)

  • Kim, Sung-Soo;Baek, Jun-Young;Kang, Beom-Soo
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.40 no.2
    • /
    • pp.92-98
    • /
    • 2017
  • Data clustering determines a group of patterns using similarity measure in a dataset and is one of the most important and difficult technique in data mining. Clustering can be formally considered as a particular kind of NP-hard grouping problem. K-means algorithm which is popular and efficient, is sensitive for initialization and has the possibility to be stuck in local optimum because of hill climbing clustering method. This method is also not computationally feasible in practice, especially for large datasets and large number of clusters. Therefore, we need a robust and efficient clustering algorithm to find the global optimum (not local optimum) especially when much data is collected from many IoT (Internet of Things) devices in these days. The objective of this paper is to propose new Hybrid Simulated Annealing (HSA) which is combined simulated annealing with K-means for non-hierarchical clustering of big data. Simulated annealing (SA) is useful for diversified search in large search space and K-means is useful for converged search in predetermined search space. Our proposed method can balance the intensification and diversification to find the global optimal solution in big data clustering. The performance of HSA is validated using Iris, Wine, Glass, and Vowel UCI machine learning repository datasets comparing to previous studies by experiment and analysis. Our proposed KSAK (K-means+SA+K-means) and SAK (SA+K-means) are better than KSA(K-means+SA), SA, and K-means in our simulations. Our method has significantly improved accuracy and efficiency to find the global optimal data clustering solution for complex, real time, and costly data mining process.

Priority Analysis of Information Security Policy in the ICT Convergence Industry in South Korea Using Cross-Impact Analysis (교차영향분석을 이용한 국내 ICT 융합산업의 정보보호정책 우선순위 분석)

  • Lee, Dong-Hee;Jun, Hyo-Jung;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.695-706
    • /
    • 2018
  • In recent years, industrial convergence centered on ICBM (internet of things (IoT), cloud, big data, mobile) has been experiencing rapid development in various fields such as agriculture and the financial industry. In order to prepare for cyber threats, one of the biggest problems facing the convergence industry in the future, the development of the industry must proceed in tandem with a framework of information security. In this study, we analyze the details of the current industrial development policy and related information protection policies using cross impact analysis and present policy priorities through the expert questionnaire. The aim of the study was to clarify the priorities and interrelationships within information security policy as a first step in suggesting effective policy direction. As a result, all six information security policy tasks derived from this study belong to key drivers. Considering the importance of policies, policies such as improving the constitution of the security industry and strengthening of support, training of information protection talent, and investing in the information security industry need to be implemented relatively first.

A Case Study of Bandi&Luni's Bookstore Using an Online to Offline(O2O) Service Design (O2O(Online to Offline) 서비스 디자인을 활용한 반디앤루니스 서점에 대한 사례연구)

  • Lee, Sangshik
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.1
    • /
    • pp.117-126
    • /
    • 2017
  • This Study Focuses on the Customer Experience Story of Bandi&Luni's Centum City branch which Offers the Different Service Concept on the Competitive Book Selling Market. Bandi&Luni's Stands as one of the Largest Bookstore Chains that has 14 Offline Bookstores and an Online Bookstore Shop. The Purpose of this Study takes Lessons from the Unique Practices and Efforts of Bandi&Lunis's Online-to-Offline(O2O) Service and Service Design. In Order to Achieve this Propose, we Investigated the History, Service Concept, Value, and Performance of Bandi&Luni's from a Variety of sources and Reviewed the Previous Literatures of O2O Service and Service Design. In order to Offer Better Customer Experience the Service should be Designed from Customer's View and be Delivered through the Lifecycle of Customers. In a era of Big Data, IOT(internet of things), AI(artificial intelligence), The Service Design Innovation using Information and Communication Technology will be needed in order to Break down the Boundaries Between Online and Offline.