• Title/Summary/Keyword: Industrial internet of things

Search Result 444, Processing Time 0.025 seconds

A Study on Classification of CNN-based Linux Malware using Image Processing Techniques (영상처리기법을 이용한 CNN 기반 리눅스 악성코드 분류 연구)

  • Kim, Se-Jin;Kim, Do-Yeon;Lee, Hoo-Ki;Lee, Tae-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.9
    • /
    • pp.634-642
    • /
    • 2020
  • With the proliferation of Internet of Things (IoT) devices, using the Linux operating system in various architectures has increased. Also, security threats against Linux-based IoT devices are increasing, and malware variants based on existing malware are constantly appearing. In this paper, we propose a system where the binary data of a visualized Executable and Linkable Format (ELF) file is applied to Local Binary Pattern (LBP) image processing techniques and a median filter to classify malware in a Convolutional Neural Network (CNN). As a result, the original image showed the highest accuracy and F1-score at 98.77%, and reproducibility also showed the highest score at 98.55%. For the median filter, the highest precision was 99.19%, and the lowest false positive rate was 0.008%. Using the LBP technique confirmed that the overall result was lower than putting the original ELF file through the median filter. When the results of putting the original file through image processing techniques were classified by majority, it was confirmed that the accuracy, precision, F1-score, and false positive rate were better than putting the original file through the median filter. In the future, the proposed system will be used to classify malware families or add other image processing techniques to improve the accuracy of majority vote classification. Or maybe we mean "the use of Linux O/S distributions for various architectures has increased" instead? If not, please rephrase as intended.

A Study on the Improvement Scheme of University's Software Education

  • Lee, Won Joo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.3
    • /
    • pp.243-250
    • /
    • 2020
  • In this paper, we propose an effective software education scheme for universities. The key idea of this software education scheme is to analyze software curriculum of QS world university rankings Top 10, SW-oriented university, and regional main national university. And based on the results, we propose five improvements for the effective SW education method of universities. The first is to enhance the adaptability of the industry by developing courses based on the SW developer's job analysis in the curriculum development process. Second, it is necessary to strengthen the curriculum of the 4th industrial revolution core technologies(cloud computing, big data, virtual/augmented reality, Internet of things, etc.) and integrate them with various fields such as medical, bio, sensor, human, and cognitive science. Third, programming language education should be included in software convergence course after basic syntax education to implement projects in various fields. In addition, the curriculum for developing system programming developers and back-end developers should be strengthened rather than application program developers. Fourth, it offers opportunities to participate in industrial projects by reinforcing courses such as capstone design and comprehensive design, which enables product-based self-directed learning. Fifth, it is necessary to develop university-specific curriculum based on local industry by reinforcing internship or industry-academic program that can acquire skills in local industry field.

Implementation and Evaluation of ECG Authentication System Using Wearable Device (웨어러블 디바이스를 활용한 ECG 인증 시스템 구현 및 평가)

  • Heo, Jae-Wook;Jin, Sun-Woo;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.10
    • /
    • pp.1-6
    • /
    • 2019
  • As mobile technologies such as Internet of Things (IoT)-based smart homes and financial technologies (FinTech) are developed, authentication by smart devices is used everywhere. As a result, presence-based biometric authentication using smart devices has become a new mainstream in knowledge-based authentication methods like the existing passwords. The electrocardiogram (ECG) is less prone to forgery, and high-level personal identification is its unique feature from among various biometric authentication methods, such as the pulse, fingerprints, the face, and the iris. Biometric authentication using an ECG is receiving a great deal of attention due to its uses in healthcare and FinTech. In this study, we implemented an ECG authentication system that allows users to easily measure and authenticate their ECG waveforms using a miniaturized wearable device, rather than a large and expensive measurement device. The implemented ECG authentication system identifies ECG features through P-Q-R-S-T feature point identification, and was user-certified under the proposed authentication protocols. Finally, assessment of measurements in a majority of adult males showed a relatively low false acceptance rate of 1.73%, and a low false rejection rate of 4.14%, in a stable normal state. In a high-activity state, the false acceptance rate was 13.72%, and the false rejection rate was 21.68%. In a high-heart rate state, the false acceptance rate was 10.48%, and the false rejection rate was 11.21%.

The Improvement Plan for Indicator System of Personal Information Management Level Diagnosis in the Era of the 4th Industrial Revolution: Focusing on Application of Personal Information Protection Standards linked to specific IT technologies (제4차 산업시대의 개인정보 관리수준 진단지표체계 개선방안: 특정 IT기술연계 개인정보보호기준 적용을 중심으로)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.12
    • /
    • pp.1-13
    • /
    • 2021
  • This study tried to suggest ways to improve the indicator system to strengthen the personal information protection. For this purpose, the components of indicator system are derived through domestic and foreign literature, and it was selected as main the diagnostic indicators through FGI/Delphi analysis for personal information protection experts and a survey for personal information protection officers of public institutions. As like this, this study was intended to derive an inspection standard that can be reflected as a separate index system for personal information protection, by classifying the specific IT technologies of the 4th industrial revolution, such as big data, cloud, Internet of Things, and artificial intelligence. As a result, from the planning and design stage of specific technologies, the check items for applying the PbD principle, pseudonymous information processing and de-identification measures were selected as 2 common indicators. And the checklists were consisted 2 items related Big data, 5 items related Cloud service, 5 items related IoT, and 4 items related AI. Accordingly, this study expects to be an institutional device to respond to new technological changes for the continuous development of the personal information management level diagnosis system in the future.

A Study on the Smart Elderly Support System in response to the New Virus Disease (신종 바이러스에 대응하는 스마트 고령자지원 시스템의 연구)

  • Myeon-Gyun Cho
    • Journal of Industrial Convergence
    • /
    • v.21 no.1
    • /
    • pp.175-185
    • /
    • 2023
  • Recently, novel viral infections such as COVID-19 have spread and pose a serious public health problem. In particular, these diseases have a fatal effect on the elderly, threatening life and causing serious social and economic losses. Accordingly, applications such as telemedicine, healthcare, and disease prevention using the Internet of Things (IoT) and artificial intelligence (AI) have been introduced in many industries to improve disease detection, monitoring, and quarantine performance. However, since existing technologies are not applied quickly and comprehensively to the sudden emergence of infectious diseases, they have not been able to prevent large-scale infection and the nationwide spread of infectious diseases in society. Therefore, in this paper, we try to predict the spread of infection by collecting various infection information with regional limitations through a virus disease information collector and performing AI analysis and severity matching through an AI broker. Finally, through the Korea Centers for Disease Control and Prevention, danger alerts are issued to the elderly, messages are sent to block the spread, and information on evacuation from infected areas is quickly provided. A realistic elderly support system compares the location information of the elderly with the information of the infected area and provides an intuitive danger area (infected area) avoidance function with an augmented reality-based smartphone application. When the elderly visit an infected area is confirmed, quarantine management services are provided automatically. In the future, the proposed system can be used as a method of preventing a crushing accident due to sudden crowd concentration in advance by identifying the location-based user density.

Development of the RAS-RMS Protocol optimized to PSTN environment and Implementation of its differentiated process (PSTN 환경에 최적화된 RAS-RMS 연동 프로토콜 개발 및 차별화된 처리과정 구축)

  • Chang, Sung-Keun;Lee, Jung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.12
    • /
    • pp.8357-8362
    • /
    • 2015
  • The emergency call device has been installed and operated for the elevator passenger safety, but the call can not be connected or delay to the operator in an emergency. The application of the Internet of Things(IoT) technology is required for the systematic management and reliability of the emergency call device installed in the elevator. To meet these requirements it is necessary to apply the RMS(Remote Management System). Emergency call device periodically reports the operating status information and the emergency call history information of the emergency call device to the RMS in the PSTN(Public Switched Telephone Network) environment, and transmits the call request information in an emergency. RAS(Remote Access Server) plays a role of converting the PSTN signals to TCP / IP. RMS reports a significant outbreak call and abnormal operating conditions to administrators. In this study, we developed optimized protocol to PSTN environment that is required by RMS and implemented its differentiated process. And a RAS-RMS Protocol was added to the Application Layer. Development protocol consisting of simple structure as compared to CoAP, MQTT or HTTP can work properly in low-spec CPU and transmit elevator emergency key information easily.

The Design of IoT-based Drive Through Service System for Customers in Distribution Stores (대형 유통매장의 고객을 위한 IoT기반 드라이브 스루 서비스 시스템 설계)

  • Min, So-Yeon;Lee, Jong-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.11
    • /
    • pp.151-157
    • /
    • 2017
  • Recently, the retail industry has created efficient store operations, and has differentiated customer service through the future store. The intelligence of these stores is being applied by using technologies such as the Internet of Things (IoT), and the business process is being improved through this. The process also focuses on efficient store operations and service developments to provide customers with shopping convenience. The change in trends in the industry means that domestic distribution has already reached maturity. Even in countries where retail industries are mature, such as the U.S. and Europe, recent trends are moving toward maximizing operational efficiency and customer service. The reason is that many retailers have already reached saturation and survived the competition. This paper is a study of a drive-through service for automation and efficiency in receiving service after ordering by a customer of the distribution store. When ordering a product being purchased by a customer, the product picking process is done in a timely fashion through a picking scheduling agent. When the customer enters the store parking lot, a service supports the entry of information and finding a parking place so the customer can quickly pick up the goods. The proposed service can be applied to a retail store drive-through system, the distribution store's delivery system, the digital picking system, and indoor/outdoor large parking management systems, and it is possible to provide one-dimensional customer service through the application of IoT technology.

A Study for Extension of BIM/GIS Interoperability Platform linked External Open Data (외부개방데이터 연계를 통한 BIM/GIS 상호운용 플랫폼확장에 관한 연구)

  • Park, Seung-Hwa;Hong, Chang-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.78-84
    • /
    • 2017
  • Because the 'Internet of Things' and sensor network technology have become a new generation industry competitiveness with a development of Information Communication Technology, each local autonomous entity is trying to adopt a Smart City quickly. This requires an integrated platform inside of a smart city operation center. Established Smart City platform provides various services using CCTV information and ITS transportation information based on a two-dimensional map. The provision of advanced Smart City services will necessitate three-dimensional map information, building and facilities unit information, linked information with public data portal for service to the public. In this paper, the authors reviewed development trends of Smart City integrated platform and proposed mashup methods between BIM/GIS interoperability platform and external open data. BIM/GIS platform can provide spatial information services for indoor and outdoor seamlessly because it was developed based on GIS spatial data with BIM data. The linked external open data are V-World data, Seoul Open Data, and Architectural Data Open. Finally, the authors proposed the direction of development for BIM/GIS integrated platform to provide advanced Smart City services.

Development of a Portable Card Reader for the Visually Impaired using Raspberry Pi (라즈베리 파이를 적용한 시각장애인을 위한 휴대용 카드 리더기 개발)

  • Lee, Hyun-Seung;Choi, In-Moon;Lim, Soon-Ja
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.10
    • /
    • pp.131-135
    • /
    • 2017
  • We developed a portable card reader for the visually impaired. In South Korea, there is insufficient development of lifestyle aids for people with disabilities. Living aids for people with disabilities are being developed using information technology, smart phones, Internet of Things(IoT) devices, 3D printers, and so on. Blind people were interviewed, which showed that the card recognition function using a currently developed smart phone app was not able to recognize the screen of the smart phone by the hand of the visually impaired, and it was inconvenient to operate. In recent years, devices that enable the visually impaired to recognize cards have been studied in foreign countries and are emerging prototypes. But what is currently available is expensive and inconvenient. In addition, visually impaired people are most vulnerable to low-income families, which makes it difficult to purchase and use expensive devices. In this study, we developed a card reader that recognizes a card using a Raspberry Pi, which is an open-source hardware that can be applied to IoT. The card reader plays it by voice and vibration, and the visually impaired can use it at a low price.

A Study on the Application of the Cyber Threat Management System to the Future C4I System Based on Big Data/Cloud (빅데이터/클라우드 기반 미래 C4I체계 사이버위협 관리체계 적용 방안 연구)

  • Park, Sangjun;Kang, Jungho
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.27-34
    • /
    • 2020
  • Recently, the fourth industrial revolution technology has not only changed everyday life greatly through technological development, but has also become a major keyword in the establishment of defense policy. In particular, Internet of Things, cloud, big data, mobile and cybersecurity technologies, called ICBMS, were selected as core leading technologies in defense information policy along with artificial intelligence. Amid the growing importance of the fourth industrial revolution technology, research is being carried out to develop the C4I system, which is currently operated separately by the Joint Chiefs of Staff and each military, including the KJCCS, ATCIS, KNCCS and AFCCS, into an integrated system in preparation for future warfare. This is to solve the problem of reduced interoperability for joint operations, such as information exchange, by operating the C4I system for each domain. In addition, systems such as the establishment of an integrated C4I system and the U.S. military's Risk Management Framework (RMF) are essential for efficient control and safe operation of weapons systems as they are being developed into super-connected and super-intelligent systems. Therefore, in this paper, the intelligent cyber threat detection, management of users' access to information, and intelligent management and visualization of cyber threat are presented in the future C4I system based on big data/cloud.