• Title/Summary/Keyword: Internet of Everything

Search Result 69, Processing Time 0.035 seconds

Checklist and Design Recommendations for the Interiors of Korean, Eco-healthy Childcare Facilities (우리나라 영유아 보육시설의 친환경 실내를 위한 체크리스트와 디자인안 제안)

  • Chun, Jin Hie
    • KIEAE Journal
    • /
    • v.10 no.6
    • /
    • pp.105-114
    • /
    • 2010
  • As children are known to touch and chew everything, green cleaning procedures are an important step in preventing children from ingesting harmful toxins. The objectives of this study are to develop a new, self-evaluation checklist and to suggest design recommendations which comply with easy, adaptable, economical ways to improve the eco-friendly indoor environment of Korean childcare facilities. The information compiled during this study was collected through literature review and internet surveys1) from July, 2009 to February, 2010. The results of this study show that the current Korean childcare accreditation system and practices emphasize clean building interiors, policies for sanitation and cleanliness, and control of humidity and lighting. On the other hand, the information provided by green-building rating systems from GBCC, LEED, and GBTool offers additional and comparative details regarding indoor environment quality and standards regarding the IAQ performance and management plan, ventilation and thermal comfort systems, views from windows, acoustics, and lighting. In conclusion, this document provides an appropriate and easy-to-follow, self-evaluation checklist composed of eight criteria and 51 practical items. This study also provides the design recommendations composed of 27 practical ideas focusing on interior elements. Both the checklist and design recommendations I have suggested can be a post-occupancy tool for evaluating eco-healthy facility standards as well as tips for continuing to maintain eco-healthy childcare facilities.

System Design for Effective Data Collection and Analysis (효율적인 정보 추출을 위한 자료 집계 및 분석 시스템의 설계 및 구현 방안)

  • Cho, Kwang-Hyun;Park, Hee-Chang
    • 한국데이터정보과학회:학술대회논문집
    • /
    • 2006.04a
    • /
    • pp.307-315
    • /
    • 2006
  • Distributing information on the internet is common in our daily life. In the past, e-mail has been the primary choice of exchanging information. But instant messengers are gaining popularity abroad and domestically because of their immediate responses. Instant messaging has become the fastest growing communication technology in recent years. Instant messaging is effectively a chat room of two people. Users that have accounts with the same provider are able to send messages via computer in real time. Instant messaging has exploded into the business world as companies utilize the technology for everything from interoffice communication to client/customer communication. In this paper, we propose a system design for effective data collection and statistical analysis.

  • PDF

Dancing with Partners at SKT: RMM Model with SKT case (SKT 에서 파트너와 함께 춤을 : RMM 모형과 SKT 사례 적용)

  • Gwon, Tae-Hyeong;Bang, Seok-Beom;Lee, Gang-Eop;Choe, Jae-Ung
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2006.11a
    • /
    • pp.3-16
    • /
    • 2006
  • In the age where the Internet changes everything, even the earth has become flat. The boarders between nations, locations, times, and industries are not maningful, and no single company can do the whole process well. Therefore, various types of 'Value network' and 'Relation web' emerge for moving first and fast learning. Bort the relationship maturity model (RMM) proposed and the partnership management initiatives at SKT demonstrate that the concept is important, and that the final goal can be reached only through a series of critical outcome at each phase. In particular, recognizing as core infrastructures various online/offline channels, deep trust, and rich communications is an important finding for a successful relationship management. Also, related literatures suggest the following key factors to be influential in more that two phases: professionalism including expertise, similarity, channel capacity. Based on these findings, future efforts need to be put on the research & development of related measurement and management tools. We do hope more people dance with their partners through these efforts.

  • PDF

DDS-Based BLE Adaptor for Standard Profile Data Interoperation in Internet of Things (사물인터넷 환경에서 표준 Profile 데이터 상호운용을 위한 DDS 기반 BLE 어댑터)

  • Oh, Jung-Hoon;Back, Moon-Ki;Oh, Gil-Tak;Lee, Kyu-Chul
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.11
    • /
    • pp.403-410
    • /
    • 2016
  • IoT(Internet of Things) has purpose for providing new kind of service though interaction with everything. With development of IoT, computer model which is based on internet is changed to distributed connection model between heterogeneous things. There is a problem that it is impossible to connect between each other different protocols. To solve this problem, we should abstract each of things of data through using adaptor of middleware structure in order to make consistent data unit. In this paper, we propose BLE(Bluetooth Low Energy) adaptor, which is interaction with things, based on DDS(Data Distribution Service) that is real-time standard middleware. It is possible to data interaction between BLE Devices as well as two-way data interaction with different protocol devices. Also existing BLE Devices and study have a problem that Data exchange without using a standard data format of a profile defined by the Bluetooth SIG. Using the data formats defined independently by a problem that should not exchange data according to the type and manufacturer of the device BLE. The BLE adapter to solve this problem, the classification and analysis of the 12 stand profile was applied to create a profile based on the standard data format. It is possible to get wide interoperability of not affected on the BLE devices type and manufacturer of the device because it is applied a profile that standard data format.

There's No Such Thing as Free Lunch but Envy among Young Facebookers

  • Iqbal, Tassawar;Yousafzai, Muhammad Tariq;Ali, Sabeen;Sattar, Kinza;Saleem, Muhammad Qaiser;Habib, Usman;Khan, Atta ur Rehman
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.10
    • /
    • pp.4724-4737
    • /
    • 2018
  • Facebook has quickly infused across cultures worldwide to become a common household term for diverse spectra of netizens, especially youngsters. Inherently, interactive in nature, Facebook provides a common cyber enabled platform for online interactions with social friends, living across the world. However, despite its merits, users also experience certain disadvantages, which include but are not limited to rise in feelings of social comparison, decline in self-esteem, contentment and general subjective well-being. This work aims to determine the role of Facebook in spreading envy and identify factors that trigger such emotions. Due to abductive nature of the study, we used pilot interviews and consulted relevant literature to formulate hypotheses. Further, we used deductive approach and conducted a survey. The results showed that frequent use of Facebook, particularly passive following is main predictor of envy, and social interaction is the biggest cause for development of envious feelings in Facebook users. However, insignificant variation was found while investigating relationship between envy and factors, such as pretentiousness, time spent, accomplishment, everything in life, likes on posts, popularity across genders, marital status and genre.

Privacy-Preserving Aggregation of IoT Data with Distributed Differential Privacy

  • Lim, Jong-Hyun;Kim, Jong-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.6
    • /
    • pp.65-72
    • /
    • 2020
  • Today, the Internet of Things is used in many places, including homes, industrial sites, and hospitals, to give us convenience. Many services generate new value through real-time data collection, storage and analysis as devices are connected to the network. Many of these fields are creating services and applications that utilize sensors and communication functions within IoT devices. However, since everything can be hacked, it causes a huge privacy threat to users who provide data. For example, a variety of sensitive information, such as personal information, lifestyle patters and the existence of diseases, will be leaked if data generated by smarwatches are abused. Development of IoT must be accompanied by the development of security. Recently, Differential Privacy(DP) was adopted to privacy-preserving data processing. So we propose the method that can aggregate health data safely on smartwatch platform, based on DP.

Service Reliability Assurance Mechanism based on the frequency of Request Messages in the Distributed Decision making IoT networks (분산 결정 방식 기반 사물인터넷(IoT)에서 요청 메시지 빈도에 기반한 서비스 신뢰성 확보 방안)

  • Kim, Seungcheon;Rho, Kwanghyun;Hwang, Hoyoung
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.8
    • /
    • pp.58-65
    • /
    • 2014
  • A recent issued Internet of Things (IoT) is based on the service that everything around us is exchanging the information and reacting upon these information. These IoT services are mainly dealing with the information that was generated by the information nodes of IoT networks such as sensors, where the way how the information from information nodes should be dealt with is very important in terms of service reliability in IoT networks. This paper introduces a new scheme for service reliability and energy efficiency that is reducing the energy consumption of actuator node reacting upon the request messages from the information nodes in IoT networks.

Autoencoder-Based Anomaly Detection Method for IoT Device Traffics (오토인코더 기반 IoT 디바이스 트래픽 이상징후 탐지 방법 연구)

  • Seung-A Park;Yejin Jang;Da Seul Kim;Mee Lan Han
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.281-288
    • /
    • 2024
  • The sixth generation(6G) wireless communication technology is advancing toward ultra-high speed, ultra-high bandwidth, and hyper-connectivity. With the development of communication technologies, the formation of a hyper-connected society is rapidly accelerating, expanding from the IoT(Internet of Things) to the IoE(Internet of Everything). However, at the same time, security threats targeting IoT devices have become widespread, and there are concerns about security incidents such as unauthorized access and information leakage. As a result, the need for security-enhancing solutions is increasing. In this paper, we implement an autoencoder-based anomaly detection model utilizing real-time collected network traffics in respond to IoT security threats. Considering the difficulty of capturing IoT device traffic data for each attack in real IoT environments, we use an unsupervised learning-based autoencoder and implement 6 different autoencoder models based on the use of noise in the training data and the dimensions of the latent space. By comparing the model performance through experiments, we provide a performance evaluation of the anomaly detection model for detecting abnormal network traffic.

An Edge Enabled Region-oriented DAG-based Distributed Ledger System for Secure V2X Communication

  • S. Thangam;S. Sibi Chakkaravarthy
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.8
    • /
    • pp.2253-2280
    • /
    • 2024
  • In the upcoming era of transportation, a groundbreaking technology, known as vehicle-to-everything (V2X) communication, is poised to redefine our driving experience and revolutionize traffic management. Real-time and secure communication plays a pivotal role in V2X networks, with the decision-making process being a key factor in establishing communication and determining malicious nodes. The proposed framework utilizes a directed acyclic graph (DAG) to facilitate real-time processing and expedite decision-making. This innovative approach ensures seamless connectivity among vehicles, the surrounding infrastructure, and various entities. To enhance communication efficiency, the entire roadside unit (RSU) region can be subdivided into various sub-regions, allowing RSUs to monitor and govern each sub-region. This strategic approach significantly reduces transaction approval time, thereby improving real-time communication. The framework incorporates a consensus mechanism to ensure robust security, even in the presence of malicious nodes. Recognizing the dynamic nature of V2X networks, the addition and removal of nodes are aligned. Communication latency is minimized through the deployment of computational resources near the data source and leveraging edge computing. This feature provides invaluable recommendations during critical situations that demand swift decision-making. The proposed architecture is further validated using the "veins" simulation tool. Simulation results demonstrate a remarkable success rate exceeding 95%, coupled with a significantly reduced consensus time compared to prevailing methodologies. This comprehensive approach not only addresses the evolving requirements of secure V2X communication but also substantiates practical success through simulation, laying the foundation for a transformative era in transportation.

Semi-fragile Watermarking Scheme for H.264/AVC Video Content Authentication Based on Manifold Feature

  • Ling, Chen;Ur-Rehman, Obaid;Zhang, Wenjun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4568-4587
    • /
    • 2014
  • Authentication of videos and images based on the content is becoming an important problem in information security. Unfortunately, previous studies lack the consideration of Kerckhoffs's principle in order to achieve this (i.e., a cryptosystem should be secure even if everything about the system, except the key, is public knowledge). In this paper, a solution to the problem of finding a relationship between a frame's index and its content is proposed based on the creative utilization of a robust manifold feature. The proposed solution is based on a novel semi-fragile watermarking scheme for H.264/AVC video content authentication. At first, the input I-frame is partitioned for feature extraction and watermark embedding. This is followed by the temporal feature extraction using the Isometric Mapping algorithm. The frame index is included in the feature to produce the temporal watermark. In order to improve security, the spatial watermark will be encrypted together with the temporal watermark. Finally, the resultant watermark is embedded into the Discrete Cosine Transform coefficients in the diagonal positions. At the receiver side, after watermark extraction and decryption, temporal tampering is detected through a mismatch between the frame index extracted from the temporal watermark and the observed frame index. Next, the feature is regenerate through temporal feature regeneration, and compared with the extracted feature. It is judged through the comparison whether the extracted temporal watermark is similar to that of the original watermarked video. Additionally, for spatial authentication, the tampered areas are located via the comparison between extracted and regenerated spatial features. Experimental results show that the proposed method is sensitive to intentional malicious attacks and modifications, whereas it is robust to legitimate manipulations, such as certain level of lossy compression, channel noise, Gaussian filtering and brightness adjustment. Through a comparison between the extracted frame index and the current frame index, the temporal tempering is identified. With the proposed scheme, a solution to the Kerckhoffs's principle problem is specified.