• Title/Summary/Keyword: Internet of Media Things

Search Result 161, Processing Time 0.024 seconds

Analysis of Technology Convergence of 'Internet of Things' Patents by IPC Code Analysis (IPC 코드 분석에 의한 '사물인터넷(IoT)' 특허의 기술 융복합 분석)

  • Shim, Jae-ruen
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.3
    • /
    • pp.266-272
    • /
    • 2016
  • In this study, we analysed the technology convergence of Internet of Things(IoT) by International Patent Classification(IPC) code analysis. 163 patent applications in Korea are the subjects of this study. We confirmed that the most representative IPC code combinations between Main and Sub categories are G06Q 50/24-G06Q 50/22(6 cases), H04L 29/02-H04L 12/28(4 cases), G06F 15/16-G06F 3/048(3 cases), G06F 15/16-G06F 9/44(3 cases), and G06Q 50/22-G06Q 50/24(3 cases). The field of Health Care business have been prepared 9 patent applications by technology convergence between 'Health Care(G06Q 50/22)' and 'Patient Record Management(G06Q 50/24)'. Finally we also concluded that the core IPC code are G06F 15/16, G06Q 50/22, G06Q 50/24, and H04L 12/28 by the technology convergence interconnections analysis of IoT patent applications.

Analysis on Energy Consumption Required for Building DTLS Session Between Lightweight Devices in Internet of Things (사물인터넷에서 경량화 장치 간 DTLS 세션 설정 시 에너지 소비량 분석)

  • Kwon, Hyeokjin;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.8
    • /
    • pp.1588-1596
    • /
    • 2015
  • In the Internet of Things (IoT), resource-constrained devices such as sensors are capable of communicating and exchanging data over the Internet. The IETF standard group has specified an application protocol CoAP, which uses UDP as a transport protocol, allows such a lightweight device to transmit data. Also, the IETF recommended the DTLS binding for securing CoAP. However, additional features should be added to the DTLS protocol to resolve several problems such as packet loss, reordering, fragmentation and replay attack. Consequently, performance of DTLS is worse than TLS. It is highly required for lightweight devices powered by small battery to design and implement a security protocol in an energy efficient manner. This paper thus discusses about DTLS performance in the perspective of energy consumption. To analyze the performance, we implemented IEEE 802.15.4 based test network consisting of constrained sensor devices in the Cooja simulator. We measured energy consumptions required for each of DTLS client and server in the test network. This paper compares the energy consumption and amount of transmitted data of each flight of DTLS handshake, and the processing and receiving time. We present the analyzed results with regard to code size, cipher primitive and fragmentation as well.

Associative Interactive play Contents for Infant Imagination

  • Jang, Eun-Jung;Lee, Chankyu;Lim, Chan
    • International journal of advanced smart convergence
    • /
    • v.8 no.1
    • /
    • pp.126-132
    • /
    • 2019
  • Creative thinking appears even before it is expressed in language, and its existence is revealed through emotion, intuition, image and body feeling before logic or linguistics rules work. In this study, Lego is intended to present experimental child interactive content that is applied with a computer vision based on image processing techniques. In the case of infants, the main purpose of this content is the development of hand muscles and the ability to implement imagination. The purpose of the analysis algorithm of the OpenCV library and the image processing using the 'VVVV' that is implemented as a 'Node' in the midst of perceptual changes in image processing technology that are representative of object recognition, and the objective is to use a webcam to film, recognize, derive results that match the analysis and produce interactive content that is completed by the user participating. Research shows what Lego children have made, and children can create things themselves and develop creativity. Furthermore, we expect to be able to infer a diverse and individualistic person's thinking based on more data.

Verification on Description of Wearable - Based Healthcare Information in MPEG-IoMT Reference SW (MPEG-IoMT 참조 SW 에서의 웨어러블 기반 의료정보 서술 툴 검증)

  • Yang, Anna;Lee, Ye-Jin;Kim, Jae-Gon
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2019.06a
    • /
    • pp.285-287
    • /
    • 2019
  • MPEG - IoMT(Internet of Media Things) 는 사물 인터넷 및 웨어러블 환경에서의 효율적인 미디어 서비스 제공을 위한 데이터 포맷 및 API(Application Programming Interface) 표준을 제공하고 있다. 본 논문에서는 MPEG - IoMT 에 채택된 헬스케어(healthcare) 정보 서술 툴에 대한 IoMT 참조 SW 에서의 검증 실험내용을 기술한다. IoMT 는 의료영상 저장/관리 및 통신을 위한 표준인 DICOM (Digital Imaging a nd Communication in Medical)을 기반으로 의료 미디어 정보를 기술하기 위한 Healthcare Information 스키마(schema)와 이를 기반으로 서술된 정보를 IoT 및 웨어러블 환경에서 활용하기 위한 API 표준을 포함하고 있다. 본 논문에서는 IoMT 참조 SW 를 이용하여 헬스케어 스키마에 따른 헬스케어 정보의 생성 및 파싱(parsing) 을 검증하고, 서술정보를 MThing (Media Thing) 들 간의 교환을 위한 API 에 대한 검증 내용을 보인다.

  • PDF

Implementation of Internet of Things Maker Kit Based on MQTT Protocol (MQTT 프로토콜 기반의 사물인터넷 메이커 키트 구현)

  • Kwon, Dong-hyeon;Lim, Ji-yong;Heo, Sung-uk;Kim, Gwan-Hyung;Oh, Am-suk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.11
    • /
    • pp.2145-2152
    • /
    • 2017
  • As the ubiquitous paradigm that allows users to access the Internet anytime and anywhere is expanding, the expectation and interest of the Internet is increasing. As interest in the Internet has increased, interest in open source hardware has also increased. As a result, the maker, who is a creator who actually uses the digital production tools to create a product that he thought, is emerging as a new trend. As these makers shared how to make products, the 'maker movement', an open source manufacturing movement, spread. In the case of the domestic market, the government's policy support is also stimulating the maker movement. However, compared to developed countries, there is not enough awareness and environment of maker culture, and only open platform hardware and software are used without special education / development equipment or kit for maker.

Secure Configuration Scheme for Internet of Things using NFC as OOB Channel (NFC를 OOB 채널로 활용한 사물인터넷 보안 설정 기술)

  • Kim, Jeongin;Kang, Namhi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.3
    • /
    • pp.13-19
    • /
    • 2016
  • The PSK (Pre-shared Secret Key) based method is appropriate for the IoT environment consisting of lightweight devices since this method requires less computing time and energy than the method to configure the session key based on the public key algorithm. A fundamental prerequisite for the PSK based method is that PSK should have been configured between the communication entities safely in advance. However, in case of a small sensor or actuator, no input and output interface such as keyboard and monitor required for configuration exists, so it is more difficult to configure PSK for such lightweight devices safely in the IoT environment than the previous Internet devices. Especially, normal users lack expertise in security so they face difficulty in configuration. Therefore, the default value configured at the time of manufacturing at factories is used or the device installer configures PSK in most cases. In such case, it is a matter for consideration whether all installers and manufacturers can be trusted or not. In order to solve such problem, this paper proposes a secure bootstrapping scheme, which utilizes the NFC (Near Field Communication) as an OOB (Out-Of-Band) channel, for lightweight devices with limited resources.

Analysis of the Vulnerability of the IoT by the Scenario (시나리오 분석을 통한 사물인터넷(IoT)의 취약성 분석)

  • Hong, Sunghyuck;Sin, Hyeon-Jun
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.9
    • /
    • pp.1-7
    • /
    • 2017
  • As the network environment develops and speeds up, a lot of smart devices is developed, and a high-speed smart society can be realized while allowing people to interact with objects. As the number of things Internet has surged, a wide range of new security risks and problems have emerged for devices, platforms and operating systems, communications, and connected systems. Due to the physical characteristics of IoT devices, they are smaller in size than conventional systems, and operate with low power, low cost, and relatively low specifications. Therefore, it is difficult to apply the existing security solution used in the existing system. In addition, IoT devices are connected to the network at all times, it is important to ensure that personal privacy exposure, such as eavesdropping, data tampering, privacy breach, information leakage, unauthorized access, Significant security issues can arise, including confidentiality and threats to facilities. In this paper, we investigate cases of security threats and cases of network of IoT, analyze vulnerabilities, and suggest ways to minimize property damage by Internet of things.

Study on the Characteristics of Modern Punk Fashion (현대 펑크 패션의 특성에 관한 연구)

  • Sohn Hyang-Mi;Park Kil-Soon
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.29 no.11
    • /
    • pp.1444-1453
    • /
    • 2005
  • In this study, I tried to analyze the characteristics of modem punk fashion by applying characteristics of modem cultural phenomena. The method of this study is the qualitative study: I analyzed collections from 1996 to 2003 by suggesting an analysis frame based on bibliological studies and applying internet photo materials to the analysis frame. As a result, modem punk fashion has the following characteristics. First, it tends to promote things that are entirely different from the previous expression methods by using the overlapping of texts combined with things that are heterogeneous. Second, the scope of its decoration has been expanded with the aid of the expression method, in which the objects that had not been used as decoration previously have been transformed into media. Third, the appearance of non-mainstream group who has suggested the anti-mainstream thought that violates the uniformed beauty of punk group has expanded the scope of classes that accept the punk fashion. Lastly, clothes, wigs and accessories have been commercialized through the permanent modification that used to signify resistance and disgust such as the expression methods of image replicas using tattoo, piercing, and transformation of hair. In doing so, punk fashion has been generalized and popularized. Such modem punk fashion reflects the change of society such as social transformation that is occupied by images thanks to its complexity and pluralism and the development of public media.

A Memory Mapping Technique to Reduce Data Retrieval Cost in the Storage Consisting of Multi Memories (다중 메모리로 구성된 저장장치에서 데이터 탐색 비용을 줄이기 위한 메모리 매핑 기법)

  • Hyun-Seob Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.1
    • /
    • pp.19-24
    • /
    • 2023
  • Recently, with the recent rapid development of memory technology, various types of memory are developed and are used to improve processing speed in data management systems. In particular, NAND flash memory is used as a main media for storing data in memory-based storage devices because it has a nonvolatile characteristic that it can maintain data even at the power off state. However, since the recently studied memory-based storage device consists of various types of memory such as MRAM and PRAM as well as NAND flash memory, research on memory management technology is needed to improve data processing performance and efficiency of media in a storage system composed of different types of memories. In this paper, we propose a memory mapping scheme thought technique for efficiently managing data in the storage device composed of various memories for data management. The proposed idea is a method of managing different memories using a single mapping table. This method can unify the address scheme of data and reduce the search cost of data stored in different memories for data tiering.

A Study on the Mixed Reality (MR) Based Storytelling Convergence Coding Education (혼합현실(MR)기반 스토리텔링형 융합 코딩교육에 관한 연구)

  • Lee, Byong-Kwon;Jung, Doo-Yong
    • Journal of Internet of Things and Convergence
    • /
    • v.5 no.2
    • /
    • pp.27-32
    • /
    • 2019
  • Recently, the introduction of the elementary and middle school software education essential courses in 2018, the emergence of educational solutions, and the need for digital content for software education rather than simple coding. In addition, in the case of current coding education, it is necessary to study how to induce interest in elementary, middle and high school students. In this study, we included the interactive (UX / UI) function using MR(Mixed Reality) and induced interest in coding education, and it was possible to cultivate logical thinking by applying storytelling coding rather than injection education. Suggested way. As a result of research, elementary, middle, and high school students easily proposed logical thinking education beyond the existing injection education method using mixed reality(MR) technology, and will break away from the injection coding education which is a problem of the school and school.