• Title/Summary/Keyword: Internet of Thing

Search Result 221, Processing Time 0.024 seconds

Design and Implementation of Customized Protocol and Smartphone App for the All-in-One Sensor Device

  • Bang, Jong-ho;Lee, Song-Yeon;Paik, Jong-Ho
    • Journal of Internet Computing and Services
    • /
    • v.19 no.1
    • /
    • pp.19-26
    • /
    • 2018
  • Social issues for environmental pollution are continuously increasing globally. Especially, Users require services to measure environmental factors in indoor and outdoor and manage related data effectively and conveniently. According to this demand, sensors that can measure environmental factors in indoor and outdoor have been developed. However, since one sensor is composed of independent module, the interface of output data from each sensor is different. To solve the problem, we propose a customized protocol for low-power short-range wireless communication between smartphone using Bluetooth and All-in-One sensor device board and analyze the performance of the proposed customized protocol by developing program for performance verification of interface with user smartphone through Bluetooth. In addition, we implement a smartphone application using proposed protocol.

The Analysis of Factors that Affect Attitudes toward the New Digital Revolution (새로운 디지털 혁명에 대한 태도에 영향을 미치는 요인 분석)

  • Jun, Bong-Gi
    • Journal of Digital Convergence
    • /
    • v.12 no.6
    • /
    • pp.333-339
    • /
    • 2014
  • In the late 2000's, a smart phone caused by the digital revolution has led to abrupt changes from our life. The internet of thing (IoT), which is considered as a next digital revolution, will be scrutinized in this paper. Students, who use smart phones in Silla University, were selected for the sample-frame. Approximately 78% students replied with a positive response to the digital revolution admit the new era with the intellectual curiosity and challenge. On the other hand, about 48% students showed uneasy response to the new civilization due to the lack of privacy and security issues of IoT; furthermore, friendship was their apprehension. This paper will provide potentially useful insights and directions for examining factors that affect different manners toward the next digital revolution.

Chatbot Design Method Using Hybrid Word Vector Expression Model Based on Real Telemarketing Data

  • Zhang, Jie;Zhang, Jianing;Ma, Shuhao;Yang, Jie;Gui, Guan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.4
    • /
    • pp.1400-1418
    • /
    • 2020
  • In the development of commercial promotion, chatbot is known as one of significant skill by application of natural language processing (NLP). Conventional design methods are using bag-of-words model (BOW) alone based on Google database and other online corpus. For one thing, in the bag-of-words model, the vectors are Irrelevant to one another. Even though this method is friendly to discrete features, it is not conducive to the machine to understand continuous statements due to the loss of the connection between words in the encoded word vector. For other thing, existing methods are used to test in state-of-the-art online corpus but it is hard to apply in real applications such as telemarketing data. In this paper, we propose an improved chatbot design way using hybrid bag-of-words model and skip-gram model based on the real telemarketing data. Specifically, we first collect the real data in the telemarketing field and perform data cleaning and data classification on the constructed corpus. Second, the word representation is adopted hybrid bag-of-words model and skip-gram model. The skip-gram model maps synonyms in the vicinity of vector space. The correlation between words is expressed, so the amount of information contained in the word vector is increased, making up for the shortcomings caused by using bag-of-words model alone. Third, we use the term frequency-inverse document frequency (TF-IDF) weighting method to improve the weight of key words, then output the final word expression. At last, the answer is produced using hybrid retrieval model and generate model. The retrieval model can accurately answer questions in the field. The generate model can supplement the question of answering the open domain, in which the answer to the final reply is completed by long-short term memory (LSTM) training and prediction. Experimental results show which the hybrid word vector expression model can improve the accuracy of the response and the whole system can communicate with humans.

Education Equipment for FPGA Design of Sensor-based IOT System (센서 기반의 IOT 시스템의 FPGA 설계 교육용 장비)

  • Cho, Byung-woo;Kim, Nam-young;Yu, Yun-seop
    • Journal of Practical Engineering Education
    • /
    • v.8 no.2
    • /
    • pp.111-120
    • /
    • 2016
  • Education equipment for field programmable gate array (FPGA) design of sensor-based IOT (Internet Of Thing) system is introduced. Because sensors have different interfaces, several types of interface controller on FPGA need. Using this equipment, several types of interface controller, which can control ADC (analog-to-digital converter) for analog sensor outputs and $I^2C$ (Inter-Integrated Circuit), SPI (Serial Peripheral Interface Bus), and GPIO (General-Purpose Input/Output) for digital sensor outputs, can be designed on FPGA. Image processing hardware using image sensors and display controller for real and image-processed images or videos can be design on FPGA chip. This equipment can design a SOC (System On Chip) consisting of a hard process core on Linux OS and a FPGA block for IOT system which can communicate with wire and wireless networks. Using the education equipment, an example of hardware design using image sensor and accelerometer is described, and an example of syllabus for "Digital system design using FPGA" course is introduced. Using the education equipment, students can develop the ability to design some hardware, and to train the ability for the creative capstone design through conceptual, partial-level, and detail designs.

Entity Authentication Scheme for Secure WEB of Things Applications (안전한 WEB of Things 응용을 위한 개체 인증 기술)

  • Park, Jiye;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.5
    • /
    • pp.394-400
    • /
    • 2013
  • WoT (Web of Things) was proposed to realize intelligent thing to thing communications using WEB standard technology. It is difficult to adapt security protocols suited for existing Internet communications into WoT directly because WoT includes LLN(Low-power, Lossy Network) and resource constrained sensor devices. Recently, IETF standard group propose to use DTLS protocol for supporting security services in WoT environments. However, DTLS protocol is not an efficient solution for supporting end to end security in WoT since it introduces complex handshaking procedures and high communication overheads. We, therefore, divide WoT environment into two areas- one is DTLS enabled area and the other is an area using lightweight security scheme in order to improve them. Then we propose a mutual authentication scheme and a session key distribution scheme for the second area. The proposed system utilizes a smart device as a mobile gateway and WoT proxy. In the proposed authentication scheme, we modify the ISO 9798 standard to reduce both communication overhead and computing time of cryptographic primitives. In addition, our scheme is able to defend against replay attacks, spoofing attacks, select plaintext/ciphertext attacks, and DoS attacks, etc.

The effect of university students' approach to health information on improvement of health behavior (대학생들의 건강정보 접근이 건강행태 개선에 미치는 영향)

  • Kim, Seung-Dae;Kim, Myung-gwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.5
    • /
    • pp.3268-3275
    • /
    • 2015
  • The goals of this study are understanding the state of improvement of university students' health behavior who are about to graduate and have to consider their health for getting a job according to the way of access and achieving health information and suggesting effective way to improve health behavior. 224 people who responded to the survey which was conducted at some universities in Kyungpook area are selected as a subject of final analysis. The analysis result of internet searching was more meaningful than the analysis result of TV programs or books regarding health. And the older grade(B=.103, p=.007), the more access to health information(B=.137, p=.008) and the higher score of existing health behavior(B=.431, p=.000) the score of improvement of health behavior was increased. Internet searching for health information is the most popular thing because information can be easily get after searching what you want immediately. TV program regarding health has better quality than the information on the internet because of the appearance of health professionals giving health information on TV but it is difficult to watch TV program whenever you want. However the separation between books, TV program and internet is obscured in that the books and TV program can be turned into replay and e-book on internet.

Analysis of the Vulnerability of the IoT by the Scenario (시나리오 분석을 통한 사물인터넷(IoT)의 취약성 분석)

  • Hong, Sunghyuck;Sin, Hyeon-Jun
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.9
    • /
    • pp.1-7
    • /
    • 2017
  • As the network environment develops and speeds up, a lot of smart devices is developed, and a high-speed smart society can be realized while allowing people to interact with objects. As the number of things Internet has surged, a wide range of new security risks and problems have emerged for devices, platforms and operating systems, communications, and connected systems. Due to the physical characteristics of IoT devices, they are smaller in size than conventional systems, and operate with low power, low cost, and relatively low specifications. Therefore, it is difficult to apply the existing security solution used in the existing system. In addition, IoT devices are connected to the network at all times, it is important to ensure that personal privacy exposure, such as eavesdropping, data tampering, privacy breach, information leakage, unauthorized access, Significant security issues can arise, including confidentiality and threats to facilities. In this paper, we investigate cases of security threats and cases of network of IoT, analyze vulnerabilities, and suggest ways to minimize property damage by Internet of things.

A Study on virtual character from the viewpoint of E-branding (E-branding관점에서 본 감정이입 가상 캐릭터의 연구)

  • 이지희
    • Archives of design research
    • /
    • v.17 no.3
    • /
    • pp.81-90
    • /
    • 2004
  • The reason of the appearance of Internet is regarded as a milestone since we have shared information globally in a mutual way. The important thing on this point is what contents we choose for ourselves. The Internet could be meaningless unless we use it in a certain way, which ultimately means that the Internet has to deliver something valuable to us humans. Therefore, we have looked at how we can deliver and share humanity and emotion through the Internet, also how we can instill vital power into our real life, through the Internet. Fortunately, the current study must essentially be ongoing due to its nature with perhaps a multidisciplinary team brainstorming ideas. The reason for that is that not only could we find new business models for companies, but also find out new ways to appease the human mind in the modern age. In addition, as consumers needs become more specialized and diversified, companies are expected to face up to fierce competition with the help of innovative ideas. The ever-intensifying competition requires companies to cultivate new strategic tools in order to have new, powerful and sustainable comparative advantages. The goal of this research will be to explore ways of finding a new approach. Specifically, this research is about how to use the EVC(empathetic virtual character), which, this researcher believes, can deliver emotional benefits so as to make e-branding successful. According to reports, it has been proven that this new concept including the EVC can result in tremendous success. So the goal of this research is to explore the current situation and to anticipate the future concerning virtual characters.

  • PDF

There's No Such Thing as Free Lunch but Envy among Young Facebookers

  • Iqbal, Tassawar;Yousafzai, Muhammad Tariq;Ali, Sabeen;Sattar, Kinza;Saleem, Muhammad Qaiser;Habib, Usman;Khan, Atta ur Rehman
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.10
    • /
    • pp.4724-4737
    • /
    • 2018
  • Facebook has quickly infused across cultures worldwide to become a common household term for diverse spectra of netizens, especially youngsters. Inherently, interactive in nature, Facebook provides a common cyber enabled platform for online interactions with social friends, living across the world. However, despite its merits, users also experience certain disadvantages, which include but are not limited to rise in feelings of social comparison, decline in self-esteem, contentment and general subjective well-being. This work aims to determine the role of Facebook in spreading envy and identify factors that trigger such emotions. Due to abductive nature of the study, we used pilot interviews and consulted relevant literature to formulate hypotheses. Further, we used deductive approach and conducted a survey. The results showed that frequent use of Facebook, particularly passive following is main predictor of envy, and social interaction is the biggest cause for development of envious feelings in Facebook users. However, insignificant variation was found while investigating relationship between envy and factors, such as pretentiousness, time spent, accomplishment, everything in life, likes on posts, popularity across genders, marital status and genre.

Implementation and application of remote control system using LACC(Local Area Control Center) (LACC를 이용한 원격제어 시스템 구현 및 적용)

  • Park Tae-Jin;Jang Myung-Kee;Chung Seung-Ryul
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.4 s.310
    • /
    • pp.15-22
    • /
    • 2006
  • Nowadays, there is called energy saving, that it is accomplished with a lot study and application development as according to demand of all around world. It is using to network device of wire or wireless such as internet, lan, plc, and zigbee and that we should be accomplished to study about method that spending a little cost to fatal error in control system that be expected of frequent occurrence on network, and that have method to do construction a little bit tried out. Also, in that such a embedded system with network function case, there is important thing that it is remote management to network node and control methods to trust because firmware upgrade have the advantage of more than the other device. In this paper, we have verified through a result of experiment for efficient remote management and control method as previously stated in this paper, that it is area of the PLC for sensor node and doing management to relay, and implementation of the LACC which is core part of the ESS, and in order to get a result to trust from doing analysis of capacity and test.