• 제목/요약/키워드: Internet of Things (IoT) Model

검색결과 282건 처리시간 0.028초

Logical Activity Recognition Model for Smart Home Environment

  • Choi, Jung-In;Lim, Sung-Ju;Yong, Hwan-Seung
    • 한국컴퓨터정보학회논문지
    • /
    • 제20권9호
    • /
    • pp.67-72
    • /
    • 2015
  • Recently, studies that interact with human and things through motion recognition are increasing due to the expansion of IoT(Internet of Things). This paper proposed the system that recognizes the user's logical activity in home environment by attaching some sensors to various objects. We employ Arduino sensors and appreciate the logical activity by using the physical activitymodel that we processed in the previous researches. In this System, we can cognize the activities such as watching TV, listening music, talking, eating, cooking, sleeping and using computer. After we produce experimental data through setting virtual scenario, then the average result of recognition rate was 95% but depending on experiment sensor situation and physical activity errors the consequence could be changed. To provide the recognized results to user, we visualized diverse graphs.

이종 IoT 데이터 표현을 위한 그래프 모델: 스마트 캠퍼스 관리 사례 연구 (A Graph Model of Heterogeneous IoT Data Representation : A Case Study from Smart Campus Management)

  • 뉘엔반퀴엣;뉘엔휴쥐;뉘엔양쯔엉;김경백
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2018년도 추계학술발표대회
    • /
    • pp.984-987
    • /
    • 2018
  • In an Internet of Thing (IoT) environment, entities with different attributes and capacities are going to be connected in a highly connected fashion. Specifically, not only the mechanical and electronic devices but also other entities such as people, locations and applications are connected to each other. Understanding and managing these connections play an important role for businesses, which identify opportunities for new IoT services. Traditional approach for storing and querying IoT data is used of a relational database management system (RDMS) such as MySQL or MSSQL. However, using RDMS is not flexible and sufficient for handling heterogeneous IoT data because these data have deeply complex relationships which require nested queries and complex joins on multiple tables. In this paper, we propose a graph model for constructing a graph database of heterogeneous IoT data. Graph databases are purposely-built to store highly connected data with nodes representing entities and edges representing the relationships between these entities. Our model fuses social graph, spatial graph, and things graph, and incorporates the relationships among them. We then present a case study which applies our model for representing data from a Smart Campus using Neo4J platform. Through the results of querying to answer real questions in Smart Campus management, we show the viability of our model.

Genetic Algorithm based hyperparameter tuned CNN for identifying IoT intrusions

  • Alexander. R;Pradeep Mohan Kumar. K
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제18권3호
    • /
    • pp.755-778
    • /
    • 2024
  • In recent years, the number of devices being connected to the internet has grown enormously, as has the intrusive behavior in the network. Thus, it is important for intrusion detection systems to report all intrusive behavior. Using deep learning and machine learning algorithms, intrusion detection systems are able to perform well in identifying attacks. However, the concern with these deep learning algorithms is their inability to identify a suitable network based on traffic volume, which requires manual changing of hyperparameters, which consumes a lot of time and effort. So, to address this, this paper offers a solution using the extended compact genetic algorithm for the automatic tuning of the hyperparameters. The novelty in this work comes in the form of modeling the problem of identifying attacks as a multi-objective optimization problem and the usage of linkage learning for solving the optimization problem. The solution is obtained using the feature map-based Convolutional Neural Network that gets encoded into genes, and using the extended compact genetic algorithm the model is optimized for the detection accuracy and latency. The CIC-IDS-2017 and 2018 datasets are used to verify the hypothesis, and the most recent analysis yielded a substantial F1 score of 99.23%. Response time, CPU, and memory consumption evaluations are done to demonstrate the suitability of this model in a fog environment.

A Novel Duty Cycle Based Cross Layer Model for Energy Efficient Routing in IWSN Based IoT Application

  • Singh, Ghanshyam;Joshi, Pallavi;Raghuvanshi, Ajay Singh
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권6호
    • /
    • pp.1849-1876
    • /
    • 2022
  • Wireless Sensor Network (WSN) is considered as an integral part of the Internet of Things (IoT) for collecting real-time data from the site having many applications in industry 4.0 and smart cities. The task of nodes is to sense the environment and send the relevant information over the internet. Though this task seems very straightforward but it is vulnerable to certain issues like energy consumption, delay, throughput, etc. To efficiently address these issues, this work develops a cross-layer model for the optimization between MAC and the Network layer of the OSI model for WSN. A high value of duty cycle for nodes is selected to control the delay and further enhances data transmission reliability. A node measurement prediction system based on the Kalman filter has been introduced, which uses the constraint based on covariance value to decide the scheduling scheme of the nodes. The concept of duty cycle for node scheduling is employed with a greedy data forwarding scheme. The proposed Duty Cycle-based Greedy Routing (DCGR) scheme aims to minimize the hop count, thereby mitigating the energy consumption rate. The proposed algorithm is tested using a real-world wastewater treatment dataset. The proposed method marks an 87.5% increase in the energy efficiency and reduction in the network latency by 61% when validated with other similar pre-existing schemes.

공유경제를 위한 IoT 기반의 휴먼 인터랙티브 광고 서비스 구현 (Development of an IoT-Based Human Interactive Advertising Service for Sharing Economy)

  • 정원석;이창교;고완진;서정욱
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2019년도 춘계학술대회
    • /
    • pp.413-415
    • /
    • 2019
  • 본 논문에서는 공유경제를 위한 IoT 기반의 휴먼 인터랙티브 광고 서비스(IoT-HiAS, IoT-Human Interactive Advertising Service)를 구현한다. HiAS 디바이스가 웹캠을 통해 디바이스의 전방을 촬영하고 MobileNet을 사용한 SSD 모델을 통해 사람을 실시간으로 검출한다. 검출된 사람을 카운팅하여 설정한 기준 이상의 사람 수가 검출되면 빔 프로젝터를 통해 유휴자원에 광고를 재생한다. 광고가 재생됨과 동시에 디바이스 전방의 광고 시작 시점을 캡쳐한 이미지와 검출된 사람의 수를 IoT 클라이언트를 통해 HiAS 서버의 oneM2M 표준을 준용한 IoT 서버로 전송한다. 광고가 끝나면 디바이스 전방을 촬영하여 이미지를 IoT 서버로 전송한다. 전송받은 데이터를 HiAS 서버의 소셜 네트워크 서비스(SNS, Social Network Service) 에이전트를 통해 광고주 및 광고제작자에게 알림 메시지를 전송하여 IoT 기반의 휴먼 인터랙티브 광고 서비스를 구현하였다.

  • PDF

A Learning-based Power Control Scheme for Edge-based eHealth IoT Systems

  • Su, Haoru;Yuan, Xiaoming;Tang, Yujie;Tian, Rui;Sun, Enchang;Yan, Hairong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권12호
    • /
    • pp.4385-4399
    • /
    • 2021
  • The Internet of Things (IoT) eHealth systems composed by Wireless Body Area Network (WBAN) has emerged recently. Sensor nodes are placed around or in the human body to collect physiological data. WBAN has many different applications, for instance health monitoring. Since the limitation of the size of the battery, besides speed, reliability, and accuracy; design of WBAN protocols should consider the energy efficiency and time delay. To solve these problems, this paper adopt the end-edge-cloud orchestrated network architecture and propose a transmission based on reinforcement algorithm. The priority of sensing data is classified according to certain application. System utility function is modeled according to the channel factors, the energy utility, and successful transmission conditions. The optimization problem is mapped to Q-learning model. Following this online power control protocol, the energy level of both the senor to coordinator, and coordinator to edge server can be modified according to the current channel condition. The network performance is evaluated by simulation. The results show that the proposed power control protocol has higher system energy efficiency, delivery ratio, and throughput.

모바일 IoT 디바이스 파워 관리의 체계적인 개발 방법: 휘처 기반 가변성 모델링 및 자산 개발 (Systematic Development of Mobile IoT Device Power Management: Feature-based Variability Modeling and Asset Development)

  • 이혜선;이강복;방효찬
    • 정보과학회 논문지
    • /
    • 제43권4호
    • /
    • pp.460-469
    • /
    • 2016
  • 사물인터넷(IoT)은 다양한 디바이스가 유무선 네트워크를 통해 연결되어 정보를 수집, 처리, 교환, 공유하는 환경이다. 대표적 디바이스가 스마트폰 같은 모바일 IoT 디바이스인데, 사용자에게 고성능서비스를 제공하기 위해 파워를 많이 소비하지만 상시 공급할 수 없어서 주어진 IoT 환경에 적합하게 파워 관리를 하는 것이 필수적이다. 하지만 기존 모바일 IoT 디바이스의 파워 관리에는 AP, AP 내/외부 HW 모듈, OS, 플랫폼, 어플리케이션 등 다양한 요소가 복잡하게 얽혀 있어서 이 관계를 쉽게 파악하고 관리하는 체계적인 방법이 필요하다. 또한 파워 관리와 연관된 다양한 관리 정책, 운영 환경, 알고리즘 등 가변 요소를 분석하고 이를 파워 관리 개발에 반영하는 것이 필요하다. 본 논문에서는 이러한 문제점을 해결하고 모바일 IoT 디바이스 파워 관리를 체계적으로 개발하기 위한 공학 원칙과 이를 기반으로 한 방법을 제안한다. 실행가능성 검증을 위해 커넥티드 헬멧 시스템 파워 관리가 사례연구로 사용되었다.

위치 추적 센서 기반의 IOT 헬스케어 서비스 관리 모델 (An Efficient IoT Healthcare Service Management Model of Location Tracking Sensor)

  • 정윤수
    • 디지털융복합연구
    • /
    • 제14권3호
    • /
    • pp.261-267
    • /
    • 2016
  • 전 세계적으로 사물인터넷(IoT) 기술이 주목을 받으면서 사물 인터넷 기반의 헬스케어, 스마트 시티, 농업, 국방 등의 다양한 서비스 개발이 진행되고 있다. 그러나, IoT를 적용한 헬스케어 서비스는 환자의 생체정보가 제3자에게 유출되어 환자의 생명을 위협하는 상황이 발생할 수 있는 문제가 존재한다. 본 논문에서는 사물 인터넷 기반의 헬스케어 서비스를 제공받는 환자의 생체정보를 제3자에게 유출되지 않으면서 센싱된 데이터 및 자원을 이용하여 치료/행정 처리의 시간 및 절차를 간소화하기 위한 위치추적 센서 기반의 IoT 헬스케어 서비스 관리 모델을 제안한다. 제안 모델은 환자의 위치 정보를 이용하여 병원내 의료진들이 환자의 위치를 실시간으로 확인하고 응급상황이 발생했을 경우에도 신속하게 대응할 수 있다. 또한, 병원 내 의료장비에도 위치추적 센서를 부착해 치료에 필요한 장비들의 위치도 즉각적으로 확인 가능하기 때문에 의료서비스의 시간 및 절차를 최소화할 수 있는 장점이 있다.

공간 중심의 사물정보통신 기반 리타게팅광고를 위한 헤도닉모델 연구 (Hedonic Model Study for Retargeting Advertising Based Air Inteface)

  • 김보람;윤용익
    • 한국위성정보통신학회논문지
    • /
    • 제11권3호
    • /
    • pp.100-103
    • /
    • 2016
  • 본 연구는 IoT(Internet of Things) 기반의 사물정보통신 인프라 환경 속에서 사용자들에게 보다 유용한 정보를 제공하는 공간 중심의 리타게팅광고 헤도닉 모델을 연구했다. 기존의 사물정보통신과 관련된 연구는 많지만, 상대적으로 사물인터넷 플랫폼에서 구현될 수 있는 효과적인 광고의 모델을 설계하는 연구는 많지 않았다, 이에 본 연구에서는 사물인터넷이 구현되는 공간을 중심으로 소비자들의 온라인상의 행적정보를 바탕으로 제공되는 리타게팅광고를 헤도닉모델의 개념을 바탕으로 보다 정보적이며, 재미있고 인터랙티브한 진화된 형식의 광고모델을 설계하고자 하였다. 따라서 본 연구의 결과물은 향후 사물정보통신 기반의 서비스 플랫폼이라 할 수 있는 사물인터넷 플랫폼 상에서 구현되는 광고를 제작하는데 있어 실무적 함의를 갖을 수 있을 것이다.

Malware Detection Using Deep Recurrent Neural Networks with no Random Initialization

  • Amir Namavar Jahromi;Sattar Hashemi
    • International Journal of Computer Science & Network Security
    • /
    • 제23권8호
    • /
    • pp.177-189
    • /
    • 2023
  • Malware detection is an increasingly important operational focus in cyber security, particularly given the fast pace of such threats (e.g., new malware variants introduced every day). There has been great interest in exploring the use of machine learning techniques in automating and enhancing the effectiveness of malware detection and analysis. In this paper, we present a deep recurrent neural network solution as a stacked Long Short-Term Memory (LSTM) with a pre-training as a regularization method to avoid random network initialization. In our proposal, we use global and short dependencies of the inputs. With pre-training, we avoid random initialization and are able to improve the accuracy and robustness of malware threat hunting. The proposed method speeds up the convergence (in comparison to stacked LSTM) by reducing the length of malware OpCode or bytecode sequences. Hence, the complexity of our final method is reduced. This leads to better accuracy, higher Mattews Correlation Coefficients (MCC), and Area Under the Curve (AUC) in comparison to a standard LSTM with similar detection time. Our proposed method can be applied in real-time malware threat hunting, particularly for safety critical systems such as eHealth or Internet of Military of Things where poor convergence of the model could lead to catastrophic consequences. We evaluate the effectiveness of our proposed method on Windows, Ransomware, Internet of Things (IoT), and Android malware datasets using both static and dynamic analysis. For the IoT malware detection, we also present a comparative summary of the performance on an IoT-specific dataset of our proposed method and the standard stacked LSTM method. More specifically, of our proposed method achieves an accuracy of 99.1% in detecting IoT malware samples, with AUC of 0.985, and MCC of 0.95; thus, outperforming standard LSTM based methods in these key metrics.