• Title/Summary/Keyword: Internet of media things

Search Result 161, Processing Time 0.022 seconds

Internet of Things and Innovative Media Firms (사물인터넷과 미디어기업의 혁신)

  • Moon, Sanghyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.6
    • /
    • pp.157-164
    • /
    • 2019
  • This research examines how IoT makes a significant contribution to the innovation of media firms. The media firms will be able to find new reveue sources and strengthen firms' competence through innovating product, process and business model. While IoT increases the experience of interactivity and immersion for consumption, it improves the way ads are exposed and its impact is measured, leading to revenue increase. For these benefits fulfilled, innovation friendly media eco-system must be established. It is the most critical that media firms should change skeptical attitude toward IoT's potential and actively invest it to employ IoT. The government should create regulatory framework to best utilize the innovative advantages of IoT.

Design of Highway Accident Detection and Alarm System Based on Internet of Things Guard Rail (IoT 가드레일 기반의 고속도로 사고감지 및 경보 시스템 설계)

  • Oh, Am-Suk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.12
    • /
    • pp.1500-1505
    • /
    • 2019
  • Currently, as part of the ICT Smart City, the company is building C-ITS(Cooperative-Intelligent Transport Systems) for solving urban traffic problems. In order to realize autonomous driving service with C-ITS, the role of advanced road infrastructure is important. In addition to the study of mid- to long-term C-ITS and autonomous driving services, it is necessary to present more realistic solutions for road traffic safety in the short term. Therefore, in this paper, we propose a highway accident detection alarm system that can detect and analyze traffic flow and risk information, which are essential information of C-ITS, based on IoT guard rail and provide immediate alarm and remote control. Intelligent IoT guard rail is expected to be used as an intelligent advanced road infrastructure that provides data at actual road sites that are required by C-ITS and self-driving services in the long term.

A Study on Characteristics and Techniques that Affect Data Integrity for Digital Forensic on Flash Memory-Based Storage Devices (플래시 메모리 기반 저장장치에서 디지털 포렌식을 위한 데이터 무결성에 영향을 주는 특성 및 기술 연구)

  • Hyun-Seob Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.3
    • /
    • pp.7-12
    • /
    • 2023
  • One of the most important characteristics of digital forensics is integrity. Integrity means that the data has not been tampered with. If evidence is collected during digital forensic and later tampered with, it cannot be used as evidence. With analog evidence, it's easy to see if it's been tampered with, for example, by taking a picture of it. However, the data on the storage media, or digital evidence, is invisible, so it is difficult to tell if it has been tampered with. Therefore, hash values are used to prove that the evidence data has not been tampered with during the process of collecting evidence and submitting it to the court. The hash value is collected from the stored data during the evidence collection phase. However, due to the internal behavior of NAND flash memory, the physical data shape may change over time from the acquisition phase. In this paper, we study the characteristics and techniques of flash memory that can cause the physical shape of flash memory to change even if no intentional data corruption is attempted.

An Efficient SLC Transition Method for Improving Defect Rate and Longer Lifetime on Flash Memory (플래시 메모리 상에서 불량률 개선 및 수명 연장을 위한 효율적인 단일 비트 셀 전환 기법)

  • Hyun-Seob Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.3
    • /
    • pp.81-86
    • /
    • 2023
  • SSD (solid state disk), which is flash memory-based storage device, has the advantages of high density and fast data processing. Therefore, it is being utilized as a storage device for high-capacity data storage systems that manage rapidly increasing big data. However, flash memory, a storage media, has a physical limitation that when the write/erase operation is repeated more than a certain number of times, the cells are worn out and can no longer be used. In this paper, we propose a method for converting defective multi-bit cells into single-bit cells to reduce the defect rate of flash memory and extend its lifetime. The proposed idea distinguishes the defects and treatment methods of multi-bit cells and single-bit cells, which have different physical characteristics but are treated as the same defect, and converts the expected defective multi-bit cells into single-bit cells to improve the defect rate and extend the overall lifetime. Finally, we demonstrate the effectiveness of our proposed idea by measuring the increased lifetime of SSD through simulations.

Study on the Security Threats Factors of A Bluetooth Low Energy (저전력 블루투스의 보안 위협 요인들에 관한 연구)

  • Jeon, Jeong Hoo
    • Convergence Security Journal
    • /
    • v.17 no.4
    • /
    • pp.3-9
    • /
    • 2017
  • Recently, Wireless communication has been widely used as a short distance communication medium in various industrial fields as well as communication connection between home appliances due to the appearance of the Internet of Things. And Most commonly used wireless communication media include WiFi, Bluetooth, and NFC. Among them, Bluetooth is widely used for communication between smart devices as well as computer peripheral devices. And Bluetooth in the home network fields is being used to control electronic products. However, since Bluetooth security vulnerabilities are known, more and more attacks are being exploited. As the application range of Bluetooth is expanding, it is necessary to prepare countermeasures accordingly. Therefore, this study investigates the security threat factors of through Bluetooth'attack case and attack technology. And By proposing countermeasures against this problem, we intend to utilize it as data for improving the security of wireless network service in the future.

A Design on Error Tracking System for Enhanced-Reliable IoT Service (사물인터넷 서비스의 신뢰성 강화를 위한 오류 추적 시스템 설계)

  • Lim, Ho-Seung;Choi, Chang-Won
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.3
    • /
    • pp.15-20
    • /
    • 2020
  • In this paper, an error tracking platform is designed for enhanced-reliable IOT system. The platform is designed to enhance reliability of IOT system by analysing additional informations(OS, Browser, Device) and by notifying error detection to developers. Especially, in the case of an error in the service which it is difficult for developers to recognize it, The platform also supports notification services through various communication media(Email, Slack, SMS). The common interface is designed to accommodate many languages(typescript, Swift, and Android) in the development process, and the interface allows users to analyze errors that occur on various platforms, including mobile/web/desktop applications. By presenting each error in groups through issues, developers can easily identify issues in the service. The visualizing function is included to recognize various error type by dashboard.

SNS using Big Data Utilization Research (빅데이타를 이용한 SNS 활용방안 연구)

  • Shin, Seung-Jung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.6
    • /
    • pp.267-272
    • /
    • 2012
  • IT convergence, social media, and the companies' customer service industry advancement, data collection activities, explosion of multimedia content with increased smartphone penetration, SNS activation networks to expand the pool of things, 10 years ago, the amount of data eunneun evenly across industries, EDW (Enterprisehad increased the demand for the Data Warehouse).Recent proliferation of SNS users and applied research background with Big Data as a new study is proposed to proceed.

A Study on Pipeline Implementation of LEA Encryption·Decryption Block (LEA 암·복호화 블록 파이프라인 구현 연구)

  • Yoon, Gi Ha;Park, Seong Mo
    • Smart Media Journal
    • /
    • v.6 no.3
    • /
    • pp.9-14
    • /
    • 2017
  • This paper is a study on the hardware implementation of the encryption and decryption block of the lightweight block cipher algorithm LEA which can be used for tiny devices in IoT environment. It accepts all secret keys with 128 bit, 192 bit, and 256 bit sizes and aims at the integrated implementation of encryption and decryption functions. It describes design results of applying pipeline method for performance enhancement. When a decryption function is executed, round keys are used in reverse order of encryption function. An efficient hardware implementation method for minimizing performance degradation are suggested. Considering the number of rounds are 24, 28, or 32 times according to the size of secret keys, pipeline of LEA is implemented so that 4 round function operations are executed in each pipeline stage.

Softwarization of Cloud-based Real-Time Broadcast Channel System

  • Kwon, Myung-Kyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.9
    • /
    • pp.25-32
    • /
    • 2017
  • In this paper, we propose the softwareization of broadcasting system. Recently, the topic of industry is the fourth industrial revolution. The fourth industrial revolution is evolving from physical to virtualization. The Industrial Revolution is based on IT technology. Artificial Intelligence (AI), Big Data, and the Internet of Things, which are famous for Alpha Go, are based on software. Among IT, software is the main driver of industrial terrain change. The systemization of software on the basis of cloud environment is proceeding rapidly. System development through softwarization can reduce time to market lead time, hardware cost reduction and manual operation compared to existing hardware system. By developing and implementing broadcasting system such as IPTV based on cloud, lead time for opening service compared to existing hardware system can be shortened by more than 90% and investment cost can be saved by about 40%. In addition, the area of the system can be reduced by 50%. In addition, efficiency can be improved between infrastructures, shortening of trouble handling and ease of maintenance. Finally, we can improve customer experience through rapid service opening.

A Study on Intelligent Edge Computing Network Technology for Road Danger Context Aware and Notification

  • Oh, Am-Suk
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.3
    • /
    • pp.183-187
    • /
    • 2020
  • The general Wi-Fi network connection structure is that a number of IoT (Internet of Things) sensor nodes are directly connected to one AP (Access Point) node. In this structure, the range of the network that can be established within the specified specifications such as the range of signal strength (RSSI) to which the AP node can connect and the maximum connection capacity is limited. To overcome these limitations, multiple middleware bridge technologies for dynamic scalability and load balancing were studied. However, these network expansion technologies have difficulties in terms of the rules and conditions of AP nodes installed during the initial network deployment phase In this paper, an intelligent edge computing IoT device is developed for constructing an intelligent autonomous cluster edge computing network and applying it to real-time road danger context aware and notification system through an intelligent risk situation recognition algorithm.