• Title/Summary/Keyword: Internet-of-Thing

Search Result 220, Processing Time 0.028 seconds

Design of Automatic Shoes Tower Using NFC (NFC를 이용한 자동 신발 타워 설계)

  • Jang, Eun-Gyeon;Ann, So-Hyeon;Yim, Dae-Geun;Kim, Yu-Bin;Yu, Seung-Su
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.07a
    • /
    • pp.295-296
    • /
    • 2018
  • 본 논문은 입 출차를 하는 주차타워의 원리를 바탕으로 NFC를 활용하여 신발을 반 출입하고, IoT 센서를 이용하여 신발의 관리를 편리하게 도와주는 자동 신발타워이다. 수동으로 번호를 입력하던 주차타워와는 다르게 제안한 신발타워는 NFC에 있는 고유ID값을 활용하여 인증된 사용자가 신발장의 센서 터치로 본인의 신발을 반 출입하도록 한다. 신발장 관리 시스템은 신발의 임의적인 반출을 가능하게 하며, IoT센서를 탑재하여 신발장 내부에 향균, 건조, 온도 조절 등의 효과를 탑재하여 신발의 관리를 편리하게 도와주는 기능들을 제공한다.

  • PDF

An Analysis on the Commodity Trust of Internet Shopping Mall (인터넷 쇼핑몰에서의 상품신뢰에 대한 분석)

  • Cho, Won-Gil
    • International Commerce and Information Review
    • /
    • v.9 no.4
    • /
    • pp.67-89
    • /
    • 2007
  • The purpose of this study is to find out current problems facing the Commodity Trust of Internet Shopping Mall and to suggest proper solutions. the Commodity Trust of Internet Shopping Mall recently emerged as ubiquitous business environment that is not this only sales promotion but the Commodity Trust. Now we should have focused on the cooperation among the organizations in the Commodity Trust of Internet Shopping Mall; need various kind of government aids; need marketing-oriented and professional skills to build and enhance the growth of trade show exhibition industry. Accordingly, the important thing is an exploratory study of assessing the Commodity Trust of Internet Shopping Mall etc.

  • PDF

Actual Cases of Internet of Thing on Smart City Industry (스마트시티 산업에서의 사물인터넷 적용 사례 연구)

  • Lee, Seong-Hoon;Shim, Dong-Hee;Lee, Dong-Woo
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.4
    • /
    • pp.65-70
    • /
    • 2016
  • Smart city is an urban development vision to integrate multiple information and communication technology(ICT) and Internet of Things(IoT). The goal of building a smart city is to improve the quality of life by using urban informatics and technology to improve the efficiency of services and meet residents' needs. Many devices in today have been used on various industrial regions. These devices use Internet to transfer their informations. We call these situations as the IoT(Internet of Things). We studied various application examples of IoT in smart city industrial region. In this paper, we described two actual cases such as smart park system and smart bin.

A Study on the Application of Voronoi Diagram for Internet of Thing (보로노이 다이어그램의 사물인터넷 적용에 관한 연구)

  • Kim, Inbum
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.01a
    • /
    • pp.283-284
    • /
    • 2016
  • 사물인터넷이란 인간의 일상생활에 사용 중인 가전제품, 의료기기, 기타 센서 부착 기기들이 인터넷에 연결되어 스스로 통신하고 제어하는 환경이다. 본 논문에서는 사물인터넷을 구성하는 각 사물들 간의 효율적인 통신을 위해 센터노드를 설정하고 각 사물들이 센터 노드를 중계기로 활용하여 다른 사물들과 효과적인 통신할 때 보로노이 다이어그램을 적용하는 방법을 제안한다.

  • PDF

Countermeasure to Underlying Security Threats in IoT communication (사물인터넷 통신기술에 내재된 보안위협과 대응 전략)

  • Mun, Hyung-Jin;Choi, Gwang-Houn;Hwang, Yooncheol
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.2
    • /
    • pp.37-43
    • /
    • 2016
  • Due to the remarkable improvement of ICT, with the popularization of mobile devices and every sector of society connected by networks, an era, in which peer to peer, peer to thing, thing to thing can be connected to one another everywhere, has begun. As all the electronic devices are connected to Internet, they have become more intellectualized and automated, making convergence and process of information through the connection of the devices possible to provide a lot better services. However, those devices communicate mutually to send information and they are exposed to various security threats. Therefore, this study analyzes ZigBee, CoAP, MQTT, XMPP, which are communication-related technology of IoT, draws security threats they have, and suggests requirements that components of IoT should have. Plus, it examines real cases about security threats in IoT, and suggests a countermeasure so as to contribute to establishment of a basis for IoT to be used much more safely in the future.

Service Configuration Method between MThings (IoMT에서 MThing간 서비스 연동 기법)

  • Kum, Seungwoo;Moon, Jaewon
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2021.06a
    • /
    • pp.168-169
    • /
    • 2021
  • 최근 미디어 기반 분석 기술의 활성화에 따라 국제 표준 기구인 ISO/IEC는 미디어 관련 분석 및 제어 기술에 대한 표준화를 진행하고 있다. ISO/IEC SC29 WG7은 Internet of Media Thing (IoMT) 이라는 기술명으로 Internet of Thing (IoT) 기술을 이용하여 미디어 기반 분석 서비스의 제공을 위한 인터페이스 기술에 대한 표준화를 진행 중이며, 이는 IoMT를 통한 미디어 취득 기기 및 센서 기기, 미디어 분석 기기, 미디어 저장 및 표현 기기에 대한 인터페이스를 정의하고 있다. 기본적으로 이 표준은 IoT 기법을 기반으로 하고 있는 데, IoT 기법은 서비스 제공자 - 소비자의 peer to peer 서비스 관리 기법으로 다양한 기기간 연동을 제공하는 미디어 기기간의 서비스 구성의 적용을 위해서는 연계에 대한 고려가 추가로 필요하다. 본 논문에서는 상기와 같은 IoMT 기반의 미디어 서비스 구성에 있어 IoMT 기기간 연계를 보다 손쉽게 설정하고 구성할 수 있는 서비스 연동 기법에 대한 요구사항을 검토하고 해결 방안을 검토한다. 단일 기기에 대한 제어와 달리 다양한 기기간의 밀접한 연계를 통한 미디어 서비스에 대하여, 본 논문은 각 기기간 연결을 autonomous하게 수행할 수 있는 별도의 IoMT 기기를 제시하여 해당 기기간 연계 기법을 제시한다. 이 과정에서 별도의 IoMT 기기가 제공해야 할 요구사항 및 주요 기능에 대한 척도를 함께 제시한다.

  • PDF

The Research on Blockchain-based Secure loT Authentication (블록체인 기반 사물인터넷 인증 연구)

  • Hong, Sunghyuck;Park, Sanghee
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.11
    • /
    • pp.57-62
    • /
    • 2017
  • With various sensors and communications capabilities, the Internet is growing larger as the internet can communicate with the Internet. Given the growing vulnerability of the internet market, the development of security and security is increasing, and the development of the internet is actively evolving and the development of the internet is actively being carried out. In particular, it is required to introduce lightweight and secure authentication schemes, especially those that are difficult to use due to the difficulty of using authentication schemes. Thus, the safety of the secure authentication system of the Internet is becoming very important. Therefore, in this thesis, we propose certification technologies on secure objects to ensure correct, safe communication in the context of the internet context.

Interpretive Structural Modeling in the Adoption of IoT Services

  • Kim, Yonghee;Park, Youngju;Song, Gwangsuk
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1184-1198
    • /
    • 2019
  • This study aims to use ISM to identify the enablers affecting the acceptance of IoT services. For this purpose, this study conducted an ISM analysis and a MICMAC analysis, extracted the enablers from Internet of Things - An Action Plan for Europe published by the EU for the research, and conducted interviews and surveys. The study found that it would be preferentially necessary to prepare the base for successful IoT services through international cooperation and the security of objective data. In addition, it turned out that it would be necessary to make efforts to spread and develop IoT services by conducting R&D and implementing projects through public-private partnerships and the organization of a consultative group. Lastly, since information security and standardization are the desired objects of the IoT industry, it was found that both the government and the industrial world should focus on them. This study has significance in that it can provide practical implications for the effective acceptance of IoT services.

Economic Damage Model on Industries due to Internet Attack and A Case Study (인터넷 침해사고로 인한 기업의 경제적인 피해 산출 모델 및 케이스 연구)

  • Jang, Jong-Ho;Chung, Ki-Hyun;Choi, Kyung-Hee
    • The KIPS Transactions:PartC
    • /
    • v.15C no.3
    • /
    • pp.191-198
    • /
    • 2008
  • Because of the internet development, most of people can acquire the information freely. But it have the disadvantages. A remarkable thing among the disadvantages is the internet attack. Internet attacks were given damages to several fields. Specially, the damage is terrible to the economic side. Specially, company is susceptive to economic damage side. But it didn't execute a research about model that estimates damage to the economic side due to internet attacks. This paper presents a model that estimates the damage to economic side due to internet attacks.

A Proposal for Approaching Internet to Interior Design firm Management Strategy (인테리어 사무실 경영 전략을 위한 인터넷의 활용 제안)

  • 최용수
    • Korean Institute of Interior Design Journal
    • /
    • no.33
    • /
    • pp.99-105
    • /
    • 2002
  • As a new environment, the Internet proposes to us the innovation of our life. New information technologies(IT) have enabled and stimulated new organizational forms. Electronic Commerce is the new economy that changes the pattern of our life and the form of business transaction. Electronic Commerce is rapidly growing due to the increasing of internet user and the development of information technology. With the emergence of the Internet, a totally new business, the electronic commerce(EC) is emerging. Internet EC brings in many benifits to the organization such as reduced costs, fast turnaround, better customer service, and in some firms strategic advantage over their competitors. As a newly created interior design paradigm, this proposal presents its utmost advantage, interlocking interior design firm management with virtual reality of internet. Appropriately interacting on-line with off-line in virtual reality of internet improves the image of interior design firm and makes the best use of its identity in marketing. This application can rightly attract consumers' interest. Analyzing the market, the most important thing in marketing is to anticipate consumers' existing and possible demand in future. In other word, servicing consumers with idea efficiently is competence. As the point of management, to maximize managing value in interior design proposes the application of internet to management strategy of interior design firm