• Title/Summary/Keyword: Internet-of-Things

Search Result 2,800, Processing Time 0.032 seconds

Development of an IoT Smart Sensor for Detecting Gaseous Materials (사물인터넷 기술을 이용한 가스상 물질 측정용 스마트센서 개발과 향후과제)

  • Kim, Wook;Kim, Yongkyo;You, Yunsun;Jung, Kihyo;Choi, Won-Jun;Lee, Wanhyung;Kang, Seong-Kyu;Ham, Seunghon
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.32 no.1
    • /
    • pp.78-88
    • /
    • 2022
  • Objectives: To develop the smart sensor to protect worker's health from chemical exposure by adopting ICT (Information and Communications Technology) technologies. Methods: To develope real-time chemical exposure monitoring system, IoT (Internet of Things) sensor technology and regulations were reviewed. We developed and produced smart sensor. A smart sensor is a system consisting of a sensor unit, a communication unit, and a platform. To verify the performance of smart sensors, each sensor has been certified by the Korea Laboratory Accreditation Scheme (KOLAS). Results: Chemicals (TVOC; Total Volatile Organic Compounds, Cl2: Chlorine, HF: Hydrogen fluoride and HCN: Hydrogen cyanide) were selected according to a priority logic (KOSHA Alert, acute poisoning statistics, literature review). Notifications were set according to OEL (occupational exposure limit). Sensors were selected based on OEL and the capabilities of the sensors. Communication is designed to use LTE (Long Term Evolution) and Wi-Fi at the same time for convenience. Electronic platform were applied to build this monitoring system. Conclusions: Real-time monitoring system for OEL of hazardous chemicals in workplace was developed. Smart sensor can detect chemicals to complement monitoring of traditional workplace environmental monitoring such as short term and peak exposure. Further research is needed to expand the scope of application, improve reliability, and systematically application.

Development of Smart Livestock Disease Control Strategies and Policy Priorities (스마트 가축방역 추진전략 및 정책 우선순위)

  • Lee, Jeongyoung;Ko, Sang Min;Kim, Meenjong;Ji, Yong Gu;Kim, Hoontae
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.109-126
    • /
    • 2018
  • With massive and dense production, the livestock industry is rapidly moving into a large-scale, capital-intensive industry especially in swine, poultry, and ducks. However, livestock epidemics can pose a serious threat to the livestock industry and the lives of the people. The government has established and operates the National Animal Protection and Prevention System (KAHIS) since 2013 in order to control the threat, in accordance with the five stages. The digitalized data and information are excellent in ease of management, but it is also pointed out that it is difficult to take countermeasures through linkage with the data in an emergency situation. Recently, the technology of the fourth industrial revolution such as Internet of Things (IoT), Big Data, Artificial intelligence (AI) has been rapidly implemented to the livestock industry, which makes smart livestock disease control system possible. Therefore, this study investigated the domestic and overseas cases which apply 4th Industrial Revolution technology in the industry, and derived 13 possible candidate tasks in the near future. In order to ascertain the priority of policy formulation, we surveyed the expert groups and examined the priority of each of the five stages of the prevention and the priority of each stage. The results of this study are expected to contribute to the establishment of policies for the advancement of smart livestock disease control research and livestock protection.

A Study on the Application of Modularization Technique to Standard Security Policy to Protect Information Assets and the Securement of Confidentiality and Integrity (정보자산 보호를 위한 표준 보안정책 모듈화 기법 적용과 기밀성 및 무결성 확보를 위한 연구)

  • Seo, Woo-Seok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.1
    • /
    • pp.111-118
    • /
    • 2019
  • For the security of a vast amount of information, it has been started to diagnose the site as a way of operating and managing the information owned by a company holding assets, to establish indexes to check the actual status and all kinds of standards to obtain security, and also to classify the information assets based on that. This has been extended to many different areas including policies to operate and manage information assets, services, the management of owned devices as physical assets, and also the management of logical assets for application software and platforms. Some of these information assets are already being operated in reality as new technology in new areas, for example, Internet of Things. Of course, a variety of electronic devices like Smart Home are being used in ordinary families, and unlike in the past, these devices generate a series of information life cycles such as accumulating and processing information. Moreover, as even distribution is now being realized, we are facing a task to secure the stability of information assets and also information that assets are holding. The purpose of this study is to suggest and apply standard security policy by moduling methods for information assets owned by companies and even families and obtain the enhancement of confidentiality as well as integrity.

Comparison of the sound source localization methods appropriate for a compact microphone array (소형 마이크로폰 배열에 적용 가능한 음원 위치 추정법 비교)

  • Jung, In-Jee;Ih, Jeong-Guon
    • The Journal of the Acoustical Society of Korea
    • /
    • v.39 no.1
    • /
    • pp.47-56
    • /
    • 2020
  • The sound source localization technique has various application fields in the era of internet-of-things, for which the probe size becomes critical. The localization methods using the acoustic intensity vector has an advantage of downsizing the layout of the array owing to a small finite-difference error for the short distance between adjacent microphones. In this paper, the acoustic intensity vector and the Time Difference of Arrival (TDoA) method are compared in the viewpoint of the localization error in the far-field. The comparison is made according to the change of spacing between adjacent microphones of the three-dimensional microphone array arranged in a tetrahedral shape. An additional test is conducted in the reverberant field by varying the reverberation time to verify the effectiveness of the methods applied to the actual environments. For estimating the TDoA, the Generalized Cross Correlation-Phase transform (GCC-PHAT) algorithm is adopted in the computation. It is found that the mean localization error of the acoustic intensimetry is 2.9° and that of the GCC-PHAT is 7.3° for T60 = 0.4 s, while the error increases as 9.9°, 13.0° for T60 = 1.0 s, respectively. The data supports that a compact array employing the acoustic intensimetry can localize of the sound source in the actual environment with the moderate reflection conditions.

Classification of Environmental Industry and Technology Competitiveness Evaluation (환경산업기술 분류체계 및 기술 경쟁력 평가)

  • Han, Daegun;Bae, Young Hye;Kim, Tae-Yong;Jung, Jaewon;Lee, Choongke;Kim, Hung Soo
    • Journal of Wetlands Research
    • /
    • v.22 no.4
    • /
    • pp.245-256
    • /
    • 2020
  • The purpose of this study is to evaluate the technological competitiveness of the environmental industry with developed countries in order to establish an international market expansion strategy of the Korean environmental industry and technology. In order to evaluate the competitiveness of the environmental industry and technology, core technologies were classified by the environmental industry sectors based on the classification system of the domestic and international environmental industry and technology. After developing the evaluation index data, the Delphi analysis, journal and patent analysis, as well as the export and import analysis were carried out and the standardization analysis was performed on the index data. Moreover, the weights of each evaluation index were calculated using the AHP(Analytic Hierarchy Process) method and the evaluation results of competitiveness of the environmental industry and technology in Korea, the United States, the United Kingdom, Germany, and France were derived. As a result of the evaluation, the United States was rated with the highest technological competitiveness in all the environmental industry sectors, while Korea got the lowest technological competitiveness rating compared to the 4 developed countries. In particular, Korea got the lowest level of technological competitiveness in the sector of multi-media environmental management and development for a sustainable social system. Therefore, in order for the Korean environmental industry and technology to enter the global advanced market, it is necessary to strengthen the competitiveness through the development of the fourth environmental industry based on IoT(Internet of Things), cloud, big data, mobile, and AI(Artificial Intelligence), which are currently the country's domestic strengths.

Process of Social Stigma on Behavioral Addictions -The Attribution Affection Theory applied - (행위중독에 대한 사회적 낙인과정 - 귀인정서이론 적용 -)

  • Park, Keun Woo;Seo, Mi Kyung
    • Korean Journal of Social Welfare
    • /
    • v.69 no.3
    • /
    • pp.241-265
    • /
    • 2017
  • This study was conducted to propose anti-stigma strategies by verifying the social stigma on behavioral addiction under the premise that social stigma is a main obstacle to the treatment of addiction. A research model was constructed by applying the attribution affection theory and the modified attribution affection theory, which are very useful for explaining emotional and behavioral responses to the persons with mental illness. In other words, when attributing the causes of behavioral addiction to the personally controllable things such as personality, will and lifestyle, social distance can be increased by the mediate of anger. However, when attributing the causes of behavioral addiction to biological factors that can not be controlled by an individual, there can exist two pathway, one is the arising of helping behaviors by the mediate of sympathy (the attribution affection theory), and the other is the aggravation in the social distance due to rising fear (the modified attribution affection theory). In order to verify the research model, 383 adult subjects mainly in South Gyeongsang Province were randomly presented with the vignettes of gambling addiction and internet game addiction, and asked about the causes of the problems and their emotional, prejudicial, and behavioral responses to them. As a result, all pathway had statistically significant predictive effect. Therefore, in the case of attributing to personal causes, social distance increased by the mediate of anger. In the case of attributing to biological causes, both pathway had significant predictive effect, but the indirect effect of the pathway predictive of the helping behavior by the mediate of sympathy was greater. Researchers suggested that anti-stigma strategies, which emphasize that behavioral addiction is a mental health problem requiring treatment, are necessary.

  • PDF

An Enhanced System of Group Key Management Based on MIPUF in IoT (IoT 환경의 MIPUF 기반 그룹키 관리 시스템 개선)

  • Tak, Geum Ji;Jeong, Ik Rae;Byun, Jin Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1243-1257
    • /
    • 2019
  • With the emergence of the IoT environment, various smart devices provide consumers with the convenience and various services. However, as security threats such as invasion of privacy have been reported, the importance of security issues in the IoT environment has emerged, and in particular, the security problem of key management has been discussed, and the PUF has been discussed as a countermeasure. In relation to the key management problem, a protocol using MIPUF has been proposed for the security problem of the group key management system. The system can be applied to lightweight IoT environments and the safety of the PUF ensures the safety of the entire system. However, in some processes, it shows vulnerabilities in terms of safety and efficiency of operation. This paper improves the existing protocol by adding authentication for members, ensuring data independence, reducing unnecessary operations, and increasing the efficiency of database searches. Safety analysis is performed for a specific attack and efficiency analysis results are presented by comparing the computational quantities. Through this, this paper shows that the reliability of data can be improved and our proposed method is lighter than existing protocol.

A Study on Analysis of Importance-Performance on Teacher Librarians' Competencies (사서교사 직무 역량에 대한 중요도·만족도 분석)

  • Lee, Seung-Min;Lim, Jeong-Hoon;Kang, Bong-Suk;Lee, Byeong-Kee
    • Journal of Korean Library and Information Science Society
    • /
    • v.52 no.3
    • /
    • pp.177-196
    • /
    • 2021
  • The purpose of this study is to analyze priorities of competencies and to find the direction of development of teacher librarian training and retraining program. A total of 238 subjects were used for the final analysis. They were analayzed using IPA, Borich's needs analysis and the Locus for Focus model. As a result, First, teacher librarians perceived that the importance and performance of teacher and manager competency were higher than information specialist and cooperative leader. Second, they needed competencies of data-science, coding, Internet of Things in the field of information specialist as changing educational environment. Third, they needed competencies of information ethics, copyright instruction, and digital and media literacy education in the field of teacher. Fourth, they needed competencies of facility designing for future education, online and offline school library marketing skills, and establishment of makerspaces and learning commons in the field of ibrary manager. Fifth, they needed competencies of library based instruction, library cooperative instruction, and building a collection related to subject in the field of cooperative leader. Sixth, the highest required competency for teacher librarians was suggested for teacher librarians' role area.

Evaluation of Compaction Quality Control applied the Dynamic Cone Penetrometer Test based on IoT (다짐품질관리를 위한 IoT 기반 DCPT 적용 평가)

  • Jisun, Kim;Jinyoung, Kim;Namgyu, Kim;Sungha, Baek;Jinwoo, Cho
    • Journal of the Korean Geosynthetics Society
    • /
    • v.21 no.4
    • /
    • pp.1-12
    • /
    • 2022
  • Generally, the plate load test and the field density test are conducted for compaction quality control in earthwork, and then additional analysis. Recently developed that the DCPT (Dynamic Cone Penetration Test) equipment for smart compaction quality control its the system are able to get location and real-time information about worker history management. The IoT-based the DCPT system improved the time-cost in the field compared traditional test, and the functions recording and storage of the DPI (Dynamic Cone Penetration Index) were automated. This paper describes using these DCPT equipment on in-situ and compared to the standards of the DCPT, and the compaction trend had be confirmed with DPI as the field test data. As a result, the DPI of the final compaction decreased by 1.4 times compared to the initial compaction, confirming the increase in the compaction strength of the subgrade compaction layer 10 to 14 cm deep from the surface. A trend of increasing compaction strength was observed. This showed a tendency to increase the compaction strength of the target DPI proposed by MnDOT and the results of the existing plate load test, but there was a difference in the increase rate. Therefore, additional studies are needed on domestic compaction materials and laboratory conditions for target DPI and correlation studies with the plate load tests. If this is reflected, it is suggested that DCPT will be widely used as smart construction equipment in earthworks.

IPC Code Based Analysis of Technology Convergence of the IoT Patents in South Korea, China, and Japan : Focusing on PCT International Applications (한중일 사물인터넷(IoT) 관련 특허의 IPC 코드 기반 기술융복합 분석 : PCT 국제출원을 중심으로)

  • Shim, Jaeruen
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.7
    • /
    • pp.949-955
    • /
    • 2020
  • In this Study, Social Network Analysis of IoT related patents in South Korea, China, and Japan was conducted from the viewpoint of patent informatics. To this end, 2,526 patents filed by PCT until December 2019 were investigated up to the subclass level of the IPC code. As a result, in the case of South Korea, representative IPC codes are in the order of G06Q, H04L, G06F, H04W, and the highest frequency of interconnection is H04L→H04W, H04W→H04L, H04W→H04B. In China, the representative IPC codes are in the order of H04L, H04W, G05B, G06Q. South Korea has strong technological convergence centered on the G06Q, while China has strong convergence centered around H04L and H04W. Moreover, in China, H04L and H04W have more diverse combinations than in South Korea in Section A, B, G, and H. In the future, it is necessary to study the diversity of technology convergence of H04L and H04W in China.