• Title/Summary/Keyword: Internet-of-Things

Search Result 2,782, Processing Time 0.03 seconds

News Article Analysis of the 4th Industrial Revolution and Advertising before and after COVID-19: Focusing on LDA and Word2vec (코로나 이전과 이후의 4차 산업혁명과 광고의 뉴스기사 분석 : LDA와 Word2vec을 중심으로)

  • Cha, Young-Ran
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.9
    • /
    • pp.149-163
    • /
    • 2021
  • The 4th industrial revolution refers to the next-generation industrial revolution led by information and communication technologies such as artificial intelligence (AI), Internet of Things (IoT), robot technology, drones, autonomous driving and virtual reality (VR) and it also has made a significant impact on the development of the advertising industry. However, the world is rapidly changing to a non-contact, non-face-to-face living environment to prevent the spread of COVID 19. Accordingly, the role of the 4th industrial revolution and advertising is changing. Therefore, in this study, text analysis was performed using Big Kinds to examine the 4th industrial revolution and changes in advertising before and after COVID 19. Comparisons were made between 2019 before COVID 19 and 2020 after COVID 19. Main topics and documents were classified through LDA topic model analysis and Word2vec, a deep learning technique. As the result of the study showed that before COVID 19, policies, contents, AI, etc. appeared, but after COVID 19, the field gradually expanded to finance, advertising, and delivery services utilizing data. Further, education appeared as an important issue. In addition, if the use of advertising related to the 4th industrial revolution technology was mainstream before COVID 19, keywords such as participation, cooperation, and daily necessities, were more actively used for education on advanced technology, while talent cultivation appeared prominently. Thus, these research results are meaningful in suggesting a multifaceted strategy that can be applied theoretically and practically, while suggesting the future direction of advertising in the 4th industrial revolution after COVID 19.

Study on Development of LED Camping Light Design Based on IOT and Emotional Lighting Contents (IOT 및 감성조명 콘텐츠 기반의 LED 캠핑등 디자인 개발에 관한 연구)

  • Kim, Hee-Jun
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.12
    • /
    • pp.332-342
    • /
    • 2018
  • This study is aimed at suggesting information about technical choices for designing LED camping lights based on emotional lighting contents of integrated IOT and design areas which take a central role in creation and knowledge based industries and the procedure for materializing them. 'i-Light,' a portable LED camping light, is 'connected lighting' connecting men, space and emotion and a smart camping light based on IOT and emotional lighting contents. 'i-Light' has two functions. One is about lighting for adjusting color and color temperature naturally and the other is about safety for detecting harmful gases. 'i-Light' also has various emotional functions for experiencing interaction and taste of light. For the purpose, portable LED camping lights were designed, first of all, and then a highly color rendering/full-color lighting module, a smart sensor module and an IOT device platform were developed. In addition, efforts were made to establish detailed data about emotional lighting contents and to develop a Web application based on them. Finally, prototypes of portable LED camping lights were made to get a test bench and usability evaluation from related organizations. According to the results, all of 12 developed emotional lighting contents and three IOT safety sensors were suitable and prototypes were satisfactory. This paper will suggest a direction about actual technical choices for development of contents and products integrating artificial intelligence and big data and about the procedure for materializing them.

A Study on the Technological Priorities of Manufacturing and Service Companies for Response to the 4th Industrial Revolution and Transformation into a Smart Company (4차 산업혁명 대응과 스마트 기업으로의 변화를 위한 제조 및 서비스 기업의 기술적용 우선순위에 대한 연구)

  • Park, Chan-Kwon;Seo, Yeong-Bok
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.4
    • /
    • pp.83-101
    • /
    • 2021
  • This study is to investigate, using AHP, what technologies should be applied first to Korean SMEs in order to respond to the 4th industrial revolution and change to a smart enterprise. To this end, technologies related to the 4th industrial revolution and smart factory are synthesized, and the classification criteria of Dae-Hoon Kim et al. (2019) are applied, but additional opinions of experts are collected and related technologies are converted to artificial intelligence (AI), Big Data, and Cloud Computing. As a base technology, mobile, Internet of Things (IoT), block chain as hyper-connected technology, unmanned transportation (autonomous driving), robot, 3D printing, drone as a convergence technology, smart manufacturing and logistics, smart healthcare, smart transportation and smart finance were classified as smart industrial technologies. As a result of confirming the priorities for technical use by AHP analysis and calculating the total weight, manufacturing companies have a high ranking in mobile, artificial intelligence (AI), big data, and robots, while service companies are in big data and robots, artificial intelligence (AI), and smart healthcare are ranked high, and in all companies, it is in the order of big data, artificial intelligence (AI), robot, and mobile. Through this study, it was clearly identified which technologies should be applied first in order to respond to the 4th industrial revolution and change to a smart company.

A Study on the Improvement for Bidet Product-Service Design for Seniors by PSS-based 4D Double Diamond Design Process Model (PSS 기반 4D 더블 다이아몬드 모델을 활용한 시니어를 위한 비데 제품-서비스디자인 개선방안 연구)

  • Seo, Hong-Seok
    • Science of Emotion and Sensibility
    • /
    • v.25 no.1
    • /
    • pp.29-40
    • /
    • 2022
  • This study uses the bidet 4D double diamond design process model to propose an improvement for "senior-oriented bidet product service design" that reflects the characteristics and needs of seniors. This study was based on the product service system concept. To this end, qualitative research on seniors was conducted to derive user value factors, and, based on this, product service ideas were discovered, and a prototype reflecting the usefulness review of a working-level expert group was proposed. First, a "smart application service for user-customized function setting guide" was proposed. A bidet incorporating Internet of Things technology and a smart phone are linked to provide an app service that automatically interprets user characteristic information and information on bidet products to guide customized functions. Second, a control panel and remote control user interface to "user-oriented product service interface" was proposed. In consideration of the usability and cognitive ability of seniors, a simple and intuitive physical user interface such as a configuration centered on main functions, button arrangement according to task sequence, and a touch screen remote control was presented. Third, we proposed a "bidet care service linked with products and health/hygiene care" that provides a wide range of services such as user health and hygiene, cleanliness, entertainment, etc., in addition to regular bidet product service. This study proposed a product-based service design methodology that can improve user experience and relationship quality by discovering and improving the pain points and needs of users (seniors) in the process of using bidet products (before, during, and after use).

A Study on the e-Document Development of Parcel Service for Reliable Delivery (택배 물류 안전 배송을 위한 전자문서 개발 연구)

  • Ahn, Kyeong Rim;Park, Chan Kwon
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.2
    • /
    • pp.47-59
    • /
    • 2016
  • Parcel service is to deliver goods from one place to the designated destination requested according to user request. Parcel operations such as sorting, distributing, etc. or the managed information are heterogeneous by the companies. Additionally, it is impossible to support interoperability between companies with unformatted data of manual processing. Most parcel package boxes attached to paper typed waybill is attached is delivered to consignee. So, security problems such as personal information leaking are occurred, or extra processing time and logistics costs are needed due to wrong or the damaged information. Business environment of parcel service is rapidly changed as introducing unmanned delivery or the advanced technology such as Internet of Things. User want to know the accurate status or steps from parcel service request to delivery. To provide these requirements, the unified and integrated waybill information for reliable transportation of parcel service is needed. This information will provide to pickup or delivery carrier, warehouse or terminal, and parcel service user per pickup, transport, and delivery stage of parcel delivery service. Therefore, this paper defines the simplified and unified information model for parcel service waybill by analyzing information systems used for logistics unit processes that is occurred to parcel service, and manual work processes, and developing the relevant information of work flows occurred between business processes or transactions with the collected or processed information by from parcel service's stages. It is possible to share these standard model between business entities, and replacing paper typed waybill will improve national life safety as preventing security threats by paper typed waybill. As a result, it will promote the public interest from the stakeholder's perspective.

The IEEE 802.15.4e based Distributed Scheduling Mechanism for the Energy Efficiency of Industrial Wireless Sensor Networks (IEEE 802.15.4e DSME 기반 산업용 무선 센서 네트워크에서의 전력소모 절감을 위한 분산 스케줄링 기법 연구)

  • Lee, Yun-Sung;Chung, Sang-Hwa
    • Journal of KIISE
    • /
    • v.44 no.2
    • /
    • pp.213-222
    • /
    • 2017
  • The Internet of Things (IoT) technology is rapidly developing in recent years, and is applicable to various fields. A smart factory is one wherein all the components are organically connected to each other via a WSN, using an intelligent operating system and the IoT. A smart factory technology is used for flexible process automation and custom manufacturing, and hence needs adaptive network management for frequent network fluctuations. Moreover, ensuring the timeliness of the data collected through sensor nodes is crucial. In order to ensure network timeliness, the power consumption for information exchange increases. In this paper, we propose an IEEE 802.15.4e DSME-based distributed scheduling algorithm for mobility support, and we evaluate various performance metrics. The proposed algorithm adaptively assigns communication slots by analyzing the network traffic of each node, and improves the network reliability and timeliness. The experimental results indicate that the throughput of the DSME MAC protocol is better than the IEEE 802.15.4e TSCH and the legacy slotted CSMA/CA in large networks with more than 30 nodes. Also, the proposed algorithm improves the throughput by 15%, higher than other MACs including the original DSME. Experimentally, we confirm that the algorithm reduces power consumption by improving the availability of communication slots. The proposed algorithm improves the power consumption by 40%, higher than other MACs.

Research on the Curriculum for Integration of ICT+Design (ICT+디자인 융합 교육과정 개발연구)

  • Jeong, Sang-Hoon
    • Science of Emotion and Sensibility
    • /
    • v.20 no.1
    • /
    • pp.105-114
    • /
    • 2017
  • Nowadays, novel and innovative technology including 3D printers, internet of things (IoT), and wearable devices are rapidly emerging. As we must constantly keep up with the most recent trends, words like convergence, multidisciplinarity, and design revolution indeed define society today. Due to the expansion of such diverse technological, industrial, and academic convergence trends, the role of design is becoming evermore essential in development of products as well as creative services. Even the government is pushing towards a 'creative economy' by encouraging ICT convergence to create novel industries as well as advanced jobs. In order to adapt flexibly to such changes in global trends, a solid academic curriculum centered around 'ICT+Design' must be developed. In the current research, we analyzed various literature and benchmarked the major universities both domestic and foreign. Also we utilized a survey-based approach against subjects who are experts or design specialists working in environments related to industry and research. In our proposed integrated ICT+Design educational curriculum, students familiarize themselves with design perspectives and methodology to creatively carry out the course. Moreover, experts from design and ICT came together in an act of 'Radical Collaboration' in which they shared their unique 'Design Thinking' in order to promote understanding and cooperation. Furthermore, industry experts have also taken part as mentors in order to create a workplace-oriented course with various integrated projects. Most importantly, the course was designed so that in addition to research, students can really get hands-on with their ideas in the creativity-integrated workplace.

Analysis of IoT Open-Platform Cryptographic Technology and Security Requirements (IoT 오픈 플랫폼 암호기술 현황 및 보안 요구사항 분석)

  • Choi, Jung-In;Oh, Yoon-Seok;Kim, Do-won;Choi, Eun Young;Seo, Seung-Hyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.7
    • /
    • pp.183-194
    • /
    • 2018
  • With the rapid development of IoT(Internet of Things) technology, various convenient services such as smart home and smart city have been realized. However, IoT devices in unmanned environments are exposed to various security threats including eavesdropping and data forgery, information leakage due to unauthorized access. To build a secure IoT environment, it is necessary to use proper cryptographic technologies to IoT devices. But, it is impossible to apply the technologies applied in the existing IT environment, due to the limited resources of the IoT devices. In this paper, we survey the classification of IoT devices according to the performance and analyze the security requirements for IoT devices. Also we survey and analyze the use of cryptographic technologies in the current status of IoT open standard platform such as AllJoyn, oneM2M, IoTivity. Based on the research of cryptographic usage, we examine whether each platform satisfies security requirements. Each IoT open platform provides cryptographic technology for supporting security services such as confidentiality, integrity, authentication an authorization. However, resource constrained IoT devices such as blood pressure monitoring sensors are difficult to apply existing cryptographic techniques. Thus, it is necessary to study cryptographic technologies for power-limited and resource constrained IoT devices in unattended environments.

Efficient Coverage Guided IoT Firmware Fuzzing Technique Using Combined Emulation (복합 에뮬레이션을 이용한 효율적인 커버리지 가이드 IoT 펌웨어 퍼징 기법)

  • Kim, Hyun-Wook;Kim, Ju-Hwan;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.847-857
    • /
    • 2020
  • As IoT equipment is commercialized, Bluetooth or wireless networks will be built into general living devices such as IP cameras, door locks, cars and TVs. Security for IoT equipment is becoming more important because IoT equipment shares a lot of information through the network and collects personal information and operates the system. In addition, web-based attacks and application attacks currently account for a significant portion of cyber threats, and security experts are analyzing the vulnerabilities of cyber attacks through manual analysis to secure them. However, since it is virtually impossible to analyze vulnerabilities with only manual analysis, researchers studying system security are currently working on automated vulnerability detection systems, and Firm-AFL, published recently in USENIX, proposed a system by conducting a study on fuzzing processing speed and efficiency using a coverage-based fuzzer. However, the existing tools were focused on the fuzzing processing speed of the firmware, and as a result, they did not find any vulnerability in various paths. In this paper, we propose IoTFirmFuzz, which finds more paths, resolves constraints, and discovers more crashes by strengthening the mutation process to find vulnerabilities in various paths not found in existing tools.

Approaches to Applying Social Network Analysis to the Army's Information Sharing System: A Case Study (육군 정보공유체계에 사회관계망 분석을 적용하기 위한방안: 사례 연구)

  • GunWoo Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.597-603
    • /
    • 2023
  • The paradigm of military operations has evolved from platform-centric warfare to network-centric warfare and further to information-centric warfare, driven by advancements in information technology. In recent years, with the development of cutting-edge technologies such as big data, artificial intelligence, and the Internet of Things (IoT), military operations are transitioning towards knowledge-centric warfare (KCW), based on artificial intelligence. Consequently, the military places significant emphasis on integrating advanced information and communication technologies (ICT) to establish reliable C4I (Command, Control, Communication, Computer, Intelligence) systems. This research emphasizes the need to apply data mining techniques to analyze and evaluate various aspects of C4I systems, including enhancing combat capabilities, optimizing utilization in network-based environments, efficiently distributing information flow, facilitating smooth communication, and effectively implementing knowledge sharing. Data mining serves as a fundamental technology in modern big data analysis, and this study utilizes it to analyze real-world cases and propose practical strategies to maximize the efficiency of military command and control systems. The research outcomes are expected to provide valuable insights into the performance of C4I systems and reinforce knowledge-centric warfare in contemporary military operations.