• Title/Summary/Keyword: IoT 기반 관리

Search Result 574, Processing Time 0.032 seconds

Image Processing System based on Deep Learning for Safety of Heat Treatment Equipment (열처리 장비의 Safety를 위한 딥러닝 기반 영상처리 시스템)

  • Lee, Jeong-Hoon;Lee, Ro-Woon;Hong, Seung-Taek;Kim, Young-Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.6
    • /
    • pp.77-83
    • /
    • 2020
  • The heat treatment facility is in a situation where the scope of application of the remote IOT system is expanding due to the harsh environment caused by high heat and long working hours among the root industries. In this heat treatment process environment, the IOT middleware is required to play a pivotal role in interpreting, managing and controlling data information of IoT devices (sensors, etc.). Until now, the system controlled by the heat treatment remotely was operated with the command of the operator's batch system without overall monitoring of the site situation. However, for the safety and precise control of the heat treatment facility, it is necessary to control various sensors and recognize the surrounding work environment. As a solution to this, the heat treatment safety support system presented in this paper proposes a support system that can detect the access of the work manpower to the heat treatment furnace through thermal image detection and operate safely when ordering work from a remote location. In addition, an OPEN CV-based deterioration analysis system using DNN deep learning network was constructed for faster and more accurate recognition than general fixed hot spot monitoring-based thermal image analysis. Through this, we would like to propose a system that can be used universally in the heat treatment environment and support the safety management specialized in the heat treatment industry.

Design and Diagnosis Case of Energy Eefficiency Diagnostic Solution based on IoT (사물인터넷 기반 에너지 효율 진단 솔루션의 설계 및 진단 사례)

  • Cho, Kwangmoon
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.1
    • /
    • pp.23-30
    • /
    • 2020
  • This paper proposes energy management directions to discover the factors of energy loss in homes and buildings and to find ways to improve them. We designed a diagnostic content app for everyday life so that not only housing experts but also the general public can use the detachable thermal imaging camera, which is a strong point of popularity and convenience. The diagnostic results using the app were analyzed using Energy Finder, an energy efficiency diagnostic solution. The survey was conducted on the senior center which is in the blind spots and facilities of the energy welfare area. The target of diagnosis was energy efficiency diagnosis by selecting 30 senior centers for over 15 years from 600 locations located in Naju City, Jeollanam-do. The overall diagnosis was good, but it is considered that the place classified as 7th grade needs to be supplemented to improve energy efficiency.

Implementation of Intelligent Medical Image Retrieval System HIPS (지능형 의료영상검색시스템 HIPS 구현)

  • Kim, Jong-Min;Ryu, Gab-Sang
    • Journal of Internet of Things and Convergence
    • /
    • v.2 no.4
    • /
    • pp.15-20
    • /
    • 2016
  • This paper describes the construction of knowledge data retrieval management system based on medical image CT. The developed system is aimed to improve the efficiency of the hospital by reading the medical images using the intelligent retrieval technology and diagnosing the patient 's disease name. In this study, the medical image DICOM file of PACS is read, the image is processed, and feature values are extracted and stored in the database. We have implemented a system that retrieves similarity by comparing new CT images required for medical treatment with the feature values of other CTs stored in the database. After converting 100 CT dicom provided for academic research into JPEG files, Code Book Library was constructed using SIFT, CS-LBP and K-Mean Clustering algorithms. Through the database optimization, the similarity of the new CT image to the existing data is searched and the result is confirmed, so that it can be utilized for the diagnosis and diagnosis of the patient.

Fast Detection of Disease in Livestock based on Deep Learning (축사에서 딥러닝을 이용한 질병개체 파악방안)

  • Lee, Woongsup;Kim, Seong Hwan;Ryu, Jongyeol;Ban, Tae-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.5
    • /
    • pp.1009-1015
    • /
    • 2017
  • Recently, the wide spread of IoT (Internet of Things) based technology enables the accumulation of big biometric data on livestock. The availability of big data allows the application of diverse machine learning based algorithm in the field of agriculture, which significantly enhances the productivity of farms. In this paper, we propose an abnormal livestock detection algorithm based on deep learning, which is the one of the most prominent machine learning algorithm. In our proposed scheme, the livestock are divided into two clusters which are normal and abnormal (disease) whose biometric data has different characteristics. Then a deep neural network is used to classify these two clusters based on the biometric data. By using our proposed scheme, the normal and abnormal livestock can be identified based on big biometric data, even though the detailed stochastic characteristics of biometric data are unknown, which is beneficial to prevent epidemic such as mouth-and-foot disease.

RFID Tag Ownership Relocation Protocol Based on Trusted Third Party (신뢰받는 제3자 기반의 RFID 태그 소유권 이전 프로토콜)

  • Kim, Young-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.3
    • /
    • pp.568-574
    • /
    • 2015
  • Recently RFID not only is widely utilized in various fields such as inventory management, merchandize logistics, etc., but also, has evolved as an important component of the Internet of Things (IoT). According to increasing the utilization field of RIFD, studies for security and privacy for RFID system have been made diverse. Among them, the ownership transfer protocols for RFID tags have also been proposed in connection with the purchase of products embedded with RFID tag. Recently, Kapoor and Piramuthu proposed a RFID ownership transfer protocol to solve the problems of security weakness of the previous RFID ownership transfer protocols. In this paper, we show that Kapoor-Piramuthu's protocol also has security problems and provide a new protocol to resolve them. Security analysis of newly proposed protocol shows the security concerns are resolved.

A Study on the Safety Monitoring of Bridge Facilities based on Smart Sensors (스마트 센서 기반의 교량 시설물 안전 모니터링 기법 연구)

  • YEON, Sang-Ho;KIM, Joon-Soo;YEON, Chun-Hum
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.22 no.2
    • /
    • pp.97-106
    • /
    • 2019
  • Today, many smart sensor's measurement instruments are used to check the safety situation of various medium and large bridge structures that should be maintained in the construction facilities, but most of them use the method of measuring and confirming the displacement behavior of the bridge at regular intervals. In order to continuously check the safety situation, various measuring instruments are used, but most of them are not able to measure and measure the displacement and behavior of main construction structures at regular intervals. In this study, GNSS and environment smart sensors and drone's image data are transmitted to wireless network so that risk of many bridge's structures can be detected beforehand. As a result, by diagnosing the fine displacement of the bridge in real time and its condition, reinforcement, repair and disaster prevention measures for the structural parts of the bridges, which are expected to be dangerous, and various disasters and accidents can be prevented, and disaster can be prevented could suggest a new alternative.

Chaincode-based File Integrity Verification Model (체인코드 기반의 파일 무결성 검증 모델)

  • Kim, Hyo-Jong;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.4
    • /
    • pp.51-60
    • /
    • 2021
  • Recent advances in network and hardware technologies have led to active research and multiple network technologies that fuse blockchain technologies with security. We propose a system model that analyzes technologies using existing blockchain and verifies the integrity of files using private blockchain in a limited environment. The proposed model can be written as a chain code of Hyperleisure Fabric, a private blockchain platform, and verified for integrity of files through Hyperleisure Explorer, a private blockchain integrated management platform. The system performance of the proposed model was analyzed from a developer perspective and from a user perspective. As a result of the analysis, there are compatibility problems according to the version of various modules to run the blockchain platform, and only limited elements such as chain code status and groups can be checked.

User Dynamic Access Control Mechanism Using Smart Contracts in Blockchain Environment (블록체인 환경에서 스마트 컨트랙트를 활용한 사용자 동적 접근제어 메커니즘)

  • Cho, Do-Eun
    • Journal of Platform Technology
    • /
    • v.9 no.1
    • /
    • pp.46-57
    • /
    • 2021
  • Recently, research has been actively conducted to utilize blockchain technology in various fields. In particular, blockchain-based smart contracts are applied to various automation systems that require reliability as they have the characteristics of recording data in a distributed ledger environment to verify the integrity and validity of data. However, blockchain does not provide data access control and information security because data is shared among network participants. In this paper, we propose a user dynamic access control mechanism utilizing smart contracts in blockchain environments. The proposed mechanism identifies the user's contextual information when accessing data, allocating the user's role and dynamically controlling the data access range. This can increase the security of the system and the efficiency of data management by granting data access dynamically at the time of user authentication, rather than providing the same services in roles assigned to each user group of the network system. The proposed mechanism is expected to provide flexible authentication capabilities through dynamic data access control by users to enhance the security of data stored within blockchain networks.

Development of soil moisture satellite and ground observation data synchronization techniques (중권역 단위 토양수분 위성 및 지상 관측자료 동기화 기법 개발)

  • Jae Beom Lee;Jeong-Seok Yang;Yeon Kyeong Han;Shin Young Joo;Ui Geon Jeong
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.372-372
    • /
    • 2023
  • 강우 유출 시 지표면 토양수분포화도는 직접유출량 및 지하수 저류에 영향을 미칠 수 있기 때문에 강우에 의한 유역 유출량 산정에서 토양수분포화도는 보다 실제와 유사한 모의 결과를 도출하는데 중요한 인자가 될 수 있다. 기존의 모형 기반의 유출량 산정 연구에서 토양수분포화도의경우 강수량, 하천수위, 유량, 지하수위 등 타 수문순환 요소에 비하여 관측 지점 및 관측 자료가 부족하기 때문에 유역 내 수문환경 특성에 따라 가정 된 값을 입력하여 유출량을 산정하였다. 최근 IoT, 5G 통신 등 정보 기술의 혁신과 이상 홍수에 의한 피해 저감을 위한 실시간 유출량 해석 모형 개발 등에 적용할 경우 모의 결과가 실제와 매우 다르게 나타나는 경우가 발생할 수 있다. 본 연구에서는 토양수분포화도의 지상 관측 자료와 위성 관측 자료를 동기화 하는 기법을 개발함으로써 중권역 단위의 유출량 산정 정확도를 향상시키고자 하였다. 기존의 지상 관측 자료는 토양수분포화도의 비교적 정확한 데이터를 제공하나 관측 자료를 유역의 대푯값으로 적용할 수 있는 지에 대한 추가 검증이 필요하다. 위성 관측자료는 유역 전반의 토양수분포화도 정보를 관측할 수 있으나 고해상도의 자료를 제공하지 못하기 때문에 유역 전체에 일관된 데이터를 적용할 수밖에 없는 한계가 발생한다. 지상 관측자료와 위성관측자료의 동기화 기법을 개발함으로써 본 연구진은 중권역 단위의 유역 내 비교적 정확한 토양수분포화도 데이터를 적용할 수 있도록 하였다. 본 연구의 결과물은 유출량 해석 결과의 정확도를 높임으로써 급격한 호우 사상 발생에 따른 이상홍수에 대응할 수 있는 유역 물 관리 대책의 기초 자료로 활용 할 수 있을 것으로 기대된다.

  • PDF

Analyses of Security Issues and Vulnerability for Healthcare System For Under Internet of Things (사물인터넷과 융합한 헬스케어 시스템에서의 보안 이슈 및 취약점 분석)

  • Jung Tae Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.699-706
    • /
    • 2023
  • Recently, the 4 generation industry revolution is developed with advanced and combined with a variety of new technologies. Conventional healthcare system is applied with IoT application. It provides many advantages with mobility and swift data transfers to patient and doctor. In despite of these kinds of advantages, it occurred security issues between basic devices and protocols in their applications. Especially, internet of things have restricted and limited resources such as small memory capacity, low capability of computing power, etc. Therefore, we can not utilize conventional mechanism. In this paper, we analyzed attacks and vulnerability in terms of security issues. To analyze security structure, features, demands and requirements, we solve the methods to be reduced security issues.