• Title/Summary/Keyword: IoT Applications

Search Result 477, Processing Time 0.023 seconds

Management of urban smart systems

  • De Lotto, Roberto
    • Smart Structures and Systems
    • /
    • v.30 no.3
    • /
    • pp.333-338
    • /
    • 2022
  • Planning activity is complex process assuming the term "complexity" as a group of elements interconnected each other. The common knowledge about city planning underlines its main aim as: figuring the present, imaging the future, governing every day the territory and the way people use and live it at different scales. When considering the strength of technological opportunities and the spreading of ICT and IoT devices within everyday life, that mean within the life of cities, the complex nature of the urban system increases with the intensification of information and their connections. Recent orientations about urban and regional planning try to carry the discipline to a more flexible approach in respect to the hyperdeterminant role of direct technical applications. This passage is a fundamental aspect considering the faster and faster modifications of social and economic assets at the global and local scale. At the same time, the "environment question" became more and more relevant at the worldwide scale within the 2015 UN 2030 Agenda for Sustainable Development. Another relevant aspect about the recent urban planning orientations regards the role of the different subjects that are part of the planning process. Approaching the government of smart cities means to define how every subject, with different roles (public or private), could enrich the knowledge of the functioning of the "urban machine" and the awareness of participation of people and city users in the quality of urban life. In the paper author starts defining recent approaches in urban planning, then the nature of the city as a complex system is analyzed from the point of view of planners and of the different subjects that act in the city. Then the smart city is introduced as a further level of complexity and finally author propose the basic element of a Planning Support System.

Performance Comparison of Task Partitioning Methods in MEC System (MEC 시스템에서 태스크 파티셔닝 기법의 성능 비교)

  • Moon, Sungwon;Lim, Yujin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.5
    • /
    • pp.139-146
    • /
    • 2022
  • With the recent development of the Internet of Things (IoT) and the convergence of vehicles and IT technologies, high-performance applications such as autonomous driving are emerging, and multi-access edge computing (MEC) has attracted lots of attentions as next-generation technologies. In order to provide service to these computation-intensive tasks in low latency, many methods have been proposed to partition tasks so that they can be performed through cooperation of multiple MEC servers(MECSs). Conventional methods related to task partitioning have proposed methods for partitioning tasks on vehicles as mobile devices and offloading them to multiple MECSs, and methods for offloading them from vehicles to MECSs and then partitioning and migrating them to other MECSs. In this paper, the performance of task partitioning methods using offloading and migration is compared and analyzed in terms of service delay, blocking rate and energy consumption according to the method of selecting partitioning targets and the number of partitioning. As the number of partitioning increases, the performance of the service delay improves, but the performance of the blocking rate and energy consumption decreases.

A semi-supervised interpretable machine learning framework for sensor fault detection

  • Martakis, Panagiotis;Movsessian, Artur;Reuland, Yves;Pai, Sai G.S.;Quqa, Said;Cava, David Garcia;Tcherniak, Dmitri;Chatzi, Eleni
    • Smart Structures and Systems
    • /
    • v.29 no.1
    • /
    • pp.251-266
    • /
    • 2022
  • Structural Health Monitoring (SHM) of critical infrastructure comprises a major pillar of maintenance management, shielding public safety and economic sustainability. Although SHM is usually associated with data-driven metrics and thresholds, expert judgement is essential, especially in cases where erroneous predictions can bear casualties or substantial economic loss. Considering that visual inspections are time consuming and potentially subjective, artificial-intelligence tools may be leveraged in order to minimize the inspection effort and provide objective outcomes. In this context, timely detection of sensor malfunctioning is crucial in preventing inaccurate assessment and false alarms. The present work introduces a sensor-fault detection and interpretation framework, based on the well-established support-vector machine scheme for anomaly detection, combined with a coalitional game-theory approach. The proposed framework is implemented in two datasets, provided along the 1st International Project Competition for Structural Health Monitoring (IPC-SHM 2020), comprising acceleration and cable-load measurements from two real cable-stayed bridges. The results demonstrate good predictive performance and highlight the potential for seamless adaption of the algorithm to intrinsically different data domains. For the first time, the term "decision trajectories", originating from the field of cognitive sciences, is introduced and applied in the context of SHM. This provides an intuitive and comprehensive illustration of the impact of individual features, along with an elaboration on feature dependencies that drive individual model predictions. Overall, the proposed framework provides an easy-to-train, application-agnostic and interpretable anomaly detector, which can be integrated into the preprocessing part of various SHM and condition-monitoring applications, offering a first screening of the sensor health prior to further analysis.

Ethics-Literacy Curriculum Modeling for Ethical Practice of 5G Information Professionals (5G 정보환경 정보전문가를 위한 윤리 리터러시 교육과정 모형연구)

  • Yoo, Sarah
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.33 no.1
    • /
    • pp.139-166
    • /
    • 2022
  • Ethical Issues increase when people engage in smart technological systems such as 5G, IoT, Cloud computing services and AI applications. Range of this research is comparison of various literacy concepts and its ethical issues in considering of 5G features and UX. 86 research papers and reports which have been published within the recent 5 years (2017-2022), relating the research subject, are investigated and analyzed. Two results show that various literacies can be grouped into four areas and that some of common issues among those areas as well as unique issues of each area are identified. Based on the literature analysis, an Operational Definition of Ethics-Literacy is presented and the model of ethics-literacy curriculum supporting ethical behavior of 5G information professionals is developed and suggested.

Efficient Access Management Scheme for Machine Type Communications in LTE-A Networks (LTE-A 네트워크 환경에서 MTC를 위한 효율적인 접근관리 기법)

  • Moon, Jihun;Lim, Yujin
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.1
    • /
    • pp.287-295
    • /
    • 2017
  • Recently, MTC (Machine Type Communication) is known as an important part to support IoT (Internet of Things) applications. MTC provides network connectivities between MTC devices without human intervention. In MTC, a large number of devices try to access over communication resource with a short period of time. Due to the limited communication resource, resource contention becomes severe and it brings about access failures of devices. To solve the problem, it needs to regulate device accesses. In this paper, we present an efficient access management scheme. We measure the number of devices which try to access in a certain time period and predict the change of the number of devices in the next time period. Using the predicted change, we control the number of devices which try to access. To verify our scheme, we conduct experiments in terms of success probability, failure probability, collision probability and access delay.

Analyses of Security Issues and Vulnerability for Healthcare System For Under Internet of Things (사물인터넷과 융합한 헬스케어 시스템에서의 보안 이슈 및 취약점 분석)

  • Jung Tae Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.699-706
    • /
    • 2023
  • Recently, the 4 generation industry revolution is developed with advanced and combined with a variety of new technologies. Conventional healthcare system is applied with IoT application. It provides many advantages with mobility and swift data transfers to patient and doctor. In despite of these kinds of advantages, it occurred security issues between basic devices and protocols in their applications. Especially, internet of things have restricted and limited resources such as small memory capacity, low capability of computing power, etc. Therefore, we can not utilize conventional mechanism. In this paper, we analyzed attacks and vulnerability in terms of security issues. To analyze security structure, features, demands and requirements, we solve the methods to be reduced security issues.

Development of a Framework for Improvement of Sensor Data Quality from Weather Buoys (해양기상부표의 센서 데이터 품질 향상을 위한 프레임워크 개발)

  • Ju-Yong Lee;Jae-Young Lee;Jiwoo Lee;Sangmun Shin;Jun-hyuk Jang;Jun-Hee Han
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.46 no.3
    • /
    • pp.186-197
    • /
    • 2023
  • In this study, we focus on the improvement of data quality transmitted from a weather buoy that guides a route of ships. The buoy has an Internet-of-Thing (IoT) including sensors to collect meteorological data and the buoy's status, and it also has a wireless communication device to send them to the central database in a ground control center and ships nearby. The time interval of data collected by the sensor is irregular, and fault data is often detected. Therefore, this study provides a framework to improve data quality using machine learning models. The normal data pattern is trained by machine learning models, and the trained models detect the fault data from the collected data set of the sensor and adjust them. For determining fault data, interquartile range (IQR) removes the value outside the outlier, and an NGBoost algorithm removes the data above the upper bound and below the lower bound. The removed data is interpolated using NGBoost or long-short term memory (LSTM) algorithm. The performance of the suggested process is evaluated by actual weather buoy data from Korea to improve the quality of 'AIR_TEMPERATURE' data by using other data from the same buoy. The performance of our proposed framework has been validated through computational experiments based on real-world data, confirming its suitability for practical applications in real-world scenarios.

Enhancing Transparency and Trust in Agrifood Supply Chains through Novel Blockchain-based Architecture

  • Sakthivel V;Prakash Periyaswamy;Jae-Woo Lee;Prabu P
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.7
    • /
    • pp.1968-1985
    • /
    • 2024
  • At present, the world is witnessing a rapid change in all the fields of human civilization business interests and goals of all the sectors are changing very fast. Global changes are taking place quickly in all fields - manufacturing, service, agriculture, and external sectors. There are plenty of hurdles in the emerging technologies in agriculture in the modern days. While adopting such technologies as transparency and trust issues among stakeholders, there arises a pressurized necessity on food suppliers because it has to create sustainable systems not only addressing demand-supply disparities but also ensuring food authenticity. Recent studies have attempted to explore the potential of technologies like blockchain and practices for smart and sustainable agriculture. Besides, this well-researched work investigates how a scientific cum technological blockchain architecture addresses supply chain challenges in Precision Agriculture to take up challenges related to transparency traceability, and security. A robust registration phase, efficient authentication mechanisms, and optimized data management strategies are the key components of the proposed architecture. Through secured key exchange mechanisms and encryption techniques, client's identities are verified with inevitable complexity. The confluence of IoT and blockchain technologies that set up modern farms amplify control within supply chain networks. The practical manifestation of the researchers' novel blockchain architecture that has been executed on the Hyperledger network, exposes a clear validation using corroboration of concept. Through exhaustive experimental analyses that encompass, transaction confirmation time and scalability metrics, the proposed architecture not only demonstrates efficiency but also underscores its usability to meet the demands of contemporary Precision Agriculture systems. However, the scholarly paper based upon a comprehensive overview resolves a solution as a fruitful and impactful contribution to blockchain applications in agriculture supply chains.

Design of Circularly Polarized Microstrip Patch Antenna Using Asymmetric Inset Feeding (비대칭 인셋 급전을 이용한 원형 편파 마이크로스트립 패치 안테나 설계)

  • Kwan-Joon Park;Dong-Kook Park
    • Journal of IKEEE
    • /
    • v.28 no.3
    • /
    • pp.279-284
    • /
    • 2024
  • In this paper, we propose a novel method for implementing a microstrip patch antenna with circular polarization characteristics through an asymmetric inset feed structure. The proposed method involves designing an antenna by taking advantage of the length difference of the asymmetric inset slots inserted into the antenna, as well as the lengths of additional slots incorporated into the design to achieve circular polarization characteristics. Using this approach, we designed and fabricated an antenna operating at 2.4 GHz in the S-band for satellite communication systems, utilizing a 1 mm thick FR-4 dielectric substrate. The measurement results confirmed a gain of 2dBi, an axial ratio of less than 3dB, and a reflection coefficient below -10dB in the frequency range of 2.35 to 2.43 GHz. Based on these results, it is expected that by employing the proposed method, circularly polarized antennas utilizing inset feeds can be realised, thereby making them applicable in small satellite communication systems and various wireless IoT environmental service applications that use the ISM band.

Design of Tour Guide System using Bluetooth 4.0 and WiFi Sensor Technology (블루투스4.0과 WiFi 센서 기술을 이용한 관광안내 시스템 설계)

  • Kim, Hee-Sook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.10
    • /
    • pp.6888-6894
    • /
    • 2015
  • Bluetooth 4.0 is the most appropriate technology for Internet of Things, which can be used to enhance and expand the existing areas and areas with a variety of applications. In this paper, an example of the services of the Internet of Things, we developed a tour guide system using the Bluetooth 4.0 and WiFi sensor technology. iBeacon-based push service have been limited to iOS smart phone series, non-iOS family and lower version of iOS 6 smart phones can not receive push-based services. This paper proposed in iBeacon and WiFi sensor is more than tourists, while maintaining the existing system (non-iOS smartphone users) can provide the service to you. Service tourist information as well as that can provide the advertising associated with the service. With 10 kinds of smart phones used in Korea was the experiment on the MAC information collected. This experiment is to track the behaviour of tourists in history can provide customized services can be based. Tourist destinations as well as amusement parks, resorts, etc. If you want to apply this system in a crowded place for user behavior information-gathering feature views over the a prevention of a missing child features such as notifications, risk, prevention is possible for a variety of applications.