• Title/Summary/Keyword: IoT Applications

Search Result 477, Processing Time 0.024 seconds

Enhanced Indoor Localization Scheme Based on Pedestrian Dead Reckoning and Kalman Filter Fusion with Smartphone Sensors (스마트폰 센서를 이용한 PDR과 칼만필터 기반 개선된 실내 위치 측위 기법)

  • Harun Jamil;Naeem Iqbal;Murad Ali Khan;Syed Shehryar Ali Naqvi;Do-Hyeun Kim
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.4
    • /
    • pp.101-108
    • /
    • 2024
  • Indoor localization is a critical component for numerous applications, ranging from navigation in large buildings to emergency response. This paper presents an enhanced Pedestrian Dead Reckoning (PDR) scheme using smartphone sensors, integrating neural network-aided motion recognition, Kalman filter-based error correction, and multi-sensor data fusion. The proposed system leverages data from the accelerometer, magnetometer, gyroscope, and barometer to accurately estimate a user's position and orientation. A neural network processes sensor data to classify motion modes and provide real-time adjustments to stride length and heading calculations. The Kalman filter further refines these estimates, reducing cumulative errors and drift. Experimental results, collected using a smartphone across various floors of University, demonstrate the scheme's ability to accurately track vertical movements and changes in heading direction. Comparative analyses show that the proposed CNN-LSTM model outperforms conventional CNN and Deep CNN models in angle prediction. Additionally, the integration of barometric pressure data enables precise floor level detection, enhancing the system's robustness in multi-story environments. Proposed comprehensive approach significantly improves the accuracy and reliability of indoor localization, making it viable for real-world applications.

Consumers' preference about the attributes of 3rd generation device (3세대 디바이스의 속성별 소비자 선호 분석)

  • Jung, Jae-Young;Lee, Joo-Suk;Kwak, Seung-Jun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.703-710
    • /
    • 2017
  • Third-generation (3G) devicesare next-generation devices that allow the use of intelligent services and applications through the Internet of Things (IoT). As the market forexisting smart devices like smartphones and tablet PCs enters the stage of stagnation, the world is now focusing on 3G devices, parts, and services. This study is intended to measure the user's benefits from the various attributes of 3G devices by applying an economic valuation method. For this purpose, the conjoint analysis method was applied, which is one of the representative valuation methods. To apply conjoint analysis, the following attributes of 3G devicesare considered: mode of use, power efficiency, life care, and price. By applying the mixed logit model, the marginal willingness-to-pay(WTP) for each attribute was derived. The results are statistically significant. Respondents showed a high preference or complete flexibility in the mode of use attribute. And they were also found to have WTP for improvements in the life care attribute. The implications and quantitative results of this study are expected to be useful for policies and strategies in the 3G device market.

Design of an Integrated University Information Service Model Based on Block Chain (블록체인 기반의 대학 통합 정보서비스 실증 모델 설계)

  • Moon, Sang Guk;Kim, Min Sun;Kim, Hyun Joo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.2
    • /
    • pp.43-50
    • /
    • 2019
  • Block-chain enjoys technical advantages such as "robust security," owing to the structural characteristic that forgery is impossible, decentralization through sharing the ledger between participants, and the hyper-connectivity connecting Internet of Things, robots, and Artificial Intelligence. As a result, public organizations have highly positive attitudes toward the adoption of technology using block-chain, and the design of university information services is no exception. Universities are also considering the application of block-chain technology to foundations that implement various information services within a university. Through case studies of block-chain applications across various industries, this study designs an empirical model of an integrated information service platform that integrates information systems in a university. A basic road map of university information services is constructed based on block-chain technology, from planning to the actual service design stage. Furthermore, an actual empirical model of an integrated information service in a university is designed based on block-chain by applying this framework.

Implementation of Smart Device-Based on Platform for the Visually Impaired (시각 장애인을 위한 스마트 장치 기반 플랫폼 구현)

  • Lee, Ook;Choi, Jung-Woon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.5
    • /
    • pp.538-549
    • /
    • 2019
  • This study suggests a new platform in which VI can communicate with their guardians who serve as a system administrator optimizing personal characteristics. In terms of interaction between platform components, this study can contribute to enhancing stability of walking by giving substantial information to VI through server processing and setups of guardians with real-time interaction to VI through server processing and setups of guardians with real-time interaction. Therefore, developing smart phone applications can facilitate both portability and cost effectiveness, by the users' downloading the application and registration. In terms of guardians' cost, this system is cost-effective because they can access to the administration system through personal computers or smart phones, not through specialized system devices. This system is web-based, which automatically communicates with the surroundings of, such as provides the guardians with the necessary information or approaches to the danger through IoT devices, which results in enhancing safety. Moreover, it is possible for guardians to utilize the personalized platform since the system not only senses personal characteristics but also sends a number of information to VI. a new platform makes it possible for guardians to provide electronic support and interaction with the application with the application users, which contributes to systematic and safe walk for VI.

A Study on the Improvement of Fire Alarm System in Special Buildings Using Beacons in Edge Computing Environment (에지 컴퓨팅 환경에서 비콘을 활용한 특수건물 화재 경보 시스템 개선 방안 연구)

  • Lee, Tae Gyu;Choi, Kyeong Seo;Shin, Youn Soon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.7
    • /
    • pp.217-224
    • /
    • 2022
  • Today, with the development of technology and industry, fire accidents in special buildings are increasing as special buildings increase. However, despite the rapid development of information and communication technology, human casualties are steadily occurring due to the underdeveloped and ineffective indoor fire alarm system. In this study, we confirmed that the existing indoor fire alarm system using acoustic alarm could not deliver a sufficiently large alarm to the in-room personnel. To improve this, we designed and implemented a fire alarm system using edge computing and beacons. The proposed improved fire alarm system consists of terminal sensor nodes, edge nodes, a user application, and a server. The terminal sensor nodes collect indoor environment data and send it to the edge node, and the edge node monitors whether a fire occurs through the transmitted sensor value. In addition, the edge node continuously generate beacon signals to collect information of smart devices with user applications installed within the signal range, store them in a server database, and send application push-type fire alarms to all in-room personnel based on the collected user information. As a result of conducting a signal valid range measurement experiment in a university building with dense lecture rooms, it was confirmed that device information was normally collected within the beacon signal range of the edge node and a fire alarm was quickly sent to specific users. Through this, it was confirmed that the "blind spot problem of the alarm" was solved by flexibly collecting information of visitors that changes time to time and sending the alarm to a smart device very adjacent to the people. In addition, through the analysis of the experimental results, a plan to effectively apply the proposed fire alarm system according to the characteristics of the indoor space was proposed.

A Study on Cell-Broadcasting Based Security Authentication System and Business Models (셀 브로드캐스팅 보안 인증시스템 및 비즈니스 모델에 관한 연구)

  • Choi, Jeong-Moon;Lee, Jungwoo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.5
    • /
    • pp.325-333
    • /
    • 2021
  • With the rapidly changing era of the fourth industrial revolution, the utilization of IT technology is increasing. In addition, the demand for security authentication is increasing as shared services or IoT technologies are being developed as new business models. Security authentication is becoming increasingly important for all intelligent devices such as self-driving cars. However, most location-based security authentication technologies are being developed mainly with technologies that utilize server proximity or satellite location tracking, which limits the scope of their physical use. Location-based security authentication technology has recently been developed as a complementary replacement technology. In this study, we introduce location-based security authentication technology using cell broadcasting technology, which has a wider range of applications and is more convenient and business-friendly than existing location-based security authentication technologies. We also introduced application cases and business models related to this. In addition to the current status of technology development, we analyzed current changes in business models being employed. Based on our analysis results, this study draws the implication that technology diversification is necessary to improve the performance of innovative technologies. It is meaningful that it has found and studied advanced technologies other than existing location authentication methods and systems.

Recent Progress in Micro In-Mold Process Technologies and Their Applications (마이크로 인몰드 공정기술 기반 전자소자 제조 및 응용)

  • Sung Hyun Kim;Young Woo Kwon;Suck Won Hong
    • Journal of the Microelectronics and Packaging Society
    • /
    • v.30 no.2
    • /
    • pp.1-12
    • /
    • 2023
  • In the current era of the global mobile smart device revolution, electronic devices are required in all spaces that people interact with. The establishment of the internet of things (IoT) among smart devices has been recognized as a crucial objective to advance towards creating a comfortable and sustainable future society. In-mold electronic (IME) processes have gained significant industrial significance due to their ability to utilize conventional high-volume methods, which involve printing functional inks on 2D substrates, thermoforming them into 3D shapes, and injection-molded, manufacturing low-cost, lightweight, and functional components or devices. In this article, we provide an overview of IME and its latest advances in application. We review biomimetic nanomaterials for constructing self-supporting biosensor electronic materials on the body, energy storage devices, self-powered devices, and bio-monitoring technology from the perspective of in-mold electronic devices. We anticipate that IME device technology will play a critical role in establishing a human-machine interface (HMI) by converging with the rapidly growing flexible printed electronics technology, which is an integral component of the fourth industrial revolution.