• Title/Summary/Keyword: IoT devices

Search Result 1,172, Processing Time 0.026 seconds

A Case Study on the Big Data Analysis Curriculum for the Efficient Use of Data (데이터의 효율적 활용을 위한 빅데이터 분석 교육과정 사례 연구)

  • Song, Young-A
    • Journal of Practical Engineering Education
    • /
    • v.12 no.1
    • /
    • pp.23-29
    • /
    • 2020
  • Data generated by the development of ICT, the diversification of ICT devices and services and the expansion of social media are categorized as big data characterized by the amount, variety and speed of the data. The spread of the use of big data is expected to have the effects of identifying the status quo by analyzing data in all industries, predicting the future, and creating opportunities to apply it. However, while it is imperative for these things to be done, the nation still lacks professional training institutions or curricula. In this case study, we will investigate and compare the state of education for the training of big data personnel in Korea, find out what level and level of education is being trained to nurture balanced professionals, and prepare an opportunity to think about how it can help students create value at a time when the need for education is growing in the wake of awareness of big data.

Hybrid Simulated Annealing for Data Clustering (데이터 클러스터링을 위한 혼합 시뮬레이티드 어닐링)

  • Kim, Sung-Soo;Baek, Jun-Young;Kang, Beom-Soo
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.40 no.2
    • /
    • pp.92-98
    • /
    • 2017
  • Data clustering determines a group of patterns using similarity measure in a dataset and is one of the most important and difficult technique in data mining. Clustering can be formally considered as a particular kind of NP-hard grouping problem. K-means algorithm which is popular and efficient, is sensitive for initialization and has the possibility to be stuck in local optimum because of hill climbing clustering method. This method is also not computationally feasible in practice, especially for large datasets and large number of clusters. Therefore, we need a robust and efficient clustering algorithm to find the global optimum (not local optimum) especially when much data is collected from many IoT (Internet of Things) devices in these days. The objective of this paper is to propose new Hybrid Simulated Annealing (HSA) which is combined simulated annealing with K-means for non-hierarchical clustering of big data. Simulated annealing (SA) is useful for diversified search in large search space and K-means is useful for converged search in predetermined search space. Our proposed method can balance the intensification and diversification to find the global optimal solution in big data clustering. The performance of HSA is validated using Iris, Wine, Glass, and Vowel UCI machine learning repository datasets comparing to previous studies by experiment and analysis. Our proposed KSAK (K-means+SA+K-means) and SAK (SA+K-means) are better than KSA(K-means+SA), SA, and K-means in our simulations. Our method has significantly improved accuracy and efficiency to find the global optimal data clustering solution for complex, real time, and costly data mining process.

Data Transmission Method using Broadcasting in Bluetooth Low Energy Environment (저전력 블루투스 환경에서 브로드캐스팅을 이용한 데이터전송 방법)

  • Jang, Rae-Young;Lee, Jae-Ung;Jung, Sung-Jae;Soh, Woo-Young
    • Journal of Digital Contents Society
    • /
    • v.19 no.5
    • /
    • pp.963-969
    • /
    • 2018
  • Wi-Fi and Bluetooth technologies are perhaps the most prominent examples of wireless communication technologies used in the Internet of Things (IoT) environment. Compared to widely used Wi-Fi, Bluetooth technology has some flaws including 1:1 connection (one-way) between Master and Slave, slow transmission, and limited connection range; Bluetooth is mainly used for connecting audio devices. Since the release of Bluetooth Low Energy (BLE), some of the flaws of Bluetooth technology have been improved but it still failed to become a competitive alternative of Wi-Fi. This paper presents a method of data transmission through broadcasting in BLE and demonstrates its performance, one-to-many data transfer result. The Connection-Free Data Transmission proposed in this paper will hopefully be utilized in special circumstances requiring 1:N data transmission or disaster security network.

Methods to Propel Tourism of Yeosu City Using Big Data (빅데이터를 활용한 여수관광 활성화 방안)

  • Lim, Yang-Ui;Kim, Kang-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.4
    • /
    • pp.739-746
    • /
    • 2020
  • The fourth industrial revolution introduced at world economic forum in 2016 has had huge effects on tourism industries as well as the change of core technologies in ICT such as big data, IoT, etc, This paper proposes the methods to propel tourism of Yoesu city through big data analysis and questionnaires. Sensitive words and positive-negative trend are extracted by Social Metrics and the keywords for Yeosu tour trends are extracted and analyzed by Naver datalab, and the results are visualized by R language. And frequency, difference, factor, covariance and regression analysis in SPSS are executed for the questionnaires for 493 visitors who traveled in Yeosu city. Sentiment analysis for Yeosu tour and maritime cable car shows that positive effect is much more than negative one. The analyses for questionnaires in SPSS show that Yeosu area is statistically significant to tour satisfaction index and tour revitalization for Yeosu, and favorite sightseeing places and searching electronic devices for age groups are different. The sightseeing places such as a maritime park with soft contents that give joyfulness and healing to tourists are highly attracted in both the big data and questionnaires analysis.

Study on the Connection with Public Authentication and Bio Authentication (공인인증서와 바이오인증 연계를 위한 연구)

  • Ryu, Gab-Sang
    • Journal of Internet of Things and Convergence
    • /
    • v.1 no.1
    • /
    • pp.39-44
    • /
    • 2015
  • Organization is increasing the authorizing process to use public certificate and bio information. Certificate, has evolved to be able to parallel distributes the bio authentication and portable bio-authentication device. Authentication using an individual's PC and smart devices continue to generalize, while convenience for authentication is increased by comparison Study on cooperation with the security at the network level's a weak situation. If ask authentication method through the cooperation of the public certificate and bio information work with current network access control, there is a possibility to develop a more powerful security policy. by cooperation weaknesses against vulnerable personal authentication techniques on security token in a reliable and secure personal authentication techniques, such as bio-recognition, Bio Information for identification and to prevent exposing a methodology suggest to validate whether or not to carry out in this paper. In addition, organize the scenario that can work with the 802.1x network authentication method, and presented a proposal aimed at realization.

Study on the Femtocell Vulnerability Analysis Using Threat Modeling (위협 모델링 기법을 이용한 펨토셀 취약점 분석에 대한 연구)

  • Kim, Jae-ki;Shin, Jeong-Hoon;Kim, Seung-joo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.8
    • /
    • pp.197-210
    • /
    • 2016
  • Lately smartphone uasage is increasing and many Internet of Things (IoT) devices support wireless communications. Accordingly, small base stations which called femtocells are supplied to prevent saturation of existing base stations. However, unlike the original purpose of the femtocell with the advanced hacking technologies, Vulnerability such as gaining the administrator authority was discovered and this can cause serious problems such as the leakage of personal information of femtocell user. Therefore, identify security threats that may occur in the femtocell and it is necessary to ways for systematic vulnerability analysis. In this paper, We analyzed the security threats that can be generated in the femtocell and constructed a checklist for vulnerability analysis using the Threat Modeling method. Then, using the constructed checklist provides a scheme that can improve the safety of the femto cell through the actual analysis and taken the results of the femtocell vulnerabilities analysis.

Lightweight Hardware Design of Elliptic Curve Diffie-Hellman Key Generator for IoT Devices (사물인터넷 기기를 위한 경량 Elliptic Curve Diffie-Hellman 키 생성기 하드웨어 설계)

  • Kanda, Guard;Ryoo, Kwangki
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.581-583
    • /
    • 2017
  • Elliptic curve cyptography is relatively a current cryptography based on point arithmetic on elliptic curves and the Elliptic Curve Discrete Logarithm Problem (ECDLP). This discrete logarithm problems enables perfect forward secrecy which helps to easily generate key and almost impossible to revert the generation which is a great feature for privacy and protection. In this paper, we provide a lightweight Elliptic Curve Diffie-Hellman (ECDH) Key exchange generator that creates a 163 bit long shared key that can be used in an Elliptic Curve Integrated Encryption Scheme (ECIES) as well as for key agreement. The algorithm uses a fast multiplication algorithm that is small in size and also implements the extended euclidean algorithm. This proposed architecture was designed using verilog HDL, synthesized with the vivado ISE 2016.3 and was implemented on the virtex-7 FPGA board.

  • PDF

NFC-based Attendance Checking System for Institutions of Higher Education (NFC 기반의 고등교육기관 출결지원 시스템에 대한 실증적 연구)

  • Cho, Yun Seok;Kim, KyungMi
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.4
    • /
    • pp.283-289
    • /
    • 2015
  • We propose a low cost attendance checking system using NFC (Near Field Communication) and show a case study of an actual operation of the system in a higher education institute. The system offers a direct attendance check service when a student touches NFC tag on a classroom desk with his/her own smartphone. Our service was first developed and operated in 2012, and then additional functions like massive real time processing were reinforced. In the fall semester, 58 courses use the service and 96% of the class attendance was checked with mobile devices. The only hardware requirement of the system was NFC tag on the classroom desk, which reduced hardware cost dramatically. However, it also minimized attendance checking time into 1 minute regardless of enrolled student number.

Design and Implementation of Smart Home Remote Control Based on Internet of Things Service Platform (사물인터넷 서비스 플랫폼 기반 스마트 홈 리모컨의 설계 및 구현)

  • Oh, Am-Suk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.12
    • /
    • pp.1563-1570
    • /
    • 2018
  • Internet of Things technology is rapidly becoming a reality in many parts of our lives through various product services, and product development especially in the field of smart home is being actively carried out. Most controllers for controlling various smart home products use smart phone applications. However, smart phone applications are not suitable as smart home controllers, contrary to smart home services that emphasize intelligence and convenience. In order to provide intelligent smart home service, intuitive form of smart home controller is needed, which enables integrated control of smart home device. Therefore, this paper proposes a smart home remote control that can control the Internet devices and services of objects. The proposed smart home remote control provides an environment where users can build a smart home service through the IFTTT(If This Then That) automated service platform.

Small-Scale Wind Energy Harvester Using PZT Based Piezoelectric Ceramic Fiber Composite Array (PZT계 압전 세라믹 파이버 어레이 복합체를 이용한 미소 풍력 에너지 하베스터)

  • Lee, Min-Seon;Na, Yong-Hyeon;Park, Jin-Woo;Jeong, Young-Hun
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.32 no.5
    • /
    • pp.418-425
    • /
    • 2019
  • A piezoelectric ceramic fiber composite (PCFC) was successfully fabricated using $0.69Pb(Zr_{0.47}Ti_{0.53})O_3-0.31[Pb(Zn_{0.4}Ni_{0.6})_{1/3}Nb_{2/3}]O_3$ (PZT-PZNN) for use in small-scale wind energy harvesters. The PCFC was formed using an epoxy matrix material and an array of Ag/Pd-coated PZT-PZNN piezo-ceramic fibers sandwiched by Cu interdigitated electrode patterned polyethylene terephthalate film. The energy harvesting performance was evaluated in a custom-made wind tunnel while varying the wind speed and resistive load with two types of flutter wind energy harvesters. One had a five-PCFC array vertically clamped with a supporting acrylic rod while the other used the same structure but with a five-PCFC cantilever array. Stainless steel (thickness: $50{\mu}m$) was attached onto one side of the PCFC to form the PZT-PZNN cantilever. The output power, in general, increased with an increase in the wind speed from 2 m/s to 10 m/s for both energy harvesters. The highest output power of $15.1{\mu}W$ at $14k{\Omega}$ was obtained at a wind speed of 10 m/s for the flutter wind energy harvester with the PZT-PZNN cantilever array. The results presented here reveal the strong potential for wind energy harvester applications to supply sustainable power to various IoT micro-devices.