• Title/Summary/Keyword: IoT service

Search Result 905, Processing Time 0.029 seconds

Multi Agent Multi Action system for AI care service for elderly living alone based on radar sensor (레이더 센서 기반 독거노인 AI 돌봄 서비스를 위한 다중 에이전트 다중 액션 시스템)

  • Chae-Byeol Lee;Kwon-Taeg Choi;Jung-HO Ahn;Kyu-Chang Jang
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.67-68
    • /
    • 2023
  • 본 논문에서 제안한 Multi Agent Multi Action은 기존의 대화형 시스템 방식인 Single Agent Single Action 구조에 비해 확장성을 갖춘 대화 시스템을 구현하는 방식이다. 시스템을 여러 에이전트로 분할하고, 각 에이전트가 특정 액션에 대한 처리를 담당함으로써 보다 유연하고 효율적인 대화형 시스템을 구현할 수 있으며, 다양한 작업에 특화된 에이전트를 그룹화함으로써 작업의 효율성을 극대화하고, 사용자 경험을 향상 시킬 수 있다.

  • PDF

Topic Modeling on Patent and Article Big Data Using BERTopic and Analyzing Technological Trends of AI Semiconductor Industry (BERTopic을 활용한 텍스트마이닝 기반 인공지능 반도체 기술 및 연구동향 분석)

  • Hyeonkyeong Kim;Junghoon Lee;Sunku Kang
    • Journal of Information Technology Applications and Management
    • /
    • v.31 no.1
    • /
    • pp.139-161
    • /
    • 2024
  • The Fourth Industrial Revolution has spurred widespread adoption of AI-based services, driving global interest in AI semiconductors for efficient large-scale computation. Text mining research, historically using LDA, has evolved with machine learning integration, exemplified by the 2021 BERTopic technology. This study employs BERTopic to analyze AI semiconductor-related patents and research data, generating 48 topics from 2,256 patents and 40 topics from 1,112 publications. While providing valuable insights into technology trends, the study acknowledges limitations in taking a macro approach to the entire AI semiconductor industry. Future research may explore specific technologies for more nuanced insights as the industry matures.

A Study on the Environment Characteristics and Continuous Usage Intention for Improvement of Fintech (핀테크 활성화를 위한 사용환경특성과 지속사용의도)

  • Jung, Dae-Hyun;Chang, Hwal-Sik;Park, Kwang-O
    • The Journal of Information Systems
    • /
    • v.26 no.2
    • /
    • pp.123-142
    • /
    • 2017
  • Purpose The development of the Fintech industry can be on the basis of the development in IT technologies such as Big data, IoT, cloud computing, it can be considered that the financial industry is repeating the evolution into Fintech. But the awareness of the consumers is still very low. Therefore the current dissertation, tries to deduce the suggestions for invigoration measures for Fintech by conducting an empirical study on the factors that influence the intention of reuse of Fintech on the consumer's point of view. Design/methodology/approach This study made a design of the research model by integrating the factors deducted from the Expectation Confirmation Theory. This paper empirically analyzes the impact of Continuous Usage Intention for Improvement of Fintech. The 302 survey responses were used to verify research hypotheses through covariate structural equation model. Findings According to the empirical analysis result, this study confirmed that the ultimate purpose of the Fintech service is to eliminate the social cost's waste element occurring from issue of money by not using or reducing the usage of cash. Since many Fintech users have pointed out security as the priority task, a direction for the related institutions has been proposed. Second, the content of the current dissertation will be the opportunity of broadening the perception of the current consumers that perceive Fintech as only a NFC simple payment service.

Design and Implementation of Lightweight Encryption Algorithm on OpenSSL (OpenSSL 상에서 LEA 설계 및 구현)

  • Park, Gi-Tae;Han, Hyo-Joon;Lee, Jae-Hwoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.12
    • /
    • pp.822-830
    • /
    • 2014
  • Recently, A Security service in Internet environments has been more important and the use of SSL & TLS is increasing for the personel homepage as well as administrative institutions. Also, IETF suggests using DTLS, which can provide a security service to constrained devices with lower CPU power and limited memory space under IoT environments. In this paper, we implement LEA(Lightweight Encryption Algorithm) algorithm and apply it to OpenSSL. The implemented algorithm is compared with other symmetric encryption algorithms such as AES etc, and it shows the superior performance in calculation speed.

Effects of Innovation Characteristics of Cloud Computing Services, Technostress on Innovation Resistance and Acceptance Intention: Focused on Public Sector (클라우드 컴퓨팅 서비스의 혁신특성, 테크노스트레스가 혁신저항 및 수용의도에 미치는 영향: 공공부문 도입을 중심으로)

  • Shin, Woochan;Ahn, Hyunchul
    • Knowledge Management Research
    • /
    • v.20 no.2
    • /
    • pp.59-86
    • /
    • 2019
  • As the era of the 4th Industrial Revolution evolves, not only private companies but also government agencies and institutions in public sector are adopting cloud computing services converged by new information technologies such as IoT, big data, and artificial intelligence to strengthen competitiveness and create new business values. The purpose of this study is to investigate the relationship between innovation characteristics, innovation resistance, and acceptance of innovative technologies from the perspective of cloud computing services in the public sector. In this study, we collected the survey data from 190 employees of IT division in the public sector, and analyzed the causal relationship between innovation characteristics, technostress, innovation resistance, and intention to adopt the cloud computing service that they perceived. As a result of the analysis, we demonstrated that innovation characteristics, technostress have significant effect on innovation resistance and acceptance intention, and that top executive commitment and innovation resistance also have significant effect on acceptance intention. This study provides meaningful practical implications for the staffs preparing for adoption of cloud computing services and the executives who make the final decision in public sector.

Determinants of Customer Satisfaction, Loyalty and Happiness in Chinese Fast-food Restaurants in the 4th Industrial Revolution Era; Is Convenience of Mobile Ordering Services a New Determinant? (4차 산업혁명 시대 중국 패스트푸드점의 고객만족, 충성도와 행복감의 결정요인; 모바일주문 서비스의 편리성이 새로운 결정요인인가?)

  • Zhong, Yongping;Chung, Jae-Eun;Moon, Hee-Cheol
    • Korea Trade Review
    • /
    • v.44 no.6
    • /
    • pp.151-168
    • /
    • 2019
  • This study aims to investigate the determinants that can influence customer satisfaction and loyalty. Compared to some of the determinants that have been investigated by other scholars before, this study also includes a new approach to mobile food-ordering that has only appeared within the Chinese fast-food industry in recent years. It is very important to test if the convenience of mobile ordering services can influence customer satisfaction, as more and more customers are using mobile apps to order food, especially in the 4th Industrial Revolution Era. Research data mostly was collected from customers who visited one of five famous Western fast-food restaurants (KFC, McDonald's, Pizza Hut, Subway, and Burger King) in China. The results show that not only price, service quality, food quality, and the physical environment can significantly affect customer satisfaction but also the convenience of mobile ordering services, a new determinant accompanied by the fast development of IoT technology.

Consumers' Responses to Smart Home Services: The Role of Self-Regulation Systems

  • Kim, Moon-Yong;Cho, Heayon
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.1
    • /
    • pp.28-39
    • /
    • 2021
  • In the new era of IoT, a deeper and richer understanding of consumer characteristics is required to accelerate the acceptance and popularization of different types of smart home services (e.g., hedonic or utilitarian smart home services). In the current research, self-regulation systems are considered one of the consumer characteristics. Therefore, this research examines the role of consumers' regulatory focus (promotion focus vs. prevention focus) in their responses to smart home services, particularly when they are not familiar with the services. Specifically, this research examines whether consumers' attitudes toward utilitarian/hedonic smart home services differ according to their regulatory focus, particularly when they are not familiar with the services. The results indicate that consumers who are not familiar with smart home services have more favorable attitudes toward hedonic smart home services when they are promotion-focused (vs. prevention-focused). In contrast, there is no significant difference in their attitudes toward utilitarian smart home services between promotion- and prevention-focused consumers. Our findings imply that regulatory focus may be an effective marketing and segmentation tool in promoting new smart home services and facilitating low-familiarity consumers' receptiveness to the services.

Neural Network and Cloud Computing for Predicting ECG Waves from PPG Readings

  • Kosasih, David Ishak;Lee, Byung-Gook;Lim, Hyotaek
    • Journal of Multimedia Information System
    • /
    • v.9 no.1
    • /
    • pp.11-20
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.

The Intelligent Blockchain for the Protection of Smart Automobile Hacking

  • Kim, Seong-Kyu;Jang, Eun-Sill
    • Journal of Multimedia Information System
    • /
    • v.9 no.1
    • /
    • pp.33-42
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.

Modified Deep Reinforcement Learning Agent for Dynamic Resource Placement in IoT Network Slicing

  • Ros, Seyha;Tam, Prohim;Kim, Seokhoon
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.17-23
    • /
    • 2022
  • Network slicing is a promising paradigm and significant evolution for adjusting the heterogeneous services based on different requirements by placing dynamic virtual network functions (VNF) forwarding graph (VNFFG) and orchestrating service function chaining (SFC) based on criticalities of Quality of Service (QoS) classes. In system architecture, software-defined networks (SDN), network functions virtualization (NFV), and edge computing are used to provide resourceful data view, configurable virtual resources, and control interfaces for developing the modified deep reinforcement learning agent (MDRL-A). In this paper, task requests, tolerable delays, and required resources are differentiated for input state observations to identify the non-critical/critical classes, since each user equipment can execute different QoS application services. We design intelligent slicing for handing the cross-domain resource with MDRL-A in solving network problems and eliminating resource usage. The agent interacts with controllers and orchestrators to manage the flow rule installation and physical resource allocation in NFV infrastructure (NFVI) with the proposed formulation of completion time and criticality criteria. Simulation is conducted in SDN/NFV environment and capturing the QoS performances between conventional and MDRL-A approaches.