• Title/Summary/Keyword: IoT-cloud

Search Result 396, Processing Time 0.036 seconds

Extending the Home Network using UPnP+ (UPnP+를 이용한 홈 네트워크 확장)

  • Kim, Hyun-Sik;Park, Yong-Suk;Koo, Sung Wan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.540-542
    • /
    • 2014
  • The Universal Plug and Play (UPnP) specification permits networked devices to discover each other and to provide diverse services in the home network environment. Recently, new paradigms such as mobile connected computing, cloud-based service delivery, smart device content sharing, and Internet of Things (IoT) have emerged, but the home network based UPnP shows functional limitations in supporting such paradigms. To support them, the UPnP Forum has recently extended the capabilities of the existing UPnP, calling it UPnP+. In this paper, the UPnP Device Architecture V2.0 (UDA 2.0), which forms the basis of UPnP+, is presented. We present how UDA 2.0 enables the expansion of the home network to wide-area networks and non-IP device domains.

  • PDF

UAV and LiDAR SLAM Combination Effectiveness Review for Indoor and Outdoor Reverse Engineering of Multi-Story Building (복층 건물 실내외 역설계를 위한 UAV 및 LiDAR SLAM 조합 효용성 검토)

  • Kang, Joon-Oh;Lee, Yong-Chang
    • Journal of Cadastre & Land InformatiX
    • /
    • v.50 no.2
    • /
    • pp.69-79
    • /
    • 2020
  • TRecently, smart cities that solve various problems in cities based on IoT technology are in the spotlight. In particular, cases of BIM application for smooth management of construction and maintenance are increasing, and spatial information is converted into 3D data through convergence technology and used for safety diagnosis. The purpose of this study is to create and combine point clouds of a multi-story building by using a ground laser scanner and a handheld LiDAR SLAM among UAV and LiDAR equipment, supplementing the Occluded area and disadvantages of each technology, examine the effectiveness of indoor and outdoor reverse design by observing shape reproduction and accuracy. As a result of the review, it was confirmed that the coordinate accuracy of the data was improved by creating and combining the indoor and outdoor point clouds of the multi-story building using three technologies. In particular, by supplementing the shortcomings of each technology, the completeness of the shape reproduction of the building was improved, the Occluded area and boundary were clearly distinguished, and the effectiveness of reverse engineering was verified.

Design and Implementation of High-Speed Software Cryptographic Modules Using GPU (GPU를 활용한 고속 소프트웨어 암호모듈 설계 및 구현)

  • Song, JinGyo;An, SangWoo;Seo, Seog Chung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1279-1289
    • /
    • 2020
  • To securely protect users' sensitive information and national secrets, the importance of cryptographic modules has been emphasized. Currently, many companies and national organizations are actively using cryptographic modules. In Korea, To ensure the security of these cryptographic modules, the cryptographic module has been verified through the Korea Certificate Module Validation Program(KCMVP). Most of the domestic cryptographic modules are CPU-based software (S/W). However, CPU-based cryptographic modules are difficult to use in servers that need to process large amounts of data. In this paper, we propose an S/W cryptographic module that provides a high-speed operation using GPU. We describe the configuration and operation of the S/W cryptographic module using GPU and present the changes in the cryptographic module security requirements by using GPU. In addition, we present the performance improvement compared to the existing CPU S/W cryptographic module. The results of this paper can be used for cryptographic modules that provide cryptography in servers that manage IoT (Internet of Things) or provide cloud computing.

Vaccine Cold Chain Monitoring System Using IoT Vaccine Fridge for Developing Countries (IoT 백신 냉장고를 사용한 개발도상국 백신 콜드체인 모니터링 시스템)

  • Lyu, Jang-Hyeon;Park, Samuel;Yu, Jong-Ha;Wang, Xin-Lin;Im, Hyuck-Soon;Rhee, Hyop-Seung;Ahn, Sung-Hoon
    • Journal of Appropriate Technology
    • /
    • v.7 no.1
    • /
    • pp.26-32
    • /
    • 2021
  • In the process of vaccine delivery and vaccination, temperature is mostly controlled by an insulated containers containing ice. Moreover, amount of wasted vaccine is significant because the temperature of the vaccine is not properly controlled. A core challenge of vaccination is temperature data monitoring, since it is critical for managing and operating strategical vaccination by health organizations. In this research, a real-time monitoring vaccine carrier system was developed. Temperature, location, and power consumption data of the vaccine carrier were monitored and working performances of the vaccine carrier were tested in both Korea and Tanzania (Arusha and Kilimanjaro regions). For both places, Short Message Service (SMS) communication method was used to send information of the carrier's status. As a result, the monitoring system was able to transmit and receive real-time data of the vaccine carrier status while the vaccine carrier was tested. The vaccine status data can be accessed from any location through the cloud server and web-based user interface.

A Study on Integrity Protection of Edge Computing Application Based on Container Technology (컨테이너 기술을 활용한 엣지 컴퓨팅 환경 어플리케이션 무결성 보호에 대한 연구)

  • Lee, Changhoon;Shin, Youngjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1205-1214
    • /
    • 2021
  • Edge Computing is used as a solution to the cost problem and transmission delay problem caused by network bandwidth consumption that occurs when IoT/CPS devices are integrated into the cloud by performing artificial intelligence (AI) in an environment close to the data source. Since edge computing runs on devices that provide high-performance computation and network connectivity located in the real world, it is necessary to consider application integrity so that it is not exploited by cyber terrorism that can cause human and material damage. In this paper, we propose a technique to protect the integrity of edge computing applications implemented in a script language that is vulnerable to tampering, such as Python, which is used for implementing artificial intelligence, as container images and then digitally signed. The proposed method is based on the integrity protection technology (Docker Contents Trust) provided by the open source container technology. The Docker Client was modified and used to utilize the whitelist for container signature information so that only containers allowed on edge computing devices can be operated.

Digital transformation in terms of user experience design - Focusing on Starbucks case (사용자 경험 디자인 측면에서의 디지털 트랜스포메이션 - 스타벅스 사례를 중심으로)

  • Choi, Ye-Na;Heo, So-Yeon;Kim, Min-Gyeong;Jung, Young-Wook
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.715-725
    • /
    • 2022
  • With the development of digital technology related to mobile, cloud, IoT, even traditional businesses have began to develop strategies for digital transformation. This is regarded as a very important part for business sustainability. However, many of these attempts are being conducted from the management point of view, and there has been little research on user experience design for digital transformation. In this study, Starbucks, which started a offline store business and expanded its experience with online services, was selected as a representative case and user research was conducted on it. Through an usability evaluation and post-task interviews of the Starbucks mobile application users, we discovered important issues of user experience to consider when transforming and expanding services online from offline. Based on the findings, the considersations for designing online user experience were discussed and proposed. These are expected to contribute to the process of researching and implementing digital transformation.

A Study on the Development Issues of Digital Health Care Medical Information (디지털 헬스케어 의료정보의 발전과제에 관한 연구)

  • Moon, Yong
    • Industry Promotion Research
    • /
    • v.7 no.3
    • /
    • pp.17-26
    • /
    • 2022
  • As the well-being mindset to keep our minds and bodies free and healthy more than anything else in the society we live in is spreading, the meaning of health care has become a key part of the 4th industrial revolution such as big data, IoT, AI, and block chain. The advancement of the advanced medical information service industry is being promoted by utilizing convergence technology. In digital healthcare, the development of intelligent information technology such as artificial intelligence, big data, and cloud is being promoted as a digital transformation of the traditional medical and healthcare industry. In addition, due to rapid development in the convergence of science and technology environment, various issues such as health, medical care, welfare, etc., have been gradually expanded due to social change. Therefore, in this study, first, the general meaning and current status of digital health care medical information is examined, and then, developmental tasks to activate digital health care medical information are analyzed and reviewed. The purpose of this article is to improve usability to fully pursue our human freedom.

Development of Competency Model for Police' Digital Forensic Examiner (경찰 디지털증거분석관 역량모델 개발)

  • Oh SoJung;Jeong JunSeon;Cho EunByul;Kim GiBum
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.4
    • /
    • pp.647-659
    • /
    • 2023
  • As digital evidence becomes more important in criminal investigations, disputes are increasing in court. As media diversifies and the scope of analysis expands, the level of expertise in digital forensics is also increasing. However, no competency model has been developed to define the capabilities of digital evidence examiners or to judge their expertise. There have been some studies that have derived the capabilities necessary for digital evidence examiner, but they are still insufficient. Therefore, in this study, 25 competency evaluation factors in a total of 9 competency groups were defined using methodologies such as expert FGI and Delphi survey. Specifically, it was defined as Digital Forensics Theory, Digital Evidence Collection&Management, Disk Forensics, Mobile Forensics, Video Forensics, infringement forensics, DB Forensics, Embedded(IoT) Forensics, and Cloud Forensics. The digital evidence examiner competency model is expected to be used in various fields such as recruitment, education and training, and performance evaluation in the future.

Design of Food Waste Trading E-Commerce Service with IoT-based Capacity Information Collection (사물인터넷 기반의 용량 정보 수집을 통한 음식물 쓰레기 전자상거래 서비스의 설계)

  • Wahyutama, Aria Bisma;Hwang, Mintae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.112-114
    • /
    • 2022
  • This paper proposes an E-Commerce service that supports large quantities of food waste sales generated by collective residences, including apartments, to consumers in urban areas, such as livestock farmers, through online transactions. Unlike general E-Commerce, the proposed service uses a smart food waste bin equipped with an IoT-based sensor and communication module to automatically collect the location information of each apartment and the amount of food waste to be displayed in a specialized E-Commerce platform. The key of this system is to provide information and sell it to consumers. The smart food waste bin periodically delivers its current capacity and location using a weight sensor, GPS sensor and LoRa communication module to a cloud-based database to be used in web or mobile applications. The proposed E-Commerce service is expected to help resolve the food waste disposal problem and revitalize the local economy by linking with a service that delivers food waste from each apartment to a nearby location where the buyer is located.

  • PDF

Research on Digital Twin Automation Techniques in the Construction Industry through 2D Design Drawing Data Extraction and 3D Spatial Data Construction (2D 설계도면 데이터 추출 및 3차원 공간 데이터 구축을 통한 건설산업 디지털 트윈 자동화 기법 연구)

  • Lee, Jongseo;Moon, Il-YOUNG
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.609-612
    • /
    • 2021
  • Government agencies and companies are establishing and promoting digital transformation strategies in various industrial fields, and are leading the era of the 4th industrial revolution through successful technological innovation. In this time of change, we can see many stories of global companies Nike and Starbucks as successful examples of digital transformation. These two companies are showing successful results through digital transformation. Domestic companies are also conducting digital innovation based on mobile, cloud, IoT, artificial intelligence, and AR/VR technologies, and are establishing RPA (Robotic Process Automation) processes for high efficiency and high productivity. In this paper, we introduce the 3D digital twin space construction automation process technique using data from the entire construction cycle of design, construction, and maintenance of the construction industry, and look into the digital transformation strategy of the construction industry in the future.

  • PDF