• Title/Summary/Keyword: Public Internet of Things

Search Result 160, Processing Time 0.029 seconds

Comparative Analysis of IoT Enabled Multi Scanning Parking Model for Prediction of Available Parking Space with Existing Models

  • Anchal, Anchal;Mittal, Pooja
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.404-412
    • /
    • 2022
  • The development in the field of the internet of things (IoT) have improved the quality of the life and also strengthened different areas in the society. All cities across the world are seeking to become smarter. The creation of a smart parking system is the essential use case in smart cities. In recent couple of years, the number of vehicles has increased significantly. As a result, it is critical to make the use of technology that enables hassle-free parking in both public and private spaces. In conventional parking systems, drivers are not able to find free parking space. Conventional systems requires more human interference in a parking lots. To manage these circumstances there is an intense need of IoT enabled parking solution that includes the well defined architecture that will contain the following components such as smart sensors, communication agreement and software solution. For implementing such a smart parking system in this paper we proposed a design of smart parking system and also compare it with convetional system. The proposed design utilizes sensors based on IoT and Data Mining techniques to handle real time management of the parking system. IoT enabled smart parking solution minimizes the human interference and also saves energy, money and time.

Rule Configuration in Self Adaptive System using SWRL (SWRL을 이용한 자가 적응 시스템 내에서의 룰 구성)

  • Park, Young B.;An, Jung Hyun
    • Journal of the Semiconductor & Display Technology
    • /
    • v.17 no.1
    • /
    • pp.6-11
    • /
    • 2018
  • With the development of the Internet of Things technology, a system that ensures the self-adaptability of an environment that includes various IoT devices is attracting public attention. The rules for determining behavior rules in existing self-adaptation systems are based on the assumption of changes in system members and environment. However, in the IoT environment, flexibility is required to determine the behavior rules of various types of IoT devices that change in real time. In this paper, we propose a rule configuration in a self-adaptive system using SWRL based on OWL ontology. The self-adaptive system using the OWL - SWRL rule configuration has two advantages. The first is based on OWL ontology, so we can define the characteristics and behavior of various types of IoT devices as an integrated concept. The second is to define the concept of a rule as a specific language type, and to add, modify and delete a rule at any time as needed. Through the rule configuration in the adaptive system, we have shown that the rule defined in SWRL can provide flexibility and deeper concept expression function to adaptability to IoT environment.

A Multi-Scale Parallel Convolutional Neural Network Based Intelligent Human Identification Using Face Information

  • Li, Chen;Liang, Mengti;Song, Wei;Xiao, Ke
    • Journal of Information Processing Systems
    • /
    • v.14 no.6
    • /
    • pp.1494-1507
    • /
    • 2018
  • Intelligent human identification using face information has been the research hotspot ranging from Internet of Things (IoT) application, intelligent self-service bank, intelligent surveillance to public safety and intelligent access control. Since 2D face images are usually captured from a long distance in an unconstrained environment, to fully exploit this advantage and make human recognition appropriate for wider intelligent applications with higher security and convenience, the key difficulties here include gray scale change caused by illumination variance, occlusion caused by glasses, hair or scarf, self-occlusion and deformation caused by pose or expression variation. To conquer these, many solutions have been proposed. However, most of them only improve recognition performance under one influence factor, which still cannot meet the real face recognition scenario. In this paper we propose a multi-scale parallel convolutional neural network architecture to extract deep robust facial features with high discriminative ability. Abundant experiments are conducted on CMU-PIE, extended FERET and AR database. And the experiment results show that the proposed algorithm exhibits excellent discriminative ability compared with other existing algorithms.

Review of Exposure Assessment Methodology for Future Directions (노출평가 방법론에 대한 과거와 현재, 그리고 미래)

  • Guak, Sooyoung;Lee, Kiyoung
    • Journal of Environmental Health Sciences
    • /
    • v.48 no.3
    • /
    • pp.131-137
    • /
    • 2022
  • Public interest has been increasing the focus on the management of exposure to pollutants and the related health effects. This study reviewed exposure assessment methodologies and addressed future directions. Exposure can be assessed by direct (exposure monitoring) or indirect approaches (exposure modelling). Exposure modelling is a cost-effective tool to assess exposure among individuals, but direct personal monitoring provides more accurate exposure data. There are several population exposure models: stochastic human exposure and dose simulation (SHEDS), air pollutants exposure (APEX), and air pollution exposure distributions within adult urban population in Europe (EXPOLIS). A South Korean population exposure model is needed since the resolution of ambient concentrations and time-activity patterns are country specific. Population exposure models could be useful to find the association between exposure to pollutants and adverse health effects in epidemiologic studies. With the advancement of sensor technology and the internet of things (IoT), exposure assessment could be applied in a real-time surveillance system. In the future, environmental health services will be useful to protect and promote human health from exposure to pollutants.

A Plan to Create New Job Positions for the Elderly in the Era of the 4th Industrial Revolution : Focused on Cheonan-Si (4차 산업혁명 시대 노인 일자리 창출 방안: 천안시를 중심으로)

  • Kim, Chilhyeon;Kim, Taehong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.159-160
    • /
    • 2021
  • We are facing major changes such as an aging population along with the 4th industrial revolution based on ICT technologies such as artificial intelligence, the Internet of Things, autonomous driving, and factory automation. For the local governments that are indexed in high population extinction risk, it is essential to consider market expansion and re-education policies suitable for regional characteristics in order to respond to changes such as advanced industrial automation and population aging. For the reemployment of the elderly, we will analyze previous public strategies for elderly-friendly jobs, expand investment in age-friendly industries. In this study, we suggest to improvement direction of the elderly labor market in Cheonan-Si.

  • PDF

Novel Method for DNA-Based Elliptic Curve Cryptography for IoT Devices

  • Tiwari, Harsh Durga;Kim, Jae Hyung
    • ETRI Journal
    • /
    • v.40 no.3
    • /
    • pp.396-409
    • /
    • 2018
  • Elliptic curve cryptography (ECC) can achieve relatively good security with a smaller key length, making it suitable for Internet of Things (IoT) devices. DNA-based encryption has also been proven to have good security. To develop a more secure and stable cryptography technique, we propose a new hybrid DNA-encoded ECC scheme that provides multilevel security. The DNA sequence is selected, and using a sorting algorithm, a unique set of nucleotide groups is assigned. These are directly converted to binary sequence and then encrypted using the ECC; thus giving double-fold security. Using several examples, this paper shows how this complete method can be realized on IoT devices. To verify the performance, we implement the complete system on the embedded platform of a Raspberry Pi 3 board, and utilize an active sensor data input to calculate the time and energy required for different data vector sizes. Connectivity and resilience analysis prove that DNA-mapped ECC can provide better security compared to ECC alone. The proposed method shows good potential for upcoming IoT technologies that require a smaller but effective security system.

5G Wireless Communication Technology for Non-Terrestrial Network (비지상네트워크를 위한 5G 무선통신 기술)

  • Kim, J.H.;Yoon, M.Y.;You, D.H.;Lee, M.S.
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.6
    • /
    • pp.51-60
    • /
    • 2019
  • As a way to further expand and enable the 5G ecosystem, the $3^{rd}$ Generation Partnership Project (3GPP) is considering the development of a 5G new radio (NR)-based non-terrestrial network (NTN). These NTNs are expected to provide ubiquitous 5G services to user's equipment (especially, in Internet of Things/machine-type communications (IoT/MTC) public safety, and critical communications) by extending service coverage to areas not covered by 5G terrestrial networks. To this end, this NTN is developing scenarios to provide 5G services using spaceborne vehicles, such as geosynchronous and low-Earth orbit satellites, and airborne vehicles, such as unmanned aircraft systems, including high-altitude pseudo-satellites. In addition, various technologies are being studied to satisfy new requirements not considered in 5G NR, such as long propagation delay time, large cell coverage, large Doppler effect, and base station movement. In this paper, we present the scenarios, requirements, technical issues and solutions, and standardization planning for NR-based NTN in 3GPP.

Technological Trends in Intelligent Cyber Range (지능형 사이버 훈련장의 기술 동향)

  • Yu, J.H.;Koo, K.J.;Kim, I.K.;Moon, D.S.
    • Electronics and Telecommunications Trends
    • /
    • v.37 no.4
    • /
    • pp.36-45
    • /
    • 2022
  • As the interest in achieving an intelligent society grows with the fourth industrial revolution's development, information and communications technologies technologies like artificial intelligence (AI), Internet of Things, virtual reality, information security, and blockchain technology are being actively employed in different fields for achieving an intelligent society. With these modifications, the information security paradigm in industrial and public institutions, like personal sensitive data, is quickly changing, and it is exposed to different cyber threats and breaches. Furthermore, as the number of cyber threats and breaches grows, so does the need for rapid detection and response. This demand can be satisfied by establishing cyber training programs and fostering experts that can improve cyber security abilities. In this study, we explored the domestic and international technology trends in cyber security education and training facilities for developing experts in information security. Additionally, the AI technology application in the cyber training ground, which can be established to respond to and deter cyber threats that are becoming more intelligent, was examined.

A Study on Media Art using Ilwolobongdo (일월오봉도를 활용한 미디어아트 연구)

  • Kideok Park;Jeanhun Chung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.6
    • /
    • pp.103-108
    • /
    • 2023
  • This paper conveys the limitations of analog natural history sample information in digital form, giving viewers interest and fun, and presenting the direction of digital diorama utilization of sample exhibitions. In this exhibition, through various media such as 10,000 won bill dramas and newspaper articles, the Sun and Moon and Five Peaks, a picture familiar to the public, was reproduced in media art so that it can be realized in real life. It is a Joseon Dynasty work in which five mountain peaks, a pair of waterfalls, and four pine trees are drawn symmetrically from side to side. In order to express the vividness of nature, the symbols of the sun and moon were created with the effect of light to maximize immersion, and animals such as waves, crane movements, deer, ramie butterflies, and carp were inserted under the mountain peaks to create the vividness of nature and creatures playing in them. The media art folding screen was produced and directed as a screen. In addition, the introduction of the work and information related to the living things in the work were provided through QR codes.

DTLS-based CoAP Security Mechanism Analysis and Performance Evaluation (DTLS 기반의 CoAP 보안 메커니즘 분석 및 성능평가)

  • Han, Sang woo;Park, Chang seop;Cho, Jung mo
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.3-10
    • /
    • 2017
  • Standard Protocol Optimized for Resource-Constrained IoT Environment Constrained Application Protocol (CoAP) supports web-based communication between a sensor node in the IoT environment and a client on the Internet. The CoAP is a Request / Response model that responds to the client's CoAP Request message by responding with a CoAP Response message from the server. CoAP recommends the use of CoAP-DTLS for message protection. However, validation of the use of DTLS in the IoT environment is underway. We analyze CoAP and DTLS security mode, evaluate performance of secure channel creation time, security channel creation step time, and RAM / ROM consumption through Cooja simulator and evaluate the possibility of real environment application.