• Title/Summary/Keyword: Service using Smart Device

Search Result 260, Processing Time 0.028 seconds

Beacon-based Internet of Things(IoT) analysis of the Case Study (비콘 기반의 사물인터넷(IoT) 활용 사례 분석)

  • Hwang, Hyun-seo;Park, Jin-tae;Yun, Jun-soo;Phyo, Gyung-soo;Moon, Il-young;Lee, Jong-sung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.977-980
    • /
    • 2015
  • Beacons have been noted in the core of the recent things Internet. It is also the technology is spreading most rapidly among the things Internet-related communication technologies. Beacon is a data communications technology that provides information that is customized to know the user's location. Using the BLE technology, to grasp the position of such people and goods. In addition to the non-contact method, since it is possible to communicate within the maximum 70m, it has attracted the interest than the NFC. Beacon, guidance for the current coupon, you can use as an advertising platform, such as the provision of product information, it has also been used in the indoor positioning service. Therefore, in this paper, we introduce about whether Case Study beacon is utilized how in the Internet of Things, were analyzed. Beacon exit the smart phone, the date to be used in conjunction with a wearable device, such as Google glasses and smart watch was not far away. Future it is expected or beacons are used everywhere to be expanded.

  • PDF

A Design of Information Security Education training Databank System for Preventing Computer Security incident (침해사고 예방을 위한 정보보안 교육훈련 문제은행 시스템)

  • Mo, Eun-Su;Lee, Jae-Pil;Lee, Jae-Gwang;Lee, Jun-Hyeon;Lee, Jae-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.277-280
    • /
    • 2015
  • Smishing, Phishing personal privacy caused by Incident accidents such as Phishing information security has become a hot topic. Such incidents have privacy in personal information management occurs due to a lack of user awareness. This paper is based on the existing structure of the XML Tag question bank used a different Key-Value Structure-based JSON. JSON is an advantage that does not depend on the language in the text-based interchange format. The proposed system is divided into information security sector High, Middle and Low grade. and Provides service to the user through the free space and the smart device and the PC to the constraints of time. The use of open source Apache Load Balancing technology for reliable service. It also handles the user's web page without any training sessions Require server verification result of the training(training server). The result is sent to the training server using jQuery Ajax. and The resulting data are stored in the database based on the user ID. Also to be used as a training statistical indicators. In this paper, we design a level training system to enhance the user's information security awareness.

  • PDF

A Study on the RFID's Application Environment and Application Measure for Security (RFID의 보안업무 적용환경과 적용방안에 관한 연구)

  • Chung, Tae-Hwang
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.155-175
    • /
    • 2009
  • RFID that provide automatic identification by reading a tag attached to material through radio frequency without direct touch has some specification, such as rapid identification, long distance identification and penetration, so it is being used for distribution, transportation and safety by using the frequency of 125KHz, 134KHz, 13.56MHz, 433.92MHz, 900MHz, and 2.45GHz. Also it is one of main part of Ubiquitous that means connecting to net-work any time and any place they want. RFID is expected to be new growth industry worldwide, so Korean government think it as prospective field and promote research project and exhibition business program to linked with industry effectively. RFID could be used for access control of person and vehicle according to section and for personal certify with password. RFID can provide more confident security than magnetic card, so it could be used to prevent forgery of register card, passport and the others. Active RFID could be used for protecting operation service using it's long distance date transmission by application with positioning system. And RFID's identification and tracking function can provide effective visitor management through visitor's register, personal identification, position check and can control visitor's movement in the secure area without their approval. Also RFID can make possible of the efficient management and prevention of loss of carrying equipments and others. RFID could be applied to copying machine to manager and control it's user, copying quantity and It could provide some function such as observation of copy content, access control of user. RFID tag adhered to small storage device prevent carrying out of item using the position tracking function and control carrying-in and carrying-out of material efficiently. magnetic card and smart card have been doing good job in identification and control of person, but RFID can do above functions. RFID is very useful device but we should consider the prevention of privacy during its application.

  • PDF

Experimental Evaluation of Prestress Force in Tendons for Prestressed Concrete Girders using Sensors (계측 센서를 활용한 PSC 거더 텐던의 긴장력 측정 실험)

  • Shin, Kyung-Joon;Park, Young-Ung;Lee, Seong-Cheol;Kim, Yun Yong;Lee, Hwan-Woo
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.28 no.6
    • /
    • pp.715-722
    • /
    • 2015
  • The prestressing force has not been managed after construction nevertheless it is one of the importrant factors that maintain the structural safety of PSC girder bridges. The prestressing force is just measured during construction using jacking device and after that, it can not be managed practically. For this reason, this study investigated the measurements of prestress using embedded sensors that can be available now with an ultimate goal to propose smart prestressed girders that can measure the prestress from the birth to the end of service life. 4 types of sensors were installed on the small prestressed girders, and the applicability and the accuracy of those sensors were tested while the prestress was applied to the girders. The results show that a center-hole type loadcell has a tendency to measure a prestressing force higher than a reference value, especially when it is loaded with an eccentricity. a EM sensor shows several advantages that has a good practical accuracy, that can be installed anyplace along the tendons.

A Study on the Pattern Analysis Method using the User Log on the CMS (CMS의 사용자 로그를 이용한 패턴 분석 방법 연구)

  • Moon, Dong-Yeol;Park, Koo-Rack;Kim, Dong-Hyun;Jung, Jin-Young
    • Journal of Digital Convergence
    • /
    • v.14 no.11
    • /
    • pp.275-281
    • /
    • 2016
  • In modern society, which boomed it became easier to obtain the necessary information to the emergence of a variety of smart devices. Due to this, the frequency of using the content based on the Web is growing rapidly. In addition, companies are turning into a production and modify the content using the CMS under the web-based. It can be a very important part to provide users with the content. Currently web services are designing a UI to the device and provided. To improve the ease of use, they are enhancing services only by survey and analysis of the patterns of all users. Most are designed without considering the UX only in the technical aspects. In this paper, to break the limits that apply to all users of the Web service pattern analysis, we propose a visualization system via the animation based on the individual user's movement patterns and usage patterns. Through this convergence is expected to be able to transform the web from the central manager to the user UX and the planning aspects researchers.

A Study on the Relationship between Camera and Subject for Visualization of Image - A Focus on the Status of Watch a Movie with Small Mobile Device - (영상의 시각화를 위한 카메라와 피사체의 상관관계 연구 - 스마트폰 사용자의 영상 시청 현황을 중심으로 -)

  • Ko, Hyun-Wook
    • Journal of Korea Entertainment Industry Association
    • /
    • v.13 no.5
    • /
    • pp.119-126
    • /
    • 2019
  • Watching movies is common on a big screen like a theater or on a big-screen TV. nowadays, small platform such as mobile devices is increasing rapidly for watch a movie. These changes are deeply related to the advent of Internet-based video streaming services such as OTT. OTT's development has provided in free video viewing system without using the set-top box is free from the limitations of time and space. Leading the market is Netflix[1], which started its business with Internet-based DVD rental service. Netflix, which is growing in tandem with the mobile market, had 193.26[2] million members as of the end of 2018. Other OTT participating companies include content-based Pooq, TVing, platform-based Olleh TV Mobile, Oksusu and LTE video portal. The size of such new growth projects has grown gradually, with 25.4 percent of all smartphone users currently watching video content with small mobile devices. Therefore, de-largeization, it is thought that visual language is needed for viewing small mobile devices that are capable of OTT services. To this end, this paper will identify the problem in viewing popular video content with small mobile devices and Survey and study its impact on viewers using the questionnaire.

A Study on Counting Measurement of Cultural Infrastructure Visitors: Focused on the Wireless Signal-Based Measurement (무선신호기반 측정방식을 활용한 문화기반시설 이용자 현황 측정에 관한 연구)

  • Kim, Ji-Hak;Park, Geun-Hwa
    • Korean Association of Arts Management
    • /
    • no.59
    • /
    • pp.73-99
    • /
    • 2021
  • Free admission policies have been gradually extended for the public to use cultural facilities free of charge, which lowered the barriers to use those facilities and has a great effect on increasing visitor demands. However, the annual number of visitors which is open to the public isn't quite accurate and varies from institution to institution, which means just a head count. Especially people counter overestimates the number of visitors because it counts visitors in duplicate. Therefore, the purpose of this study is to prepare effective way of grasping the number of visitors using cultural infrastructure. First, comparable number of visitors should be measured by defining the notion of visitor clearly, which has been measured vaguely. Secondly, the problem of duplicate count, which is considered the most problematic, should be solved. Thirdly, the various analysis of visitor behavior should be conducted to provide a high-quality service. To work out the problems above, new measurement will be presented here. This study suggests a state-of-the-art wireless signal-based measurement that could eliminate the duplicate data by collecting MAC address -smart device's distinct signal value. And it also could analyze diverse visitor behaviors by understanding a flow of visitor traffic, duration of stay and revisitation. I would like to examine the possibility and effectiveness of this new measurement by testing it.

A Study on the Regional Characteristics of Broadband Internet Termination by Coupling Type using Spatial Information based Clustering (공간정보기반 클러스터링을 이용한 초고속인터넷 결합유형별 해지의 지역별 특성연구)

  • Park, Janghyuk;Park, Sangun;Kim, Wooju
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.3
    • /
    • pp.45-67
    • /
    • 2017
  • According to the Internet Usage Research performed in 2016, the number of internet users and the internet usage have been increasing. Smartphone, compared to the computer, is taking a more dominant role as an internet access device. As the number of smart devices have been increasing, some views that the demand on high-speed internet will decrease; however, Despite the increase in smart devices, the high-speed Internet market is expected to slightly increase for a while due to the speedup of Giga Internet and the growth of the IoT market. As the broadband Internet market saturates, telecom operators are over-competing to win new customers, but if they know the cause of customer exit, it is expected to reduce marketing costs by more effective marketing. In this study, we analyzed the relationship between the cancellation rates of telecommunication products and the factors affecting them by combining the data of 3 cities, Anyang, Gunpo, and Uiwang owned by a telecommunication company with the regional data from KOSIS(Korean Statistical Information Service). Especially, we focused on the assumption that the neighboring areas affect the distribution of the cancellation rates by coupling type, so we conducted spatial cluster analysis on the 3 types of cancellation rates of each region using the spatial analysis tool, SatScan, and analyzed the various relationships between the cancellation rates and the regional data. In the analysis phase, we first summarized the characteristics of the clusters derived by combining spatial information and the cancellation data. Next, based on the results of the cluster analysis, Variance analysis, Correlation analysis, and regression analysis were used to analyze the relationship between the cancellation rates data and regional data. Based on the results of analysis, we proposed appropriate marketing methods according to the region. Unlike previous studies on regional characteristics analysis, In this study has academic differentiation in that it performs clustering based on spatial information so that the regions with similar cancellation types on adjacent regions. In addition, there have been few studies considering the regional characteristics in the previous study on the determinants of subscription to high-speed Internet services, In this study, we tried to analyze the relationship between the clusters and the regional characteristics data, assuming that there are different factors depending on the region. In this study, we tried to get more efficient marketing method considering the characteristics of each region in the new subscription and customer management in high-speed internet. As a result of analysis of variance, it was confirmed that there were significant differences in regional characteristics among the clusters, Correlation analysis shows that there is a stronger correlation the clusters than all region. and Regression analysis was used to analyze the relationship between the cancellation rate and the regional characteristics. As a result, we found that there is a difference in the cancellation rate depending on the regional characteristics, and it is possible to target differentiated marketing each region. As the biggest limitation of this study and it was difficult to obtain enough data to carry out the analyze. In particular, it is difficult to find the variables that represent the regional characteristics in the Dong unit. In other words, most of the data was disclosed to the city rather than the Dong unit, so it was limited to analyze it in detail. The data such as income, card usage information and telecommunications company policies or characteristics that could affect its cause are not available at that time. The most urgent part for a more sophisticated analysis is to obtain the Dong unit data for the regional characteristics. Direction of the next studies be target marketing based on the results. It is also meaningful to analyze the effect of marketing by comparing and analyzing the difference of results before and after target marketing. It is also effective to use clusters based on new subscription data as well as cancellation data.

Development of a complex failure prediction system using Hierarchical Attention Network (Hierarchical Attention Network를 이용한 복합 장애 발생 예측 시스템 개발)

  • Park, Youngchan;An, Sangjun;Kim, Mintae;Kim, Wooju
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.4
    • /
    • pp.127-148
    • /
    • 2020
  • The data center is a physical environment facility for accommodating computer systems and related components, and is an essential foundation technology for next-generation core industries such as big data, smart factories, wearables, and smart homes. In particular, with the growth of cloud computing, the proportional expansion of the data center infrastructure is inevitable. Monitoring the health of these data center facilities is a way to maintain and manage the system and prevent failure. If a failure occurs in some elements of the facility, it may affect not only the relevant equipment but also other connected equipment, and may cause enormous damage. In particular, IT facilities are irregular due to interdependence and it is difficult to know the cause. In the previous study predicting failure in data center, failure was predicted by looking at a single server as a single state without assuming that the devices were mixed. Therefore, in this study, data center failures were classified into failures occurring inside the server (Outage A) and failures occurring outside the server (Outage B), and focused on analyzing complex failures occurring within the server. Server external failures include power, cooling, user errors, etc. Since such failures can be prevented in the early stages of data center facility construction, various solutions are being developed. On the other hand, the cause of the failure occurring in the server is difficult to determine, and adequate prevention has not yet been achieved. In particular, this is the reason why server failures do not occur singularly, cause other server failures, or receive something that causes failures from other servers. In other words, while the existing studies assumed that it was a single server that did not affect the servers and analyzed the failure, in this study, the failure occurred on the assumption that it had an effect between servers. In order to define the complex failure situation in the data center, failure history data for each equipment existing in the data center was used. There are four major failures considered in this study: Network Node Down, Server Down, Windows Activation Services Down, and Database Management System Service Down. The failures that occur for each device are sorted in chronological order, and when a failure occurs in a specific equipment, if a failure occurs in a specific equipment within 5 minutes from the time of occurrence, it is defined that the failure occurs simultaneously. After configuring the sequence for the devices that have failed at the same time, 5 devices that frequently occur simultaneously within the configured sequence were selected, and the case where the selected devices failed at the same time was confirmed through visualization. Since the server resource information collected for failure analysis is in units of time series and has flow, we used Long Short-term Memory (LSTM), a deep learning algorithm that can predict the next state through the previous state. In addition, unlike a single server, the Hierarchical Attention Network deep learning model structure was used in consideration of the fact that the level of multiple failures for each server is different. This algorithm is a method of increasing the prediction accuracy by giving weight to the server as the impact on the failure increases. The study began with defining the type of failure and selecting the analysis target. In the first experiment, the same collected data was assumed as a single server state and a multiple server state, and compared and analyzed. The second experiment improved the prediction accuracy in the case of a complex server by optimizing each server threshold. In the first experiment, which assumed each of a single server and multiple servers, in the case of a single server, it was predicted that three of the five servers did not have a failure even though the actual failure occurred. However, assuming multiple servers, all five servers were predicted to have failed. As a result of the experiment, the hypothesis that there is an effect between servers is proven. As a result of this study, it was confirmed that the prediction performance was superior when the multiple servers were assumed than when the single server was assumed. In particular, applying the Hierarchical Attention Network algorithm, assuming that the effects of each server will be different, played a role in improving the analysis effect. In addition, by applying a different threshold for each server, the prediction accuracy could be improved. This study showed that failures that are difficult to determine the cause can be predicted through historical data, and a model that can predict failures occurring in servers in data centers is presented. It is expected that the occurrence of disability can be prevented in advance using the results of this study.

Edge to Edge Model and Delay Performance Evaluation for Autonomous Driving (자율 주행을 위한 Edge to Edge 모델 및 지연 성능 평가)

  • Cho, Moon Ki;Bae, Kyoung Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.1
    • /
    • pp.191-207
    • /
    • 2021
  • Up to this day, mobile communications have evolved rapidly over the decades, mainly focusing on speed-up to meet the growing data demands of 2G to 5G. And with the start of the 5G era, efforts are being made to provide such various services to customers, as IoT, V2X, robots, artificial intelligence, augmented virtual reality, and smart cities, which are expected to change the environment of our lives and industries as a whole. In a bid to provide those services, on top of high speed data, reduced latency and reliability are critical for real-time services. Thus, 5G has paved the way for service delivery through maximum speed of 20Gbps, a delay of 1ms, and a connecting device of 106/㎢ In particular, in intelligent traffic control systems and services using various vehicle-based Vehicle to X (V2X), such as traffic control, in addition to high-speed data speed, reduction of delay and reliability for real-time services are very important. 5G communication uses high frequencies of 3.5Ghz and 28Ghz. These high-frequency waves can go with high-speed thanks to their straightness while their short wavelength and small diffraction angle limit their reach to distance and prevent them from penetrating walls, causing restrictions on their use indoors. Therefore, under existing networks it's difficult to overcome these constraints. The underlying centralized SDN also has a limited capability in offering delay-sensitive services because communication with many nodes creates overload in its processing. Basically, SDN, which means a structure that separates signals from the control plane from packets in the data plane, requires control of the delay-related tree structure available in the event of an emergency during autonomous driving. In these scenarios, the network architecture that handles in-vehicle information is a major variable of delay. Since SDNs in general centralized structures are difficult to meet the desired delay level, studies on the optimal size of SDNs for information processing should be conducted. Thus, SDNs need to be separated on a certain scale and construct a new type of network, which can efficiently respond to dynamically changing traffic and provide high-quality, flexible services. Moreover, the structure of these networks is closely related to ultra-low latency, high confidence, and hyper-connectivity and should be based on a new form of split SDN rather than an existing centralized SDN structure, even in the case of the worst condition. And in these SDN structural networks, where automobiles pass through small 5G cells very quickly, the information change cycle, round trip delay (RTD), and the data processing time of SDN are highly correlated with the delay. Of these, RDT is not a significant factor because it has sufficient speed and less than 1 ms of delay, but the information change cycle and data processing time of SDN are factors that greatly affect the delay. Especially, in an emergency of self-driving environment linked to an ITS(Intelligent Traffic System) that requires low latency and high reliability, information should be transmitted and processed very quickly. That is a case in point where delay plays a very sensitive role. In this paper, we study the SDN architecture in emergencies during autonomous driving and conduct analysis through simulation of the correlation with the cell layer in which the vehicle should request relevant information according to the information flow. For simulation: As the Data Rate of 5G is high enough, we can assume the information for neighbor vehicle support to the car without errors. Furthermore, we assumed 5G small cells within 50 ~ 250 m in cell radius, and the maximum speed of the vehicle was considered as a 30km ~ 200 km/hour in order to examine the network architecture to minimize the delay.