• 제목/요약/키워드: Smart IoT

검색결과 1,345건 처리시간 0.031초

웨어러블 디바이스를 활용한 ECG 인증 시스템 구현 및 평가 (Implementation and Evaluation of ECG Authentication System Using Wearable Device)

  • 허재욱;진선우;전문석
    • 한국산학기술학회논문지
    • /
    • 제20권10호
    • /
    • pp.1-6
    • /
    • 2019
  • IoT 기반의 스마트홈, 핀테크 등의 모바일 기술이 발달하면서 스마트 디바이스를 이용한 사용자 인증이 일상생활에서 널리 사용되고 있다. 이에 따라 기존의 비밀번호와 같은 지식 기반의 인증 방법에서 스마트 디바이스를 이용한 존재 기반의 생체인증이 새로운 주류가 되었고, 맥파, 지문, 얼굴, 홍채 등 다양한 생체인증 중에 신체적 특성상 위변조 가능성이 낮고 고유한 특징으로 개인 식별성이 높은 ECG(Electrocardiogram, 이하 ECG)를 이용한 생체인증이 헬스케어 및 핀테크와 맞물려 높은 관심을 받고 있다. 본 연구에서는 기존의 고가이면서 부피가 커 휴대가 불가능한 ECG 측정디바이스가 아닌 소형화된 웨어러블 디바이스를 이용하여 손쉽게 사용자의 ECG 파형을 측정해 사용자 인증을 할 수 있는 ECG 인증 시스템을 구현하였다. 구현된 ECG 인증 시스템은 PQRST 고유 값 식별을 통해 ECG 특징점을 판별하고 이를 이용한 제안된 인증 프로토콜로 사용자 인증이 가능하였다. 최종적으로 성인 남성 다수를 통한 측정 평가를 통해 안정적인 정지 상태에서는 1.73%의 비교적 낮은 타인수락률과 4.14%의 본인거부율을 보였고 움직임이 있는 상태에서는 13.72%의 타인수락률과 21.68%의 높은 본인거부율을 보였다. 활동으로 인해 심박수가 상승한 정지 상태에서는 10.48%의 타인수락률과 11.21%의 본인거부율을 보였다.

MQTT와 Node-RED를 이용한 설비 모니터링 시스템의 구현 (Implementation of factory monitoring system using MQTT and Node-RED)

  • 오세춘;김태형;김영곤
    • 한국인터넷방송통신학회논문지
    • /
    • 제18권4호
    • /
    • pp.211-218
    • /
    • 2018
  • 근래에는 IoT 및 스마트팩토리 산업분야의 확산으로 인하여 IIoT와 관련한 다양한 기술들이 지속적으로 소개되고 있다. 본 논문에서는 이러한 다양한 기술들을 이용한 공장 설비 감시용 양방향 무선 네트워크 시스템의 구축을 제안한다. 본 논문에서 사용되는 주요 기술들은 다양한 현장의 설비상태를 모니터링하기 위한 초소형 센서 노드의 설계기술, 개별 센서 노드에서 처리된 다양한 정보를 무선 시스템을 이용해 서버로 전송하고 또한 서버에서 새롭게 설정된 각종 센서의 임계치들을 개별 센서 노드로 무선 전송하기 위한 Wi-Fi 기반의 MQTT 기술, 수집된 데이터를 저장하고 유무선으로 사용자에게 손쉽게 표시할 수 있는 Node-RED 기반의 설계 기술 등이다. 아울러 개별 센서 노드에서의 이상상태의 판단시에 이를 상황실로 알리고 상황실의 무선조정에 의해 현장의 화면영상을 상황실에서 확인할 수 있는 무선 양방향 카메라 시스템도 함께 구현하였다.

A Study on the Design of Low-Code and No Code Platform for Mobile Application Development

  • Chang, Young-Hyun;Ko, Chang-Bae
    • International journal of advanced smart convergence
    • /
    • 제6권4호
    • /
    • pp.50-55
    • /
    • 2017
  • Workers' demands for new applications, especially mobile applications, are increasing. Many industry analysts, researchers and corporate executives say the demand for mobile applications is becoming increasingly difficult to follow in the IT department. Gartner predicts that by 2021, the demand for mobile application development within the enterprise will increase about five times faster than IT can deliver applications. The purpose of this paper is to provide an environment where non-developers who are in charge of business development can develop apps and webs for their work. The basic concept of a new innovative App development tool, Smart Maker Authoring Tool is to develop Apps on the level using easy-to-learn Word or Excel in a computer. The main feature is that the app is developed by a non-developer worker. The coding technology is perfectly optimized to the structure and operation mechanism of the IT Infra such as hardware devices and operating system, which are the targets for implementing a desired function. Rather, it shows excellent software productivity. The most important feature of future business development is that it is developed by a non-developer worker. In this paper, we propose a no-code and low-code platform for non - developers to develop their business. In the future, we will link the IoT based Arduino system and artificial intelligent interpretation system.

원격 모니터링 및 제어가 가능한 와이파이 스마트 콘센트 (A Wifi Smart Power Outlet for Remote Monitoring and Control of Power Consumption)

  • 김홍석;나재환;박소현;곽수영
    • 한국멀티미디어학회논문지
    • /
    • 제17권2호
    • /
    • pp.160-169
    • /
    • 2014
  • 생활 주변의 사물들이 인터넷에 접속되어 사물들과의 통신이 가능한 "사물 인터넷" 시대의 흐름에 맞춰 본 논문에서는 스마트 전력 관리 시스템을 제안한다. 제안된 시스템은 와이파이 기능을 내장한 파워 콘센트와 전력 소비량을 모니터링하고 제어할 수 있는 웹서버로 구성되어 있다. 또한, 사용자가 쉽게 전력 소비 상태를 체크하고 콘센트의 전원 상태를 조작할 수 있는 스마트폰용 웹페이지도 함께 개발하였다. 본 시스템은 방화벽 또는 컴퓨터의 환경 설정 문제가 없도록 고안되어 사용의 편리성을 보장하였다.

Zigbee-based Local Army Strategy Network Configurations for Multimedia Military Service

  • Je, Seung-Mo
    • Journal of Multimedia Information System
    • /
    • 제6권3호
    • /
    • pp.131-138
    • /
    • 2019
  • With the rapid evolution of communication technology, it became possible to overcome the spatial and temporal limitations faced by humans to some extent. Furthermore, the quality of personal life was revolutionized with the emergence of the personal communication device commonly known as the smart phone. In terms of defense networks, however, due to restrictions from the military and security perspectives, the use of smart phones has been prohibited and controlled in the army; thus, they are not being used for any defense strategy purposes as yet. Despite the current consideration of smart phones for military communication, due to the difficulties of network configuration and the high cost of the necessary communication devices, the main tools of communication between soldiers are limited to the use of flag, voice or hand signals, which are all very primitive. Although these primitive tools can be very effective in certain cases, they cannot overcome temporal and spatial limitations. Likewise, depending on the level of the communication skills of each individual, communication efficiency can vary significantly. As the term of military service continues to be shortened, however, types of communication of varying efficiency depending on the levels of skills of each individual newly added to the military is not desirable at all. To address this problem, it is essential to prepare an intuitive network configuration that facilitates use by soldiers in a short period of time by easily configuring the strategy network at a low cost while maintaining its security. Therefore, in this article, the author proposes a Zigbee-based local strategic network by using Opnet and performs a simulation accordingly.

An ID-based Broadcast Encryption Scheme for Cloud-network Integration in Smart Grid

  • Niu, Shufen;Fang, Lizhi;Song, Mi;Yu, Fei;Han, Song
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권9호
    • /
    • pp.3365-3383
    • /
    • 2021
  • The rapid growth of data has successfully promoted the development of modern information and communication technologies, which are used to process data generated by public urban departments and citizens in modern cities. In specific application areas where the ciphertext of messages generated by different users' needs to be transmitted, the concept of broadcast encryption is important. It can not only improve the transmission efficiency but also reduce the cost. However, the existing schemes cannot entirely ensure the privacy of receivers and dynamically adjust the user authorization. To mitigate these deficiencies, we propose an efficient, secure identity-based broadcast encryption scheme that achieves direct revocation and receiver anonymity, along with the analysis of smart grid solutions. Moreover, we constructed a security model to ensure wireless data transmission under cloud computing and internet of things integrated devices. The achieved results reveal that the proposed scheme is semantically secure in the random oracle model. The performance of the proposed scheme is evaluated through theoretical analysis and numerical experiments.

Designing a Vehicles for Open-Pit Mining with Optimized Scheduling Based on 5G and IoT

  • Alaboudi, Abdulellah A.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권3호
    • /
    • pp.145-152
    • /
    • 2021
  • In the Recent times, various technological enhancements in the field of artificial intelligence and big data has been noticed. This advancement coupled with the evolution of the 5G communication and Internet of Things technologies, has helped in the development in the domain of smart mine construction. The development of unmanned vehicles with enhanced and smart scheduling system for open-pit mine transportation is one such much needed application. Traditional open-pit mining systems, which often cause vehicle delays and congestion, are controlled by human authority. The number of sensors has been used to operate unmanned cars in an open-pit mine. The sensors haves been used to prove the real-time data in large quantity. Using this data, we analyses and create an improved transportation scheduling mechanism so as to optimize the paths for the vehicles. Considering the huge amount the data received and aggregated through various sensors or sources like, the GPS data of the unmanned vehicle, the equipment information, an intelligent, and multi-target, open-pit mine unmanned vehicle schedules model was developed. It is also matched with real open-pit mine product to reduce transport costs, overall unmanned vehicle wait times and fluctuation in ore quality. To resolve the issue of scheduling the transportation, we prefer to use algorithms based on artificial intelligence. To improve the convergence, distribution, and diversity of the classic, rapidly non-dominated genetic trial algorithm, to solve limited high-dimensional multi-objective problems, we propose a decomposition-based restricted genetic algorithm for dominance (DBCDP-NSGA-II).

Neural Network and Cloud Computing for Predicting ECG Waves from PPG Readings

  • Kosasih, David Ishak;Lee, Byung-Gook;Lim, Hyotaek
    • Journal of Multimedia Information System
    • /
    • 제9권1호
    • /
    • pp.11-20
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.

Design and Implementation of Context-aware Application on Smartphone Using Speech Recognizer

  • Kim, Kyuseok
    • 한국정보기술학회 영문논문지
    • /
    • 제10권2호
    • /
    • pp.49-59
    • /
    • 2020
  • As technologies have been developing, our lives are getting easier. Today we are surrounded by the new technologies such as AI and IoT. Moreover, the word, "smart" is a very broad one because we are trying to change our daily environment into smart one by using those technologies. For example, the traditional workplaces have changed into smart offices. Since the 3rd industrial revolution, we have used the touch interface to operate the machines. In the 4th industrial revolution, however, we are trying adding the speech recognition module to the machines to operate them by giving voice commands. Today many of the things are communicated with human by voice commands. Many of them are called AI things and they do tasks which users request and do tasks more than what users request. In the 4th industrial revolution, we use smartphones all the time every day from the morning to the night. For this reason, the privacy using phone is not guaranteed sometimes. For example, the caller's voice can be heard through the phone speaker when accepting a call. So, it is needed to protect privacy on smartphone and it should work automatically according to the user context. In this aspect, this paper proposes a method to adjust the voice volume for call to protect privacy on smartphone according to the user context.

A Study on the Development of Artificial Intelligence Crop Environment Control Framework

  • Guangzhi Zhao
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제15권2호
    • /
    • pp.144-156
    • /
    • 2023
  • Smart agriculture is a rapidly growing field that seeks to optimize crop yields and reduce risk through the use of advanced technology. A key challenge in this field is the need to create a comprehensive smart farm system that can effectively monitor and control the growth environment of crops, particularly when cultivating new varieties. This is where fuzzy theory comes in, enabling the collection and analysis of external environmental factors to generate a rule-based system that considers the specific needs of each crop variety. By doing so, the system can easily set the optimal growth environment, reducing trial and error and the user's risk burden. This is in contrast to existing systems where parameters need to be changed for each breed and various factors considered. Additionally, the type of house used affects the environmental control factors for crops, making it necessary to adapt the system accordingly. While developing such a framework requires a significant investment of labour and time, the benefits are numerous and can lead to increased productivity and profitability in the field of smart agriculture. We developed an AI platform for optimal control of facility houses by integrating data from mushroom crops and environmental factors, and analysing the correlation between optimal control conditions and yield. Our experiments demonstrated significant performance improvement compared to the existing system.