• Title/Summary/Keyword: Smart IoT

Search Result 1,345, Processing Time 0.029 seconds

IoT based Multi 3D Printers Management for Personalized Manufacturing Service (개인화 제조 서비스를 위한 IoT기반 멀티 3D프린터 관리 방안 연구)

  • Kang, Hyun-chul;Han, Hyon-young;Bae, Hee-chul;Lee, Eun-seo;Son, Ji-yeon;Kim, Hyun;Kim, Young-kuk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.570-571
    • /
    • 2017
  • The manufacturing industry is evolving from the automation process to the intelligent process through ICT convergence As the spread of 3D printers, 3D printing technology is becoming a technology that leads the Industry4.0. In this paper, we propose and implement a multi-3D printer management structure and control method based on IoT optimized for personalized manufacturing services.

  • PDF

A Study on the Security Technology of Real-time Biometric Data in IoT Environment

  • Shin, Yoon-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.1
    • /
    • pp.85-90
    • /
    • 2016
  • In this paper, the biometric data is transmitted in real time from the IoT environment is runoff, forgery, alteration, prevention of the factors that can be generated from a denial-of-service in advance, and the security strategy for the biometric data to protect the biometric data secure from security threats offer. The convenience of living in our surroundings to life with the development of ubiquitous computing and smart devices are available in real-time. And is also increasing interest in the IOT. IOT environment is giving the convenience of life. However, security threats to privacy also are exposed for 24 hours. This paper examines the security threats to biological data to be transmitted in real time from IOT environment. The technology for such security requirements and security technology according to the analysis of the threat. And with respect to the biometric data transmitted in real time on the IoT environment proposes a security strategy to ensure the stability against security threats and described with respect to its efficiency.

Construction and Development of IoT-based Home Gas Equipment Safety Platform Service (IoT 기반 가정 가스시설 안전 플랫폼 서비스 구축 및 개발)

  • Oh, Jeong-Seok;Baek, Dong-Seok;Park, Tae-Jun;Kim, Jong-Hyeok
    • Journal of the Korean Institute of Gas
    • /
    • v.23 no.5
    • /
    • pp.15-23
    • /
    • 2019
  • 42.5% of domestic gas accident due to human factors, and 38% occurred in residential area. Also gas accident caused by deterioration / malfunction increased more than 2 times for last 1 year. In this study we developed IoT based gas safety platform service for Home-gas safety, which secured 99.32% of data transmit accuracy, monitoring and remote control through LPWA bidirectional communication.

Education Content Service Platform Using the Near Field Communication based on IoT (IoT 기반의 근거리 통신 기술을 활용한 교육콘텐츠 서비스 플랫폼)

  • Ryu, Chang-su
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.690-692
    • /
    • 2014
  • Conventional one-way cramming education at schools has the disadvantage of poor student interest in learning, immersion, and learning efficiency as well as a limitation in realizing collective intelligence and collaborative learning. Therefore, an educational content service platform using a near-field communication(NFC) technology is required as a tool for encouraging the voluntary learning participation of students and increasing learning effectiveness through self-directed studying. This study focuses on the development of an educational content production system that creates high-quality education contents suitable for smart schools. In these schools, students and teachers generally communicate through an electronic blackboard using Bluetooth, which is an NFC technology. Further, the lecture notes of individual students are reproduced and collected as big data, which will facilitate the sharing of these notes.

  • PDF

Big IoT Healthcare Data Analytics Framework Based on Fog and Cloud Computing

  • Alshammari, Hamoud;El-Ghany, Sameh Abd;Shehab, Abdulaziz
    • Journal of Information Processing Systems
    • /
    • v.16 no.6
    • /
    • pp.1238-1249
    • /
    • 2020
  • Throughout the world, aging populations and doctor shortages have helped drive the increasing demand for smart healthcare systems. Recently, these systems have benefited from the evolution of the Internet of Things (IoT), big data, and machine learning. However, these advances result in the generation of large amounts of data, making healthcare data analysis a major issue. These data have a number of complex properties such as high-dimensionality, irregularity, and sparsity, which makes efficient processing difficult to implement. These challenges are met by big data analytics. In this paper, we propose an innovative analytic framework for big healthcare data that are collected either from IoT wearable devices or from archived patient medical images. The proposed method would efficiently address the data heterogeneity problem using middleware between heterogeneous data sources and MapReduce Hadoop clusters. Furthermore, the proposed framework enables the use of both fog computing and cloud platforms to handle the problems faced through online and offline data processing, data storage, and data classification. Additionally, it guarantees robust and secure knowledge of patient medical data.

A Study on a Method for Detecting Leak Holes in Respirators Using IoT Sensors

  • Woochang Shin
    • International journal of advanced smart convergence
    • /
    • v.12 no.4
    • /
    • pp.378-385
    • /
    • 2023
  • The importance of wearing respiratory protective equipment has been highlighted even more during the COVID-19 pandemic. Even if the suitability of respiratory protection has been confirmed through testing in a laboratory environment, there remains the potential for leakage points in the respirators due to improper application by the wearer, damage to the equipment, or sudden movements in real working conditions. In this paper, we propose a method to detect the occurrence of leak holes by measuring the pressure changes inside the mask according to the wearer's breathing activity by attaching an IoT sensor to a full-face respirator. We designed 9 experimental scenarios by adjusting the degree of leak holes of the respirator and the breathing cycle time, and acquired respiratory data for the wearer of the respirator accordingly. Additionally, we analyzed the respiratory data to identify the duration and pressure change range for each breath, utilizing this data to train a neural network model for detecting leak holes in the respirator. The experimental results applying the developed neural network model showed a sensitivity of 100%, specificity of 94.29%, and accuracy of 97.53%. We conclude that the effective detection of leak holes can be achieved by incorporating affordable, small-sized IoT sensors into respiratory protective equipment.

Privacy-Preserving Aggregation of IoT Data with Distributed Differential Privacy

  • Lim, Jong-Hyun;Kim, Jong-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.6
    • /
    • pp.65-72
    • /
    • 2020
  • Today, the Internet of Things is used in many places, including homes, industrial sites, and hospitals, to give us convenience. Many services generate new value through real-time data collection, storage and analysis as devices are connected to the network. Many of these fields are creating services and applications that utilize sensors and communication functions within IoT devices. However, since everything can be hacked, it causes a huge privacy threat to users who provide data. For example, a variety of sensitive information, such as personal information, lifestyle patters and the existence of diseases, will be leaked if data generated by smarwatches are abused. Development of IoT must be accompanied by the development of security. Recently, Differential Privacy(DP) was adopted to privacy-preserving data processing. So we propose the method that can aggregate health data safely on smartwatch platform, based on DP.

Impact of Road Traffic Characteristics on Environmental Factors Using IoT Urban Big Data (IoT 도시빅데이터를 활용한 도로교통특성과 유해환경요인 간 영향관계 분석)

  • Park, Byeong hun;Yoo, Dayoung;Park, Dongjoo;Hong, Jungyeol
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.20 no.5
    • /
    • pp.130-145
    • /
    • 2021
  • As part of the Smart Seoul policy, the importance of using big urban data is being highlighted. Furthermore interest in the impact of transportation-related urban environmental factors such as PM10 and noise on citizen's quality of life is steadily increasing. This study established the integrated DB by matching IoT big data with transportation data, including traffic volume and speed in the microscopic Spatio-temporal scope. This data analyzed the impact of a spatial unit in the road-effect zone on environmental risk level. In addition, spatial units with similar characteristics of road traffic and environmental factors were clustered. The results of this study can provide the basis for systematically establishing environmental risk management of urban spatial units such as PM10 or PM2.5 hot-spot and noise hot-spot.

A Study on Smart Door Lock using Internet of Things (IoT를 이용한 스마트 도어락에 관한 연구)

  • Kim, Jang-Won
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.539-544
    • /
    • 2020
  • The research is on progressing to operate digital door lock with the method to guarantee the security and safety in the meantime to use digital door lock conveniently using Internet of Things (IoT) standardizing various service providing technology using IoT in home network currently. In this study, compose home network interconnecting Raspberry-PI and web server reflection this trend and composed the system to control the door lock after connect Arduino substituting converter function. Making Raspberry-PI using dynamic IP address using existing open source easily maintain DNS information and possible to connect internet network in home network ethernet and finally, making the smartphone can control door lock remotely entering designated address after connect the internet. The connection between home network and Arduino is executed by Raspberry-PI and bluetooth pairing as 1:1 and make random user's access to be impossible. Especially, to make open/close the door lock with smartphone not by using password on the keypad or using RFID card is judged as the method increasing the security make random user's access to be impossible and also increased the usefulness making remote control to be possible.

A Message Communication for Secure Data Communication in Smart Home Environment Based Cloud Service (클라우드 서비스 기반 스마트 홈 환경에서 안전한 데이터 통신을 위한 메시지 통신 프로토콜 설계)

  • Park, Jung-Oh
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.7
    • /
    • pp.21-30
    • /
    • 2021
  • With the development of IoT technology, various cloud computing-based services such as smart cars, smart healthcare, smart homes, and smart farms are expanding. With the advent of a new environment, various problems continue to occur, such as the possibility of exposure of important information such as personal information or company secrets, financial damage cases due to hacking, and human casualties due to malicious attack techniques. In this paper, we propose a message communication protocol for smart home-based secure communication and user data protection. As a detailed process, secure device registration, message authentication protocol, and renewal protocol were newly designed in the smart home environment. By referring to the security requirements related to the smart home service, the stability of the representative attack technique was verified, and as a result of performing a comparative analysis of the performance, the efficiency of about 50% in the communication aspect and 25% in the signature verification aspect was confirmed.