• Title/Summary/Keyword: Smart IoT

Search Result 1,345, Processing Time 0.033 seconds

Development of Automatic Algal Bloom Remover System using IoT (사물인터넷을 적용한 녹조제거 자동화 시스템 개발)

  • Lee, Hyun-Seung;Yu, Tae-Soo;Joung, Suck-Tae;Lim, Soon-Ja
    • Journal of IKEEE
    • /
    • v.22 no.1
    • /
    • pp.93-97
    • /
    • 2018
  • In this paper, it proposes a method that uses an air pump to inject oxygen to water directly to prevent the growth of algae and cyanobacterium using MCU(Micro Controller Unit). MCU can control itself with modules of GPS, a sonic sensor, camera, conveyer belt and water pump to remove and prevent growths of algae. It can also be connected to the smart phone application software to track the system where it is and it can be controlled by the user interfaced with the smart phone application.

Design of Restaurant Advertisement and Order System using Bluetooth 4.0 Technology (블루투스 4.0 기술을 이용한 음식점 광고/주문 시스템 설계)

  • Cho, Byungho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.69-76
    • /
    • 2015
  • Bluetooth 4.0 is a low energy near communication technology. It is a suitable for Internet of Things(IoT), that is, all devices using small electric power consume are connected because power consumption is more lowing and brodening for application scope against bluetooh 3.0. Therefore in this paper, a present situation of beacon technologies are investigated and a design principle of restaurant advertisement and order system using beacon technology are presented. A beacon which is tranceiver based on bluetooth 4.0 technology and bluetooth 4.0 receiver device design is showed and design method of smart-phone interlocking these devices is presented. Also it shows that this design method is very useful for the Restaurant Advertisement & Order Commercial System production.

A Study on Hardware Implementation of 128-bit LEA Encryption Block (128비트 LEA 암호화 블록 하드웨어 구현 연구)

  • Yoon, Gi Ha;Park, Seong Mo
    • Smart Media Journal
    • /
    • v.4 no.4
    • /
    • pp.39-46
    • /
    • 2015
  • This paper describes hardware implementation of the encryption block of the '128 bit block cipher LEA' among various lightweight encryption algorithms for IoT (Internet of Things) security. Round function blocks and key-schedule blocks are designed by parallel circuits for high throughput. The encryption blocks support secret-key of 128 bits, and are designed by FSM method and 24/n stage(n=1, 2, 3, 4, 8, 12) pipeline methods. The LEA-128 encryption blocks are modeled using Verilog-HDL and implemented on FPGA, and according to the synthesis results, minimum area and maximum throughput are provided.

Applications and Issues of Medical Big Data (의료 빅데이터의 활용과 해결과제)

  • Woo, SungHee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.545-548
    • /
    • 2016
  • Big data is all data generated in the digital environment which has a variety of large and a short life cycle. The amount and type of data are becoming more and more produced on a larger scale, as a smart phone and the internet are popular, and consequently it has been converted into time for users to take advantage and extract only the valuable and useful data from the generated big data. Big data can also be applied to the medical industry and health sectors. It has created the synergy to be fused with ICT such as IoT, smart healthcare, and so on. However, there will be challenges like data security in order securely to use a meaningful and useful vast amounts of data. In this study, we analyze the future prospects of the healthcare, applications and issues of medical big data, and the expected challenges.

  • PDF

A Study on Pipeline Implementation of LEA Encryption·Decryption Block (LEA 암·복호화 블록 파이프라인 구현 연구)

  • Yoon, Gi Ha;Park, Seong Mo
    • Smart Media Journal
    • /
    • v.6 no.3
    • /
    • pp.9-14
    • /
    • 2017
  • This paper is a study on the hardware implementation of the encryption and decryption block of the lightweight block cipher algorithm LEA which can be used for tiny devices in IoT environment. It accepts all secret keys with 128 bit, 192 bit, and 256 bit sizes and aims at the integrated implementation of encryption and decryption functions. It describes design results of applying pipeline method for performance enhancement. When a decryption function is executed, round keys are used in reverse order of encryption function. An efficient hardware implementation method for minimizing performance degradation are suggested. Considering the number of rounds are 24, 28, or 32 times according to the size of secret keys, pipeline of LEA is implemented so that 4 round function operations are executed in each pipeline stage.

How to Sustain Smart Connected Hospital Services: An Experience from a Pilot Project on IoT-Based Healthcare Services

  • Park, Arum;Chang, Hyejung;Lee, Kyoung Jun
    • Healthcare Informatics Research
    • /
    • v.24 no.4
    • /
    • pp.387-393
    • /
    • 2018
  • Objectives: This paper describes an experience of implementing seamless service trials online and offline by adopting Internet of Things (IoT) technology based on near-field communication (NFC) tags and Bluetooth low-energy (BLE) beacons. The services were provided for both patients and health professionals. Methods: The pilot services were implemented to enhance healthcare service quality, improve patient safety, and provide an effective business process to health professionals in a tertiary hospital in Seoul, Korea. The services to enhance healthcare service quality include healing tours, cancer information/education, psychological assessments, indoor navigation, and exercise volume checking. The services to improve patient safety are monitoring of high-risk inpatients and delivery of real-time health information in emergency situations. In addition, the services to provide an effective business process to health professionals include surveys and web services for patient management. Results: Considering the sustainability of the pilot services, we decided to pause navigation and patient monitoring services until the interference problem could be completely resolved because beacon signal interference significantly influences the quality of services. On the other hand, we had to continue to provide new wearable beacons to high-risk patients because of hygiene issues, so the cost increased over time and was much higher than expected. Conclusions: To make the smart connected hospital services sustainable, technical feasibility (e.g., beacon signal interference), economic feasibility (e.g., continuous provision of new necklace beacons), and organizational commitment and support (e.g., renewal of new alternative medical devices and infrastructure) are required.

Smart Home Device Management System Using FOTA Technique based on TR-069 Protocol (FOTA기술을 적용한 TR-069기반의 스마트홈 디바이스 관리 시스템)

  • Son, Minjae;Park, Subin;Bae, Seongwon;Moon, Daejin;Cho, Dae-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.569-572
    • /
    • 2016
  • It is currently associated with the increase in smart home devices. So they are getting a lot IoT platform for managing and integrating these devices. However, existing platforms lack the firmware management for each device. In this paper, We will make easier the management of firmware, using a technique called POTA. This technology is a technology that allows you to update the firmware using a wireless internet without a computer and Utilizing the TR-069 protocol, we propose a system for controlling each device in CPE.

  • PDF

IoT based Wearable Smart Safety Equipment using Image Processing (영상 처리를 이용한 IoT 기반 웨어러블 스마트 안전장비)

  • Hong, Hyungi;Kim, Sang Yul;Park, Jae Wan;Gil, Hyun Bin;Chung, Mokdong
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.17 no.3
    • /
    • pp.167-175
    • /
    • 2022
  • With the recent expansion of electric kickboards and bicycle sharing services, more and more people use them. In addition, the rapid growth of the delivery business due to the COVID-19 has significantly increased the use of two-wheeled vehicles and personal mobility. As the accident rate increases, the rule related to the two-wheeled vehicles is changed to 'mandatory helmets for kickboards and single-person transportation' and was revised to prevent boarding itself without driver's license. In this paper, we propose a wearable smart safety equipment, called SafetyHelmet, that can keep helmet-wearing duty and lower the accident rate with the communication between helmets and mobile devices. To make this function available, we propose a safe driving assistance function by notifying the driver when an object that interferes with driving such as persons or other vehicles are detected by applying the YOLO v5 object detection algorithm. Therefore it is intended to provide a safer driving assistance by reducing the failure rate to identify dangers while driving single-person transportation.

A Cooperative Smart Jamming Attack in Internet of Things Networks

  • Al Sharah, Ashraf;Owida, Hamza Abu;Edwan, Talal A.;Alnaimat, Feras
    • Journal of information and communication convergence engineering
    • /
    • v.20 no.4
    • /
    • pp.250-258
    • /
    • 2022
  • The emerging scope of the Internet-of-Things (IoT) has piqued the interest of industry and academia in recent times. Therefore, security becomes the main issue to prevent the possibility of cyberattacks. Jamming attacks are threads that can affect performance and cause significant problems for IoT device. This study explores a smart jamming attack (coalition attack) in which the attackers were previously a part of the legitimate network and are now back to attack it based on the gained knowledge. These attackers regroup into a coalition and begin exchanging information about the legitimate network to launch attacks based on the gained knowledge. Our system enables jammer nodes to select the optimal transmission rates for attacks based on the attack probability table, which contains the most probable link transmission rate between nodes in the legitimate network. The table is updated constantly throughout the life cycle of the coalition. The simulation results show that a coalition of jammers can cause highly successful attacks.

Global Market Entry Strategy for Smart Personal Recognition-based Non-contact Thermometer Convergence access Control System (스마트 개인 인식기반 비접촉 체열측정기 융합 출입통제시스템의 글로벌 시장 진출전략)

  • Chung, Jason;Kim, hyung-o
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.673-675
    • /
    • 2021
  • Biometric technology is a next-generation information security technology that provides reliability and convenience. As a core technology in the post-corona era, then on-contact biometric access control system is capable of non-face-to-face and automated technology, and is active not only in Korea but also in overseas markets such as the United States, Europe, and the Middle East. There are precautions that must be taken to reflect requirements such as cooperation between companies and approval of the US Food and Drug Admin is tration in developing IoT-based smart device customized sensors and securing H/W systems.

  • PDF