• Title/Summary/Keyword: Smart Systems and Services

Search Result 609, Processing Time 0.023 seconds

AHP Analysis Model for drawing Importance Priorities of IT Service developments for Smart Tourism (스마트관광을 위한 IT서비스 개발의 우선순위 도출을 위한 AHP 분석모델)

  • Kim, Keun-Hyung
    • The Journal of Information Systems
    • /
    • v.28 no.4
    • /
    • pp.49-64
    • /
    • 2019
  • Purpose The purpose of this paper is to observe the relative priorities of importances among IT services for Smart tourism as well as the relative priorities of importances among ways for developing the IT Services. Design/methodology/approach AHP analysis model was designed with 3 layers in order to recognize the relative importances priorities of IT services and the ways developing the IT services in Smart tourism. The factors in the top layer consist of Pre-trip IT services, During-trip IT services and Post-trip IT services. The lower factors in second layer of the Pre-trip IT services consists of Tourism information search, Online reservation and Price comparison. The lower factors of the During-trip IT services consists of Context recognition, Virtual Reality and Drone Application. The lower factors of the Post-trip IT services consists of Interactive Sharing and Tagging. The factor of third layer, the ways of developing the IT services consist of Company leading, University leading and Industry-University Collaboration. The structural questionnaire based on the AHP analysis model was designed and used to survey experts in IT and tourism areas. The collected data by the question investigation was analyzed by AHP analysis technique. Findings The importance priority of During-trip IT service was highest among in the three type IT services of tourism life cycle. The importance priority of Price comparison service was highest among IT services for Pre-trip. The importance priority of the Context recognition service was highest among IT services for During-trip. The Interactive sharing service was highest among IT services for Post-trip. It would be confirmed for the IT service development ways of Company leading to be suitable for most of the It services, such as Tourism information search, Online reservation, Price comparison, Context recognition, Virtual reality, Drone application, Interactive sharing.

Interaction Logic and Algorithm in Smart Cloud Computing (스마트 클라우드 컴퓨팅의 상호작용 로직 및 알고리즘)

  • Lee, Tae-Gyu;Shin, Seong-Yoon;Lee, Hyun-Chang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.203-206
    • /
    • 2014
  • This paper discuss both cloud computing and smart computing, and then debates structural and functional issues about how the two computing systems interact for offering user-friendly information solutions. Smart Table is proposed to configure cloud resources. Smart Control algorithm is proposed to choose the best resources. The information interaction between cloud computing and smart computing services is realized for efficient construction of information systems and for user's convenience of information services.

  • PDF

A Study on User Preference for Smart City Non-face-to-face Services: Focusing on the Cases of Sejong City and Busan City (스마트시티 비대면 서비스에 대한 이용자 선호도 연구: 세종시와 부산시 사례를 중심으로)

  • Yechan Kim;Heetae Yang
    • Information Systems Review
    • /
    • v.23 no.4
    • /
    • pp.87-102
    • /
    • 2021
  • Smart cities are attracting attention as a new economic growth engine based on new technologies and means to solve side effects of urbanization such as a surge in energy consumption, deepening environmental pollution, and an increase in crime rates. In particular, as demand for non-face-to-face services increases due to COVID-19, the role of smart cities that can provide various online and offline non-face-to-face services is becoming more important. Therefore, this study defined smart city non-face-to-face services based on literature research on the concept and underlying technology of smart city, and analyzed consumer utility for each service using Conjoint analysis. In particular, differences in user preferences between Sejong City and Busan City, which are currently designated as national smart city pilot cities in Korea, were compared and analyzed, and based on the derived results, measures to improve the competitiveness of smart city services were suggested.

Private Blockchain-Based Secure Access Control for Smart Home Systems

  • Xue, Jingting;Xu, Chunxiang;Zhang, Yuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.6057-6078
    • /
    • 2018
  • Smart home systems provide a safe, comfortable, and convenient living environment for users, whereby users enjoy featured home services supported by the data collected and generated by smart devices in smart home systems. However, existing smart devices lack sufficient protection in terms of data security and privacy, and challenging security and privacy issues inevitably emerge when using these data. This article aims to address these challenging issues by proposing a private blockchain-based access control (PBAC) scheme. PBAC involves employing a private blockchain to provide an unforgeable and auditable foundation for smart home systems, that can thwart illegal data access, and ensure the accuracy, integrity, and timeliness of access records. A detailed security analysis shows that PBAC could preserve data security against various attacks. In addition, we conduct a comprehensive performance evaluation to demonstrate that PBAC is feasible and efficient.

Application Technologies of Smart Phone for Emotional Satisfaction and Mental Health-care of the Elderly (고령자의 감성 만족과 정신건강을 위한 스마트폰 응용 기술)

  • Cho, Myeon-Gyun;Kim, Shik
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.8 no.1
    • /
    • pp.31-42
    • /
    • 2013
  • Considerations of how to facilitate aging-in-place(AIP) are becoming increasingly pertinent as care-givers are overwhelmed by an aging population. Aging friendly home-care services combined with IT can satisfy the needs of the elderly suffer from chronic diseases such as depression and dementia. Therefore, we propose future smart phone services and application technologies which can estimate emotional states of the aged and respond to the desire to be happy with mental health, connectedness and consolation from peoples. Firstly, we introduce depression measurement techniques to estimate the severity of depression using multiple sensors. At second, the emotional responding services are categorized to four parts and the details are described. Lastly, we propose the process to implement emotional communication and the application techniques(services) to fulfill the emotional satisfaction and mental healthcare for AIP using smart phone as a mediator.

A Security Reference Model for the Construction of Mobile Banking Services based on Smart Phones

  • Shin, Yong-Nyuo;Shin, Woo-Chang
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.11 no.4
    • /
    • pp.229-237
    • /
    • 2011
  • As smart phones have become widely adopted, they have brought about changes in individual lifestyles, as well as significant changes in the industry. As the mobile technology of smart phones has become associated with all areas of industry, it is not only accelerating innovation in other industries such as shopping, healthcare service, education, and finance, but is also creating new markets and business opportunities. The preparation of thorough security measures for smart phones is increasing in demand. While offering excellent mobility and convenience, smart phones can be exposed to a range of violation threats. In particular, it is necessary to make efforts to develop a security system that can preemptively cope with potential security threats in the banking service area, which requires a high level of reliability. This paper suggests a security reference model that is considered for the smart phone-based joint mobile banking development project being undertaken by the Bank of Korea in 2010. The purpose of this study is to make a security reference model for a reliable smart phone-based mobile financial service, by recognizing the specific security threats directed toward smart phones, and providing countermeasures to these security threats. The proposed mobile banking security reference model is useful in improving system security by systematically analyzing information security threats to the mobile financial service, and by presenting the guideline for the preparation of countermeasures.

Vehicular Cyber-Physical Systems for Smart Road Networks

  • Jeong, Jaehoon Paul;Lee, Eunseok
    • Information and Communications Magazine
    • /
    • v.31 no.3
    • /
    • pp.103-116
    • /
    • 2014
  • This paper proposes the design of Vehicular Cyber-Physical Systems (called VCPS) based on vehicular cloud for smart road networks. Our VCPS realizes mobile cloud computing services where vehicles themselves or mobile devices (e.g., smartphones and tablets of drivers or passengers in vehicles) play a role of both cloud server and cloud client in the vehicular cloud. First, this paper describes the architecture of vehicular networks for VCPS and the delay modeling for the event prediction and data delivery, such as a mobile node's travel delay along its navigation path and the packet delivery delay in vehicular networks. Second, the paper explains two VCPS applications as smart road services for the driving efficiency and safety through the vehicular cloud, such as interactive navigation and pedestrian protection. Last, the paper discusses further research issues for VCPS for smart road networks.

Worker-Driven Service Development Tool for Smart Factory

  • Lee, Jin-Heung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.7
    • /
    • pp.143-150
    • /
    • 2020
  • Recently, many companies are interested in smart factory services. Because various smart factory services are provided by the combination of mobile devices, cloud computing, and IoT services. However, many workers turn away from these systems because most of them are not implemented from the worker's point of view. To solve this, we implemented a development tool that allows field workers to produce their own services so that workers can easily create smart factory services. Manufacturing data is collected in real time from sensors which are connected to manufacturing facilities and stored within smart factory platforms. Implemented development tools can produce services such as monitoring, processing, analysis, and control of manufacturing data in drag-and-drop. The implemented system is effective for small manufacturing companies because of their environment: making various services quickly according to the company's purpose. In addition, it is assumed that this also will help workers' improve operation skills on running smart factories and fostering smart factory capable personnel.

Implementation of Workflow Based Smart Building Services (워크플로우 기반 스마트 빌딩 서비스 구현)

  • Lee, JaeHee;Kim, DooYoung;Song, Seheon;Lee, Sangil;Park, JaeHyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.6
    • /
    • pp.289-296
    • /
    • 2017
  • With the development of IoT technology, the scope of object controls and sensor information has expanded and services have been diversified. Energy saving efforts in buildings with high energy consumption is increasing, and services are being extended over life safety, security and convenience. However, Existing smart building services are dependent on IoT devices and are difficult to change or expand. In this paper, we have implement of workflow based smart building services to modify or extend services according to user's needs.

A Design of Access Control Method for Security Enhance based Smart Device (스마트 디바이스 기반의 보안성 강화를 위한 접근제어 기법 설계)

  • Park, Jungoh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.3
    • /
    • pp.11-20
    • /
    • 2018
  • Smart devices refer to various devices and control equipment such as health care devices, imaging devices, motor devices and wearable devices that use wireless network communication (e.g., Wi-fi, Bluetooth, LTE). Commercial services using such devices are found in a wide range of fields, including home networks, health care and medical services, entertainment and toys. Studies on smart devices have also been actively undertaken by academia and industry alike, as the penetration rate of smartphones grew and the technological progress made with the fourth industrial revolution bring about great convenience for users. While services offered through smart devices come with convenience, there is also various security threats that can lead to financial loss or even a loss of life in the case of terrorist attacks. As attacks that are committed through smart devices tend to pick up where attacks based on wireless internet left off, more research is needed on related security topics. As such, this paper seeks to design an access control method for reinforced security for smart devices. After registering and authenticating the smart device from the user's smart phone and service provider, a safe communication protocol is designed. Then to secure the integrity and confidentiality of the communication data, a management process such as for device renewal or cancellation is designed. Safety and security of the existing systems against attacks are also evaluated. In doing so, an improved efficiency by approximately 44% compared to the encryption processing speed of the existing system was verified.