• Title/Summary/Keyword: internet of Everything

Search Result 67, Processing Time 0.023 seconds

Design and Implementation of Nools-based Rule Engine for Smart IoE Platform (지능형 IoE 플랫폼을 위한 Nools 기반 룰 엔진의 설계 및 구현)

  • Lee, Sung-Hun;Hwang, Chae-Eun;Jeong, Jin-Woo
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.4
    • /
    • pp.379-387
    • /
    • 2018
  • In order to make the IoT ecosystem more usable and friendly to general users, the interaction between the users and platforms/devices and its UX must be improved. In this study, a web-based rule engine system to help users intuitively interact with the various devices and services in IoE (Internet of Everything) platform is proposed. The proposed system consists of web interfaces and UI components for creating and managing rule-based scenarios using sensors, actuators, and external services in an intuitive way. Also, a rule management module for automatically translating the rules from the web interface into Nools rule engine compatible ones is proposed. Finally, we show the usability and feasibility of the proposed system by demonstration of rule-based use cases of IoT devices and external services.

Mobile Ultra-Broadband, Super Internet-of-Things and Artificial Intelligence for 6G Visions

  • Hamza Ali Alshawabkeh
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.235-245
    • /
    • 2023
  • Smart applications based on the Network of Everything also known as Internet of Everything (IoE) are increasing popularity as network connectivity requires rise further. As a result, there will be a greater need for developing 6G technologies for wireless communications in order to overcome the primary limitations of visible 5G networks. Furthermore, implementing neural networks into 6G will bring remedies for the most complex optimizing networks challenges. Future 6G mobile phone networks must handle huge applications that require data and an increasing amount of users. With a ten-year time skyline from thought to the real world, it is presently time for pondering what 6th era (6G) remote correspondence will be just before 5G application. In this article, we talk about 6G dreams to clear the street for the headway of 6G and then some. We start with the conversation of imaginative 5G organizations and afterward underline the need of exploring 6G. Treating proceeding and impending remote organization improvement in a serious way, we expect 6G to contain three critical components: cell phones super broadband, very The Web of Things (or IoT and falsely clever (artificial intelligence). The 6G project is currently in its early phases, and people everywhere must envision and come up with its conceptualization, realization, implementation, and use cases. To that aim, this article presents an environment for Presented Distributed Artificial Intelligence as-a-Services (DAIaaS) supplying in IoE and 6G applications. The case histories and the DAIaaS architecture have been evaluated in terms of from end to end latency and bandwidth consumption, use of energy, and cost savings, with suggestion to improve efficiency.

Immersion Experience of the Cyber World of Adolescents (청소년의 사이버세계 몰입경험)

  • 박남희;조영란;최원희;문남진;안혜경;신재신
    • Journal of Korean Academy of Nursing
    • /
    • v.34 no.1
    • /
    • pp.15-24
    • /
    • 2004
  • Purpose: The purpose of this research was to explore the cyber world immersion experience of adolescents. Method: Multiple strategies for data collecting were used: an in depth face-to-face interview; analysis of adolescent' writings; and analysis of examples of phenomenon in the realistic world. The sample group consisted of 10 adolescents. Results: Although the experience was different for all adolescent interviewed, the essential themes of experience emerged: "fill up", "homoeologous feeling", "the older generation has a conflicting negative opinion", "change in social character", "become habitually skeptic", "have bad health", "mean of superiority and getting everything solved", "ease of access", "monetary benefit", "addiction to the computer", "forget real life solved stress", "do harm to society", "take comfort", or "new job". Conclusion: Accordingly this paper suggests that contact with various software is necessary in adolescents, and good quality contents function to prepare and activate adolescents to apply the internet for good use.

The Development Model of a non-rechargeable wrist-type smart-band for the vulnerable group

  • YU, Kyoungsung;SHIN, Seung-Jung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.170-181
    • /
    • 2022
  • We live in a digital age. Smartphones are used by everyone from children to the elderly. And many smart devices are pouring out and changing our daily life a lot. However, even in the development of this digital age, there are some marginalized groups. There are also those who are reluctant to expose their information in the digital age. They have difficulty making reservations on their smartphones, using payment systems, logging into the site using various authentication and verification procedures, and entering and leaving buildings. We still carry most IDs, seals, certificates, etc. in physical form. Those who use smartphones are enjoying the convenience of the times. However, among the underprivileged, the desire to pass everything with only one device is growing. In this study, the most suitable smart band model was proposed by collecting the Delphi survey and the opinions of the general public. Future research is required to improve practical usability and utility by developing cheaper and more convenient models.

The Actualizatoin of e-Community and Change Management in Higher Education (대학의 e-커뮤니티활성화와 변화관리)

  • Kim, Se-Ihn
    • The Journal of Information Technology
    • /
    • v.8 no.2
    • /
    • pp.1-16
    • /
    • 2005
  • In high education, knowledge is the very important resource and output. Knowledge management is the art of creating additional value from academic knowledge assets. The e-community is the network community, newly created by information communication technology, and the critical place that share and transfer people's the various knowledge and thinking and the effective space that can apply knowledge management. If we construct a convenient and useful e-community in our university, we will be able to increase the student's intellectual needs, and create new knowledge. Web-portal will promote the activity of e-community providing easy to access and personalized web circumstance. The emergence of Internet and Web access to all university services will force institutions to rethik everything. We should reconfigure our academic environment in order to adapt information technology and educational change, and must do change management based on their structure and culture.

  • PDF

A Study and Countermeasure of the Infected TTF(True type Font) Files (감염된 TTF(True Type Font)파일에 대한 연구 및 대응방법)

  • Park, Yeon-Jin;Oh, Ju-Hye;Lee, Keun-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.283-285
    • /
    • 2016
  • 최근 정보통신 기술의 발전과 함께 M2M(Machine-to-Machine) 산업분야의 시스템이 다기능 고성능화되고 있으며 IoT(Internet of Things), IoE(Internet of Everything)기술 등과 함께 많은 발전해가고 있다[1]. 가장 오래 된 정보통신 기술의 근간인 웹 애플리케이션은 점점 발전하고 고도화 되어가고 있으며 이러한 웹 애플리케이션을 해킹하는 기술도 다양한 관점에서 발전하고 있다. 웹 애플리케이션을 구성하는데 필수적인 파일인 TTF(True Type Font)파일에 대한 보안적 관심이 필요하다. TTF파일을 외부에서 받아옴으로서 웹 애플리케이션에 적용시키는 방식을 사용할 때, 다른 서버에서 URL을 통해 받아오는 TTF파일에 대해 보안적 검사가 제대로 실행되지 않는다. 본 논문에서는 TTF파일의 감염과 그 파일에 대한 대응 방법을 제안하고자 한다.

Basic Study on Safety Accident Prevention System Development Using Wearable Device (웨어러블 장치를 이용한 건설사고 예방 시스템 개발 기초 연구)

  • Ryu, Han-Guk;Kang, Jin-Woo
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2018.11a
    • /
    • pp.55-56
    • /
    • 2018
  • In order to reduce the risk of accidents, we proposed a construction safety management system combined with wearable device and LoRa (Low-Range Wireless Network) communication method to apply the usefulness of Internet (IoT) technology which means "everything connected". to construction safety management Management system. The proposed wearable safety device is a device that relays information exchange between wearable safety device and safety management server by LoRa wireless communication method. The safety management server can store workers bio-data and perform big data analysis. If a risk factor is determined from the analysis result, a warning is sent to the wearable safety device and the manager's application. The goal of this system is to prevent construction workers from entering the dangerous area that is not suitable for work, and to prevent safety accidents caused by human cause by detecting abnormal condition during work.

  • PDF

IoE 환경에 적합한 보안 경고 디스플레이를 활용한 개인정보 보호 기법

  • Ryoo, Jungwoo
    • Review of KIISC
    • /
    • v.27 no.1
    • /
    • pp.25-30
    • /
    • 2017
  • 최근, Internet of Everything (IoE)는 Internet of Things (IoT)의 영역을 급속히 확장하며 그 범위를 넓혀가고 있다. IoT가 여러 가지 다양한 센서들을 인터넷에 연결하는 기술이라면 IoE는 우리주변의 모든 기기들 (예를 들면 가전제품이나 보안 시스템)을 IoE와 아울러서 통합된 망을 구축함으로써 여러 가지 상승효과를 모색하는 정보산업의 새로운 흐름이라 할 수 있겠다. 하지만, IoE의 많은 장점에도 불구하고, 새롭게 개발되고 있는 기술이라는 특성상, 아직도 보완해야 될 점이 많은 것이 사실이다. 특히, IoE 환경의 경우, 가정이나 사무공간에서 연결되고 있는 기기나 장비들이 개인용품이 많다는 특성상 정보 보안에 문제가 생길 때 개인정보 유출의 우려가 클 수밖에 없는 것이 사실이다. 하지만, 많은 IoE 서비스 이용자들이 이런 보안상의 문제점들에 대해서 인지하지 못하고 있는 것이 현실이다. 따라서 본 논문에서는 보안경고 디스플레이 기술을 활용하여 일반인들에게 개인정보 유출에 대한 경각심을 일으키고 구체적인 대응방안을 모색해 볼 수 있도록 유도하는 디자인 기법들의 가능성들을 모색해 보고자 한다.

Verifying a Safe P2P Security Protocol in M2M Communication Environment (M2M 통신환경에서 안전한 P2P 보안 프로토콜 검증)

  • Han, Kun-Hee;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.213-218
    • /
    • 2015
  • In parallel with evolving information communication technology, M2M(Machine-to-Machine) industry has implemented multi-functional and high-performance systems, and made great strides with IoT(Internet of Things) and IoE(Internet of Everything). Authentication, confidentiality, anonymity, non-repudiation, data reliability, connectionless and traceability are prerequisites for communication security. Yet, the wireless transmission section in M2M communication is exposed to intruders' attacks. Any security issues attributable to M2M wireless communication protocols may lead to serious concerns including system faults, information leakage and privacy challenges. Therefore, mutual authentication and security are key components of protocol design. Recently, secure communication protocols have been regarded as highly important and explored as such. The present paper draws on hash function, random numbers, secret keys and session keys to design a secure communication protocol. Also, this paper tests the proposed protocol with a formal verification tool, Casper/FDR, to demonstrate its security against a range of intruders' attacks. In brief, the proposed protocol meets the security requirements, addressing the challenges without any problems.

Sparse DTMNs routihg protocol for the M2M environment (Sparse M2M 환경을 위한 DTMNs 라우팅 프로토콜)

  • Wang, Jong Soo;Seo, Doo Ok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.4
    • /
    • pp.11-18
    • /
    • 2014
  • Recently, ICT technology has been evolving towards an M2M (Machine to Machine) environment that allows communication between machine and machine from the communication between person and person, and now the IoT (Internet of Things) technology that connects all things without human intervention is receiving great attention. In such a network environment, the communication network between object and object as well as between person and person, and person and object is available which leads to the sharing of information between all objects, which is the essential technical element for us to move forward to the information service society of the era of future ubiquitous computing. On this paper, the protocol related to DTMNs in a Sparse M2M environment was applied and the improved routing protocol was applied by using the azimuth and density of the moving node in order to support a more efficient network environment to deliver the message between nodes in an M2M environment. This paper intends to verify the continuity of the study related to efficient routing protocols to provide an efficient network environment in the IoT and IoE (Internet of Everything) environment which is as of recently in the spotlight.