• Title/Summary/Keyword: 네트워크 디바이스

Search Result 907, Processing Time 0.029 seconds

A Proposal of a Model for Measuring Influences of Social Networks (소셜 네트웍 영향력 측정 모델 제안)

  • Lee, Seung-Hee;Park, Young-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.1497-1500
    • /
    • 2011
  • 최근, 스마트폰 가입자 수가 급격히 증가하는 가운데, 사람과 사람의 관계에 중심을 두는 서비스인 SNS가 급격히 성장하고 있다. 모바일 디바이스를 사용한 소셜 네트워크가 접목되어 사용자들 사이에 자연스러운 의사 교류 관계가 형성되며, 장소나 이벤트를 기반하여 빠르고 끊임없이 정보들이 발생하게 되었다. 그러나 너무 많이 발생하는 불필요한 데이터들로 인해 의미 있는 정보, 필요한 정보를 파악하는 데 어려움이 생긴다. 이러한 문제점을 해결하기 위해, 소셜 네트워크 서비스를 통해 제공되는 정보들 가운데 영향력 있는 정보가 무엇인지 판단하는 연구가 중요시 되고 있다. 본 논문에서는 소셜 네트워크 영향력 측정을 위해 장소를 기반으로 한 동적 소셜 커뮤니티에서의 소셜 네트워크 액티비티를 중심으로 이벤트에 대한 영향력을 측정하는 방법에 대해 고찰하고, 새로운 영향력 측정 방안에 대해 제안한다.

Cloud-based smart maritime logistics warehouse management system with IP cameras (IP 카메라와 클라우드 기반 스마트 해상물류 창고 관리 시스템)

  • Kang-Hyeon Ryu;Dae-Hoon Kang;Dong-Min Kim;Min-Ho Kim
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.1082-1083
    • /
    • 2023
  • 우리나라의 수출입 대부분은 해상을 통해 이루어지고 있으나 항만의 물류 창고는 데이터 네트워크를 통한 유기적인 화물의 출입과 현황관리가 부족한 실정이다. 이는 부족한 데이터 네트워크 인프라와 CCTV에 의한 아날로그 영상 데이터에 의존하는 기존 시스템의 한계로 인해 기인하는 바가 크다. 이에 IP 카메라와 엣지 디바이스의 영상분석에 의한 개별 화물 창고의 디지털 현황 분석 기반을 구축하고 분산된 개별 화물 창고의 데이터를 클라우드에 위치한 중앙 집중 데이터 분석 시스템을 구축하여 유연한 개별 화물 창고 관리와 지속적인 모니터링 기반을 제공한다. 사용자 인터페이스는 웹 기반으로 구축하여 항만 화물 관계자에게 편의성과 위치에 구애받지 않는 서비스를 제공한다. 이 과정에서 사설 IoT 네트워크를 통한 최소한의 시공비용으로 항만 내 인터넷 데이터 네트워크를 구축하여 향후 항만 내 다양한 데이터 서비스를 위한 초석을 제공한다.

A MAC Design for Collision Avoidance in Wireless USB Home Networks (WUSB 홈네트워크에서의 충돌회피를 위한 MAC설계)

  • Sim, Jae-Hwan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.1
    • /
    • pp.55-64
    • /
    • 2013
  • The USB-IF has specified a Wireless USB (WUSB) protocol based on UWB for high speed wireless home networks and WPANs. In this paper, firstly, performance degradation due to the Private Distributed Reservation Protocol (DRP) conflict problem caused by devices' mobility is analyzed. And a novel relay transmission protocol combined with Private DRP conflict resolution is proposed to overcome the performance degradation at Private DRP conflicts. In order to give the loser device due to Private DRP conflicts another chance to maintain resources, the proposed relay transmission protocol executed at each device helps the loser device reserve another indirect link maintaining the required resources via a relay node.

A Study on Internet of Things in IT Convergence Period (융복합 시대의 사물인터넷에 관한 연구)

  • Lee, Seong-Hoon;Lee, Dong-Woo
    • Journal of Digital Convergence
    • /
    • v.12 no.7
    • /
    • pp.267-272
    • /
    • 2014
  • Many people have used a internet at various purposes. Internet have been used the optimal space to share informations by information producer or consumer. But, recently, through the development of networks and devices, The Internet is expanding beyond PCs and mobile devices into enterprise assets such as field equipment, and consumer items such as cars and televisions. The Internet of Things will enable forms of collaboration and communication between people and things, and between things themselves, hitherto unknown and unimagined. This paper presents various meanings of IoT, and describe the electronic and car domain of internet of things.

A Study on ISpace with Distributed Intelligent Network Devices for Multi-object Recognition (다중이동물체 인식을 위한 분산형 지능형네트워크 디바이스로 구현된 공간지능화)

  • Jin, Tae-Seok;Kim, Hyun-Deok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.950-953
    • /
    • 2007
  • The Intelligent Space(ISpace) provides challenging research fields for surveillance, human-computer interfacing, networked camera conferencing, industrial monitoring or service and training applications. ISpace is the space where many intelligent devices, such as computers and sensors, are distributed. According to the cooperation of many intelligent devices, the environment, it is very important that the system knows the location information to offer the useful services. In order to achieve these goals, we present a method for representing, tracking and human following by fusing distributed multiple vision systems in ISpace, with application to pedestrian tracking in a crowd.

  • PDF

Study of OCAP Based Home Entertainment System (OCAP 기반 홈 엔터테인먼트 시스템에 관한 연구)

  • Si, Jang-Hyun;Lee, Cha-Won;Yang, Kyung-Mo;Kim, Seoung-Won;Jung, Moon-Ryul
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2006.11a
    • /
    • pp.269-272
    • /
    • 2006
  • 홈 엔터테인먼트 서비스는 홈 네트워크 서비스의 하나로서 홈 네트워크를 통해 제공되는 TV, 영화, 게임과 같은 다양한 디지털 콘텐츠를 TV라는 매체를 통해 PC와 같은 TV와는 다른 디바이스에 존재하는 다양한 콘텐츠를 손쉽게 즐길 수 있는 콘텐츠 서비스의 형태라고 할 수 있다. 이러한 다양한 기기에 존재하는 콘텐츠를 손쉽게 이용할 수 있는 허브 장치로서 STB(Set-top Box)가 대두되고 있다. STB가 허브 장치로서의 기능을 하기 위해서는 서로 다른 기기들과의 연계시 발생하는 여러 문제점들(예 : 조작의 불편)을 해결하고 이를 통합 조정할 수 있는 어플리케이션이 필요하다. 본 논문에서는 STB와 멀티미디어 기기 중의 하나인 HTPC(Home Theater PC)를 예를 들어 두 기기간의 연동 환경에서 STB 리모컨을 통해 HTPC를 제어할 수 있는 어플리케이션에 대해 연구한다. 이를 위해 이종 단말기 간의 연동을 위해 RMI(Remote Method Invocation)의 클라이언트/서버 통신 메커니즘을 응용하였다. 이를 통해 HTPC 뿐만이 아닌 다양한 디바이스를 STB에 연결하여 활용할 수 있는 좋은 예가 될 수 있을 것이다.

  • PDF

Smart Glasses Technologies for Trustworthy, Augmented Reality, See-Through Eyes-Direct Communications as Substitute for Smart Phones (스마트폰 대체재로서의 신뢰증강보는통신용 스마트안경 기술)

  • Song, K.B.;Lee, J.K.;Kim, K.Y.;Kim, G.W.;Park, S.H.;Kim, T.Y.;Yoon, H.S.;Lee, J.H.;Kim, D.H.
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.5
    • /
    • pp.58-70
    • /
    • 2019
  • In this paper, we present the R&D status of ETRI's Trusted Reality (TR) project and its core technologies. ETRI's TR project focuses on the next-generation paradigm of smart phones, ETRI-TR Smart Glasses, which aims to provide the same features as those of smart phones without the involvement of any handheld device. Furthermore, they are characterized by additional features enabled by trustworthy VR/AR/MR/XR, such as privacy masking/unmasking, distributed structure of thin-client computing/networking among TR-Glasses, TR-LocalEdge, and TR-RemoteEdge, with novel see-through eyes-direct communication between IoT real/virtual objects and human eyes. Based on these core technologies of the ETRI's TR project, the human-held ETRI-TR Smart Glasses is expected to aid in the realization of XR vision with particularly more XR's safe_privacy on social life in the near future.

A Study on the License Management Model for Secure Contents Distribution in Ubiquitous Environment (유비쿼터스 환경의 안전한 콘텐츠 유통을 위한 라이센스 관리 모델 연구)

  • Jang, Ui-Jin;Lim, Hyung-Min;Shin, Yong-Tae
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.4
    • /
    • pp.550-558
    • /
    • 2009
  • In ubiquitous environment, more small, lightweight, cheap and movable device is used than one device used in wired network environment. Multimedia service which is anytime, anywhere, is provided by device. However, it does not ensure the fair use of multimedia contents and causes damage to the contents providers because of illegal copy and distribution and indiscriminate use of digital contents. For solving this problems, DRM is applied to wired network but it has the problems does not protect stored license and manage license completely because of depending on simple protection such as device authentication and cryptographic algorithm. This paper proposes the license management model using digital forensic and DRM that prevents contents and licenses from distributing illegally and also enables the creation of evidence for legal countermeasure and the protection of license in whole life cycle.

  • PDF

Performance Enhancement and Evaluation of a Deep Learning Framework on Embedded Systems using Unified Memory (통합메모리를 이용한 임베디드 환경에서의 딥러닝 프레임워크 성능 개선과 평가)

  • Lee, Minhak;Kang, Woochul
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.7
    • /
    • pp.417-423
    • /
    • 2017
  • Recently, many embedded devices that have the computing capability required for deep learning have become available; hence, many new applications using these devices are emerging. However, these embedded devices have an architecture different from that of PCs and high-performance servers. In this paper, we propose a method that improves the performance of deep-learning framework by considering the architecture of an embedded device that shares memory between the CPU and the GPU. The proposed method is implemented in Caffe, an open-source deep-learning framework, and is evaluated on an NVIDIA Jetson TK1 embedded device. In the experiment, we investigate the image recognition performance of several state-of-the-art deep-learning networks, including AlexNet, VGGNet, and GoogLeNet. Our results show that the proposed method can achieve significant performance gain. For instance, in AlexNet, we could reduce image recognition latency by about 33% and energy consumption by about 50%.

A Study on gateway authentication protocol in IoT (IoT에서 게이트웨이에 대한 인증 프로토콜에 관한 연구)

  • Lee, Jae-Young
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.3
    • /
    • pp.91-96
    • /
    • 2017
  • IoT which is an abbreviation of Internet of Things refers to the communication network service among various objects such as people-people, objects-objects interconnection. The characteristic of IoT that enables direct connection among each device makes security to be considered as more emphasized factor. Though a security module such as an authentication protocol for resolving various security problems that may occur in the IoT environment has been developed, some weak points in security are still being revealed. Therefore, this paper proposes a method for including a protocol including gateway authentication procedure and mutual authentication between the devices and gateways. Protocols with additional authentication procedures can appropriately respond to attackers' spoofing attacks. In addition, important information in the message used for authentication process is protected by encryption or hash function so that it can respond to wiretapping attacks.