• Title/Summary/Keyword: 도어 시스템

Search Result 220, Processing Time 0.021 seconds

A Real-time Face Recognition System using Fast Face Detection (빠른 얼굴 검출을 이용한 실시간 얼굴 인식 시스템)

  • Lee Ho-Geun;Jung Sung-Tae
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.12
    • /
    • pp.1247-1259
    • /
    • 2005
  • This paper proposes a real-time face recognition system which detects multiple faces from low resolution video such as web-camera video. Face recognition system consists of the face detection step and the face classification step. At First, it finds face region candidates by using AdaBoost based object detection method which have fast speed and robust performance. It generates reduced feature vector for each face region candidate by using principle component analysis. At Second, Face classification used Principle Component Analysis and multi-SVM. Experimental result shows that the proposed method achieves real-time face detection and face recognition from low resolution video. Additionally, We implement the auto-tracking face recognition system using the Pan-Tilt Web-camera and radio On/Off digital door-lock system with face recognition system.

A Indoor Management System using Raspberry Pi (라즈베리 파이를 이용한 실내관리 시스템)

  • Jeong, Soo;Lee, Jong Jin;Jung, Won Ki
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.745-752
    • /
    • 2016
  • In the era of the Internet of Things, where all physical objects are connected to the Internet, we suggest a remote control system using a Raspberry Pi single-board computer with ZigBee, which can turn an indoor light-emitting diode (LED) and a multiple-tap on and off, and with a smart phone can control the brightness of the LED as well as an electronic door lock. By connecting an infrared (IR) transmitter module to the Raspberry Pi, we can control home appliances, such as an air conditioner, and we can also monitor indoor images, indoor temperatures, and illumination by using a smart phone app. We developed a method of finding out IR transmission codes required for remote-controllable appliances with an AVR micro-controller. We suggest a method to remotely open and shut an office door by novating the door lock. The brightness level of an LED (between 0 and 10) can be controlled through a PWM signal generated by an ATmega88 microcontroller. A mutiple-tap is controlled using an ATmega32, a photo-coupler, and a TRIAC. The signals for measured temperature and illumination are converted from analog to digital by using the ATtiny44A microcontroller transmitting to a Raspberry Pi through SPI communication. Then, we connect a camera to the CSI head of the Raspberry Pi. We can turn on the smart multiple-tap for a certain period of time, or we can schedule the multi-tap to turn on at a specific time. To reduce standby power, people usually pull out a power code from multiple-taps or turn off a switch. Our method helps people do the same thing with a smart phone, if they are away from home.

Analyzing of connected car vulnerability and Design of Security System (커네티트 카의 취약점 분석 및 보안 시스템 설계)

  • Kim, Tae-Hyoung;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.241-243
    • /
    • 2016
  • In the Past, Trend of car security was Physical Something like doorlock system, and The Generation did not have skills connecting External devices. Through Car Development is up, that trend of car security Changed Physical Security to Intelligence Security. This Changes give a chance to hackers to attack this system. This System use CAN(Controller Area Network) Protocol which have three vulnerabilities. First, ID Spoofing, Twice, D - Dos Attack, Third, Android Application Injected Modern cars have many ECU(Electronic Control Unit) to control devices like Engine ON/OFF, Door Lock Handling, and Controlling Handle. Because CAN Protocol spread signal using broadcast, Hackers can get the signal very easily, and Those often use Mobile devices like Android or IOS to attack this system. if bluetooth signal is spread wide, hackers get the signal, and analysis the bluetooth data, so then They makes certain data to attack ECU, they send the data to ECU, and control ECU installed car. so I suggest that I will prevent this attack to make Auth system and prevent this attack in end of Android.

  • PDF

Door-Lock System to Detect and Transmit in Real Time according to External Shock Sensitivity (외부 충격 감도에 따른 실시간으로 탐지하고 전송하는 Door-Lock 시스템)

  • Jeon, Byung-Jin;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.7
    • /
    • pp.9-16
    • /
    • 2018
  • The purpose of this study is to prevent the malicious user from breaking the door-lock due to physical impact. If it matches the analog displacement value set in the door-lock system, it protects the body and property by transmitting damage information in real time to the manager smart phone. The research suggests a system that transmits damage information in real time to registered users when door-lock is damaged by physical impact. Then compare the impact information sensed by the door lock with the data of the sensitivity control unit. In the web server of the proposed system, after impact information transmitted from Door-Lock is stored in the DB, if the impact information is larger than the shock detection transmission reference value stored in the DB, it is transmitted to the administrator in real time by SMS module so that illegal access information.

Design and Implementation of M2M-based Smart Factory Management Systems that controls with Smart Phone (스마트폰과 연동되는 M2M 기반 스마트 팩토리 관리시스템의 설계 및 구현)

  • Park, Byoung-Seob
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.4
    • /
    • pp.189-196
    • /
    • 2011
  • The main issues of the researches are monitoring environment such as weather or temperature variation and natural accident, and sensor gateways which have mobile device, applications for mobile health care. In this paper, we propose the SFMS(Smart Factory Management System) that can effectively monitor and manage a green smart factory area based on M2M service and smart phone with android OS platform. The proposed system is performed based on the TinyOS-based IEEE 802.15.4 protocol stack. To validate system functionality, we built sensor network environments where were equipped with four application sensors such as Temp/Hum, PIR, door, and camera sensor. We also built and tested the SFMS system to provide a novel model for event detection systems with smart phone.

The Convergence Application Example of Non-destructive Inspection System (비파괴 검사 시스템의 융합 적용 사례)

  • Lee, Jeong-Ick
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.3
    • /
    • pp.191-197
    • /
    • 2017
  • This development is for non-destructive machine using X-Ray source about detecting outline faults of below middle size products. The differentiation is product of research and development unspecialized small and medium-sized products using X-Ray light sources can check real time if the surface of an external fault of radiation dose reference, within the leakage. The speed control is possible by software solution. In addition, we're working on possibly block doors for worker safety and equipment at the same time that inner drive can be identified in the image. These principles, as a key enabler of the current inspection system such as the container is small to medium-sized parts - a long way from utilization level is possible. This research will give rise to major effects for other various non-destructive market industries except car-industry. The most important fact is that this developed non-destructive machine is controlled below $0.2micro-S{\mu}v$.

Smart Outlet System for Single-person Household based on IoT (Internet of Things) (사물 인터넷 기반의 1인 가구를 위한 스마트 콘센트 시스템)

  • Kim, Hye-Suk;Park, Byeong-Ju;Cho, Young-Ju
    • Journal of Digital Contents Society
    • /
    • v.18 no.5
    • /
    • pp.895-904
    • /
    • 2017
  • In this paper, we propose an IoT based smart outlet system for one-person household with electric safety, electric energy consumption management and transmission of messages to the reserved contacts by connecting the emergency network. The proposed smart outlet system is implemented by parsing packet data and protocol between server, module, application and WiFi AP receiver. The WiFi AP built for communication can be used not only for the outlet but also for the gas barrier, the door lock and the like. In addition, the proposed method can provide the remote monitoring function by receiving the amount of power of the receptacle received through the AC current sensor (SCT-013) in real time. The smart outlet system is expected to be capable of automatically shutting off the power in case of emergency through automatic power use analysis in addition to the standby power cutoff function.

Device Identification System for Corporate Internal Network Visibility in IoT Era (IoT 시대 기업 내부 네트워크의 가시성 확보를 위한 단말 식별 시스템 설계)

  • Lee, Dae-Hyo;Kim, Yong-Kwon;Lee, Dong-Bum;Kim, Hyeob
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.51-59
    • /
    • 2019
  • In this paper, we propose a device identification system for network visibility that can maintain the secure internal network environment in the IoT era. Recently, the area of enterprise network is getting huge and more complicated. Not only desktops and smartphones but also business pads, barcode scanners, APs, Video Surveillance, digital doors, security devices, and lots of Internet of Things (IoT) devices are rapidly pouring into the business network, and there are highly risk of security threats. Therefore, in this paper, we propose the device identification system that includes the process and module-specific functions to identify the exploding device in the IoT era. The proposed system provides in-depth visibility of the devices and their own vulnerabilities to the IT manager in company. These information help to mitigate the risk of the potential cyber security threats in the internal network and offer the unified security management against the business risks.

A Study of Security Threats in Bluetooth v4.1 Beacon based Coupon Convergence Service (블루투스 v4.1 비콘 기반 쿠폰 융합서비스에서의 보안위협 연구)

  • Lee, Kwang-Jae;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.2
    • /
    • pp.65-70
    • /
    • 2015
  • As the new technologies like IoT and Fintech appear which have not existed before, security threat ranges in existing system are increasing. Especially, IoT has increasing ranges to cause malicious behaviors in specific systems because related IT infrastructure ranges are increasing. Fintech also requires the innovation of traditional security system because it has new structure which didn't exist in the past. As IoT and Fintech technologies are commercialized and related markets are developing in the future, structural security threats could be connected to actual attacks and secondary attacks by the attackers' imbedding of back door in IoT internet devices through remote access. Customer's device cannot be compulsively controlled for security in new system where these various security threats exist. Therefore, these services should minimize the collected information, and now is the time to politically control the utilizing methods of the collected information. In this thesis, security threats are to be suggested which could occur in newly appearing mobile services like IoT and Fintech.

Application of Spaceborne Earth Remote Sensing Information (인공위성 원격탐사 정보의 활용)

  • 가민호
    • Korean Journal of Remote Sensing
    • /
    • v.16 no.3
    • /
    • pp.261-279
    • /
    • 2000
  • Today, the development of spaceborne Earth remote sensing is characterised by the increasing number and various types of remote sensing satellites, which are being operated in the low altitude and geostationary orbits with the help of rapid development of modern space technologies. It is believed that around 15 countries have programs to own their spaceborne Earth remote sensing systems, and the number of systems will be reached to some tens until the end of 2000 years. It is expected that Korean remote sensing satellites will be launched in sequence according to the national space program. The befinits will be magnificient because of the wide range of application area. Application of remote sensing information to the social infra implies that the potential customers can access the information, mission and the characteristics of the operation, and it is necessary to be supplied more information about systems and mission areas to our domestic users for proper applications. In this review we will survey the applications of the information acquired by the systems of USA, Russia and other countries. In this review we will discussed withing general application area, missions and systems.