• Title/Summary/Keyword: 도어 시스템

Search Result 218, Processing Time 0.021 seconds

Remote Control System using Face and Gesture Recognition based on Deep Learning (딥러닝 기반의 얼굴과 제스처 인식을 활용한 원격 제어)

  • Hwang, Kitae;Lee, Jae-Moon;Jung, Inhwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.6
    • /
    • pp.115-121
    • /
    • 2020
  • With the spread of IoT technology, various IoT applications using facial recognition are emerging. This paper describes the design and implementation of a remote control system using deep learning-based face recognition and hand gesture recognition. In general, an application system using face recognition consists of a part that takes an image in real time from a camera, a part that recognizes a face from the image, and a part that utilizes the recognized result. Raspberry PI, a single board computer that can be mounted anywhere, has been used to shoot images in real time, and face recognition software has been developed using tensorflow's FaceNet model for server computers and hand gesture recognition software using OpenCV. We classified users into three groups: Known users, Danger users, and Unknown users, and designed and implemented an application that opens automatic door locks only for Known users who have passed both face recognition and hand gestures.

Efficient Coverage Guided IoT Firmware Fuzzing Technique Using Combined Emulation (복합 에뮬레이션을 이용한 효율적인 커버리지 가이드 IoT 펌웨어 퍼징 기법)

  • Kim, Hyun-Wook;Kim, Ju-Hwan;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.847-857
    • /
    • 2020
  • As IoT equipment is commercialized, Bluetooth or wireless networks will be built into general living devices such as IP cameras, door locks, cars and TVs. Security for IoT equipment is becoming more important because IoT equipment shares a lot of information through the network and collects personal information and operates the system. In addition, web-based attacks and application attacks currently account for a significant portion of cyber threats, and security experts are analyzing the vulnerabilities of cyber attacks through manual analysis to secure them. However, since it is virtually impossible to analyze vulnerabilities with only manual analysis, researchers studying system security are currently working on automated vulnerability detection systems, and Firm-AFL, published recently in USENIX, proposed a system by conducting a study on fuzzing processing speed and efficiency using a coverage-based fuzzer. However, the existing tools were focused on the fuzzing processing speed of the firmware, and as a result, they did not find any vulnerability in various paths. In this paper, we propose IoTFirmFuzz, which finds more paths, resolves constraints, and discovers more crashes by strengthening the mutation process to find vulnerabilities in various paths not found in existing tools.

A Study on the Accurate Stopping Control of a Train for the Urban Rail Transit Using Kalman Filter (칼만 필터를 이용한 도시철도 열차 정위치 정차에 관한 연구)

  • Kim, Jungtai;Lee, Jaeho;Kim, Moo Sun;Park, Chul Hong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.655-662
    • /
    • 2016
  • Accurate stopping control is important for trains, especially now that many train stations are equipped with platform screen doors. Various algorithms have been proposed for accurate stopping control. However, most metro trains in South Korea use classic control algorithms such as PID control because other algorithms are too complex to realize. PID control has merits of simple structure and operation. However, PID control sometimes fails, and much time is needed to find the proper coefficients due to the long control period and the brake delay. We propose a control algorithm that uses a Kalman filter. The Kalman filter estimates the states at the time when braking starts. Then, a suitable control input is derived for proper control. System modeling and a computer simulation were performed with consideration of the brake properties and the period of the control system. The superiority of the proposed control algorithm is shown by analyzing stop errors.

Doors open and close during regenerative energy harvester developed (자동문 개폐 시 회생에너지 하베스트 개발)

  • Park, Won-hyeon;Kim, Min;Jeong, Jae-hoon;Lee, Dong-heon;Byun, Gi-sik;Kim, Gwan-hyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.257-258
    • /
    • 2015
  • Korean power consumption of the electrical supply problems due to excess demand is repeated every year, the interest in energy increasing social and personal cost has been subject to the number of ways to reduce this cost increases. Automatic doors and automatic door installation market is increasing every year and frequently, when used in general commercial and communal porch consumption based on average 300 times a day power is 70[W] degree is a monthly average usage is about 50.4[KW]. The level can not ignore the power consumption due to switching frequency is large. In this paper, by converting the energy to be discarded in the automatic doors to the inverter and the regenerative energy and to develop control systems for power regeneration to reduce the power consumption by utilizing automatic contact auxiliary power.

  • PDF

The Accuracy Evaluation according to Dose Delivery Interruption and Restart for Volumetric Modulated Arc Therapy (용적변조회전 방사선치료에서 선량전달의 중단 및 재시작에 따른 정확성 평가)

  • Lee, Dong Hyung;Bae, Sun Myung;Kwak, Jung Won;Kang, Tae Young;Back, Geum Mun
    • The Journal of Korean Society for Radiation Therapy
    • /
    • v.25 no.1
    • /
    • pp.77-85
    • /
    • 2013
  • Purpose: The accurate movement of gantry rotation, collimator and correct application of dose rate are very important to approach the successful performance of Volumetric Modulated Arc Therapy (VMAT), because it is tightly interlocked with a complex treatment plan. The interruption and restart of dose delivery, however, are able to occur on treatment by various factors of a treatment machine and treatment plan. If unexpected problems of a treat machine or a patient interrupt the VMAT, the movement of treatment machine for delivering the remaining dose will be restarted at the start point. In this investigation, We would like to know the effect of interruptions and restart regarding dose delivery at VMAT. Materials and Methods: Treatment plans of 10 patients who had been treated at our center were used to measure and compare the dose distribution of each VMAT after converting to a form of digital image and communications in Medicine (DICOM) with treatment planning system (Eclipse V 10.0, Varian, USA). We selected the 6 MV photon energy of Trilogy (Varian, USA) and used OmniPro I'mRT system (V 1.7b, IBA dosimetry, Germany) to analyze the data that were acquired through this measurement with two types of interruptions four times for each case. The door interlock and the beam-off were used to stop and then to restart the dose delivery of VMAT. The gamma index in OmniPro I'mRT system and T-test in Microsoft Excel 2007 were used to evaluate the result of this investigation. Results: The deviations of average gamma index in cases with door interlock, beam-off and without interruption on VMAT are 0.141, 0.128 and 0.1. The standard deviations of acquired gamma values are 0.099, 0.091, 0.071 and The maximum gamma value in each case is 0.413, 0.379, 0.286, respectively. This analysis has a 95-percent confidence level and the P-value of T-test is under 0.05. Gamma pass rate (3%, 3 mm) is acceptable in all of measurements. Conclusion: As a result, We could make sure that the interruption of this investgation are not enough to seriously affect dose delivery of VMAT by analyzing the measured data. But this investigation did not reflect all cases about interruptions and errors regarding the movement of a gantry rotation, collimator and patient So, We should continuously maintain a treatment machine and program to deliver the accurate dose when we perform the VMAT for the many kinds of cancer patients.

  • PDF

An Improved Multi-Keyword Search Protocol to Protect the Privacy of Outsourced Cloud Data (아웃소싱된 클라우드 데이터의 프라이버시를 보호하기 위한 멀티 키워드 검색 프로토콜의 개선)

  • Kim, Tae-Yeon;Cho, Ki-Hwan;Lee, Young-Lok
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.10
    • /
    • pp.429-436
    • /
    • 2017
  • There is a growing tendency to outsource sensitive or important data in cloud computing recently. However, it is very important to protect the privacy of outsourced data. So far, a variety of secure and efficient multi-keyword search schemes have been proposed in cloud computing environment composed of a single data owner and multiple data users. Zhang et. al recently proposed a search protocol based on multi-keyword in cloud computing composed of multiple data owners and data users but their protocol has two problems. One is that the cloud server can illegally infer the relevance between data files by going through the keyword index and user's trapdoor, and the other is that the response for the user's request is delayed because the cloud server has to execute complicated operations as many times as the size of the keyword index. In this paper, we propose an improved multi-keyword based search protocol which protects the privacy of outsourced data under the assumption that the cloud server is completely unreliable. And our experiments show that the proposed protocol is more secure in terms of relevance inference between the data files and has higher efficiency in terms of processing time than Zhang's one.

Interoperable Security Framework for Heterogeneous IoT Platforms (이종 사물인터넷 플랫폼 간 보안 상호운용을 위한 프레임워크)

  • Oh, Se-Ra;Kim, Young-Gab
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.3
    • /
    • pp.81-90
    • /
    • 2018
  • Due to the dramatic advancement of IoT (Internet of Things), it is expected that tens of billions of IoT devices will be connected by the year 2024. Furthermore, as IoT technologies evolves, the security management in IoT platforms has become a critical issue. For example, there are interworking problems between heterogeneous IoT platforms caused by differences from communication protocols, security policies, etc. in each platform. In addition, unsecured interworking can cause major security issues including the information leakage. In this paper, in order to solve these problems, a security interworking architecture is proposed and implemented in both FIWARE and oneM2M, which are representative IoT platforms. First, the security architecture of FIWARE is analyzed and implemented, and then the security framework based on OAuth 2.0 is developed on Mobius platform. Finally, in order to validate the proposed security interworking architecture, a LED (Light-Emitting Diode) example, where the LED is controlled by only authorized users, is developed. The proposed architecture can be extended to the diverse IoT platforms and devices.

Design and Implement a Smart Control System of Door Security Guard (도어 안전고리 스마트 제어시스템 설계 및 구현)

  • Lee, Hyo Seung;Oh, Jae Chul
    • Smart Media Journal
    • /
    • v.6 no.1
    • /
    • pp.61-67
    • /
    • 2017
  • A large number of people living in modern times prefer remaining unmarried or living alone independently for the reason of their own will or another person's will. This is because they dislike being interfered with by other persons or because there is a financial problem. This behavior has become mainstream in persons working for professional jobs, persons having a strong disposition toward individual activity or college students. In particular, career women pursuing their own comfortable life have the tendency to prefer single life. However, sometimes, they become a target of crime that targets and makes bad use of this point. For these reasons. Consequently, sometimes, they additionally install and use a security system such as door security guard at front door and so on. It is not so difficult to lock the door security guard at the front door. However, it is apt to be forgotten. And when they are on the bedspread before falling asleep, in case they should check whether the door security guard is locked or in case they should lock it, they should get up, go to the entrance, and check and lock the door security guard. They often don't lock the door security guard due to their feeling that it is all right because of annoyance and inconvenience. This paper is intended to work for safety from crime such as illegal housebreaking by more conveniently using the door security guard after designing and implementing a system that can remotely control the door security guard, using a smartphone as a method of resolving this annoyance and keeping life more safe.