• Title/Summary/Keyword: 스마트워크 시스템

Search Result 672, Processing Time 0.031 seconds

A Study about Learning Graph Representation on Farmhouse Apple Quality Images with Graph Transformer (그래프 트랜스포머 기반 농가 사과 품질 이미지의 그래프 표현 학습 연구)

  • Ji Hun Bae;Ju Hwan Lee;Gwang Hyun Yu;Gyeong Ju Kwon;Jin Young Kim
    • Smart Media Journal
    • /
    • v.12 no.1
    • /
    • pp.9-16
    • /
    • 2023
  • Recently, a convolutional neural network (CNN) based system is being developed to overcome the limitations of human resources in the apple quality classification of farmhouse. However, since convolutional neural networks receive only images of the same size, preprocessing such as sampling may be required, and in the case of oversampling, information loss of the original image such as image quality degradation and blurring occurs. In this paper, in order to minimize the above problem, to generate a image patch based graph of an original image and propose a random walk-based positional encoding method to apply the graph transformer model. The above method continuously learns the position embedding information of patches which don't have a positional information based on the random walk algorithm, and finds the optimal graph structure by aggregating useful node information through the self-attention technique of graph transformer model. Therefore, it is robust and shows good performance even in a new graph structure of random node order and an arbitrary graph structure according to the location of an object in an image. As a result, when experimented with 5 apple quality datasets, the learning accuracy was higher than other GNN models by a minimum of 1.3% to a maximum of 4.7%, and the number of parameters was 3.59M, which was about 15% less than the 23.52M of the ResNet18 model. Therefore, it shows fast reasoning speed according to the reduction of the amount of computation and proves the effect.

The research for human bio-signal monitoring smart home system (생체신호 모니터링 스마트 홈 모니터링에 관한 연구)

  • Kim, Kuk-Se;Kwon, Young-Sun;Lee, Ho-Young;Lee, Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.11
    • /
    • pp.2097-2104
    • /
    • 2008
  • Ubiquitous services are high duality and differentiated services which are provided for users by recognizing the context of users and environmental conditions actively. In this case, context-aware middleware is one of the most important technologies required to implement the ubiquitous services. In this paper, we propose a method for providing ubiquitous services in a specific user space effectively and monitoring human bio-signal sensors. That is, the design and implementation of intelligent home service middleware and monitoring human bio-signal sensor based on context awareness is discussed here. Context information from various sensors is gathered, and suitable services are inferred and provided to users by the middleware system. In our approach, user services can be modelled easily by using facts and rules, and the system can be extended easily to support various ubiquitous services other than intelligent home services also. The system can be integrated with external applications and legacy systems effectively by using various protocols such as RMI, socket and HTTP, XML and Zigbee etc. We have designed and evaluated various facts and rules for intelligent home services in real environments. Functionality evaluation with the system shows that ubiquitous services can be provided to users effectively in a home environment.

Analyses of Security Issues and Vulnerability for Smart Home Network based on Internet of Things (사물인터넷 기반의 스마트 홈 네트워크에서의 취약점 및 보안 이슈 분석)

  • Jung Tae Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.707-714
    • /
    • 2023
  • The Internet of Things, which is the key factor of the 4th industrial revolution, are apt to apply to many systems. The existing security mechanism cannot be realized with limited resources such as low capacity of devices and sensors. In order to apply IoT system, a new structure and ultra-lightweight encryption is required. In this paper, we analyzed security issues that can operate in Internet-based smart home networks, and to solve the critical issues against these attacks, technologies for device protection between heterogeneous devices. Security requirements are required to protect from attacks. Therefore, we analyzed the demands and requirements for its application by analyzing the security architecture and features in smart home network.

Research on Functionality Extension of Certification System for High Speed Power Line Communication Device based on KS ${\times}$ 4600-1 Class A (KS ${\times}$ 4600-1 고속전력선통신 클래스 A 장치 인증 시험 시스템의 기능 확장에 대한 연구)

  • Na, Eun-Chong;Kim, Dong-Ha;Lee, Sung-Won
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06d
    • /
    • pp.415-417
    • /
    • 2012
  • 최근 간단한 연결방식과 손쉬운 네트워크의 구축이 가능하고 무선 통신에서의 음영지역 해소 등의 이유로 홈 네트워크와 스마트 그리드를 구축하는데 용이한 전력선통신이 주목받고 있다. 이에 본 논문에서는 옥내 또는 옥외에서의 고속전력선통신에 대해서 서술하고 이더넷 인터페이스를 통한 고속전력선통신 Class A 기준장치의 MAC 계층 적합성 및 상호운용성을 시험하고 이를 위한 통합 프로그램의 개발 및 보완을 수행하였다.

The Mobile Remittance Service Trends and Regulatory Policy Directions (모바일 송금 서비스 동향 및 규제정책 방향)

  • Kim, B.I.;Kim, S.C.
    • Electronics and Telecommunications Trends
    • /
    • v.27 no.6
    • /
    • pp.165-181
    • /
    • 2012
  • 세계은행의 발표에 따르면 전 세계적으로 개인 간 해외송금 시장의 규모는 지속적으로 성장해 왔으며, 향후에도 지속적으로 성장할 것으로 전망된다. 이러한 글로벌 송금 시장의 확산과 맞물려 이동통신 네트워크의 글로벌화와 스마트폰의 확산 등 통신 기술 및 서비스 진화에 따라 모바일 네트워크를 통해 간편하고 신속하게 송금할 수 있는 모바일 송금 서비스 시장이 국내외에서 급속하게 팽창하고 있다. 이에 세계이동통신사업자협회(Global System for Mobile Communications Association: GSMA)의 MMT(Mobile Money Transfer) 프로그램, 케냐 및 일본의 모바일 송금 서비스 제공 사례를 중심으로 서비스 제공 시스템 및 그 이용에 따른 장 단점, 가치사슬, 서비스 유형 등을 간략하게 살펴보았다. 이를 바탕으로 모바일 송금 서비스 제공 과정에서 나타날 수 있는 규제 이슈들을 분석해 보았다. 그리고, 국내 이동통신 사업자가 MMT 서비스를 본격적으로 제공하는 경우에 고려해야 할 규제 요소들과 안전하고 효율적인 MMT 시장의 활성화를 위해 필요한 규제정책 방향을 검토해 보았다.

  • PDF

Cyber-physical System Framework for Smart Factory (스마트 공장을 위한 CPS 프레임워크 설계에 관한 연구)

  • Shin, Hyun-Jun;Oh, Chang-Heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.754-755
    • /
    • 2017
  • CPS refers to a computer-based component and system that closely connects various complicated processes and information of real space with the cyber space that provides data access and processing services through internet. In this paper, CPS was applied to shop-floor as a part of CPS research.

  • PDF

Effect of Interference from DC Power Supply on Power Line Communication Channel (전력선 통신 채널에서 직류전원 공급장치의 간섭 영향)

  • Kim, Sungeon;Jeon, Taehyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.5
    • /
    • pp.111-115
    • /
    • 2014
  • Power line communications can be utilized to build up the data transmission network wherever the electricity is available. This type of communication system could provide a basis for the network construction in many application areas which include the smart grid and home networks. On the other hand the power line communication is vulnerable to various types of interferences and noises. Also, its channel characteristics are constantly changing depending on the type and the amount of electrical loads connected to the network. Especially, the usage of DC power supply has been increased due to the explosive expansion of smart devices in our daily lives which result in the increased level of interferences on the power line channel. In this paper, the effect of the operation of the DC power supplies on the channel characteristics and the data transmission performance is analyzed through the experiments.

Kiosk System Design using Bluetooth SPP on Android Platform (안드로이드 플랫폼 기반 블루투스 SPP를 이용한 키오스크 시스템 설계)

  • Nam, Yong-Su;Kim, Tae-Yong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.10
    • /
    • pp.2143-2148
    • /
    • 2011
  • In general, existed kiosk using touch-screen based kiosk system has been used by only single user, so that multiple users to access this kiosk need to provide a lot of waiting time and maintenance costs. To solve this problem, the framework design based on Bluetooth profile for kiosk servers is presented. The proposed kiosk system can be more efficiently used in theater, train station, bank, government, and public offices by using Bluetooth module and AP in mobile system such as smart phone.

Individual Heating system Automation based on IOT. (loT를 활용한 개별 난방시스템 설계 제안)

  • Lee, Sang-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.182-185
    • /
    • 2015
  • IT 기술분야에서 IOT(Internet of Things) 는 현재 주목받는 기술 중 하나로서 여려 IT 분야에서 연구활동이 이루어지고 있는 추세이며 이로 인해 IT 기기 뿐만 아니라 일반 기기들과도 연결이 되어 빠른 시일 내에 사물인터넷 시대가 여릴 것으로 예측되고 있다. 본 논문에서는 이런 추세에 맞추어 스마트 홈네트워크 시스템에서는 가정내의 난방시스템에 대한 모니터링 및 자동온도측정 센서를 활용하여 적정온도 혹은 사용자의 활동 여부 등을 파악하여 설정된 온도보다 낮거나 높을 시에 자동으로 실내온도를 변경하고 나아가 원하는 가정내의 일부 부분만을 난방 할 수 있도록 자동화하는 방법에 대한 시스템 설계를 제안하고자 한다.

Device Identification System for Corporate Internal Network Visibility in IoT Era (IoT 시대 기업 내부 네트워크의 가시성 확보를 위한 단말 식별 시스템 설계)

  • Lee, Dae-Hyo;Kim, Yong-Kwon;Lee, Dong-Bum;Kim, Hyeob
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.51-59
    • /
    • 2019
  • In this paper, we propose a device identification system for network visibility that can maintain the secure internal network environment in the IoT era. Recently, the area of enterprise network is getting huge and more complicated. Not only desktops and smartphones but also business pads, barcode scanners, APs, Video Surveillance, digital doors, security devices, and lots of Internet of Things (IoT) devices are rapidly pouring into the business network, and there are highly risk of security threats. Therefore, in this paper, we propose the device identification system that includes the process and module-specific functions to identify the exploding device in the IoT era. The proposed system provides in-depth visibility of the devices and their own vulnerabilities to the IT manager in company. These information help to mitigate the risk of the potential cyber security threats in the internal network and offer the unified security management against the business risks.