• Title/Summary/Keyword: 스마트 IoT

Search Result 1,194, Processing Time 0.074 seconds

CNN Based 2D and 2.5D Face Recognition For Home Security System (홈보안 시스템을 위한 CNN 기반 2D와 2.5D 얼굴 인식)

  • MaYing, MaYing;Kim, Kang-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.6
    • /
    • pp.1207-1214
    • /
    • 2019
  • Technologies of the 4th industrial revolution have been unknowingly seeping into our lives. Many IoT based home security systems are using the convolutional neural network(CNN) as good biometrics to recognize a face and protect home and family from intruders since CNN has demonstrated its excellent ability in image recognition. In this paper, three layouts of CNN for 2D and 2.5D image of small dataset with various input image size and filter size are explored. The simulation results show that the layout of CNN with 50*50 input size of 2.5D image, 2 convolution and max pooling layer, and 3*3 filter size for small dataset of 2.5D image is optimal for a home security system with recognition accuracy of 0.966. In addition, the longest CPU time consumption for one input image is 0.057S. The proposed layout of CNN for a face recognition is suitable to control the actuators in the home security system because a home security system requires good face recognition and short recognition time.

A Study on the Improvement of Military Information Communication Network Efficiency Using CCN (CCN을 활용한 군 정보통신망 효율성 향상 방안)

  • Kim, Hui-Jung;Kwon, Tae-Wook
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.5
    • /
    • pp.799-806
    • /
    • 2020
  • The rapid growth of smartphone-to-Internet of Things (IoT) connections and the explosive demand for data usage centered on mobile video are increasing day by day, and this increase in data usage creates many problems in the IP system. In a full-based environment, in which information requesters focus on information providers to receive information from specific servers, problems arise with bottlenecks and large data processing. To address this problem, CCN networking technology, a future network technology, has emerged as an alternative to CCN networking technology, which reduces bottlenecks that occur when requesting popular content through caching of intermediate nodes and increases network efficiency, and can be applied to military information and communication networks to address the problem of traffic concentration and the use of various surveillance equipment in full-based networks, such as scientific monitoring systems, and to provide more efficient content.

CCMS (Crop Classification Management System) Detecting Growth Environment Changes to Improve Crop Production Rate (작물 생산률 향상을 위한 생장 환경 변화 탐지 CCMS(Crop Classification Management System))

  • Choi, Hokil;Lee, Byungkwan;Son, Surak;Ahn, Heuihak
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.2
    • /
    • pp.145-152
    • /
    • 2020
  • In this paper, we propose the Crop Classification Management System (CCMS) that detects changes in growth environment to improve crop production rate. The CCMS consists of two modules. First, the Crop Classification Module (CCM) classifies crops through CNN. Second, the Farm Anomaly Detection Module (FADM) detects abnormal crops by comparing accumulated data of farms. The CCM recognizes crops currently grown on farms and sends them to the FADM, and the FADM picks up the weather data from the past to the present day of the farm growing the crops and applies them to the Nelson rules. The FADM uses the Nelson rules to find out weather data that has occurred and adjust farm conditions through IoT devices. The performance analysis of CCMS showed that the CCM had a crop classification accuracy of about 90%, and the FADM improved the estimated yield by up to about 30%. In other words, managing farms through the CCMS can help increase the yield of smart farms.

An Effective Malware Detection Mechanism in Android Environment (안드로이드 환경에서의 효과적인 악성코드 탐지 메커니즘)

  • Kim, Eui Tak;Ryu, Keun Ho
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.4
    • /
    • pp.305-313
    • /
    • 2018
  • With the explosive growth of smart phones and efficiency, the Android of an open mobile operating system is gradually increasing in the use and the availability. Android systems has proven its availability and stability in the mobile devices, the home appliances's operating systems, the IoT products, and the mechatronics. However, as the usability increases, the malicious code based on Android also increases exponentially. Unlike ordinary PCs, if malicious codes are infiltrated into mobile products, mobile devices can not be used as a lock and can be leaked a large number of personal contacts, and can be lead to unnecessary billing, and can be cause a huge loss of financial services. Therefore, we proposed a method to detect and delete malicious files in real time in order to solve this problem. In this paper, we also designed a method to detect and delete malicious codes in a more effective manner through the process of installing Android-based applications and signature-based malicious code detection method. The method we proposed and designed can effectively detect malicious code in a limited resource environment, such as mobile environments.

The Technology of Connected Car (커넥티드 카의 기술)

  • Shim, Hyun-Bo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.3
    • /
    • pp.590-598
    • /
    • 2016
  • It comes into the spotlight as the new Blue Ocean in which the connected car industry in which the car and mobile communication technology is convergence. All sorts of infortainments services connecting with the portable electronic device(Smart phone, tablet PC, and MP3 player) and car are rapidly grown. The Connected car emphasizes the vehicle connectivity with the concept that the car has communication with the around on a real time basis and it provides the safety and expedience to the operator and using the thing of Internet (IoT) in the car and supports the application, presently, the entertainment service including the real-time Navigation, parking assistant function, not only the remote vehicle control and management service but also Email, multimedia streaming service, SNS and with the platform. Intelligent vehicle network is studied as the kind according to MANET(Mobile Ad Hoc Network) for the safety operation of the cars of the road and improving the efficiency of the driving.

Development of Baekje cultural tourism contents by utilizing portable VR glasses (휴대용 가상현실 안경을 접목한 백제문화 관광 콘텐츠 개발)

  • Kang, Byoung-Gil;Lee, Wan-Bok;Ryu, Seuc-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.1
    • /
    • pp.317-323
    • /
    • 2018
  • Although various kinds of VR services are being carried out in the tourism field, The virtual reality experiences are still costly, since they could be realized in a limited space with some kinds of expensive equipment such as HMD. In this study, we propose a mobile virtual reality tourism experience using an easy and simple Google card board and user's smartphone because most tourist sites are outdoors and most of users like enjoying sightseeing and experience at the same time. For this purpose, we constructed a system that provides tourist information in real time employing both the IoT and VR techniques. Especially we develpoed a tourism contents for the UNESCO World Heritage Communities of Baekje Historical Site and Songsanri Tumulus. In addition, we virtually restored the royal palace in Gongju and confirmed the historical experience by VR flatform could be popular with people.

Korea's Development Strategy through 5G Network Global Status Analysis (5G 네트워크 글로벌 현황분석을 통한 한국의 발전 전략)

  • Kim, Hee-Jin;Park, Yun-Seon;Ryu, Seul-gi;Lee, Ga-Eun;Lee, Seung-joo;Won, Jong-Kwon;Hwang, Hye-Jeong;Chang, Young-Hyun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.3 no.2
    • /
    • pp.43-48
    • /
    • 2017
  • 5G will bring revolutionary development in mobile communication, and it is anticipated to have complete commercialization including mass adoption rate by 2020s. High number of smart devices including IoT, wearable devices, etc., which have high amount of data usage, will involve even higher data traffics. In addition, media dependency and demand is rapidly rising. These environmental aspects will necessity and sufficient condition for successful implementation of 5G mobile communication system. In this paper, global cooperation and competition for 5G technology leadership will be analyzed and summarized. Through this, proper solution to maintain competency of Korea in future will be proposed.

Proposal of Personalized Recommendation for Korean Food and Tour Using Beacon System (비콘을 활용한 개인 맞춤형 한식과 관광지 추천 관리 시스템 제안)

  • Sung, Kihyuk;Ryu, Gihwan;Yun, Daiyeol
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.3
    • /
    • pp.267-273
    • /
    • 2020
  • Beacon is a wireless communication device that can automatically recognize the smart device in the short distance and transmit the necessary data, Beacon is a representative Internet of Things (IoT) facility in the era of the 4th Industrial Revolution, which is utilized in various fields such as short-distance information delivery, mobile location service, shopping, and marketing, and is constantly evolving. In this paper, it is based on tourist site-based recommendation information service. A system is proposed that recommends customized information according to the user's interest, preference, etc. by incorporating beacon technology. In other words, it acts as an information agent that informs tourists of desired information. In order to meet the needs of tourists, it is necessary to build an intelligent tourism recommendation system. The personalized Korean food and tourism recommendation management system using the beacon technology proposed in this paper is expected to provide high-quality services not only to foreigners visiting Korea but also to Korean tourists.

IoT-Based Module Development for Management and Real-time Activity Recognition of Disaster Recovery Resources (사물인터넷 기반 재난복구자원 관리 및 실시간 행동인지 모듈 개발)

  • Choe, Sangyun;Park, Juhyung;Han, Sumin;Park, Jinwoo;Chang, Tai-woo;Yun, Hyeokjin
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.4
    • /
    • pp.103-115
    • /
    • 2017
  • Globally, frequency and scale of natural disasters are growing, also the damage is increasing. In view of the damage by natural disasters for several years, it is true that Korea is not free from such damages. In this paper, we propose a process to efficiently manage recovery resources in case of disaster damage. We utilize the IoT technology to detect the resource status in real time, and configure the process so that the state and movement of the recovery resource can be grasped in real time through the resource activity recognition module. In addition, we designed the database that is necessary to actualize it, and developed and experimented resource activity recognition module using smart-phone sensors. This will contribute to building a quick and efficient disaster response system.

A Dual Security Technique based on Beacon (비콘 기반의 이중 보안 기법)

  • Park, Sang-Min;Kim, Chul-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.8
    • /
    • pp.311-317
    • /
    • 2016
  • Many services have been developed that are based on smart devices, and security between devices is emphasized. A beacon on the current IoT(Internet of Things) services has been utilized in the commercial field and is being applied to the services of the home IoT. On the other hand, the beacon is weak to security using Bluetooth-based services. Therefore, it is important to strengthen the security of the beacon. This paper proposes a dual security technique that can enhance the security of beacon-based services. The dual security architecture and security process is proposed based on beacon and authentication service. In addition, mobile application was developed and validated based on the beacon for proving the suitability of the proposed technique. The experimental method for verification are the authentication failure case, such as 1st authentication fail, and authentication success case, such as 1st authentication success and 2nd authentication success. The components of the verification experiments consists of two beacons (matched with Beacon ID, mismatched with Beacon ID), one mobile device and authentication application. This was tested to verify the compatibility of the dual security architecture and 1st/2nd authentication process.