• Title/Summary/Keyword: 임베디드 웹

Search Result 176, Processing Time 0.019 seconds

EmXJ : A Framework of Configurable XML Processor for Flexible Embedding (EmXJ : 유연한 임베딩을 위한 XML 처리기 구성 프레임워크)

  • Chung, Won-Ho;Kang, Mi-Yeon
    • The KIPS Transactions:PartA
    • /
    • v.9A no.4
    • /
    • pp.467-478
    • /
    • 2002
  • With the rapid development of wired or wireless Internet, various kinds of resource constrained mobile devices, such as cellular phone, PDA, homepad, smart phone, handhold PC, and so on, have been emerging into personal or commercial usages. Most software to be embedded into those devices has been forced to have the characteristic of flexibility rather than the fixedness which was an inherent property of embedded system. It means that recent technologies require the flexible embedding into the variety of resource constrained mobile devices. A document processor for XML which has been positioned as a standard mark-up language for information representation on the Web, is one of the essential software to be embedded into those devices for browsing the information. In this paper, a framework for configurable XML processor called EmXJ is designed and implemented for flexible embedding into various types of resource constrained mobile devices, and its advantages are compared to conventional XML processors.

Development of Non-Face-To-Face Heat Sensor Module for AI Automated Access Control System and Linkage with Education Program (AI 자동화 출입통제 시스템을 위한 비대면 발열 감지기 모듈 개발 및 교육 프로그램 연계)

  • Lee, Hyo-Jai;Kim, Eungsuk;Hong, Chang-Ho
    • Journal of Practical Engineering Education
    • /
    • v.13 no.2
    • /
    • pp.301-304
    • /
    • 2021
  • In this study, we developed a module that can perform two functions at the same time through interworking between a personal recognition module and a heat detection module in the era of COVID-19. This can simultaneously solve the problem of compatibility of the personal recognition module that occurs in the existing system and the problem of secondary infection that can occur during congestion due to the separate implementation of heat detection. Therefore, in this study, NFC and Bluetooth motherboards were developed, and an array-type non-contact temperature sensor was applied to detect heat. The developed system is expected to be able to realize both access control of floating population and effective quarantine at the same time in public institutions or private companies that require AI automated access control. In addition, it is judged that it is possible to link the embedded programming and web programming implementation method using the module of the development system to the educational program.

Frequently Occurred Information Extraction from a Collection of Labeled Trees (라벨 트리 데이터의 빈번하게 발생하는 정보 추출)

  • Paik, Ju-Ryon;Nam, Jung-Hyun;Ahn, Sung-Joon;Kim, Ung-Mo
    • Journal of Internet Computing and Services
    • /
    • v.10 no.5
    • /
    • pp.65-78
    • /
    • 2009
  • The most commonly adopted approach to find valuable information from tree data is to extract frequently occurring subtree patterns from them. Because mining frequent tree patterns has a wide range of applications such as xml mining, web usage mining, bioinformatics, and network multicast routing, many algorithms have been recently proposed to find the patterns. However, existing tree mining algorithms suffer from several serious pitfalls in finding frequent tree patterns from massive tree datasets. Some of the major problems are due to (1) modeling data as hierarchical tree structure, (2) the computationally high cost of the candidate maintenance, (3) the repetitious input dataset scans, and (4) the high memory dependency. These problems stem from that most of these algorithms are based on the well-known apriori algorithm and have used anti-monotone property for candidate generation and frequency counting in their algorithms. To solve the problems, we base a pattern-growth approach rather than the apriori approach, and choose to extract maximal frequent subtree patterns instead of frequent subtree patterns. The proposed method not only gets rid of the process for infrequent subtrees pruning, but also totally eliminates the problem of generating candidate subtrees. Hence, it significantly improves the whole mining process.

  • PDF

Development of a Moving Monitor System for Growing Crops and Environmental Information in Green House (시설하우스 이동형 환경 및 생장 모니터링 시스템 개발)

  • Kim, Ho-Joon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.3
    • /
    • pp.285-290
    • /
    • 2016
  • In rural area, our farmers confront decreasing benefits owing to imported crops and increased cost. Recently, the government encourage the 6th Industry that merges farming, rural resources, and information and communication technology. Therefor the government makes an investment in supplying 'smart greenhouse' in which a farmer monitor growing crops and environment information to control growing condition. The objective of this study is developing an Moving Monitor and Control System for crops in green House. This system includes a movable sensing unit, a controlling unit, and a server PC unit. The movable sensing unit contains high resolution IP camera, temperature and humidity sensor and WiFi repeater. It rolls on a rail hanging beneath the ceiling of a green house. The controlling unit contains embedded PC, PLC module, WiFi router, and BLDC motor to drive the movable sensing unit. And the server PC unit contains a integrated farm management software and home pages and databases in which the images of crops and environment informations. The movable sensing unit moves widely in a green house and gathers lots of information. The server saves these informations and provides them to customers with the direct commercing web page. This system will help farmers to control house environment and sales their crops in online market. Eventually It will be helpful for farmers to increase their benefits.

A Study on Systematic Firmware Security Analysis Method for IoT Devices (체계적인 IoT 기기의 펌웨어 보안 분석 방법에 관한 연구)

  • Kim, Yejun;Gim, Jeonghyeon;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.1
    • /
    • pp.31-49
    • /
    • 2021
  • IoT devices refer to embedded devices that can communicate with networks. Since there are various types of IoT devices and they are widely used around us, in the event of an attack, damages such as personal information leakage can occur depending on the type of device. While the security team analyzes IoT devices, they should target firmware as well as software interfaces since IoT devices are operated by both of them. However, the problem is that it is not easy to extract and analyze firmware and that it is not easy to manage product quality at a certain level even if the same target is analyzed according to the analyst's expertise within the security team. Therefore, in this paper, we intend to establish a vulnerability analysis process for the firmware of IoT devices and present available tools for each step. Besides, we organized the process from firmware acquisition to analysis of IoT devices produced by various commercial manufacturers, and we wanted to prove their validity by applying it directly to drone analysis by various manufacturers.

Implementation of CoMirror System with Video Call and Messaging Function between Smart Mirrors (스마트 미러간 화상 통화와 메시징 기능을 가진 CoMirror 시스템 구현)

  • Hwang, Kitae;Kim, Kyung-Mi;Kim, Yu-Jin;Park, Chae-Won;Yoo, Song-Yeon;Jung, Inhwan;Lee, Jae-Moon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.6
    • /
    • pp.121-127
    • /
    • 2022
  • Smart mirror is an IoT device that attaches a display and an embedded computer to the mirror and provides various information to the useer along with the mirror function. This paper went beyond the form of dealing with smart mirrors only stand alone device the provide information to users, and constructed a network in which smart mirrors are connected, and proposed and implemented a CoMirror system that allows users to talk and share information with other smart mirror users. The CoMirror system has a structure in which several CoMirror clients are connected on one CoMirror server. The CoMirror client consists of Raspberry Pi, a mirror film, a touch pad, a display device, an web camera, etc. The server has functions such as face learning and recognition, user management, a relay role for exchanging messages between clients, and setting up for video call. Users can communicate with other CoMirror users via the server, such as text, image, and audio messages, as well as 1:1 video call.