• Title/Summary/Keyword: 통신권

Search Result 1,433, Processing Time 0.03 seconds

Design of Emergency Notification Smart Farm Service Model based on Data Service for Facility Cultivation Farms Management (시설 재배 농가 관리를 위한 데이터 서비스 기반의 비상 알림 스마트팜 서비스 모델 설계)

  • Bang, Chan-woo;Lee, Byong-kwon
    • Journal of Advanced Technology Convergence
    • /
    • v.1 no.1
    • /
    • pp.1-6
    • /
    • 2022
  • Since 2015, the government has been making efforts to distribute Korean smart farms. However, the supply is limited to large-scale facility vegetable farms due to the limitations of technology and current cultivation research data. In addition, the efficiency and reliability compared to the introduction cost are low due to the simple application of IT technology that does not consider the crop growth and cultivation environment. Therefore, in this paper, data analysis services was performed based on public and external data. To this end, a data-based target smart farm system was designed that is suitable for the situation of farms growing in facilities. To this end, a farm risk information notification service was developed. In addition, light environment maps were provided for proper fertilization. Finally, a disease prediction model for each cultivation crop was designed using temperature and humidity information of facility farms. Through this, it was possible to implement a smart farm data service by linking and utilizing existing smart farm sensor data. In addition, economic efficiency and data reliability can be secured for data utilization.

A Study analysis and solutions to the problems related to use of IP phones in ALL IP environment and IMS server products (All IP 환경에서 상용화 IP Phones 과 IMS 서버 제품 군에 대한 문제점 분석 및 해결 방안연구)

  • Chung, In-Kwon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.581-584
    • /
    • 2010
  • Based on superspeed nation-wide communication infrastructure, high speed and high quality ALL IP communication network is created. It is a point in time where such infrastructure allows residential and commercial phones to be ported from PSTN to IP network. The problem experienced on IP phones in ALL IP environment and IMS server products are not easily approachable and dealt with. Therefore, this paper discusses approaches used in analyzing and resolving problems before they actually occur. This paper first discusses briefly the IP phones used in IMS network and their related problems. Then next topic deals with characteristics of these problems and current status. Last but not least, the causes of the problems are analyzed and solutions to these problems are introduced. Also discussed are solutions to possible future issues followed by conclusion.

A Study on the Minimum Route Cost Routing Protocol for 6LoWPAN (6LoWPAN을 위한 최소경로비용 라우팅 프로토콜에 관한 연구)

  • Kim, Won-Geun;Kim, Jung-Gyu
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.1
    • /
    • pp.1-14
    • /
    • 2010
  • It is recently issued scalability, mobility and external internet connection on Wire-less sensor network. The low power wireless sensor networks based on IPv6 technology 6LoWPAN technology is being standardized in the IETF. This paper for the 6LoWPAN environment based on the routing protocol LOAD, route cost applied the packet re-transmission rate which follows in Link Qualities price which uses at course expense and packet transmission Minimum route Cost routing protocol where does on the course wherethe smallest packet re-transmission becomes accomplished proposed. The technique which proposes compared and LOAD and AODV that about 13%, about 16% energy consumption is few respectively averagely, Energy of the entire network equally, used and energy effectiveness and improvement of network life time experiment led and confirmed.

Concept and Development Direction of Digital Aquaculture considering the Improvement of Aquaculturists' Acceptability (어가수용성 향상을 고려한 디지털양식의 정의 및 발전방향)

  • Sang Jung Ahn;Chang-Mo Ma;Se Han Kim;Deuk-Young Jeong;Sungyoon Cho;Kiwon Kwon
    • Journal of Internet Computing and Services
    • /
    • v.24 no.4
    • /
    • pp.93-105
    • /
    • 2023
  • In order to transform the traditional aquaculture industry, which is dependent on experience, labor-intensive and natural environment, into future intelligent smart aquaculture, digital aquaculture improves aquaculture reproducibility and efficiency of production process through digitization of the aquaculture industry based on ICT equipments, Data analysis and utilization for promoted to increase the acceptability of aquaculturist. Europe's advanced fisheries countries have achieved rapid growth not only in aquaculture technology but also in the aquaculture equipment industry through digitization that combines information and communication technology with aquaculture farms. However, it is not possible to collect aquacultural data in Korea because it has not secured a Korean aquaculture industry for multi-variety, small-scale production and aquaculturists' refusal of reception for digital transformation. Therefore, this study intends to suggest the development direction of digital aquaculture to convert to intelligent smart aquaculture in the future by analyzing trends and critical technology.

A Study on ScienceDMZ Construction for High Speed Transfer of Science Big Data (과학빅데이터 고속전송을 위한 ScienceDMZ 구축 방안 연구)

  • Moon, Jeong-hoon;Kwak, Jai-seung;Hong, Won-taek;Kim, Ki-heyon;Lee, Sang-kwon;Kim, Dong-kyun;Kim, Yong-hwan;Yu, Ki-sung
    • KNOM Review
    • /
    • v.22 no.2
    • /
    • pp.12-21
    • /
    • 2019
  • There is a rapid development of experimental equipment and ICT technology in data-intensive scientific areas, thus, big data of more than exabyte size is being generated. However, the big data transmission technology does not satisfy the needs of the application researchers who utilize it. Various high-performance transmission technologies have been developed based on QoS(Quality of Service), but they also require changes in the clean slate method. On the other hand, ScienceDMZ technologies improve the performance of scientific big data transmission by bypassing the firewall that causes a big problem in transmission performance. In addition, it is possible to implement without changing the existing network. In this paper, we built ScienceDMZ in an international long-distance environment based on KREONET(Korea Research Environment Open NETwork), and we verified the performance. We also introduced how GPU platform could be linked in a distributed ScienceDMZ environment.

A Study on Android Malware Detection using Selected Features (선별된 특성 정보를 이용한 안드로이드 악성 앱 탐지 연구)

  • Myeong, Sangjoon;Kim, Kangseok
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.3
    • /
    • pp.17-24
    • /
    • 2022
  • Mobile malicious apps are increasing rapidly, and Android, which accounts for most of the global mobile OS market, is becoming a major target of mobile cyber security threats. Therefore, in order to cope with rapidly evolving malicious apps, there is a need for detection techniques of malicious apps using machine learning, one of artificial intelligence implementation technologies. In this paper, we propose a selected feature method using feature selection and feature extraction that can improve the detection performance of malicious apps. In the feature selection process, the detection performance improved according to the number of features, and the API showed relatively better detection performance than the permission. Also combining the two characteristics showed high precision of over 93% on average, confirming that the appropriate combination of characteristics could improve the detection performance.

Real-time Anomaly Detection System Using HITL Simulation-Based UAV Packet Data (HITL 시뮬레이션 기반 무인비행체 패킷 데이터를 활용한 실시간 이상 탐지 시스템)

  • Daekyeong Park;Byeongjin Kim
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.103-113
    • /
    • 2023
  • In recent years, Unmanned Aerial Vehicles (UAV) have been widely used in various industries. However, as the depend ence on UAV increases rapidly, concerns about the security and safety of UAV are growing. Currently, various vulnerabili ties such as stealing the control right of the UAV or the right to communicate with the UAV in the web application are being disclosed. However, there is a lack of research related to the security of UAV. Therefore, in this paper, a study was conducted to determine whether the packet data was normal or abnormal by collecting packet data of an unmanned aerial vehicle in a HITL(Hardware In The Loop) simulation environment similar to the real environment. In addition, this paper proposes a method for reducing computational cost in the modeling process and increasing the ease of data interpretation, a machine learning-based anomaly detection model that detects abnormal data by learning only normal data, and optimized hyperparameter values.

An Optimization Technique in Memory System Performance for RealTime Embedded Systems (실시간 임베디드 시스템을 위한 메모리 시스템 성능 최적화 기법)

  • Yongin Kwon;Doosan Cho;Jongwon Lee;Yongjoo Kim;Jonghee Youn;Sanghyun Park;Yunheung Paek
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.882-884
    • /
    • 2008
  • 통상 하드웨어 캐시의 크기보다 수십에서 수백배 큰 크기의 데이타를 랜덤하게 접근하는 경우 낮은 메모리 접근 지역성(locality)에 기인하여 캐시 메모리 성능이 급격히 저하되는 문제를 야기한다. 예를 들면, 현재 보편적으로 사용되고 있는 차량용 General Positioning System (GPS) 프로그램의 경우 최대 32개의 위성으로부터 데이터를 받아 수신단의 위치를 계산하는 부분이 핵심 모듈중의 하나 이며, 이는 전체 성능의 50% 이상을 차지한다. 이러한 모듈에서는 위성 신호를 실시간으로 받아 버퍼 메모리에 저장하며, 이때 필요한 데이터가 순차적으로 저장되지 못하기 때문에 랜덤하게 데이터를 읽어 사용하게 된다. 결과적으로 낮은 지역성에 기인하여 실시간 (realtime)안에 데이터 처리를 하기 어려운 문제에 직면하게 된다. 통상의 통신 응용의 알고리즘 상에 내재된(inherited) 낮은 메모리 접근 지역성을 개선하는 것은 알고리즘 상에서의 접근을 요구한다. 이는 높은 비용이 필요함으로 본 연구에서는 사용되는 데이터 구조를 변환하여 지역성을 높이는 방향으로 접근하였다. 결과적으로 핵심 모듈에서 2배, 전체 시스템 성능에서 14%를 개선할 수 있었다.

A study on community care using AI technology (AI 기술을 활용한 커뮤니티케어에 관한 연구)

  • Seungae Kang
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.151-156
    • /
    • 2023
  • Currently, ICT is widely used in caring for the elderly living alone and preventing the disappearance of the elderly with dementia. Therefore, in this study, based on the government policy direction for the 4th industrial revolution, the use of AI technology-based care services, which are gradually increasing in community care, was sought to explore the current status and prospects for utilization and activation.AI speakers and caring robots, services that can be used for community care, help solve various problems experienced by the elderly, and are also used to relieve lack of conversation or loneliness by adding emotional functions. In order to activate community care using AI technology in the future: First, there is a need for continuous education to familiarize the elderly with AI devices and 'user experience (UX) design' for the elderly. Second, it is necessary to use human-centered technology that has a complementary relationship and enables emotional mutual relationships rather than using function-oriented technology. Third, it is necessary to solve ethical problems such as guaranteeing the user's right to self-determination and protecting privacy.

A Study on the Crime Investigation of Anonymity-Driven Blockchain Forensics (익명 네트워크 기반 블록체인 범죄 수사방안 연구)

  • Han, Chae-Rim;Kim, Hak-Kyong
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.45-55
    • /
    • 2023
  • With the widespread use of digital devices, anonymous communication technologies such as the dark web and deep web are becoming increasingly popular for criminal activity. Because these technologies leave little local data on the device, they are difficult to track using conventional crime investigation techniques. The United States and the United Kingdom have enacted laws and developed systems to address this issue, but South Korea has not yet taken any significant steps. This paper proposes a new blockchain-based crime investigation method that uses physical memory data analysis to track the behavior of anonymous network users. The proposed method minimizes infringement of basic rights by only collecting physical memory data from the device of the suspected user and storing the tracking information on a blockchain, which is tamper-proof and transparent. The paper evaluates the effectiveness of the proposed method using a simulation environment and finds that it can track the behavior of dark website users with a residual rate of 77.2%.