• Title/Summary/Keyword: 통신 시스템

Search Result 27,779, Processing Time 0.05 seconds

Remote Multi-control Smart Farm with Deep Learning Growth Diagnosis Function

  • Kim, Mi-jin;Kim, Ji-ho;Lee, Dong-hyeon;Han, Jung-hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.9
    • /
    • pp.49-57
    • /
    • 2022
  • Currently, the problem of food shortage is emerging in our society due to climate problems and an increase population in the world. As a solution to this problem, we propose a multi-remote control smart farm that combines artificial intelligence (AI) and information and communication technology (ICT) technologies. The proposed smart farm integrates ICT technology to remotely control and manage crops without restrictions in space and time, and to multi-control the growing environment of crops. In addition, using Arduino and deep-learning technology, a smart farm capable of multiple control through a smart-phone application (APP) was proposed, and Ai technology with various data securing and diagnosis functions while observing crop growth in real-time was included. Various sensors in the smart farm are controlled by using the Arduino, and the data values of the sensors are stored in the built database, so that the user can check the stored data with the APP. For multiple control for multiple crops, each LED, COOLING FAN, and WATER PUMP for two or more growing environments were applied so that the user could control it conveniently. And by implementing an APP that diagnoses the growth stage through the Tensor-Flow framework using deep-learning technology, we developed an application that helps users to easily diagnose the growth status of the current crop.

A Study on the Cerber-Type Ransomware Detection Model Using Opcode and API Frequency and Correlation Coefficient (Opcode와 API의 빈도수와 상관계수를 활용한 Cerber형 랜섬웨어 탐지모델에 관한 연구)

  • Lee, Gye-Hyeok;Hwang, Min-Chae;Hyun, Dong-Yeop;Ku, Young-In;Yoo, Dong-Young
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.10
    • /
    • pp.363-372
    • /
    • 2022
  • Since the recent COVID-19 Pandemic, the ransomware fandom has intensified along with the expansion of remote work. Currently, anti-virus vaccine companies are trying to respond to ransomware, but traditional file signature-based static analysis can be neutralized in the face of diversification, obfuscation, variants, or the emergence of new ransomware. Various studies are being conducted for such ransomware detection, and detection studies using signature-based static analysis and behavior-based dynamic analysis can be seen as the main research type at present. In this paper, the frequency of ".text Section" Opcode and the Native API used in practice was extracted, and the association between feature information selected using K-means Clustering algorithm, Cosine Similarity, and Pearson correlation coefficient was analyzed. In addition, Through experiments to classify and detect worms among other malware types and Cerber-type ransomware, it was verified that the selected feature information was specialized in detecting specific ransomware (Cerber). As a result of combining the finally selected feature information through the above verification and applying it to machine learning and performing hyper parameter optimization, the detection rate was up to 93.3%.

Prioritizing Themes Using a Delphi Survey on Patient Safety Theme Reports (환자안전 주제별 보고서의 주제 우선순위 설정: 델파이 조사를 통한 분석)

  • Park, Jeong Yun;Shin, Eun-Jung;Kim, Rhieun;Kim, Sukyeong;Park, Choon-Seon;Park, Taezoon;Choi, Yun-Kyoung;Heo, Young-Hee
    • Quality Improvement in Health Care
    • /
    • v.28 no.1
    • /
    • pp.45-54
    • /
    • 2022
  • Purpose: The study aims to identify the theme list and priority criteria of patient safety theme reports in South Korea. Methods: The survey was conducted twice, and the importance of each criterion and theme was measured on a nine-point scale using the Delphi technique by a panel of 19 patient safety experts. The criteria included severity, universality, preventability, and organizational-social impact. Descriptive statistics such as frequency, percentage, mean, standard deviation, median, and interval quartile range were used to analyze the data. Results: The parameters were assigned a weighted average of 35% for severity, 20% for universality, 30% for preventability, and 15% for organizational-social impact, respectively. The final top three rankings were surgery safety, blood transfusion safety, and medication safety. In addition to expert opinion, for the theme that is selected based on the priority ranking, one to five sub-topics can be derived from the theme based on the priority ranking, societal demands, or the yearly priority list of patient safety incidents. Conclusion: It is recommended that the official patient safety center distribute the report in the form of a summary that can be utilized nationwide at medical institutions, government institutions, and other places. Updates, as well as accumulated theme reports, will serve as the baseline data for the proposal of the system and for the policy designed to implement and improve institutions' safety practices as a standard of domestic patient safety practice guidelines.

A Study on Tire Surface Defect Detection Method Using Depth Image (깊이 이미지를 이용한 타이어 표면 결함 검출 방법에 관한 연구)

  • Kim, Hyun Suk;Ko, Dong Beom;Lee, Won Gok;Bae, You Suk
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.11 no.5
    • /
    • pp.211-220
    • /
    • 2022
  • Recently, research on smart factories triggered by the 4th industrial revolution is being actively conducted. Accordingly, the manufacturing industry is conducting various studies to improve productivity and quality based on deep learning technology with robust performance. This paper is a study on the method of detecting tire surface defects in the visual inspection stage of the tire manufacturing process, and introduces a tire surface defect detection method using a depth image acquired through a 3D camera. The tire surface depth image dealt with in this study has the problem of low contrast caused by the shallow depth of the tire surface and the difference in the reference depth value due to the data acquisition environment. And due to the nature of the manufacturing industry, algorithms with performance that can be processed in real time along with detection performance is required. Therefore, in this paper, we studied a method to normalize the depth image through relatively simple methods so that the tire surface defect detection algorithm does not consist of a complex algorithm pipeline. and conducted a comparative experiment between the general normalization method and the normalization method suggested in this paper using YOLO V3, which could satisfy both detection performance and speed. As a result of the experiment, it is confirmed that the normalization method proposed in this paper improved performance by about 7% based on mAP 0.5, and the method proposed in this paper is effective.

Simulation and Examination for Beam Profile of DFB Laser with an Anti-reflection Coated Mirror (무반사 면을 갖는 DFB 레이저의 빔 분포 시뮬레이션과 검정)

  • Kwon, Kee-Young;Ki, Jang-Geun
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.1
    • /
    • pp.55-63
    • /
    • 2020
  • Lasers for optical broadband communication systems should have excellent frequency selectivity and modal stability. DFB lasers have low lasing frequency shift during high speed current modulation. In this paper, when a refractive index grating and a gain grating are simultaneously present in a DFB laser having a wavelength of 1.55 ㎛, the dielectric film is coated so that reflection does not occur on the right mirror surface, so that ρr=0. For the first mode, which requires a minimum gain at the threshold, the beam distribution of the oscillation mode in the longitudinal direction and the radiated power ratio Pl/Pr were analyzed and compared for the cases of the phase of ρl=π and π/2. If the phase of ρl=π, in order to obtain a low threshold current and high frequency stability, κL should be greater than 8. In the case of the phase of ρl=π/2, for low threshold current, κL is necessary to be 1.0, where the oscillation frequency coincides with the lattice frequency. DFB lasers with an anti-reflection coated mirror have excellent mode selectivity than 1.55um DFB lasers with two mirror facets

Some Lessons Learned from Previous Studies in Cooperative Driving Automation (협력형 자율주행 기술 개발 동향과 시사점)

  • Jeon, Hyeonmyeong;Yang, Inchul;Kim, Hyoungsoo;Lee, Junhyung;Kim, Sun-Kyum;Jang, Jiyong;Kim, Jiyoon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.4
    • /
    • pp.62-77
    • /
    • 2022
  • A cooperative driving automation system is imperative to overcome the limitation of the stand-alone automated driving technology. By definition, a cooperative driving automation system refers to a technology in which an automated vehicle cooperates with other vehicles or infrastructure to increase driving efficiency and safety. Specifically, in this study, the technical elements necessary for the cooperative driving automation technology and the technological research trends were investigated. Subsequently, implications for future cooperative driving automation technology development were drawn through the research trends. Finally, the importance of cooperative driving automation technology and infra-guidance service for automated vehicles were discussed.

Multi-Path Routing Algorithm for Cost-Effective Transactions in Automated Market Makers (자동화 마켓 메이커에서 비용 효율적인 거래를 위한 다중 경로 라우팅 알고리즘)

  • Jeong, Hyun Bin;Park, Soo Young
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.8
    • /
    • pp.269-280
    • /
    • 2022
  • With the rise of a decentralized finance market (so called, DeFi) using blockchain technology, users and capital liquidity of decentralized finance applications are increasing significantly. The Automated Market Maker (AMM) is a protocol that automatically calculates the asset price based on the liquidity of the decentralized trading platform, and is currently most commonly used in the decentralized exchanges (DEX), since it can proceed the transactions by utilizing the liquidity pool of the trading platform even if the buyers and sellers do not exist at the same time. However, Automated Market Maker have some disadvantages since the cost efficiency of each transaction using Automated Market Maker depends on the liquidity size of some liquidity pools used for the transaction, so the smaller the size of the liquidity pool and the larger the transaction size, the smaller the cost efficiency of the trade. To solve this problem, some platforms are adopting Transaction Path Routing Algorithm that bypasses transaction path to other liquidity pools that have relatively large size to improve cost efficiency, but this algorithm can be further improved because it uses only a single transaction path to proceed each transaction. In addition to just bypassing transaction path, in this paper we proposed a Multi-Path Routing Algorithm that uses multiple transaction paths simultaneously by distributing transaction size, and showed that the cost efficiency of transactions can be further improved in the Automated Market Maker-based trading environment.

A Study to Evaluate the Impact of In-Vehicle Warning Information on Driving Behavior Using C-ITS Based PVD (C-ITS 기반 PVD를 활용한 차량 내 경고정보의 운전자 주행행태 영향 분석)

  • Kim, Tagyoung;Kim, Ho Seon;Kang, Kyeong-Pyo;Kim, Seoung Bum
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.5
    • /
    • pp.28-41
    • /
    • 2022
  • A road system with CV(Connected Vehicle)s, which is often referred to as a cooperative intelligent transportation system (C-ITS), provides various road information to drivers using an in-vehicle warning system. Road environments with CVs induce drivers to reduce their speed or change lanes to avoid potential risks downstream. Such avoidance maneuvers can be considered to improve driving behaviors from a traffic safety point of view. Thus, empirically evaluating how a given in-vehicle warning information affects driving behaviors, and monitoring of the correlation between them are essential tasks for traffic operators. To quantitatively evaluate the effect of in-vehicle warning information, this study develops a method to calculate compliance rate of drivers where two groups of speed profile before and after road information is provided are compared. In addition, conventional indexes (e.g., jerk and acceleration noise) to measure comfort of passengers are examined. Empirical tests are conducted by using PVD (Probe Vehicle Data) and DTG (Digital Tacho Graph) data to verify the individual effects of warning information based on C-ITS constructed in Seoul metropolitan area in South Korea. The results in this study shows that drivers tend to decelerate their speed as a response to the in-vehicle warning information. Meanwhile, the in-vehicle warning information helps drivers to improve the safety and comport of passengers.

Gene Chip을 이용한 돼지의 퇴행성 관절염의 활막세포 기작 연구

  • Lee, Jeong-Su;O, Baatartsogt;Im, Hui-Gyeong;Jo, In-Hui;So, Hyeon-Gyeong;;Kim, Eun-Guk;Lee, Jong-Ha;Hwang, Su-Yeong;Choe, Gang-Deok
    • Proceedings of the Korean Society for Food Science of Animal Resources Conference
    • /
    • 2006.05a
    • /
    • pp.128-132
    • /
    • 2006
  • 관절염이 일어나는 정확한 기전은 아직까지 잘 규명되어 있지 않으나 일반적으로 cytokine, chemokine을 비롯한 여러 가지 조절 물질들 사이의 미묘한 균형이 깨어지는 일이 주된 요인으로 추정되고 있다. 사람의 경우 염증이 일어난 관절 조직에서 활막 세포(synovial fibroblast)는 여러 염증성 사이토카인들을 분비하기도 하며 또 한편 이들 cytokine의 target 세포로 이들의 자극에 대하여 정상인의 그것과 다른 증식 및 활성화 반응을 보이는 등, 다양한 측면에서 관절염증의 유발에 기여하는 것으로 보여진다. 따라서 활막세포 활성화 경로를 DNA Microarray chip을 이용하여 세포 및 분자 수준에서 밝혀 이를 차단할 수 있는 자연물질(natural product)를 선별함으로써 항생제나 스테로이드를 사용하지 않고 돼지의 관절염을 효과적으로 치료 또는 예방할 수 있는 방법을 모색하고자 한다. 6.6kg의 암컷 Yorkshire와 수컷 Landrace의 교배잡으로 왼쪽 뒷다리 슬관절에 십자인대를 파열하여 관절염을 유발하고 8주간 성장을 시킨 후 정상 슬관절과 관절염이 유발된 슬관절의 활막세포로부터 total RNA를 추출한 후 affymetrix Gene chip을 제작하여 Geneplex소프트웨어를 이용하여 데이터를 분석하였다. 분석 결과 unknown 유전자 962개를 포함하여 유전자 발현이 증가된 유전자는 총 1,059개 였으며, unknown 유전자 564개를 포함하여 유전자 발현이 증가된 유전자는 총 639개를 얻었다. 이러한 돼지 관절염에서의 활막세포에 의한 유전적 발현 양상으로부터 molecular function, biological process, pathway등을 이용하여 관절염 지표를 작성할 수 있다.분별을 성공적으로 수행하였다.(p<0.05), 맛, 연도, 다즙성 및 전체적인 기호성은 유의한 차이가 없었다.자체를 악하다고 볼 수 없고 더구나 구원을 이 세상에서의 이탈로 볼 수 없다. 진정한 구원이란 원래 하나님이 보시기에 아름다웠던 그 세상으로의 회복을 포함한다. 이런 면에서 하나님 주권 신앙 하에서 구원이란 전 인격적인 구원, 전 우주적인 구원이 된다. 그렇기 때문에 성도는 세상의 삶과 학문, 예술, 정치, 경제, 사회를 포함한 모든 분야를 하나님의 뜻 가운데서 그 원래의 목적에 부합할 수 있도록 회복시키는 일에 적극 참여해야 한다.자체가 이를 주도하기는 사실 어려움이 있다. 그리고 대형유통점이 영업행위를 영업시간제한에서부터 출점제한에 이르기까지 규제하는 건은 심사숙고하여야 한다. 대형유통점이 국가경제 및 지역사회에 미치는 영향이 부정적인가 긍정적인가에 대해 국내외 학계와 업계에서 여전히 많은 논란이 있기 때문이다. 정부와 지자체에 의한 시장개입은 반드시 필요한 경우에 한해 합당한 방법에 의해 이루어져야 한다. 대형유통점에 대한 규제는 지역사회에 미치는 영향을 다면적으로 평가한 결과에 근거하여 이루어져야 할 것이다. 대부분의 지자체는 체계적인 평가시스템과 객관적인 통계 자료를 갖고 있지 못한 실정이다. 향후 가장 시급한 과제는 시장개방 이후 지난 10년간 대형유통점이 지역사회에 미친 영향에 관한 광범위한 통계자료를 수집하고 이를 체계적으로 분석하여 정책방향을 올바르게 설정하는 것이라 할 수 있다.i와 K. pneumoniae가 존재하며 확산 중임을 시사한다. 앞으로 CTX-M형 ESBL의 만연과 변종 CTX-M형 ESBL의 출연을 감시하기 위한 정기적인 연구와 조사가 필요한 것으로 생각한다., A2-1, B1-1, B2-1의 경우, 강우 일수 감소 이전과

  • PDF

Post-Quantum Security Strength Evaluation through Implementation of Quantum Circuit for SIMECK (SIMEC 경량암호에 대한 양자회로 구현 및 Post-Quantum 보안 강도 평가)

  • Song Gyeong Ju;Jang Kyung Bae;Sim Min Joo;Seo Hwa Jeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.6
    • /
    • pp.181-188
    • /
    • 2023
  • Block cipher is not expected to be safe for quantum computer, as Grover's algorithm reduces the security strength by accelerating brute-force attacks on symmetric key ciphers. So it is necessary to check the post-quantum security strength by implementing quantum circuit for the target cipher. In this paper, we propose the optimal quantum circuit implementation result designed as a technique to minimize the use of quantum resources (qubits, quantum gates) for SIMECK lightweight cryptography, and explain the operation of each quantum circuit. The implemented SIMECK quantum circuit is used to check the estimation result of quantum resources and calculate the Grover attack cost. Finally, the post-quantum strength of SIMECK lightweight cryptography is evaluated. As a result of post-quantum security strength evaluation, all SIMECK family cipher failed to reach NIST security strength. Therefore, it is expected that the safety of SIMECK cipher is unclear when large-scale quantum computers appear. About this, it is judged that it would be appropriate to increase the block size, the number of rounds, and the key length to increase the security strength.