• Title/Summary/Keyword: Home Network Algorithm

Search Result 151, Processing Time 0.025 seconds

Power-line Communication based Digital Home-Network Technology (로봇주행을 위한 바닥면 특징점 추출에 관한 연구)

  • Jin, Tae-Seok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.579-582
    • /
    • 2010
  • We propose a method of using the three dimensional characteristic information to classify the front environment in travelling by using the images captured by a CCD camera equipped on a mobile robot. So, this paper proposes the method of deciding the travelling direction of a mobile robot with using input images based upon the suggested algorithm by preprocessing, and verified the validity of the image information which are detected as obstacles by the analysis through neural network.

  • PDF

Design of Face Recognition based Embedded Home Security System

  • Sahani, Mrutyunjanya;Subudhi, Subhashree;Mohanty, Mihir Narayan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1751-1767
    • /
    • 2016
  • Home security has become the prime concern for everyone in present scenario. In this work an attempt has been made to develop a home security system which is accessible, affordable and yet effective.The proposed system is based on 'Remote Embedded Control System' (RECS) which works both on the web and gsm platform for authentication and monitoring. This system is therefore cost effective as it relies on existing network infrastructure. As PCA is most popular and efficient algorithm for face recognition, it has been usedin this work. Next to it an interface has been developed for communication purpose in the embedded security system through the ZigBee module. Based on this embedded system, automated control of door movement has been implemented through electromagnetic door lock technology. This helps the users to monitor the real-time activities through web services/SMS. The web service consists of either web browser command or e-mail provision. The system establishes the communication between the system and authenticated user. The e-mail received by the system from the authorized person will monitor and control the real-time operation and door lock. The entire control system is reinforced using ARM1176JZF-S microcontroller and tested for actual use in the home environment. The result shows the experimental verification of the proposed system.

Home Network System control using defect avoidance transceiver algorithm (트랜시버용 결함방지 알고리즘을 이용한 홈네트워크 시스템 제어)

  • An, Dong-Hun;Yang, Hoon-Gee
    • Proceedings of the KIEE Conference
    • /
    • 2008.04a
    • /
    • pp.203-204
    • /
    • 2008
  • 본 논문은 결함방지 알고리즘이 적용된 트랜시버 모듈을 사용해서 홈네트워크 내에서 발생한 결함, 침입 등에 대응 할 수 있는 방법을 설명한다. 시스템 구성도와 결함방지 알고리즘에 대해서 설명하고 알고리즘을 수행하는데 있어서 필요한 데이터베이스의 구조와 역할을 제시하였다. 마지막으로 알고리즘을 적용한 테스트용 홈기기가 올바르게 동자하는 것으로 시스템 제어 결과를 확인 하였다.

  • PDF

Network Forensics and Intrusion Detection in MQTT-Based Smart Homes

  • Lama AlNabulsi;Sireen AlGhamdi;Ghala AlMuhawis;Ghada AlSaif;Fouz AlKhaldi;Maryam AlDossary;Hussian AlAttas;Abdullah AlMuhaideb
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.95-102
    • /
    • 2023
  • The emergence of Internet of Things (IoT) into our daily lives has grown rapidly. It's been integrated to our homes, cars, and cities, increasing the intelligence of devices involved in communications. Enormous amount of data is exchanged over smart devices through the internet, which raises security concerns in regards of privacy evasion. This paper is focused on the forensics and intrusion detection on one of the most common protocols in IoT environments, especially smart home environments, which is the Message Queuing Telemetry Transport (MQTT) protocol. The paper covers general IoT infrastructure, MQTT protocol and attacks conducted on it, and multiple network forensics frameworks in smart homes. Furthermore, a machine learning model is developed and tested to detect several types of attacks in an IoT network. A forensics tool (MQTTracker) is proposed to contribute to the investigation of MQTT protocol in order to provide a safer technological future in the warmth of people's homes. The MQTT-IOT-IDS2020 dataset is used to train the machine learning model. In addition, different attack detection algorithms are compared to ensure the suitable algorithm is chosen to perform accurate classification of attacks within MQTT traffic.

A Medium Access Control Protocol for Sensor Data in Powerline Communications (전력선통신방식에서 센서데이터 전달을 위한 MAC 프로토콜 설계)

  • Jin, Kyo-Hong;Choi, Pyung-Suk;Park, Mu-Hun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.2
    • /
    • pp.257-263
    • /
    • 2006
  • With the ever increasing demand for data communication methods, powerline communication has become in interesting alternative method for data communication in home networking. For the purpose of home safety, several sensors will be installed at door, windows, gas alarm, etc. When considering home networking, the sensor data as well as other types of data should be supported in powerline communication. Usually the sensor data do not have priority over isochronous traffics (voice, video traffic), but in the case of urgent situation at home, the data of sensor being aware of the situation should be transmitted earlier than others. The objective in this paper is to develop a method for supporting an urgent data in home networking using powerline communication. We propose a modified algorithm of HomePlug 1.0 and show the results of computer simulation.

Development of KNX/EIB-based Communication Module (KNX/EIB 프로토콜 기반의 통신 모듈 개발)

  • Park, D.K.;Lee, W.S.;Hong, S.H.;Hwang, T.Y.
    • Proceedings of the KIEE Conference
    • /
    • 2007.04a
    • /
    • pp.420-422
    • /
    • 2007
  • Nowadays, the demand for home networking system is gradually increasing. But most of vendors use their own protocols. KNX/EIB ( European Installation Bus / Konnex) is a standard protocol approved as an European (EN 50090 - EN 13321-1) and a World-wide standard (ISO/IEC 14543). In this study, we develop on/off and dimming lighting control system using BIM. In this system, BIM communicates to micro-controller using PEI(Physical External Interface) communication. And this enables including more KNX/EIB communication objects in lighting control system, and providing lighting control algorithm. The technology in this paper can help to adapt the world-wide standards.

  • PDF

Self-Diagnosing Disease Classification System for Oriental Medical Science with Refined Fuzzy ART Algorithm (Refined Fuzzy ART 알고리즘을 이용한 한방 자가 질병 분류 시스템)

  • Kim, Kwang-Baek
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.7
    • /
    • pp.1-8
    • /
    • 2009
  • In this paper, we propose a home medical system that integrates a self-diagnosing disease classification system and a tele-consulting system by communication technology. The proposed disease classification system supports to self-diagnose the health condition based on oriental medical science using fuzzy neural network algorithm. The prepared database includes 72 different diseases and their associated symptoms based on a famous medical science book "Dong-eui-bo-gam". The proposed system extracts three most prospective diseases from user's symptoms by analyzing disease database with fuzzy neural network technology. Technically, user's symptoms are used as an input vector and the clustering algorithm based upon a fuzzy neural network is performed. The degree of fuzzy membership is computed for each probable cluster and the system infers the three most prospective diseases with their degree of membership. Such information should be sent to medical doctors via our tele-consulting system module. Finally a user can take an appropriate consultation via video images by a medical doctor. Oriental medical doctors verified the accuracy of disease diagnosing ability and the efficacy of overall system's plausibility in the real world.

Dynamic Bandwidth Allocation Algorithm with Two-Phase Cycle for Ethernet PON (EPON에서의 Two-Phase Cycle 동적 대역 할당 알고리즘)

  • Yoon, Won-Jin;Lee, Hye-Kyung;Chung, Min-Young;Lee, Tae-Jin;Choo, Hyun-Seung
    • The KIPS Transactions:PartC
    • /
    • v.14C no.4
    • /
    • pp.349-358
    • /
    • 2007
  • Ethernet Passive Optical Network(EPON), which is one of PON technologies for realizing FTTx(Fiber-To-The-Curb/Home/Office), can cost-effectively construct optical access networks. In addition, EPON can provide high transmission rate up to 10Gbps and it is compatible with existing customer devices equipped with Ethernet card. To effectively control frame transmission from ONUs to OLT EPON can use Multi-Point Control Protocol(MPCP) with additional control functions in addition to Media Access Control(MAC) protocol function. For EPON, many researches on intra- and inter-ONU scheduling algorithms have been performed. Among the inter-ONU scheduling algorithms, IPS(Interleaved Polling with Stop) based on polling scheme is efficient because OLT assigns available time portion to each ONU given the request information from all ONUs. Since the IPS needs an idle time period on uplink between two consecutive frame transmission periods, it wastes time without frame transmissions. In this paper, we propose a dynamic bandwidth allocation algorithm to increase the channel utilization on uplink and evaluate its performance using simulations. The simulation results show that the proposed Two-phase Cycle Danamic Bandwidth Allocation(TCDBA) algorithm improves the throughput about 15%, compared with the IPS and Fast Gate Dynamic Bandwidth Allocation(FGDBA). Also, the average transmission time of the proposed algorithm is lower than those of other schemes.

Prediction of Elementary Students' Computer Literacy Using Neural Networks (신경망을 이용한 초등학생 컴퓨터 활용 능력 예측)

  • Oh, Ji-Young;Lee, Soo-Jung
    • Journal of The Korean Association of Information Education
    • /
    • v.12 no.3
    • /
    • pp.267-274
    • /
    • 2008
  • A neural network is a modeling technique useful for finding out hidden patterns from data through repetitive learning process and for predicting target values for new data. In this study, we built multilayer perceptron neural networks for prediction of the students' computer literacy based on their personal characteristics, home and social environment, and academic record of other subjects. Prediction performance of the network was compared with that of a widely used prediction method, the regression model. From our experiments, it was found that personal characteristic features best explained computer proficiency level of a student, whereas the features of home and social environment resulted in the worse prediction accuracy among all. Moreover, the developed neural network model produced far more accurate prediction than the regression model.

  • PDF

Performance Analysis in Wireless Home Network using Bluetooth with SAW-ARQ (SAW-ARQ를 활용하여 블루투스 하에서의 무선 홈 네트워크의 성능 분석)

  • Hong, Sung-Hwa;Kang, Bong-Jik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.5
    • /
    • pp.1608-1615
    • /
    • 2010
  • In this paper, we proposed the method called "DoublePico"(Double Piconet) forovercoming low data transmission rate in a scatternet. This needs a new Ad-hoc network topology to transmit with high rate. Every node performs the function of the relay station. DoublePico has two bluetooth devices that should form two different poconets; every node can make a link between two different piconets. Two different piconets are linked in one node by the link with two bluetooth divices thereby forming the Ad-Hoc network. In this paper, we shows the method of DoublePico which supports about 457kbps of the maximum data transmission rate. This method supports a higher data transmission rate than the traditional bluetooth's Ad-Hoc topology by using analysis and comparison of existing algorithm of bluetooth specification and simulation results. Specifically, this paper focuses on the impact of intererence on the PER (Packet Error Rate), throughput performance, and the throughput improvement with SAW(Stop and Wait)-ARQ scheme in DoublePico.