• Title/Summary/Keyword: Home Network System

Search Result 867, Processing Time 0.027 seconds

A Study on the Transition and Characteristics of Convergence Design Furniture (융합디자인 가구의 변천과 특성에 관한 연구)

  • Kim, Mi-Sook;Kang, Hwa-Seon
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.5
    • /
    • pp.137-143
    • /
    • 2018
  • The 4th industrial revolution will have brought smart furniture integrated with IT technology and provide a convenient and comfortable environment for our lives. Therefore, this study analyzed the design characteristics of fusion integrated furniture based on changes of the times. In 20th centuries, characteristic of fusion design was based on architectural structure, new material and function. In 21st centuries, smart home furniture and network system was developed based on IT technology. In addition, due to the increase of single-person households and various consumer purchasing patterns, combined functions for small spaces and multi-function furniture was also developed. In conclusion, the trends of convergence design furniture from 20 to 21st century showed that furniture industry has a significant potential for high-tech technology. This study may be a useful information in developing convergence design furniture industry.

Measurement of Indoor Power Line Channel Characteristics Considering Capacitive Loads (용량성 부하를 고려한 옥내 전력선 채널 특성 측정)

  • Heo Yoon-Seok;Hong Bong-Hwa;Kim Chul;Jun Kye-Suk;Lee Dae-Young
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.6 s.336
    • /
    • pp.53-60
    • /
    • 2005
  • Considerable efforts has been recently devoted to the determination of accurate channel models for the power line environment, both for the indoor and outdoor cases. The common limitation of the known and previously published models is the particular type of approach followed. This paper is concerned with a power line channel characteristic measurement for the more fast and efficiently power line communication experiment. The need arises from the fact that indoor power cables consist of conductors and inductors. A capacitive load simulator is a essential equipment in the power line modem development for indoor power line network. We accomplished a channel data base by the frequency response method about the total 224 capacitor load cases. On the basis of this measurement modeling it is here revealed that the power line communication channel is a more deterministic media.

Adaptive Realtime Traffic Allocation Algorithm for Streaming Data (스트리밍 데이터를 위한 적응적 실시간 트래픽 할당 기법)

  • Jin Hyun-Joon;Seo Sang-Jin;Park Nho-Kyung
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.3 s.345
    • /
    • pp.111-117
    • /
    • 2006
  • Developing a home network and a ubiquitous infrastructure requires various communication techniques and devices with more advanced hardware. With this development, increasing realtime access to multimedia data results in rapid degradation of qualify for multimedia playback. This paper presents a traffic allocation technique based on MPP(Media Preference for Presentation) that can steadily maintain multimedia playback quality by adaptively allocating streaming traffic requested from clients with different playback performances. Media preference is defined in accordance with content popularity and playback performance of client devices. Through experiments when requested stream data exceeds processing ability of a midea server, the proposed allocation technique shows 10% quality improvement comparing to the system without applying the proposed allocation technique.

Performance Analysis using Markov chain in WiBro (WiBro에서 마코프 체인을 이용한 성능분석)

  • Park, Won-Gil;Kim, Hyoung-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.1
    • /
    • pp.190-197
    • /
    • 2010
  • The ACR (Access Control Router) of WiBro processes location registration of the Correspondent Node and Home Agent as the Correspondent Node moves between ACRs. Therefore, the location update cost is low compared with MIPv6. However, all packets which are sent and received are sent through the ACR, so as the number of mobile nodes that are managed by the ACR increases, the cost of packet delivery also increases. Therefore, the communication state of the ACR domain remains smooth when the ACR which manages the mobile node in the ACR domain has good performance. However, network delays occur unless the ACR performs well, so the role of the ACR is important. In this paper, we analysis performance of the ACR for efficient realization of the WiBro standard. By using the Deny Probability and the Total Profit of ACR performance and apply it to the Random Walk Mobility model as the mobility model.

Design of An Fair Non-Repudiation Protocol Using Digital Signature Recorder (전자서명 기록기를 이용한 공정한 부인방지 프로토콜의 설계)

  • Lee, Yong-Joon;Oh, Hae-Seok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.9C
    • /
    • pp.1345-1351
    • /
    • 2004
  • Due to the overwhelming importance the Internet gained nowadays, more and more sophisticated security services are requested. However many applications such as Internet Banking, Home Trading System, Electronic Medical Recede, electronic commerce, etc. are related to non-repudiation. Non-repudiation services are one of these new security requirements. ill comparison to other security issues, such as privacy or authenticity of communications, non-repudiation has not been studied intensively. Informally, we say that a protocol is fair if at the end of the protocol execution either originator receives a non-repudiation of receipt evidence and recipient receives a non-repudiation of origin evidence or none of them receives any valid evidence. The most non-repudiation protocols rely on a trusted third party(TIP) that has to intervene during each protocols run. the TIP may create a communication bottleneck. ill this paper, we suggest the digital signature recorder that guarantees fairness logically and supplies minimal network bottleneck to be composed verification server physically.

Development of Smart Mirror System based on the Raspberry Pi (Raspberry Pi를 이용한 스마트 미러 개발)

  • Lin, Zhi-Ming;Kim, Chul-Won
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.2
    • /
    • pp.379-384
    • /
    • 2021
  • With people's continuous research and exploration in the field of artificial intelligence, more relatively mature artificial intelligence technology is applied in people's daily life. Mirrors are the most commonly used daily necessities in life, and it should be applied to artificial intelligence. The research results of this paper show that the smart mirror designed based on the raspberry pi displays weather, temperature, greetings, and has a human-mirror interaction function. The research method of this paper uses the Raspberry pi 3B + as the core controller and Google Assistant as the intelligent control. When connected to the network via Raspberry Pi's own WiFi, the mirror can automatically display and update time, weather and news information features. You can wake up the Google Assistant using keywords, then control the mirror to play music, remind the time, It implements the function of smart mirror voice interaction. Also, all the hardware used in this study is modular assembly. Later, it is convenient for user to assemble by himself later. It is suitable for market promotion at an affordable price.

A IoT Security Service based on Authentication and Lightweight Cryptography Algorithm (인증 및 경량화 암호알고리즘 기반 IoT 보안 서비스)

  • Kim, Sun-Jib
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.1
    • /
    • pp.1-7
    • /
    • 2021
  • The IoT market continues to expand and grow, but the security threat to IoT devices is also increasing. However, it is difficult to apply the security technology applied to the existing system to IoT devices that have a problem of resource limitation. Therefore, in this paper, we present a service that can improve the security of IoT devices by presenting authentication and lightweight cryptographic algorithms that can reduce the overhead of applying security features, taking into account the nature of resource limitations of IoT devices. We want to apply these service to home network IoT equipment to provide security. The authentication and lightweight cryptographic algorithm application protocols presented in this paper have secured the safety of the service through the use of LEA encryption algorithms and secret key generation by users, IoT devices and server in the IoT environment. Although there is no difference in speed from randomly generating secret keys in experiments, we verify that the problem of resource limitation of IoT devices can be solved by additionally not applying logic for secret key sharing to IoT devices.

Non-Intrusive Load Monitoring Method based on Long-Short Term Memory to classify Power Usage of Appliances (가전제품 전력 사용 분류를 위한 장단기 메모리 기반 비침입 부하 모니터링 기법)

  • Kyeong, Chanuk;Seon, Joonho;Sun, Young-Ghyu;Kim, Jin-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.4
    • /
    • pp.109-116
    • /
    • 2021
  • In this paper, we propose a non-intrusive load monitoring(NILM) system which can find the power of each home appliance from the aggregated total power as the activation in the trading market of the distributed resource and the increasing importance of energy management. We transform the amount of appliances' power into a power on-off state by preprocessing. We use LSTM as a model for predicting states based on these data. Accuracy is measured by comparing predicted states with real ones after postprocessing. In this paper, the accuracy is measured with the different number of electronic products, data postprocessing method, and Time step size. When the number of electronic products is 6, the data postprocessing method using the Round function is used, and Time step size is set to 6, the maximum accuracy can be obtained.

Health Behavior Changes in Korean Adolescents before and during the COVID-19 Pandemic: Secondary Data Analysis of the 2019~2020 Youth Health Risk Behavior Web-Based Survey (코로나19 팬데믹 전후 청소년의 건강행태 비교: 2019~2020 청소년 건강행태 온라인조사를 이용한 2차 자료분석)

  • Lee, Jinhwa;Kwon, Min
    • Journal of the Korean Society of School Health
    • /
    • v.34 no.3
    • /
    • pp.179-189
    • /
    • 2021
  • Purpose: The purpose of the study was to investigate health behavior changes in Korean adolescents before and during the COVID-19 pandemic. Methods: A descriptive cross-sectional design was employed. Data were obtained from the 15~16th (2019~2020) Korea Youth Risk Behavior Web-based Survey. Overall, the data of 112,251 students, 57,303 before the COVID pandemic and 54,948 during the pandemic, were included. The data were analyzed using rao-scott 𝝌2-test, t-test, ANCOVA and logistic regression analysis. Results: While sitting time for study decreased, sitting time for leisure increased in the 2020 group compared to the 2019 group. The 2020 group was more likely to skip breakfast and have a higher BMI than the 2019 group. The 2020 group was less likely to consume fruit and engage in moderate and vigorous physical activities than the 2019 group. The 2020 group was less likely to engage in CC, EC, and HTP current smoking and be exposed to secondhand smoke at home, school, and public places than the 2019 group. The 2020 group was more likely to be satisfied with sleep, but less likely to experience stress, depression, suicidal ideation, suicidal plans, and suicidal attempts than the 2019 group. Conclusion: It is necessary to reduce sedentary time, encourage physical activities, manage smoking and drinking rates continuously, and establish a network system to prevent psychological loneliness and isolation for adolescents, which requires participation of experts from the community as a whole.

Cloud Security Scheme Based on Blockchain and Zero Trust (블록체인과 제로 트러스트 기반 클라우드 보안 기법)

  • In-Hye Na;Hyeok Kang;Keun-Ho Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.2
    • /
    • pp.55-60
    • /
    • 2023
  • Recently, demand for cloud computing has increased and remote access due to home work and external work has increased. In addition, a new security paradigm is required in the current situation where the need to be vigilant against not only external attacker access but also internal access such as internal employee access to work increases and various attack techniques are sophisticated. As a result, the network security model applying Zero-Trust, which has the core principle of doubting everything and not trusting it, began to attract attention in the security industry. Zero Trust Security monitors all networks, requires authentication in order to be granted access, and increases security by granting minimum access rights to access requesters. In this paper, we explain zero trust and zero trust architecture, and propose a new cloud security system for strengthening access control that overcomes the limitations of existing security systems using zero trust and blockchain and can be used by various companies.