• Title/Summary/Keyword: IOT.

Search Result 334, Processing Time 0.048 seconds

Comparison Study on the Resistance Characteristics of an Arctic Tanker and a General Tanker (쇄빙 유조선과 일반 유조선의 저항특성 비교연구)

  • Kim, Hyun-Soo;Ha, Mun-Keun;Ahn, Dang;Chun, Ho-Hwan
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.43 no.1 s.145
    • /
    • pp.43-49
    • /
    • 2006
  • The hull form of icebreaking tanker depends on the trade route and ice characteristic. The hull form has to be designed for icebreaking concept if the vessel is operating in heavy ice and also the hull from has to be optimized for general tanker when the ship is operating in ice-free ocean. This paper presents comparison of ship resistance in pack ice, level ice and open water. Four ships are used to compare the resistance characteristic. One is conventional tanker and three ships are icebreaking tankers. The ice model test was carried out at the IOT (Institute for Ocean Technology, Newfoundland, Canada) and open water test was performed at 55MB (Samsung Ship Model Basin). The ice resistance of conventional tanker was predicted by Colbourne's method. The resistance of open water, pack ice and level ice are compared and discussed. The best hull form of icebreaker is not good in open water performance compare to conventional tanker. This result explains that the hull form of icebreaker and normal tanker have to compromise when the ship is operated in ice and ice-free condition. The result of this paper gives a guide for icebreaking tanker design.

Development of Smart Mirror System based on the Raspberry Pi (Raspberry Pi를 이용한 스마트 미러 개발)

  • Lin, Zhi-Ming;Kim, Chul-Won
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.2
    • /
    • pp.379-384
    • /
    • 2021
  • With people's continuous research and exploration in the field of artificial intelligence, more relatively mature artificial intelligence technology is applied in people's daily life. Mirrors are the most commonly used daily necessities in life, and it should be applied to artificial intelligence. The research results of this paper show that the smart mirror designed based on the raspberry pi displays weather, temperature, greetings, and has a human-mirror interaction function. The research method of this paper uses the Raspberry pi 3B + as the core controller and Google Assistant as the intelligent control. When connected to the network via Raspberry Pi's own WiFi, the mirror can automatically display and update time, weather and news information features. You can wake up the Google Assistant using keywords, then control the mirror to play music, remind the time, It implements the function of smart mirror voice interaction. Also, all the hardware used in this study is modular assembly. Later, it is convenient for user to assemble by himself later. It is suitable for market promotion at an affordable price.

A Study on Malware Identification System Using Static Analysis Based Machine Learning Technique (정적 분석 기반 기계학습 기법을 활용한 악성코드 식별 시스템 연구)

  • Kim, Su-jeong;Ha, Ji-hee;Oh, Soo-hyun;Lee, Tae-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.775-784
    • /
    • 2019
  • Malware infringement attacks are continuously increasing in various environments such as mobile, IOT, windows and mac due to the emergence of new and variant malware, and signature-based countermeasures have limitations in detection of malware. In addition, analytical performance is deteriorating due to obfuscation, packing, and anti-VM technique. In this paper, we propose a system that can detect malware based on machine learning by using similarity hashing-based pattern detection technique and static analysis after file classification according to packing. This enables more efficient detection because it utilizes both pattern-based detection, which is well-known malware detection, and machine learning-based detection technology, which is advantageous for detecting new and variant malware. The results of this study were obtained by detecting accuracy of 95.79% or more for benign sample files and malware sample files provided by the AI-based malware detection track of the Information Security R&D Data Challenge 2018 competition. In the future, it is expected that it will be possible to build a system that improves detection performance by applying a feature vector and a detection method to the characteristics of a packed file.

IoT MQTT Security Protocol Design Using Chaotic Signals (혼돈신호를 이용한 IoT의 MQTT 보안 프로토콜 설계)

  • Yim, Geo-Su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.6
    • /
    • pp.778-783
    • /
    • 2018
  • With the rapid advancement of information and communication technology and industrial technologies, a hyper-connected society is being realized to connect human beings, all programs and things via the Internet. IoT (Internet of Thing), which connects a thing and another thing, and things and human beings, gathers information to realize the hyper-connected society. MQTT (Message Queuing Telemetry Transport) is a push-technology-based light message transmission protocol that was developed to be optimized to the limited communication environment such as IoT. In pursuing the hyper-connected society, IoT's sensor environment information is now being used as a wide range of information on people's diseases and health management. Thus, security problems of such MQTT include not only the leak of environmental information but also the personal information infringement. To resolve such MQTT security problems, we have designed a new security MQTT communication by applying the initial-value sensitivity and pseudorandomness of the chaotic system to the integrity and confidentiality. The encryption method using our proposed chaotic system offers a simple structure and a small amount of calculation, and it is deemed to be suitable to the limited communication environment such as IoT.

A Scheme of User Face Recognition using a Moire Phenomenon in IoT Environment (IoT환경에서 무아레 현상을 이용한 사용자 얼굴 인증 기법)

  • Cho, Ik-Hyun;Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.17 no.2
    • /
    • pp.171-176
    • /
    • 2019
  • In modern times, many IoT products are being used as all things and devices are connected to the Internet and IoT products become easily accessible through the network. For the convenience of users, IoT products can be remotely operated automatically without manual operation. Various research and development are underway to improve the convenience of users by using IoT products. However, since only the convenience of the users is pursued, in terms of security, there is a serious problem that exposes the user's personal information. This paper has proposed a method to apply $moir{\acute{e}}$ technology to IoT products in order to improve the performance of security, and a method to increase the safety of IoT products using user face authentication based on shadow $moir{\acute{e}}$ as a $moir{\acute{e}}$ phenomenon method, and the projection $moir{\acute{e}}$. When comparing the existing IoT products and IoT products applied with $moir{\acute{e}}$ technology, IoT products applied with $moir{\acute{e}}$ technology are safer in terms of security.

Intelligent Home appliances Power Control using Android and Arduino (안드로이드와 아두이노를 이용한 지능형 가전제품 전력 컨트롤)

  • Park, Sung-hyun;Kim, A-Yong;Kim, Wung-Jun;Bae, Keun-Ho;Yoo, Sang-keun;Jung, Hoe-kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.854-856
    • /
    • 2014
  • Has been released of make it possible to control the using for smart devices of a wide variety home appliances and electronics in smart appliances in accordance with the one person multi devices. In addition, is increasing rapidly for the number of the product on cleaning robot and refrigerator, air conditioning, TV, etc. these devices are using the implement up DLNA system. And at home and abroad for development and has provided with Iot and Alljoyn such systems. But currently using home appliances or electronic devices of there are a lot of the operating system non installed than the installed products. In addition, smart appliances do not use for user than buying existing electronic products a lot more. In addition, more occur for smart appliances of that do not use for the user on smart appliances rather than buying existing electronics. In this paper, Suggested and implemented for system of control such as smart devices to existed home appliance on not have an operating system, Using mobile device for want users to quantify the data to transfer from arduino board.

  • PDF

Development of Ubuntu-based Raspberry Pi 3 of the image recognition system (우분투 기반 라즈베리 파이3의 영상 인식 시스템 개발)

  • Kim, Gyu-Hyun;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.868-871
    • /
    • 2016
  • Recently, Unmanned vehicle and Wearable Technology using iot research is being carried out. The unmanned vehicle is the result of it technology. Robots, autonomous navigation vehicle and obstacle avoidance, data communications, power, and image processing, technology integration of a unmanned vehicle or an unmanned robot. The final goal of the unmanned vehicle manual not autonomous by destination safely and quickly reaching. This paper managed to cover One of the key skills of unmanned vehicle is to image processing. Currently battery technology of unmanned vehicle can drive for up to 1 hours. Therefore, we use the Raspberry Pi 3 to reduce power consumption to a minimum. Using the Raspberry Pi 3 and to develop an image recognition system. The goal is to propose a system that recognizes all the objects in the image received from the camera.

  • PDF

A Study on IoT based Forensic Policy for Early Warning System of Plant & Animal as A Subsystem of National Disaster Response and Management (국가재난형 동·식물 조기경보시스템을 위한 IOT기반의 포렌식 정책 연구)

  • Chung, Ho-jin;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.295-298
    • /
    • 2014
  • In recently, a climatic change(such as subtropical climate and frequent unusual high temperature) and the open-trade policies of agricultural & livestock products are increasing the outbreak risk of highly pathogenic avian influenza(HPAI) and foot and mouth disease(FMD), and accordingly the socio-economic damage and impacts are also increasing due to the cases such as damage from the last 5 times of FMD outbreak(3,800 billion won), from 10 years public control cost of Pine Wilt Disease (PWD)(238.3 billion won), and from the increased invasive pests of exotic plant like isoptera. Therefore, the establishment of new operation strategy of IoT(Internet of Things) based satellite early warning system(SEWS) for plants and animals as a subsystem of national disaster response and management system is being required, where the forensic technology & measures should be applied as a government policy to estimate the post compensation and to carry out the legal responsibility.

  • PDF

A Mobile Voting DApp Implementation and Security Issues (모바일 투표 Dapp 실행 및 보안 이슈)

  • KHERLEN, NARANTUYA;Park, Jun Beom;Park, Jong Sou
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.290-292
    • /
    • 2019
  • Since the advent of blockchain and bitcoin, decentralization has been accelerating around the world as a public blockchain ethereum with smartcontract has begun. Developers can use Ethereum's blockchain development platform to develop "distributed applications" (DApp) running on a decentralized P2P network, and various types of devices from IoT to mobile can participate in a block-chain distributed environment have. Using Ethereum's blockchain development platform, developers can develop "Decentralized Application (DApp)" that run on a decentralized P2P network and various types of devices from IOT to mobile can participate in distributed blockchain environments. There are many ways to interact with the blockchain and the smart contract, but users tend to prefer the mobile methods due to their convenience and accessibility advantages. Therefore, the author developed an Android based voting DApp and researched related issues. Since the current development methods of DApp are not adequately researched and standardized, efficient methods for developing user-friendly DApp were studied. Because DApp has to spend a certain amount of fees to interact with blockchain, it has intensively investigated the gas problem of Smart Contract code and the security problem of code, and author would like to introduce it in this paper.

  • PDF

Validation on Solar-array Drive Assembly of GEO-KOMPSAT-2A Through In-orbit Operation (천리안2A호 태양전지판구동기 궤도상 운영 검증)

  • Park, Young-Woong;Park, Keunjoo;Park, Bong-Kyu
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.47 no.4
    • /
    • pp.283-288
    • /
    • 2019
  • In this paper, there is summarized the validation of ground test results through the telemetry acquired during on-orbit initial activation on solar-array drive assembly(SDA) of GK2A launched at Dec-5, 2018. Especially, the decision logic of SDA initial position and the compensation logic are validated and confirmed. The SDA initial position is needed when GK2A enter to geostationary orbit from transfer orbit and the compensation logic is for the accumulated position error due to the open-loop control. Up to now, it is normal operating. Also the periodic offset between the geostationary orbit and Sun position is found that it is not checked on design phase, and then the proper threshold value is applied.