• Title/Summary/Keyword: IoT/IoL

Search Result 79, Processing Time 0.023 seconds

GRID BASED ENERGY EFFICIENT AND SECURED DATA TRANSACTION FOR CLOUD ASSISTED WSN-IOT

  • L. SASIREGA;C. SHANTHI
    • Journal of applied mathematics & informatics
    • /
    • v.41 no.1
    • /
    • pp.95-105
    • /
    • 2023
  • To make the network energy efficient and to protect the network from malignant user's energy efficient grid based secret key sharing scheme is proposed. The cost function is evaluated to select the optimal nodes for carrying out the data transaction process. The network is split into equal number of grids and each grid is placed with certain number of nodes. The node cost function is estimated for all the nodes present in the network. Once the optimal energy proficient nodes are selected then the data transaction process is carried out in a secured way using malicious nodes filtration process. Therefore, the message is transmitted in a secret sharing method to the end user and this process makes the network more efficient. The proposed work is evaluated in network simulated and the performance of the work are analysed in terms of energy, delay, packet delivery ratio, and false detection ratio. From the result, we observed that the work outperforms the other works and achieves better energy and reduced packet rate.

Study into prosodic morphological analysis in Korean and Standard Chinese partial reduplication and contrastive analysis using optimality theory (한국어와 표준 중국어 부분 중첩 의성·의태어에 대한 운율 형태론적 분석의 문제와 최적성 이론적 분석을 통한 대조 분석)

  • Chang, Jae-Woong
    • Cross-Cultural Studies
    • /
    • v.49
    • /
    • pp.275-301
    • /
    • 2017
  • Based on the previous analysis by Wanghongjun(2008), this paper applies Optimality Theory (OT) to the field of partial reduplication in Korea to increase its scientific validity. Toward this end, I propose an alternative analysis of Korean partial reduplication, applied as a single process of prefixation. Reduplicated words by prefixation are divided into two types: with a heavy syllable of the stem, and another with the stem. The two types of partial reduplication are closely related by the sound features. In addition, I discussed Chinese partial reduplication from a prefixation perspective within the framework of OT and performed contrastive analysis of Korean and Standard Chinese processes of reduplication by focusing on constrained rankings. As a result, the alternative analysis showed a systematic relationship among the reduplicated words in Korean and Standard Chinese. Lastly, I explained that the coronal /t/ and liquid /l/ have a special functional hierarchy in both languages. This study can be re-explained based on the framework of OT according to a few major constraints, involving MAX-BR, MAX-IO. Their rankings show the adequacy of analysis.

The development of industrial secure L2 switch and introduction example for management and security improvement of supervisory control network in purification plant (정수장 감시제어망의 관리와 보안개선을 위한 산업용 보안 L2스위치 개발 및 적용사례)

  • Kim, Yunha;Yu, Chool;Oh, Eun;Kim, Chanmoon;Park, Ikdong;Kim, Yongseong;Choi, Hyunju
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.33 no.5
    • /
    • pp.329-339
    • /
    • 2019
  • Recently, the advancement of information and communication technology(ICT) is expanding the connectivity through Internet of Things(IoT), and the media of connection is also expanding from wire/cable transmission to broadband wireless communication, which has significantly improved mobility. This hyperconnectivity has become a key element of the fourth industrial revolution, whereas the supervisory control network of purification plants in korea is operated as a communication network separated from the outside, thereby lagging in terms of connectivity. This is considered the best way to ensure security, and thus there is hardly any consideration of establishing alternatives to operate an efficient and stable communication network. Moreover, security for management of a commercialized communication network and network management solution may be accompanied by immense costs, making it more difficult to make new attempts. Therefore, to improve the conditions for the current supervisory control network of purification plants, this study developed a industrial security L2 switch that supports modbus TCP(Transmission Control Protocol) communication and encryption function of the transmission section. As a result, the communication security performance improved significantly, and the cost for implementing the network management system using Historical Trend and information of HMI(Human Machine Interface) could be reduced by approximately KRW 200 million. The results of this study may be applied to systems for gas, electricity and social safety nets that are infrastructure communication networks that are similar to purification plants.

Isolation and Characterization of Cathepsin B inhilbitor Produced by Streptomyces luteogriseus KT-10 (Streptomyces luteogriseus KT-10 이 생산하는 Cathepsin B 저해물질의 분리 및 특성)

  • 한길환;김상달
    • Microbiology and Biotechnology Letters
    • /
    • v.29 no.2
    • /
    • pp.84-89
    • /
    • 2001
  • Isolation and Characterization of Cathepsin B inhibitor Produced by Streptomyces luteogriseus KT-IO. Han, Kil~Hwan and Sang~Dal Kim*. Department of Applied Microbiology, Yeungnam Universit}/t Kyongsan 712749, Korea - The cathepsin B inhibitor produced by Streptomyces luteogriseus KT-IO was very stable in heat, acidic and alkaline conditions. The cathepsin B inhibitor was isolated from the extracted fraction of culture broth with butanol, methanol and chloroform subsequently, the inhibitor was purified with following several column chromatography sLlch as DEAE-Sephadex A-25, Sephadex G-15, silica gel 60, Sephadex LH-20, and preparative HPLC. The cathepsin B inhibitor showed positively to detective reaction of ninhydrine, 5% H2S04, iodine, but negatively to the reaction of Ehrlich's reagent, DNS, aniline. The molecular formular of cathepsin B inhibitor was elucidated by JR, lH and 13C-NMR, FAB mass and elemental analyzer. Consequently, it was identified as C4HlI04N6. The cathepsin B inhibitor had the mode of competitive inhibition with the reaction of cathepsin B.

  • PDF

Quantification of Realistic Discharge Coefficients for the Critical Flow Model of RELAP5/MOD3/KAERl (RELAP5 / MOD3/ KAERI의 임계유동모델을 위한 실제적 배출계수의 정량화)

  • Kwon, T.S.;Chung, B.D.;Lee, W.J.;Lee, N.H.;Huh, J.Y.
    • Nuclear Engineering and Technology
    • /
    • v.27 no.5
    • /
    • pp.701-709
    • /
    • 1995
  • The realistic discharge coefficient for the critical How model of RELAP5/AOD3/KAERI are determined for the subcooled and too-phase critical flow by assessments of nine MARVIKEN Critical flew Test(CFT). The selected test runs include a high initial subcooling and large nozzle aspect rat-io(L/D). The code assessment results show that RELAP5/MOD3/KAERI over-predicts the subcooled critical flow and under-predicts the two-phase critical flow. Using these result, the realistic discharge coefficients of critical flow models are quantified by an iterative method. The realistic discharge coefficients are determined to be 0.89 for the subcooled critical How and 1.07 for the two-phase critical flow, and the associated standard deviations are 0.0349 and 0.1189, respectively. The results obtained from this study can be applied to calculate the realistic system response of Large Break Loss of Coolant Accident and to evaluate the realistic Emergency Core Cooling System performance.

  • PDF

Design of Real time Vital Signal Streaming Service Based on Self-Organizing Internet of Things Platform (자율군집 IoT 플랫폼기반 실시간 생체신호 스트리밍 서비스 설계)

  • Kim, Hyunho;Son, Taeyoung;Kang, Soonju
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.7
    • /
    • pp.434-439
    • /
    • 2017
  • More and more people are suffering from sleep disturbance, which can have many different causes. The healthcare industry, which can help people with this disability, is one technology that is currently in the spotlight. However, current services are vulnerable to data concentration, because they are simple telemedicine services that transmit all data to a remote server and process the data on the server. They have a disadvantage in that the data cannot be streamed in real time by synchronizing the biometric data of remotely protected persons. In order to solve this problem, we propose a service structure for streaming biometric data of protected persons to a hospital or guardian in real time, using a self-organizing distributed middleware platform without a central server. We prove that it is possible to provide an effective streaming service by evaluating the service start time and average delay time.

An Impact of Addressing Schemes on Routing Scalability

  • Ma, Huaiyuan;Helvik, Bjarne E.;Wittner, Otto J.
    • Journal of Communications and Networks
    • /
    • v.13 no.6
    • /
    • pp.602-611
    • /
    • 2011
  • The inter-domain routing scalability issue is a major challenge facing the Internet. Recent wide deployments of multihoming and traffic engineering urge for solutions to this issue. So far, tunnel-based proposals and compact routing schemes have been suggested. An implicit assumption in the routing community is that structured address labels are crucial for routing scalability. This paper first systematically examines the properties of identifiers and address labels and their functional differences. It develops a simple Internet routing model and shows that a binary relation T defined on the address label set A determines the cardinality of the compact label set L. Furthermore, it is shown that routing schemes based on flat address labels are not scalable. This implies that routing scalability and routing stability are inherently related and must be considered together when a routing scheme is evaluated. Furthermore, a metric is defined to measure the efficiency of the address label coding. Simulations show that given a 3000-autonomous system (AS) topology, the required length of address labels in compact routing schemes is only 9.12 bits while the required length is 10.64 bits for the Internet protocol (IP) upper bound case. Simulations also show that the ${\alpha}$ values of the compact routing and IP routing schemes are 0.80 and 0.95, respectively, for a 3000-AS topology. This indicates that a compact routing scheme with necessary routing stability is desirable. It is also seen that using provider allocated IP addresses in multihomed stub ASs does not significantly reduce the global routing size of an IP routing system.

Machine learning application for predicting the strawberry harvesting time

  • Yang, Mi-Hye;Nam, Won-Ho;Kim, Taegon;Lee, Kwanho;Kim, Younghwa
    • Korean Journal of Agricultural Science
    • /
    • v.46 no.2
    • /
    • pp.381-393
    • /
    • 2019
  • A smart farm is a system that combines information and communication technology (ICT), internet of things (IoT), and agricultural technology that enable a farm to operate with minimal labor and to automatically control of a greenhouse environment. Machine learning based on recently data-driven techniques has emerged with big data technologies and high-performance computing to create opportunities to quantify data intensive processes in agricultural operational environments. This paper presents research on the application of machine learning technology to diagnose the growth status of crops and predicting the harvest time of strawberries in a greenhouse according to image processing techniques. To classify the growth stages of the strawberries, we used object inference and detection with machine learning model based on deep learning neural networks and TensorFlow. The classification accuracy was compared based on the training data volume and training epoch. As a result, it was able to classify with an accuracy of over 90% with 200 training images and 8,000 training steps. The detection and classification of the strawberry maturities could be identified with an accuracy of over 90% at the mature and over mature stages of the strawberries. Concurrently, the experimental results are promising, and they show that this approach can be applied to develop a machine learning model for predicting the strawberry harvesting time and can be used to provide key decision support information to both farmers and policy makers about optimal harvest times and harvest planning.

Prediction Service of Wild Animal Intrusions to the Farm Field based on VAR Model (VAR 모델을 이용한 야생 동물의 농장 침입 예측 서비스)

  • Kadam, Ashwini L.;Hwang, Mintae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.5
    • /
    • pp.628-636
    • /
    • 2021
  • This paper contains the implementation and performance evaluation results of a system that collects environmental data at the time when the wild animal intrusion occurred at farms and then predicts future wild animal intrusions through a machine learning-based Vector Autoregression(VAR) model. To collect the data for intrusion prediction, an IoT-based hardware prototype was developed, which was installed on a small farm located near the school and simulated over a long period to generate intrusion events. The intrusion prediction service based on the implemented VAR model provides the date and time when intrusion is likely to occur over the next 30 days. In addition, the proposed system includes the function of providing real-time notifications to the farmers mobile device when wild animals intrusion occurs in the farm, and performance evaluation was conducted to confirm that the average response time was 7.89 seconds.

Technology Convergence Analysis by IPC Code-Based Social Network Analysis of Healthcare Patents (헬스케어 특허의 IPC 코드 기반 사회 연결망 분석(SNA)을 이용한 기술 융복합 분석)

  • Shim, Jaeruen
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.5
    • /
    • pp.308-314
    • /
    • 2022
  • This study deals with the technology Convergence Analysis by IPC Code-Based Social Network Analysis of Healthcare Patents filed in Korea. The relationship between core technologies is visualized using Social Network Analysis. At the subclass level of healthcare patents, 1,155 cases (49.4%) of patents with complex IPC codes were investigated, and as a result of Social Network Analysis on them, the IPC codes with the highest Degree Centrality were A61B, G16H, and G06Q, in that order. The IPC codes with the highest Betweenness Centrality are in the order of A61B, G16H, and G06Q. In addition, it was confirmed that healthcare patents consist of two large technology clusters. Cluster-1 corresponds to related business models centered on A61B, G16H and G06Q, and Cluster-2 is consisting of H04L, H04W and H04B. The technology convergence core pairs of the healthcare patent is [G16H-A61B] and [G16H-G06Q] in Cluster-1, and [H04L-H04W] in Cluster-2. The results of this study can contribute to the development of core technologies for healthcare patents.