• Title/Summary/Keyword: IoT기기

Search Result 590, Processing Time 0.028 seconds

Analysis of facial expression recognition (표정 분류 연구)

  • Son, Nayeong;Cho, Hyunsun;Lee, Sohyun;Song, Jongwoo
    • The Korean Journal of Applied Statistics
    • /
    • v.31 no.5
    • /
    • pp.539-554
    • /
    • 2018
  • Effective interaction between user and device is considered an important ability of IoT devices. For some applications, it is necessary to recognize human facial expressions in real time and make accurate judgments in order to respond to situations correctly. Therefore, many researches on facial image analysis have been preceded in order to construct a more accurate and faster recognition system. In this study, we constructed an automatic recognition system for facial expressions through two steps - a facial recognition step and a classification step. We compared various models with different sets of data with pixel information, landmark coordinates, Euclidean distances among landmark points, and arctangent angles. We found a fast and efficient prediction model with only 30 principal components of face landmark information. We applied several prediction models, that included linear discriminant analysis (LDA), random forests, support vector machine (SVM), and bagging; consequently, an SVM model gives the best result. The LDA model gives the second best prediction accuracy but it can fit and predict data faster than SVM and other methods. Finally, we compared our method to Microsoft Azure Emotion API and Convolution Neural Network (CNN). Our method gives a very competitive result.

An Investigation Study to Reduce Security Threat in the Internet of Things Environment (IoT 환경에서 보안위협을 최소화하기 위한 방안 연구)

  • Shin, Seung-Soo;Chae, Gyoo-Soo;Lee, Tae-Hyun
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.4
    • /
    • pp.31-36
    • /
    • 2015
  • Recently, the necessity of Internet of Things in conjunction between devices is increasing. However, there are increasing security threats while applying various communication technologies in the Internet of Things. In this paper, we propose a security countermeasures to minimize damage to the security of a variety of security technologies used in the Internet of Things in order to improve the efficiency of the Internet of Things. The proposed method defined the environment to minimize security damage between home devices such as TV, washing machine, refrigerator, boiler and medical devices such as Analyzers, blood glucose meters, blood pressure monitors that are used in daily life. In addition, a variety of technologies(Zigbee, Wi-Fi, NFC, RFID, etc.) that are used in the Internet of Things may be under integrated management.

  • PDF

Smart Factory Safety Management System using Bluetooth (블루투스 통신을 이용한 스마트공장 안전관리 시스템)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.11
    • /
    • pp.47-53
    • /
    • 2019
  • Safety accidents at industrial sites can occur anytime, anywhere. Recently, research on the industrial safety management system based on the IoT has been actively conducted. However, most of the studies are studies of actions after safety accidents or simply monitoring. In this paper, the safety equipment was introduced before safety accidents occurred, and the subjects could be managed not only by workers but also by visitors. Also, it implements a system to prevent the accident by detecting the user's motion and situation periodically before a safety accident occurs. The implemented system is a system that attaches the device for safety management to the hard hat and can identify the safety situation by using the Bluetooth beacon device attached to the user's smartphone and the industrial site.

A Study on Idea and Implementation of Augmented Reality-based Guidance System (증강현실(Augmented Reality)기반 유도시스템 아이디어와 구현에 관한 연구)

  • Park, Myung-Suk;kwon, Soon-young;Kim, Kyung Uk;Kang, Dong-Hyeok;Kwon, Seung-Eon;Nam, Gung-Ung;Kwak, Seong-ju
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.11a
    • /
    • pp.989-991
    • /
    • 2022
  • 최근 들어 기후변화와 함께, 화재 발생이 증가함에 따라 인명피해와 경제적 피해가 늘고 있다. 화재 발생시 인명 피해를 줄여주는 소방시설 중 경보설비와 유도등설비는 위험 상황시 경보와 함께 동선을 유도하는 유도등을 보고 재실자들이 안전한 공간으로 신속하게 대피할 수 있도록 하는 소방설비 이다. 이중에서 유도등설비는 화재발생 상황에서 매우 중요한 역할을 맡고 있다. 특히 복잡한 동선을 가지고 있는 복합건물 및 지하철, 고층건축물에 신속한 대피 유도에 필요한 설비이다. 그러나, 화재 초기에 신속한 대피를 해야 하는데 5분도 되지 않아 화재로 인해 발생한 가스는 검은 연기로 유도등의 역할과 효과를 저해하는 현상을 가져온다. 즉 유도등의 녹색빛이 보이지 않는다. 이는 저시력자 또는 시력에 장애를 가지고 있는 자들은 더욱더 유도등을 확인하고 대피 하기란 쉽지 않게 된다. 이런 단점이 있는 기존의 유도등에 IoT(Internet of Things)와 함께 증강현실 이미지를 스마트기기에 활성화 한다면, 진한 검은연기로 인한 빛의 가림으로 인한 유도장애에 대해서 개선 할 수 있을 거라 생각되어, 변류기의 전류 감지를 시작으로 그 신호를 스마트기기에 녹색의 유도 이미지를 활성화하여 골든타임에 대피가 신속하도록 설비를 구현하여 그 가능성을 확인하였다.

Isolation and Characterization of Cathepsin B inhilbitor Produced by Streptomyces luteogriseus KT-10 (Streptomyces luteogriseus KT-10 이 생산하는 Cathepsin B 저해물질의 분리 및 특성)

  • 한길환;김상달
    • Microbiology and Biotechnology Letters
    • /
    • v.29 no.2
    • /
    • pp.84-89
    • /
    • 2001
  • Isolation and Characterization of Cathepsin B inhibitor Produced by Streptomyces luteogriseus KT-IO. Han, Kil~Hwan and Sang~Dal Kim*. Department of Applied Microbiology, Yeungnam Universit}/t Kyongsan 712749, Korea - The cathepsin B inhibitor produced by Streptomyces luteogriseus KT-IO was very stable in heat, acidic and alkaline conditions. The cathepsin B inhibitor was isolated from the extracted fraction of culture broth with butanol, methanol and chloroform subsequently, the inhibitor was purified with following several column chromatography sLlch as DEAE-Sephadex A-25, Sephadex G-15, silica gel 60, Sephadex LH-20, and preparative HPLC. The cathepsin B inhibitor showed positively to detective reaction of ninhydrine, 5% H2S04, iodine, but negatively to the reaction of Ehrlich's reagent, DNS, aniline. The molecular formular of cathepsin B inhibitor was elucidated by JR, lH and 13C-NMR, FAB mass and elemental analyzer. Consequently, it was identified as C4HlI04N6. The cathepsin B inhibitor had the mode of competitive inhibition with the reaction of cathepsin B.

  • PDF

Entity Authentication Scheme for Secure WEB of Things Applications (안전한 WEB of Things 응용을 위한 개체 인증 기술)

  • Park, Jiye;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.5
    • /
    • pp.394-400
    • /
    • 2013
  • WoT (Web of Things) was proposed to realize intelligent thing to thing communications using WEB standard technology. It is difficult to adapt security protocols suited for existing Internet communications into WoT directly because WoT includes LLN(Low-power, Lossy Network) and resource constrained sensor devices. Recently, IETF standard group propose to use DTLS protocol for supporting security services in WoT environments. However, DTLS protocol is not an efficient solution for supporting end to end security in WoT since it introduces complex handshaking procedures and high communication overheads. We, therefore, divide WoT environment into two areas- one is DTLS enabled area and the other is an area using lightweight security scheme in order to improve them. Then we propose a mutual authentication scheme and a session key distribution scheme for the second area. The proposed system utilizes a smart device as a mobile gateway and WoT proxy. In the proposed authentication scheme, we modify the ISO 9798 standard to reduce both communication overhead and computing time of cryptographic primitives. In addition, our scheme is able to defend against replay attacks, spoofing attacks, select plaintext/ciphertext attacks, and DoS attacks, etc.

A Study on the Improvement of Fire Alarm System in Special Buildings Using Beacons in Edge Computing Environment (에지 컴퓨팅 환경에서 비콘을 활용한 특수건물 화재 경보 시스템 개선 방안 연구)

  • Lee, Tae Gyu;Choi, Kyeong Seo;Shin, Youn Soon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.7
    • /
    • pp.217-224
    • /
    • 2022
  • Today, with the development of technology and industry, fire accidents in special buildings are increasing as special buildings increase. However, despite the rapid development of information and communication technology, human casualties are steadily occurring due to the underdeveloped and ineffective indoor fire alarm system. In this study, we confirmed that the existing indoor fire alarm system using acoustic alarm could not deliver a sufficiently large alarm to the in-room personnel. To improve this, we designed and implemented a fire alarm system using edge computing and beacons. The proposed improved fire alarm system consists of terminal sensor nodes, edge nodes, a user application, and a server. The terminal sensor nodes collect indoor environment data and send it to the edge node, and the edge node monitors whether a fire occurs through the transmitted sensor value. In addition, the edge node continuously generate beacon signals to collect information of smart devices with user applications installed within the signal range, store them in a server database, and send application push-type fire alarms to all in-room personnel based on the collected user information. As a result of conducting a signal valid range measurement experiment in a university building with dense lecture rooms, it was confirmed that device information was normally collected within the beacon signal range of the edge node and a fire alarm was quickly sent to specific users. Through this, it was confirmed that the "blind spot problem of the alarm" was solved by flexibly collecting information of visitors that changes time to time and sending the alarm to a smart device very adjacent to the people. In addition, through the analysis of the experimental results, a plan to effectively apply the proposed fire alarm system according to the characteristics of the indoor space was proposed.

Analyses of Security into End-to-End Point Healthcare System based on Internet of Things (사물인터넷 기반의 헬스케어 시스템의 종단간 보안성 분석)

  • Kim, Jung Tae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.6
    • /
    • pp.871-880
    • /
    • 2017
  • Recently, service based on internet is inter-connected and integrated with a variety of connection. This kind of internet of things consist of heterogenous devices such as sensor node, devices and end-to end equipment which used in conventional protocols and services. The representative system is healthcare system. From healthcare appliance used by IoT, patient and doctor can utilize healthcare information with safety and high speed management. It is very convenient management to operate mobility. But it induced security and vulnerability issues because it has small memory capacity, low power supply and low computing power. This made impossible to implement security algorithm with embedded engine based on hardware. Nowdays, we can't realize conventional standard algorithm due to these kinds of reasons. From the critical issues, it occurred security and vulnerability issues. Therefore, we analysed and compared with conventional method and proposed techniques. Finally, we evaluated security issues and requirement for end-to-end point healthcare system based on internet of things.

Compression and Performance Evaluation of CNN Models on Embedded Board (임베디드 보드에서의 CNN 모델 압축 및 성능 검증)

  • Moon, Hyeon-Cheol;Lee, Ho-Young;Kim, Jae-Gon
    • Journal of Broadcast Engineering
    • /
    • v.25 no.2
    • /
    • pp.200-207
    • /
    • 2020
  • Recently, deep neural networks such as CNN are showing excellent performance in various fields such as image classification, object recognition, visual quality enhancement, etc. However, as the model size and computational complexity of deep learning models for most applications increases, it is hard to apply neural networks to IoT and mobile environments. Therefore, neural network compression algorithms for reducing the model size while keeping the performance have been being studied. In this paper, we apply few compression methods to CNN models and evaluate their performances in the embedded environment. For evaluate the performance, the classification performance and inference time of the original CNN models and the compressed CNN models on the image inputted by the camera are evaluated in the embedded board equipped with QCS605, which is a customized AI chip. In this paper, a few CNN models of MobileNetV2, ResNet50, and VGG-16 are compressed by applying the methods of pruning and matrix decomposition. The experimental results show that the compressed models give not only the model size reduction of 1.3~11.2 times at a classification performance loss of less than 2% compared to the original model, but also the inference time reduction of 1.2~2.21 times, and the memory reduction of 1.2~3.8 times in the embedded board.

The Physical Activity and Smart Health Care of Trend for the Elderly (노인을 위한 신체활동 및 스마트 헬스 케어분야의 경향)

  • Yi, Eun Surk
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.511-516
    • /
    • 2017
  • The study conducted a systematic analysis through systematic literature to explore trends in physical activities and trends in the elderly and smart health care sector. Based on the research data collected from 2006 to 2017, the research paper was selected as an analysis data base and collected data from the patented patent data registered to the Patent Office. Based on the combination of the aged, physical activities, IT, IoT, and healthcare, the research identified the research trends and subjects through the analysis and analysis of subjects based on a total of 102 academic journals and 79 patents. First of all, the academic research published a surge in 2010 research in 2006, and it has emerged as an area of continuous interest in academia until 2017. Meanwhile, patents for patents soared in 2012, according to the company's patent. Second, research shows that studies are being conducted in five areas of research. Service design, monitoring systems, systems, policies, and other studies. In the case of patents, three types of patents were classified as patents, devices and information related to information. Subsequent studies will be deemed necessary to verify the effectiveness of the smart health care technology to enhance the health of the elderly.