• Title/Summary/Keyword: IoT 디바이스

Search Result 545, Processing Time 0.028 seconds

Design of a Low Noise 6-Axis Inertial Sensor IC for Mobile Devices (모바일용 저잡음 6축 관성센서 IC의 설계)

  • Kim, Chang Hyun;Chung, Jong-Moon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.2
    • /
    • pp.397-407
    • /
    • 2015
  • In this paper, we designed 1 chip IC for 3-axis gyroscope and 3-axis accelerometer used for various IoT/M2M mobile devices such as smartphone, wearable device and etc. We especially focused on analysis of gyroscope noise and proposed new architecture for removing various noise generated by gyroscope MEMS and IC. Gyroscope, accelerometer and geo-magnetic sensors are usually used to detect user motion or to estimate moving distance, direction and relative position. It is very important element to designing a low noise IC because very small amount of noise may be accumulated and affect the estimated position or direction. We made a mathematical model of a gyroscope sensor, analyzed the frequency characteristics of MEMS and circuit, designed a low noise, compact and low power 1 chip 6-axis inertial sensor IC including 3-axis gyroscope and 3-axis accelerometer. As a result, designed IC has 0.01dps/${\sqrt{Hz}}$ of gyroscope sensor noise density.

Compression of CNN Using Low-Rank Approximation and CP Decomposition Methods (저계수 행렬 근사 및 CP 분해 기법을 이용한 CNN 압축)

  • Moon, HyeonCheol;Moon, Gihwa;Kim, Jae-Gon
    • Journal of Broadcast Engineering
    • /
    • v.26 no.2
    • /
    • pp.125-131
    • /
    • 2021
  • In recent years, Convolutional Neural Networks (CNNs) have achieved outstanding performance in the fields of computer vision such as image classification, object detection, visual quality enhancement, etc. However, as huge amount of computation and memory are required in CNN models, there is a limitation in the application of CNN to low-power environments such as mobile or IoT devices. Therefore, the need for neural network compression to reduce the model size while keeping the task performance as much as possible has been emerging. In this paper, we propose a method to compress CNN models by combining matrix decomposition methods of LR (Low-Rank) approximation and CP (Canonical Polyadic) decomposition. Unlike conventional methods that apply one matrix decomposition method to CNN models, we selectively apply two decomposition methods depending on the layer types of CNN to enhance the compression performance. To evaluate the performance of the proposed method, we use the models for image classification such as VGG-16, RestNet50 and MobileNetV2 models. The experimental results show that the proposed method gives improved classification performance at the same range of 1.5 to 12.1 times compression ratio than the existing method that applies only the LR approximation.

An Exploratory Study on Smart Wearable and Game Service Design for U-Silver Generation: U-Hospital Solution for the Induction of Interest to Carry Out Personalized Exercise Prescription (U-실버세대를 위한 스마트 웨어러블 및 연동 게임의 서비스 디자인 방안 탐색: 개인 맞춤형 운동처방 실행을 위한 흥미 유도 목적의 U-Hospital 솔루션)

  • Park, Su Youn;Lee, Joo Hyeon
    • Science of Emotion and Sensibility
    • /
    • v.22 no.1
    • /
    • pp.23-34
    • /
    • 2019
  • The U-Healthcare era has evolved with the development of the Internet of things (IoT) in the early stages of being connected as a society. Already, many changes such as increased well-being and the extension of human life are becoming evident across cultures. Korea entered the growing group of aging societies in 2017, and its silver industry is expected to grow rapidly by adopting the IoT of a super-connected society. In particular, the senior shift phenomenon has resulted in increased interest in the promotion of the health and well-being of the emergent silver generation which, unlike the existing silver generation, is highly active and wields great economic power. This study conducted in-depth interviews to investigate the characteristics of the new silver generation, and to develop the design for a wearable serious game that intends to boost the interest of the elderly in exercise and fitness activities according to their personalized physical training regimes as prescribed by the U-Hospital service. The usage scenario of this wearable serious game for the 'U-silver generation' is derived from social necessity. Medical professionals can utilize this technology to conduct health examinations and to monitor the rehabilitation of senior patients. The elderly can also use this tool to request checkups or to interface with their healthcare providers. The wearable serious game is further aimed at mitigating concerns about the deterioration of the physical functions of the silver generation by applying personalized exercise prescriptions. The present investigation revealed that it is necessary to merge the on / off line community activities to meet the silver generation's daily needs for connection and friendship. Further, the sustainability of the serious game must be enhanced through the inculcation of a sense of accomplishment as a player rises through the levels of the game. The proposed wearable serious game is designed specifically for the silver generation that is inexperienced in using digital devices: simple game rules are applied to a familiar interface grounded on the gourmet travels preferred by the target players to increase usability.

Implementation of Home Network Services Using OpenWRT-based Wireless Access Point and Zigbee Communications (OpenWRT 기반 유무선 공유기와 Zigbee 통신을 이용한 홈 네트워크 서비스 구축)

  • Kwon, Kisu;Lee, Kyoung-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.2
    • /
    • pp.375-381
    • /
    • 2018
  • As smart home network services such as home CCTV, outdoor control of home appliances, home security and disaster prevention services become popular, there appear various affiliated products including smart home gateway and smart speaker. Since those services are generally developed on the vendors' individual hardware and software platforms, it is not much expected for them to interwork well among different architecture and communication methods. In this paper, we propose a new home network service system running on an open source platform to address such issues. We implemented a home network system using OpenWRT-based wireless router(or access point) and Zigbee communication technology. In the proposed system, a wireless router replaces a commercial home gateway and small control units implemented with Arduino control electronic devices and sensors in home. Several service scenarios are also implemented to verify the operability of the proposed system.

Security Authentication Technique using Hash Code in Wireless RFID Environments (무선 RFID 환경에서 해시코드를 이용한 EPC 코드 보안)

  • Lee, Cheol-Seung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.6
    • /
    • pp.1077-1082
    • /
    • 2019
  • The development of computing technology and networking has developed into a fundamental technology of the Fourth Industrial Revolution, which provides a ubiquitous environment. In the ubiquitous environment, the IoT environment has become an issue so that various devices and the things can be actively accessed and connected. Also, the RFID system using the wireless identification code attaches an RFID tag to the object, such as the production and distribution of products. It is applied to the management very efficiently. EPCglobal is conducting a research on RFID system standardization and various security studies. Since RFID systems use wireless environment technology, there are more security threats than wire problems. In particular, failure to provide confidentiality, indistinguishability, and forward safety could expose them to various threats in the Fourth Industrial Revolution. Therefore, this study analyzes the standard method of EPCgolbal and proposes RFID security method using hash code that can consider the amount of computation.

생체신호를 이용한 텔레바이오인식기술 동향 및 전망

  • Kim, Jason;Lee, Saewoom
    • Review of KIISC
    • /
    • v.26 no.4
    • /
    • pp.41-46
    • /
    • 2016
  • 전통적으로 바이오인식기술은 출입국심사(전자여권, 승무원 승객 신원확인), 출입통제(도어락, 출입통제 근태관리), 행정(무인민원발급, 전자조달), 사회복지(미아찾기, 복지기금관리), 의료(원격의료, 의료진 환자 신원확인), 정보통신(휴대폰 PC 인터넷 인증), 금융(온라인 뱅킹, ATM 현금인출) 등 다방면에서 폭넓게 보급되어 실생활에서 널리 활용되고 있다. [그림1]은 신체적 특징(Physiological biometrics)과 행동적 특징(Behavioral biometrics)을 이용한 사용자 인증기술인 바이오인식기술의 유형과 함께 각 기술별 보안취약점(괄호 안 빨강색글자)을 나타내고 있다. 최근 들어, 모바일 지급결제서비스 ATM 인출기 인터넷전문은행 등과 같은 핀테크 분야에서 비대면 인증기술로 바이오인식기술이 각광을 받기 시작했다. 한편, 가짜지문 등 기존의 신체적 특징을 이용한 바이오인식기술의 위변조 위협에 대한 우려 존재함에 따라 뇌파 심전도 근전도 맥박 등 살아있는 사람의 행동적(신체의 기능적) 특징을 이용한 생체신호를 이용하여 비대면 인증기술로서 활용하기 위하여 주요 선진국에서 차세대 바이오인식 기술개발이 가속화되고 있는 추세이다.[1] 또한, 이러한 생체신호는 최근에 삼성전자, LG전자, 애플 등에서 스마트워치를 통해 심장박동수를 측정하고 스마트폰을 통하여 모바일 지급결제, 헬스케어 등과 같은 IoT 모바일 융복합 응용서비스에 활용될 전망이다. 본고에서는 뇌파 심전도(심박수)와 같은 생체신호를 측정하는 스마트워치 밴드형 의복형 또는 패치형태의 웨어러블 디바이스와 같은 생체신호센서, 생체신호 인증기술 및 관련표준화 동향을 고찰해 보기로 한다. 국내외 관련기술과 표준화 동향을 면밀히 분석하여 지난 2015년 5월29일에 발족한 국내외 전문가그룹인 KISA"모바일 생체신호 인증기술 표준연구회"(이하 KISA 표준연구회)가 구심점이 되어 한국형 생체신호를 이용한 차세대 텔레바이오인식기술에 대한 연구개발과 국내외 표준화 추진에 박차를 가할 계획이다.

Group Key Generation and Exchange Scheme using a Trapdoor Collision Hash in M2M Communications Environment (M2M 통신 환경에서 트랩도어 충돌 해쉬를 이용한 그룹키 생성 및 교환 기법)

  • Kim, Sung-Soo;Jun, Moon-Seog;Choi, Do-Hyeon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.5
    • /
    • pp.9-17
    • /
    • 2015
  • The development of wireless communication technology and change in the ICT market has led to the development of the M2M service and technology. Under these circumstances, the M2M environment has been the focus of communication environment construction between machines without control or direct intervention of human being. With characteristics of wireless communication environment, the possibility of being exposed to numerous security threats and safe communication security technology have becoming an issue an important requirements for problems such as data exposure, forgery, modulation, deletion, and privacy. This research analyzes requirements of trapdoor collision hash, generates keys between groups under the M2M environment by using the specificity of trapdoor, and suggests technology to exchange keys with session keys. Further, it also suggests techniques to confirm authentication of device and gateway in accordance with group key generation. The techniques herein suggested are confirmed as safe methods in that they have attack resistance such as Masquerade Attack, Man-in-the-Middle Attack, and Replay Attack in the group communication block by using the speciality of collision message and collision hash.

A study on smart fashion product development trends (스마트패션제품 개발 동향에 관한 연구)

  • Suh, Sung-Eun;Roh, Jung-Sim
    • The Research Journal of the Costume Culture
    • /
    • v.23 no.6
    • /
    • pp.1097-1115
    • /
    • 2015
  • ICT in the IOT era is the core basis of modern society. This study investigated and analyzed the recent commercialization trends of smart fashion products internationally and domestically, to utilize them as the basis of data for developing user-friendly smart fashion products that can meet the needs of consumers. Keyword research using the most representative search engines, Google and Naver was conducted for searching for various wearable items commercialized actively since 2010. The final 78 products were classified by the physical area, and the key features and benefits were analyzed. Smart fashion products were classified as four physical types for the head and face, torso, arms and hands, and ankles and feet. Smart fashion products for each body part were developed in various ways, such as hats, glasses, lenses, virtual screens, earphones, headsets, clothing, watches, wrist bands, gloves, rings, wallets, bags, anklets, shoes, socks, and insoles. The main features were music playback, bluetooth, a camera based on NFC, virtual effects, health and safety protection through measuring heartbeat and momentum, and social network sharing of all kinds of information, based on inter-working with a smartphone. These functions represent the physical, social, and emotional interactions among users and their surroundings, as well as the users, themselves. The research results are expected to be used in future studies on planning user-friendly and marketable products through in-depth analysis of the design characteristics of smart fashion products as well as consumer responses.

A Design on Error Tracking System for Enhanced-Reliable IoT Service (사물인터넷 서비스의 신뢰성 강화를 위한 오류 추적 시스템 설계)

  • Lim, Ho-Seung;Choi, Chang-Won
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.3
    • /
    • pp.15-20
    • /
    • 2020
  • In this paper, an error tracking platform is designed for enhanced-reliable IOT system. The platform is designed to enhance reliability of IOT system by analysing additional informations(OS, Browser, Device) and by notifying error detection to developers. Especially, in the case of an error in the service which it is difficult for developers to recognize it, The platform also supports notification services through various communication media(Email, Slack, SMS). The common interface is designed to accommodate many languages(typescript, Swift, and Android) in the development process, and the interface allows users to analyze errors that occur on various platforms, including mobile/web/desktop applications. By presenting each error in groups through issues, developers can easily identify issues in the service. The visualizing function is included to recognize various error type by dashboard.

Study on the Connection with Public Authentication and Bio Authentication (공인인증서와 바이오인증 연계를 위한 연구)

  • Ryu, Gab-Sang
    • Journal of Internet of Things and Convergence
    • /
    • v.1 no.1
    • /
    • pp.39-44
    • /
    • 2015
  • Organization is increasing the authorizing process to use public certificate and bio information. Certificate, has evolved to be able to parallel distributes the bio authentication and portable bio-authentication device. Authentication using an individual's PC and smart devices continue to generalize, while convenience for authentication is increased by comparison Study on cooperation with the security at the network level's a weak situation. If ask authentication method through the cooperation of the public certificate and bio information work with current network access control, there is a possibility to develop a more powerful security policy. by cooperation weaknesses against vulnerable personal authentication techniques on security token in a reliable and secure personal authentication techniques, such as bio-recognition, Bio Information for identification and to prevent exposing a methodology suggest to validate whether or not to carry out in this paper. In addition, organize the scenario that can work with the 802.1x network authentication method, and presented a proposal aimed at realization.