• Title/Summary/Keyword: IoT Coding

Search Result 38, Processing Time 0.023 seconds

A Study on the Effectiveness of IoT Coding Education Using Microbit (마이크로비트(MicroBit)를 활용한 IoT코딩 교육 효과성에 대한 연구)

  • Kim, Seong-Yeol
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.2
    • /
    • pp.363-370
    • /
    • 2020
  • In this study, we compared and analyzed the Arduino-based IoT coding environment, which is most frequently used in OSHW, and the microbit-based IoT coding environment developed and spread in the UK. The results show that a microbit-based educational environment can offer a variety of benefits. Although the basic problems are defined and compared, many differences occur. Microbit-based environment has less overhead than Arduino-based environment, which is effective for IoT coding education.

Machine Learning-based MCS Prediction Models for Link Adaptation in Underwater Networks (수중 네트워크의 링크 적응을 위한 기계 학습 기반 MCS 예측 모델 적용 방안)

  • Byun, JungHun;Jo, Ohyun
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.5
    • /
    • pp.1-7
    • /
    • 2020
  • This paper proposes a link adaptation method for Underwater Internet of Things (IoT), which reduces power consumption of sensor nodes and improves the throughput of network in underwater IoT network. Adaptive Modulation and Coding (AMC) technique is one of link adaptation methods. AMC uses the strong correlation between Signal Noise Rate (SNR) and Bit Error Rate (BER), but it is difficult to apply in underwater IoT as it is. Therefore, we propose the machine learning based AMC technique for underwater environments. The proposed Modulation Coding and Scheme (MCS) prediction model predicts transmission method to achieve target BER value in underwater channel environment. It is realistically difficult to apply the predicted transmission method in real underwater communication in reality. Thus, this paper uses the high accuracy BER prediction model to measure the performance of MCS prediction model. Consequently, the proposed AMC technique confirmed the applicability of machine learning by increase the probability of communication success.

Detection of Disguised Packet and Valid Reconstruction Identification Using Network Coding in IoT Environment (IoT 환경에서 네트워크 코딩의 위장패킷 탐지와 유효한 복구의 식별 알고리즘)

  • Lee, Yong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.29-37
    • /
    • 2020
  • Work to improve network throughput has been focused on network coding as the utilization of IoT-based application services increases and network usage increases rapidly. In network coding, nodes transform packets received from neighboring nodes into a combination of encoded packets for transmission and decoding at the destination. This scheme is based on trust among nodes, but in the IoT environment where nodes are free to join, a malicious node can fabricate the packet if it legally participates in the configuration. It is difficult to identify the authenticity of the encoded packet since the packet received at destination is not a single source but a combination of packets generated by several nodes. In this paper, we propose a method to detect "look-like-valid" packets that have been attacked and disguised in packets received at destination, and to identify valid messages in the reconstructions. This method shows that network coding performance is significantly improved because the destination can reconstruct a valid message with only received packets without retransmission with a high probability, despite the presence of disguised packets.

Development of AR-based Coding Puzzle Mobile Application Using Command Placement Recognition (명령어 배치 인식을 활용한 AR 코딩퍼즐 모바일앱 개발)

  • Seo, Beomjoo;Cho, Sung Hyun
    • Journal of Korea Game Society
    • /
    • v.20 no.3
    • /
    • pp.35-44
    • /
    • 2020
  • In this study, we propose a reliable command placement recognition algorithm using tangible commands blocks developed for our coding puzzle platform, and present its performance measurement results on an Augmented Reality testbed environment. As a result, it can recognize up to 30 tangible blocks simultaneously and their placements within 5 seconds reliably. It is successfully ported to an existing coding puzzle mobile app and can operate an IoT attached robot via bluetooth connected mobile app.

Deep Learning based BER Prediction Model in Underwater IoT Networks (딥러닝 기반의 수중 IoT 네트워크 BER 예측 모델)

  • Byun, JungHun;Park, Jin Hoon;Jo, Ohyun
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.6
    • /
    • pp.41-48
    • /
    • 2020
  • The sensor nodes in underwater IoT networks have practical limitations in power supply. Thus, the reduction of power consumption is one of the most important issues in underwater environments. In this regard, AMC(Adaptive Modulation and Coding) techniques are used by using the relation between SNR and BER. However, according to our hands-on experience, we observed that the relation between SNR and BER is not that tight in underwater environments. Therefore, we propose a deep learning based MLP classification model to reflect multiple underwater channel parameters at the same time. It correctly predicts BER with a high accuracy of 85.2%. The proposed model can choose the best parameters to have the highest throughput. Simulation results show that the throughput can be enhanced by 4.4 times higher than the conventionally measured results.

Network Coding-Based Information Sharing Strategy for Reducing Energy Consumption in IoT Environments (사물인터넷 환경에서 에너지 소모량을 줄이기 위한 네트워크 부호화 기반 정보 공유 방식)

  • Kim, Jung-Hyun;Park, Dabin;Song, Hong-Yeop
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.4
    • /
    • pp.433-440
    • /
    • 2016
  • This paper proposes a method of minimizing total energy consumption of IoT environment when communication devices in the network share the information directly. The proposed method reduces total number of transmission for the information sharing by using an effective network coding-based technique which dynamically selects a node and a data packet for each transmission. Simulation results show that the proposed method has better performance than an existing network coding-based method selecting transmission node in fixed order, a network coding-based method selecting transmission node in random order, and a uncoded method selecting transmission node in random order.

A Study on the Virtual Remote Input-Output Model for IoT Simulation Learning (IoT 시뮬레이션 학습을 위한 가상 리모트 입출력 모델에 관한 연구)

  • Seo, Hyeon-Ho;Kim, Jae-Woong;Kim, Dong-Hyun;Park, Seong-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.10
    • /
    • pp.45-53
    • /
    • 2021
  • In our technology-driven world, various methods for teaching in an educational venue or in a simulated environment have been suggested especially for computer and coding education. In particular, IoT related education has been made possible owing to the industrial developments that have occurred in various fields since the Fourth Industrial Revolution. The proposed model allows various IoT systems to be indirectly built; it provides an inexpensive learning method by applying a simulation system in a 3D environment. The model is implemented on Virtual Remote IO based on the Arduino platform, thereby reducing the cost of building an education system. In addition various education-related content can be provided to learners through such an indirectly developed system. Test code was written to check the consistency of an operation between the real system and the virtual system.

An Improved Decoding Scheme of LCPC Codes (LCPC 부호의 개선된 복호 방식)

  • Cheong, Ho-Young
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.4
    • /
    • pp.430-435
    • /
    • 2018
  • In this paper, an improved decoding scheme for low-complexity parity-check(LCPC) code with small code length is proposed. The LCPC code is less complex than the turbo code or low density parity check(LDPC) code and requires less memory, making it suitable for communication between internet-of-things(IoT) devices. The IoT devices are required to have low complexity due to limited energy and have a low end-to-end delay time. In addition, since the packet length to be transmitted is small and the signal processing capability of the IoT terminal is small, the LCPC coding system should be as simple as possible. The LCPC code can correct all single errors and correct some of the two errors. In this paper, the proposed decoding scheme improves the bit error rate(BER) performance without increasing the complexity by correcting both errors using the soft value of the modulator output stage. As a result of the simulation using the proposed decoding scheme, the code gain of about 1.1 [dB] was obtained at the bit error rate of $10^{-5}$ compared with the existing decoding method.

Visual Block Coding Tool for Artificial Intelligence IoT Physical Computing Practice (인공지능 IoT 피지컬 컴퓨팅 실습을 위한 비주얼 블록 코딩 도구)

  • Lee, Se-Hoon;Kim, Su-Min;Kim, Young-Ho
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.07a
    • /
    • pp.407-408
    • /
    • 2022
  • 본 논문에서는 AIoT를 위한 비주얼 블록 코딩 도구를 설계하였다. AI 블록 코딩이 가능한 EduB 플랫폼에 피지컬 컴퓨팅을 가능하게 하는 모듈을 추가함으로써 블록을 사용한 쉬운 피지컬컴퓨팅 코딩과 AIoT 코딩이 가능하다. 도구는 WebSocket과 Wifi를 사용해 EduB와 타겟보드인 RaspberryPi의 무선 통신을 하며, 블록으로 생성된 코드를 RaspberryPi 내부에서 실행하여 GPIO와 SenseHAT을 제어할 수 있게 하였다. 따라서, 코딩 결과를 콘솔 출력이나 그래프로만 확인할 수 있어 정적이던 AI 교육을 LED나 모터를 제어해 동적으로 결과를 확인할 수 있게 하여 흥미와 관심을 유발할 수 있도록 한다.

  • PDF

A Software Vulnerability Analysis System using Learning for Source Code Weakness History (소스코드의 취약점 이력 학습을 이용한 소프트웨어 보안 취약점 분석 시스템)

  • Lee, Kwang-Hyoung;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.11
    • /
    • pp.46-52
    • /
    • 2017
  • Along with the expansion of areas in which ICT and Internet of Things (IoT) devices are utilized, open source software has recently expanded its scope of applications to include computers, smart phones, and IoT devices. Hence, as the scope of open source software applications has varied, there have been increasing malicious attempts to attack the weaknesses of open source software. In order to address this issue, various secure coding programs have been developed. Nevertheless, numerous vulnerabilities are still left unhandled. This paper provides some methods to handle newly raised weaknesses based on the analysis of histories and patterns of previous open source vulnerabilities. Through this study, we have designed a weaknesses analysis system that utilizes weakness histories and pattern learning, and we tested the performance of the system by implementing a prototype model. For five vulnerability categories, the average vulnerability detection time was shortened by about 1.61 sec, and the average detection accuracy was improved by 44%. This paper can provide help for researchers studying the areas of weaknesses analysis and for developers utilizing secure coding for weaknesses analysis.