• Title/Summary/Keyword: IoT sensor

Search Result 832, Processing Time 0.026 seconds

Transmission Performance of Lattice Structure Ad-Hoc Network under Intrusions (침해가 있는 격자구조 애드-혹 네트워크의 전송성능)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.7
    • /
    • pp.767-772
    • /
    • 2014
  • As temporary network, ad-hoc network has been effected by structures and implemented environments of networks. In this paper, transmission performance of lattice structure ad-hoc network, which is expected to use in sensor network and IoT(Internet of Things), is analyzed in point of intrusions and countermeasure for intrusion is suggested. In this paper, computer simulation based on NS-2 is used for performance analysis, VoIP(Voice over Internet Protocol) as a widely used service is chosen for performance measure. MOS(Mean Opinion Score) and call connection rate is used as performance parameter. As results of performance analysis, it is shown that for MOS, random network is better then lattice network at intrusion environments, but for call connection rate, lattice network is better then random network.

A Study on the Improvement of Heat Energy Efficiency for Utilities of Heat Consumer Plants based on Reinforcement Learning (강화학습을 기반으로 하는 열사용자 기계실 설비의 열효율 향상에 대한 연구)

  • Kim, Young-Gon;Heo, Keol;You, Ga-Eun;Lim, Hyun-Seo;Choi, Jung-In;Ku, Ki-Dong;Eom, Jae-Sik;Jeon, Young-Shin
    • Journal of Energy Engineering
    • /
    • v.27 no.2
    • /
    • pp.26-31
    • /
    • 2018
  • This paper introduces a study to improve the thermal efficiency of the district heating user control facility based on reinforcement learning. As an example, it is proposed a general method of constructing a deep Q learning network(DQN) using deep Q learning, which is a reinforcement learning algorithm that does not specify a model. In addition, it is also introduced the big data platform system and the integrated heat management system which are specialized in energy field applied in processing huge amount of data processing from IoT sensor installed in many thermal energy control facilities.

Channel Selection Using Optimal Channel-Selection Policy in RF Energy Harvesting Cognitive Radio Networks (무선 에너지 하비스팅 인지 무선 네트워크에서 최적의 채널 선택 정책을 이용한 채널 선택)

  • Jung, Jun Hee;Hwang, Yu Min;Cha, Gyeong Hyeon;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.10 no.3
    • /
    • pp.1-5
    • /
    • 2015
  • Recently, RF energy harvesting technology is a promising technology for small-size IoT(Internet of Things) devices such as sensor to resolve battery scarcity problem. When applied to existing cognitive radio networks, this technology can be expected to increase network throughput through the increase of cognitive user's operating time. This paper proposes a optimal channel-selection policy for RF energy harvesting CR networks model where cognitive users in harvesting zone harvest ambient RF energy from transmission by nearby active primary users and the others in non-harvesting zone choose the channel and communicate with their receiver. We consider that primary users and secondary users are distributed as Poisson point processes and contact with their intended receivers at fixed distances. Finally we can derive the optimal frame duration, transmission power and density of secondary user from the proposed model that can maximize the secondary users's throughput under the given several conditions and suggest future directions of research.

A Study on Workers' Risk-Aware Smart Bands System in Explosive Areas (폭발위험지역 근로자 위험 인지형 스마트밴드시스템에 대한 연구)

  • Lee, Byong-Kwon
    • Journal of Internet of Things and Convergence
    • /
    • v.5 no.2
    • /
    • pp.73-79
    • /
    • 2019
  • Research is underway on services and systems that provide real-time alerts for suffocating gases and potentially explosive materials, but currently smart bend type services are lacking. This study supports real-time identification of explosion hazards due to static electricity in the workplace and immediate elimination of accident occurrence factors, real-time monitoring of worker status and workplace hazards (oxygen, hazardous chemical concentration), and immediate warning and data in case of danger. We propose a method of establishing an accident prevention system through analysis. In this way, various accidents that may occur in industrial sites are monitored using IoT-based intelligent sensor nodes, wireless network technology, data processing middleware, and integrated control system, and real-time risk information at the industrial sites is prevented and accidents are prevented. By supporting a safe working environment, the company can significantly reduce costs compared to post-procurement costs.

Development of Multi-dimensional Flatbed Printer using Head Encoder and Trigger Control (Head Encoder와 Trigger 제어를 이용한 다입체 평판 프린터 개발)

  • Kim, Bong-Hyun
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.10
    • /
    • pp.47-52
    • /
    • 2020
  • The general flatbed printer system is composed of a PC and a dedicated S/W, which is inconvenient to use. In the end, there is a need for a technology that can easily and conveniently use various types of printing through simplification, smartization, etc. of a flatbed printer system configuration. That is, there is an increasing demand for multi-dimensional printer capable of printing on various types of materials with one printer and capable of printing various types of products. Therefore, in this paper, we developed a flatbed printer system capable of multi-dimensional printing using Head Encoder/Trigger control. To this end, we developed a flatbed printer that connects the internal module of the flatbed printer with an input type detection sensor and controls all operating states by the head encoder and head trigger signals of the printer through separate main controllers. Through this, the development and diffusion of IoT technology will expand the printer control of the smart environment to the developed form throughout the industry. It is expected to contribute to the development of the 3D printing industry in the future.

Transient Multipath routing protocol for low power and lossy networks

  • Lodhi, Muhammad Ali;Rehman, Abdul;Khan, Meer Muhammad;Asfand-e-yar, Muhammad;Hussain, Faisal Bashir
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2002-2019
    • /
    • 2017
  • RPL routing protocol for low-power and lossy networks is an Internet Engineering Task Force (IETF) recommended IPv6 based protocol for routing over Low power Lossy Networks (LLNs). RPL is proposed for networks with characteristics like small packet size, low bandwidth, low data rate, lossy wireless links and low power. RPL is a proactive routing protocol that creates a Directed Acyclic Graph (DAG) of the network topology. RPL is increasingly used for Internet of Things (IoT) which comprises of heterogeneous networks and applications. RPL proposes a single path routing strategy. The forwarding technique of RPL does not support multiple paths between source and destination. Multipath routing is an important strategy used in both sensor and ad-hoc network for performance enhancement. Multipath routing is also used to achieve multi-fold objectives including higher reliability, increase in throughput, fault tolerance, congestion mitigation and hole avoidance. In this paper, M-RPL (Multi-path extension of RPL) is proposed, which aims to provide temporary multiple paths during congestion over a single routing path. Congestion is primarily detected using buffer size and packet delivery ratio at forwarding nodes. Congestion is mitigated by creating partially disjoint multiple paths and by avoiding forwarding of packets through the congested node. Detailed simulation analysis of M-RPL against RPL in both grid and random topologies shows that M-RPL successfully mitigates congestion and it enhances overall network throughput.

A Implementation of Smart Band and Data Monitoring System available of Measuring Skin Moisture and UV based on ICT (ICT기반의 피부 수분 및 자외선 측정이 가능한 스마트 밴드 및 데이터 모니터링 시스템 구현)

  • Jung, Se-Hoon;Sim, Chun-Bo;You, Kang-Soo;So, Won-Ho
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.4
    • /
    • pp.715-724
    • /
    • 2017
  • Today all kinds of smart devices are being developed with various researches on wearable devices that support smart computing on the human body. Skin diseases continue to rise including freckles, pimples, atopy, and scalp trouble due to the environmental and genetic factors, and people pay bigger medical bills to treat their skin diseases. There is thus a need to develop a smart-phone or table-based smart healthcare imaging system of high portability and diagnostic accuracy capable of analyzing and managing various skin problems related to skin care. This study proposed an integrated system combining the Smart Mi Band, a wearable device using moisture and UV sensors based on IoT, on the hardware part with the sensor information monitoring software.

Analysis of Security Technology for Internet of things (사물인터넷 보안 기술 분석)

  • Lee, Ho-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.43-48
    • /
    • 2017
  • Today our society is approaching new intelligence information society, which has been caused by the Fourth Industrial Revolution along with the development of information and communication technology(ICT). And this has just opened a new era of Internet of Things(IoT) that connects between human and objects and between objects through network, allowing transmission and reception of information beyond the limits of space. However, many crises occurred in the existing communication environment may threaten the security of Internet of Things, by violating the three components of information security. In this paper, this study aims to analyze security technology to achieve advanced security by dividing IoT security technology for coping with security vulnerability found in different components into three groups.

Smart Attendance Checking System based on BLE using a Beacon (BLE 기반의 비콘을 이용한 스마트 출석 확인 시스템)

  • Ahn, Sung-Woo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.2
    • /
    • pp.209-214
    • /
    • 2016
  • In an environment of IoT services, sensors to track things and human activities are included as an essential element and smart phone is actively used as a means of collecting and processing information from sensors. Especially, wireless communication and NFC provided by the smart phone are key technologies for exchanging information between participants of IoT service. In this paper, we propose and implement the smart attendance checking system based on BLE using a beacon for improving the quality of a university lecture by processing attendance information automatically. Proposed system uses the beacon sensor for being aware of attendance information and the smart phone for receiving and processing this information. The implemented system has the benefit to improve the lecture quality because a professor can minimize attendance checking time and spend a lot of time on the lecture.

A SPECK Crypto-Core Supporting Eight Block/Key Sizes (8가지 블록/키 크기를 지원하는 SPECK 암호 코어)

  • Yang, Hyeon-Jun;Shin, Kyung-Wook
    • Journal of IKEEE
    • /
    • v.24 no.2
    • /
    • pp.468-474
    • /
    • 2020
  • This paper describes the hardware implementation of SPECK, a lightweight block cipher algorithm developed for the security of applications with limited resources such as IoT and wireless sensor networks. The block cipher SPECK crypto-core supports 8 block/key sizes, and the internal data-path was designed with 16-bit for small gate counts. The final round key to be used for decryption is pre-generated through the key initialization process and stored with the initial key, enabling the encryption/decryption for consecutive blocks. It was also designed to process round operations and key scheduling independently to increase throughput. The hardware operation of the SPECK crypto-core was validated through FPGA verification, and it was implemented with 1,503 slices on the Virtex-5 FPGA device, and the maximum operating frequency was estimated to be 98 MHz. When it was synthesized with a 180 nm process, the maximum operating frequency was estimated to be 163 MHz, and the estimated throughput was in the range of 154 ~ 238 Mbps depending on the block/key sizes.