• 제목/요약/키워드: Machine-to-machine (M2M) technology

Search Result 345, Processing Time 0.025 seconds

Applications and Strategies on Defense Acquisition based CPS & IoT Technology (사이버물리시스템(CPS)과 사물인터넷(loT) 기술의 군사적 활용방안 및 추진전략)

  • Kye, J.E.;Park, P.J.;Kim, W.T.;Lim, C.D.
    • Electronics and Telecommunications Trends
    • /
    • v.30 no.4
    • /
    • pp.92-101
    • /
    • 2015
  • 미래 전장은 정보 지식 기반의 첨단 전력체계를 확충하기 위해 향후 전력구조를 통합, 지휘통제통신(C4I) 체계와 생존성과 통합성이 향상된 전장의 네트워크중심전(NCW) 수행능력을 향상시킬 것이다. 사이버물리시스템(Cyber-Physical Systems: CPS)은 함정전투체계에 적용되고 있는 DDS를 포함하여 국방 M&S의 근간인 Live, Virture, Constructive(L-V-C) 체계의 큰 축을 형성하고 있다. 사물인터넷(Internet of Things: IoT) 기술은 센서네트워크, 통신, Radio Frequency Identification(RFID), Ubiquitous Sensor Network(USN), Machine to Machine(M2M), D2D 기술 및 상황인지, 지능서비스를 위한 정보수집/가공/융합/분석/예측기술을 포괄적으로 포함한 기술로서 미래산업을 이끌어 갈 차세대 선도 기술이며, 특히 군사적으로도 감시정찰 센서네트워크(USN), 견마형로봇, 경전투로봇과 무인기 기술 및 전술정보통신망체계(TICN) 등 첨단 통신네트워크 기술의 전력화 추세는 IoT 기술의 적용영역을 넓혀주고 있다. 감시정찰체계(Sensor)에서는 감시정찰 분야 영상정보 처리, 표적탐지 등과 관련된 IoT 기술 소요와 지휘통제통신(C4I) 체계의 상호운용성, 데이터링크, 지능형 통신체계 등 C4I 관련 IoT 기술 소요 및 타격체계(Shooter)의 내장형 SW 등 유 무인 무기체계 관련 IoT 기술의 소요가 증대될 것으로 예상된다. 본고는 CPS 및 IoT 기술의 군사적 활용방안 및 획득전략에 대한 적용기술 및 발전방향을 살펴본다.

  • PDF

Paper Machine Industrial Analysis on Moisture Control Using BF-PSO Algorithm and Real Time Implementation Setup through Embedded Controller

  • Senthil Kumar, M.;Mahadevan, K.
    • Journal of Electrical Engineering and Technology
    • /
    • v.11 no.2
    • /
    • pp.490-498
    • /
    • 2016
  • Proportional Integral Derivative (PID) controller tuning is an area of interest for researchers in many areas of science and engineering. This paper presents a new algorithm for PID controller tuning based on a combination of bacteria foraging and particle swarm optimization. BFO algorithm has recently emerged as a very powerful technique for real parameter optimization. To overcome delay in an optimization, combine the features of BFOA and PSO for tuning the PID controller. This new algorithm is proposed to combine both the algorithms to get better optimization values. The real time prototype model of paper machine is designed and controlled by using PIC microcontroller embedded with the programming in C language.

A Study on Measurement System Accuracy of Theodolite System(IV) - A Measurement System Accuracy depending on a Distance of Scale Bar on the Distance 4m between two Theodolites (데오드라이트 시스템의 측정 정확도에 대한 연구(IV) - 시준거리 4m에서의 기준자 거리에 따른 측정 정도)

  • Yoon Yong-Sik;Lee Dong-Ju;Park Yo-Chang
    • Transactions of the Korean Society of Machine Tool Engineers
    • /
    • v.14 no.3
    • /
    • pp.67-73
    • /
    • 2005
  • An accuracy of theodolite system may be affected by a measurement environment and a measurement distance change from theodolite to scale bar and/or targets. This study was performed for measuring an accuracy when the distance from thodolite system to scale bar was changed $2\~6m$ on the distance 4m between two theodolites. The results showed that an accuracy was ${\pm}0.025mm$ or better when the distance from theodolite system to targets was 3, 4 and 5m. According to the results, it was found that the best distance from theodolite system to scale bar was $3\~4m$ when the collimation distance was $3\~4m$.

A Study on Measurement Accuracy of Theodolite System(III) - A Measurement System Accuracy depending on a Distance of Scale Bar on the Distance 3 m between two Theodolites (데오드라이트 시스템의 측정 정확도에 대한 연구(III) - 시준거리 3 m에서 기준자 거리에 따른 측정 정도)

  • Yoon Yong Sik;Lee Dong Ju;Yoon In Jin
    • Transactions of the Korean Society of Machine Tool Engineers
    • /
    • v.14 no.2
    • /
    • pp.48-54
    • /
    • 2005
  • The theodolite system consists of two theodolites, a scale bar and a target bu. A measurement accuracy of theodolite system is affected by a measurement distance of each equipment. This study was performed fir measuring an accuracy when the distance from theodolite to scale bar was changed 2~ 6 m on two theodolites distance 3 a The results showed thai the measurement accuracy could be $\pm$0.021 mm when the distance from theodolite to target was 2,3 and 6 n Specially, it was found that the maximum measurement accuracy was 10.017mm on theodolite collimation distance 3m and the distance 4 m of the theodolite and scale bar.

A Survey of Trust Management in WSNs, Internet of Things and Future Internet

  • Chang, Kai-Di;Chen, Jiann-Liang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.5-23
    • /
    • 2012
  • Nowadays, most researchers and manufacturers always pay attention on wireless sensor networks (WSNs) due to its potential applications in many regions such as military, industrial and civilian areas. WSNs are the basic components of Internet of Things (IoT) and the key to machine-to-machine communications and the future Internet. Also, the security is an essential element for deploying WSNs. Recently the concept of trust-based mechanism was proposed in WSNs such as traditional cryptographic and authentication mechanisms. However, there is lack a survey on trust management for WSNs, IoT even future Internet. In this paper, we discuss the concept and potential application areas of trust management for WSNs and IoT worlds. Furthermore, we survey different trust management issues (i.e., cluster, aggregation, reputation). Finally, future research directions with respect to trust management in WSNs and future IoT world are provided. We give not only simple WSNs for IoT environments but also a simulated bootstrap platform to provide the discussion of open challenges and solutions for deploying IoT in Future Internet.

Automatic Classification of Drone Images Using Deep Learning and SVM with Multiple Grid Sizes

  • Kim, Sun Woong;Kang, Min Soo;Song, Junyoung;Park, Wan Yong;Eo, Yang Dam;Pyeon, Mu Wook
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.38 no.5
    • /
    • pp.407-414
    • /
    • 2020
  • SVM (Support vector machine) analysis was performed after applying a deep learning technique based on an Inception-based model (GoogLeNet). The accuracy of automatic image classification was analyzed using an SVM with multiple virtual grid sizes. Six classes were selected from a standard land cover map. Cars were added as a separate item to increase the classification accuracy of roads. The virtual grid size was 2-5 m for natural areas, 5-10 m for traffic areas, and 10-15 m for building areas, based on the size of items and the resolution of input images. The results demonstrate that automatic classification accuracy can be increased by adopting an integrated approach that utilizes weighted virtual grid sizes for different classes.

A Study for its Characteristics with Electric Variation in an Electrical Discharge Machining (방전가공에서 전기적 변화가 갖는 방전 특성에 관한 연구)

  • 신근하
    • Journal of the Korean Society of Manufacturing Technology Engineers
    • /
    • v.6 no.4
    • /
    • pp.72-79
    • /
    • 1997
  • A study is a experiment which is figure out to optimum discharge cutting condition of the surface roughness, electronic discharging speed and electrode wear ration with Ton , Toff and V(voltage) as an input condition according to the current(Ip) in an electric spark machine : 1) Electrode is utilized Cu and Graphite. 2) Work piece is used the material of carbon steel. The condition of experiment is : 1) Current is varied 0.7(A) to 50(A) and the time of electric discharging to work piece in each time is 30(min) to 60(min). 2) After the upper side of work piece was measured in radius(5$\mu$m) of stylus analyzed the surface roughness to ade the table and graph of Rmax by yielding data. 3) Electro wear ratio is : \circled1Cooper was measured ex-machining and post-machining by the electronic balance. \circled2The ex-machining of graphite measured by it, the post-machining was found the data from volume $\times$specific gravity and analyzed to made its table and graph on ground the data. 4) In order to keep the accuracy of voltage affected to the work piece was equipped with the A.V. R and the memory scope was sticked to the electric spark machine. 5) In order to preserve the precision of current, to get rid of the noise occured by internal resistance of electric spark machine and to force injecting for the discharge fluid , it made the fixed table for a work piece to minimize the work error by means of one's failure during the electric discharging.

  • PDF

A Study on the Compensation of the Thermal Errors for Machine Tool (공작기계 열변위 보정에 관한 연구)

  • 이인재
    • Journal of the Korean Society of Manufacturing Technology Engineers
    • /
    • v.9 no.4
    • /
    • pp.117-122
    • /
    • 2000
  • This paper presents an indirect compensation of thermal errors during machining , in which thermal error is modelled as a linear regression of temperatures measured at 4 specified positions. In this regression model, weighting coefficients of the measured temperatures were estimated by using the least square method. The grinding test with compensation , after 4 -hour warning-up operation before the test, showed that the maximum machining error of the work pieces was reduced to 12${\mu}{\textrm}{m}$ while it measured by 28${\mu}{\textrm}{m}$ without compensation . Furthermore the standard deviation of machining errors was also reduced from 8${\mu}{\textrm}{m}$ to 2${\mu}{\textrm}{m}$.

  • PDF

A Study on the Security Framework for IoT Services based on Cloud and Fog Computing (클라우드와 포그 컴퓨팅 기반 IoT 서비스를 위한 보안 프레임워크 연구)

  • Shin, Minjeong;Kim, Sungun
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.12
    • /
    • pp.1928-1939
    • /
    • 2017
  • Fog computing is another paradigm of the cloud computing, which extends the ubiquitous services to applications on many connected devices in the IoT (Internet of Things). In general, if we access a lot of IoT devices with existing cloud, we waste a huge amount of bandwidth and work efficiency becomes low. So we apply the paradigm called fog between IoT devices and cloud. The network architecture based on cloud and fog computing discloses the security and privacy issues according to mixed paradigm. There are so many security issues in many aspects. Moreover many IoT devices are connected at fog and they generate much data, therefore light and efficient security mechanism is needed. For example, with inappropriate encryption or authentication algorithm, it causes a huge bandwidth loss. In this paper, we consider issues related with data encryption and authentication mechanism in the network architecture for cloud and fog-based M2M (Machine to Machine) IoT services. This includes trusted encryption and authentication algorithm, and key generation method. The contribution of this paper is to provide efficient security mechanisms for the proposed service architecture. We implemented the envisaged conceptual security check mechanisms and verified their performance.

H2M e-learning System Based on Object Extractor Technology (동영상 객체추출 기술 기반의 H2M e-learning 시스템 제안)

  • Park Seung-Beom;Lee Sang-Jun;Song Ho-Yeong;Kim Byoung-Ki
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.771-774
    • /
    • 2006
  • 본 논문에서는 양방향 인터넷 방송을 위하여 연구되고 있는 고품질 동영상 콘텐츠의 객체 분할 기술을 이용하여 컴퓨터와 사용자간의 인터랙션을 개선하여 학습 몰입도를 높이고 고품질의 서비스를 제공하는 H2M(Human to Machine) e-learning 시스템을 제안한다. 본 시스템에서는 고품질 동영상 콘텐츠 및 기타 정보를 한눈에 볼 수 있으며 에듀테인먼트를 가미한 H2M e-learning시스템에 적합한 새로운 인터페이스를 제공하고자 한다.

  • PDF