• Title/Summary/Keyword: Sensor Connection

Search Result 295, Processing Time 0.022 seconds

Design of Compact Data Integration and Convergence Device Using Esp8266 Module (Esp8266모듈을 이용한 소형 데이터 통합 및 융합장치 설계)

  • Lee, Dong-Seok;Lim, Joong-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.2
    • /
    • pp.15-20
    • /
    • 2017
  • In this paper, Esp8266, Node.js, and TCP / IP socket communication are used to design a compact data integration device. This device is designed to configure server and client using Esp8266 module that supports Wifi connection and to support bidirectional data transmission using TCP / IP socket communication. The server is configured using the Node.js operating system, and the database is integrated using Mysql. The network is designed to have a separate IP address by assigning a private IP address to the router, such as a home network. This device can transmit data bidirectionally, store individual client data on the server side, and can check the flow of data transmitted bidirectionally through wire-shark, so that it can be used as a compact real-time data integration and convergence device.

A Mechanism to configure for Connected Car Service Environment using Mobile Virtual Fence (모바일 가상 펜스를 이용한 커넥티드 카 서비스 환경 구성 메커니즘)

  • Eom, Young-Hyun;Choi, Young-Keun;Kim, Inhwan;Yoo, Hyunmi;Cho, Sungkuk;Jeon, Byungkook
    • The Journal of the Convergence on Culture Technology
    • /
    • v.4 no.3
    • /
    • pp.227-233
    • /
    • 2018
  • In recent years, connected car, which has sensors and computers attached to vehicles used to detect the surrounding environment, has been actively studied. However, in order to configure the connected car environment, various sensors and roadside equipments are required to detect the surrounding environment of the vehicle, and also communication techniques for transmitting the collected data are in demands. Therefore, in this paper, the mobile virtual fence that collects and communicates the data of the surrounding environment through the sensor mounted on the mobile device is applied to the vehicles that were released before the connected car service environment was constructed, We propose a mechanism to receive the service and show the possibility through experiment.

Design and Implementation of Data Binder for Dynamic Data Delivery in Healthcare Service (헬스케어 서비스에서 동적인 데이터 전달을 위한 데이터 결합기 설계 및 구현)

  • Kang, Kyu-Chang;Lee, Jeun-Woo;Choi, Hoon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.12
    • /
    • pp.891-898
    • /
    • 2009
  • This paper suggests producer/consumer-based Data Binder enabling applications and biomedical devices developed by mutually different vendors to transfer data dynamically. Data Binder is implemented as a bundle of OSGi platform providing component-based programming model and service-oriented operation architecture. Data Binder complements the disadvantage of OSGi WireAdmin service enabling static data delivery between a producer and a consumer of data. Data Binder normalizes an application requirement as an application descriptor and a device capability as a device descriptor so that it enables dynamic data delivery by making data producer/consumer pair in runtime. Therefore, Data Binder can be used as a connection management of a data link between a data producer and a data consumer in sensor-based application development. The object of this paper is to provide the facility of the healthcare service development by separating a data producer such as a biomedical device from a data consumer such as a healthcare application.

Secure Key Management Framework in USN Environment using Certificateless Public Keys (USN 환경에서 비인증서 공개키를 사용하는 보안키 관리 프레임워크)

  • Heo, Joon;Hong, Choong-Seon
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.6
    • /
    • pp.545-551
    • /
    • 2009
  • In this paper, we propose the secure key management framework to connect USN with different network. Although connected USN with different network has no CA (Certificate Authority), it is important to use public key based cryptography system because this network consists of numerous devices. The proposed mechanisms focus on device authentication and public/private key management without existing PKI system of IP network. To solve no CA and certificate problems, the IDC (Identity Based Cryptography) concept is adopted in our proposed mechanism. To verify the possibility of realization, we make an effort to implement the proposed mechanisms to real system. In the test bed, both USN and PLC network are connected to IP network; and proposed mechanisms are implemented to PLC and sensor devices. Through this test using the proposed mechanism, we met the similar performance with symmetric algorithms on key generation and update process. Also, we confirmed possibility of connection between different network and device authentication.

Airtouch technology smart fusion DID system design (Airtouch 기술을 활용한 스마트융합 DID 시스템 설계)

  • Lee, Gwang-Yong;Hwang, Bu-Hyun
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.2
    • /
    • pp.240-246
    • /
    • 2013
  • Airtouch technology to integrate the system in the way of information delivery devices, touch screen DID this study is to develop new ways of information delivery systems. Airtouch technology to design and implement a system that can be utilized to view the college campus announcements, education, information, and employment information, and store the remote operation and sharing content, the development of cloud services to sync content via smart technology implementation fusion DID systemto develop. Packs USB interface kinek because you may be used in connection with the information appliances, and low-cost product by leveraging the Kinect sensor, Airtouch technology implementation. Types of input devices paper Airtouch technology systems, the user's hand gestures alone can interact with information appliances, smart fusion system developed by DID by tracking the user's hand movements to manipulate the mouse pointer, and information through the user's hand gestures to command the unit so that you can make. Airtouch technology smart fusion DID system technology utilizing a ripple effect on other industries, such as the online education industry, advertising, information industry increases. Also, replace the existing interface device with the versatility of a wide range of technologies, usability is an infinite expansion.

A Study of Evaluation Certification on Electronic Power u-IT Convergence Equipment (전력 u-IT 융복합화 기기의 평가와 인증 연구)

  • Yi, Jeong-Hoon;Park, Dea-Woo;Kim, Eung-Sik;Kim, Hong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.11
    • /
    • pp.2433-2440
    • /
    • 2009
  • Whole system and network for supply of electric power and electricity safety are essential element. Electricity safety technology need rating for product and research about certification as product development that is done electric power u-IT cotton flannel mixed with development of u-IT, u-City base technology consists. Study on serve to develop electricity safety integration supervision system to apply product to u-City electric power appliance and cotton flannel mixed of u-IT appliance, Connection badness sensing instrument made device built-in electric power u-IT cotton flannel mixed in outlet that is used most in electric power appliance terminal. Using sensor on ZigBee, RFID performance estimation of communication module about function of product for remote safety check of electricity safety integration supervision system. A performance experiment and estimation in electric leakage, high voltage, Arc, fire detection diagnosis system and certification KS, electricity safety about product that get fitness finding.

Research about Security Attack Methods to Arduino Boards Using Temporary Files Data Manipulation (임시파일 데이터 조작을 통한 아두이노 보드 공격 기법에 관한 연구)

  • Lee, Woo Ho;Jung, Hyun Mi;Jeong, Kimoon
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.11
    • /
    • pp.21-27
    • /
    • 2017
  • Internet of Things(IoT), which is developing for the hyper connection society, is based on OSHW (Open Source Hardware) such as Arduino and various small products are emerging. Because of the limitation of low performance and low memory, the IoT is causing serious information security problem that it is difficult to apply strong security technology. In this paper, we analyze the vulnerability that can occur as a result of compiling and loading the application program of Arduino on the host computer. And we propose a new attack method that allows an attacker to arbitrarily change the value input from the sensor of the arduino board. Such as a proposed attack method may cause the arduino board to misinterpret environmental information and render it inoperable. By understanding these attack techniques, it is possible to consider how to build a secure development environment and cope with these attacks.

A Study on the Overseas Expansion Strategy of u-City based on BIM/GIS (BIM/GIS 기반 u-City 해외진출 전략 연구)

  • Na, Joon Yeop;Lee, Woo Sik;Hong, Chang Hee;Hwang, Jung Rae
    • Spatial Information Research
    • /
    • v.20 no.6
    • /
    • pp.119-127
    • /
    • 2012
  • u-City is next generation city which can innovate functions of city. It can realize increase of convenience, improvement of life quality and safety guarantee by convergence of information technologies and ubiquitous service with urban space. Market of u-City is in range of rapid growth and u-City can make enormous synergy effects by accompanying construction technologies with spatial information, sensor technologies, communications network and related equipments. In this study, we analyzed the domestic/abroad status, researches and element technologies involved in u-City. And, we suggested overseas expansion strategy of u-City such as selection and analysis of target nations, packaging method of u-City service models and application of BIM/GIS connection technologies in terms of u-City construction and operation.

Design and Optimization of Intelligent Service Robot Suspension System Using Dynamic Model (동역학 모델을 활용한 서비스용 지능형 로봇의 현가 시스템 설계 및 최적화)

  • Choi, Seong-Hoon;Park, Tae-Won;Lee, Soo-Ho;Jung, Sung-Pil;Jun, Kab-Jin;Yun, Ji-Won
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.34 no.8
    • /
    • pp.1023-1028
    • /
    • 2010
  • Recently, an intelligent service robot is being developed for use in guiding and providing information to visitors about the building at public institutions. The intelligent robot has a sensor at the bottom to recognize its location. Four wheels, which are arranged in the form of a lozenge, support the robot. This robot cannot be operated on uneven ground because its driving parts are attached to its main body that contains the important internal components. Continuous impact with the ground can change the precise positions of the components and weaken the connection between each structural part. In this paper, the design of the suspension system for such a robot is described. The dynamic model of the robot is created, and the driving characteristics of the robot with the designed suspension system are simulated. Additionally, the suspension system is optimized to reduce the impact for the robot components.

Digital Image as Scientific Evidence: A Theoretical Inquiry of the Roles of Digital Technologies in Visualizing Risk (과학적 증거물로서 디지털 이미지: 위험의 시각화에서 디지털 영상기술의 역할과 위치)

  • Kim, Soo-Chul
    • Korean journal of communication and information
    • /
    • v.54
    • /
    • pp.98-117
    • /
    • 2011
  • This paper is a theoretical inquiry of the changing roles of digital technologies in the representation of risk. Critically examining existing perspectives on risk society and risk communication, this paper argues that digital technologies and images in risk communication have been relatively understudied. Having said that, this paper suggests that Actor-network Theory provide useful theoretical tools for current studies on how digital technologies affect contemporary risk communication practices. Furthermore, this paper examines varied recent studies investigating how digital technologies of visualization are at play in risk communication practices. In doing so, this paper demonstrates how digital images and technologies interrupt the processes that scientific evidence is presented and facts are constructed in varied contemporary scientific reasoning. It will focus on the emerging mode of seeing and visual regime made possible by the increased usage of digital image and technologies, which are characterized by networked connection, sensor, computerized algorithm, and increased storage space. Finally this paper will discuss on the implications on future studies on the roles of digital images and technologies in risk communication practices in Korean context.

  • PDF