• Title/Summary/Keyword: Smart Core

Search Result 664, Processing Time 0.028 seconds

Evolution of Industrial IoT Network Technology: Past, Present, and Future Trends (산업용 IoT 네트워크 기술의 진화: 과거, 현재, 미래 동향)

  • T.J. Park;E.H. Kim;J.S. Cha;K.S. Lee
    • Electronics and Telecommunications Trends
    • /
    • v.38 no.3
    • /
    • pp.20-28
    • /
    • 2023
  • Wireless communication technology has mainly been used to fulfill the demands of industrial sites at which performance is not a critical concern. However, ongoing discussions and efforts are now focused on securing core wireless communication technologies to enable the transformation or expansion of wired industrial IoT (Internet of Things) network technology into a flexible and dynamic smart manufacturing system. This paper provides an overview of current wireless industrial IoT network technology and the recent wireless time-sensitive networking technology. It outlines the challenging level of reliability required for wireless communication technology to coexist with or replace its wired counterpart in future smart manufacturing systems. Additionally, we introduce ultra-reliable time deterministic network as the core technology of wireless industrial communications and focus on its reliability and delay characteristics.

The spline design of the power-train for the bicycle adopting the belt

  • Young-Woong Kwon
    • International journal of advanced smart convergence
    • /
    • v.13 no.3
    • /
    • pp.267-272
    • /
    • 2024
  • Bicycles and electric bicycles, which are short-distance vehicles, do not generate exhaust gases that cause environmental pollution. Rather, they are in the spotlight because they have exercise effects that help the health of the human body while operating the bicycle. Power-trains of bicycle have traditionally used chains and sprockets, and they still have the largest market share. In the previous study, a new type of bicycle power-train was proposed. The power transmission medium of the proposed power-train device employs a belt. The core of the proposed new bicycle power-train is the configuration of the pulley. The core component of the proposed power-train pulley is a spline. In this study, the basic shape of the proposed power-train model and the basic role and design principles of the spline used in the configuration of the model were studied. The target splines are linear spline used for the central axis of the power-train pulley and helical spline for shifting. The linear spline is a basic shape, and the helical spline is an equation that can calculate the inclination angle and the shift range.

Developing the Core Modules of for Viz-Platform for Supporting Public Service in the City (도시의 공공서비스 제공을 위한 시각화 플랫폼의 핵심모듈 개발)

  • Kim, Mi-Yun
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.9
    • /
    • pp.1131-1139
    • /
    • 2015
  • The purpose of this research is creating the visualization platform of the user interface to make able to be provide the demanded service while users communication with surrounding space in a smart city environment. This comes from the latest enhanced interface technology and social media, and it uses the shares information to support the proper interface environment according to a life style and spatial properties. "EzCity" which is the user interface platform suggested in this research, can control the enormous amount of public data for the smart city. The core module of user platform is made up with Public data module, Interface module, Visualization module and Service module. The role of this platform is to be provide "Geo-Intelligent Interface Service" for space users to access the data in easier and more practical interface environment. This reinforces the visualization process for data collecting, systematization, visualization and providing service. Also this will be expected to be the base to solve the problem which complexity and rapidly increasing amount of data.

Media Education Methodology in Smart Media Era (스마트 미디어 시대의 미디어 교육 방안)

  • Do, Joonho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.5
    • /
    • pp.245-250
    • /
    • 2018
  • The diffusion of smart media based on Internet has brought great changes on existing media business model. This changes also affect the core competence of jobs in media industry. This study performed two focus group interviews among professionals in media industry. The interviews examined the changes that media professionals recognize in the field and requirement changes to meet the job core competence. The interviews also examined the media education method in university that can respond to the changes in the media industry. Breaking away from the classical theory oriented education, university should develop the curriculum that can support competence required in the media industry. Media education in university should focus on fostering problem solving ability that can work regarding various issues in new media environment.

Development of a special thermal-hydraulic component model for the core makeup tank

  • Kim, Min Gi;Wisudhaputra, Adnan;Lee, Jong-Hyuk;Kim, Kyungdoo;Park, Hyun-Sik;Jeong, Jae Jun
    • Nuclear Engineering and Technology
    • /
    • v.54 no.5
    • /
    • pp.1890-1901
    • /
    • 2022
  • We have assessed the applicability of the thermal-hydraulic system analysis code, SPACE, to a small modular reactor called SMART. For the assessment, the experimental data from a scale-down integral-test facility, SMART-ITL, were used. It was conformed that the SPACE code unrealistically calculates the safety injection flow rate through the CMT and SIT during a small-break loss-of-coolant experiment. This unrealistic behavior was due to the overprediction of interfacial heat transfer at the steam-water interface in a vertically stratified flow in the tanks. In this study, a special thermal-hydraulic component model has been developed to realistically calculate the interfacial heat transfer when a strong non-equilibrium two-phase flow is formed in the CMT or SIT. Additionally, we developed a special heat structure model, which analytically calculates the heat transfer from the hot steam to the cold tank wall. The combination of two models for the tank are called the special component model. We assessed it using the SMART-ITL passive safety injection system (PSIS) test data. The results showed that the special component model well predicts the transient behaviors of the CMT and SIT.

Deep Packet Inspection Time-Aware Load Balancer on Many-Core Processors for Fast Intrusion Detection

  • Choi, Yoon-Ho;Park, Woojin;Choi, Seok-Hwan;Seo, Seung-Woo
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.5 no.3
    • /
    • pp.169-177
    • /
    • 2016
  • To realize high-speed intrusion detection by accommodating many regular expression (regex)-based signatures and growing network link capacities, we propose the Service TimE-Aware Load-balancing (STEAL) algorithm. This work is motivated from the observation that utilization of a many-core network intrusion detection system (NIDS) is influenced by unfair computational distribution among many-core NIDS nodes. To avoid such unfair computational distribution, STEAL is designed to dynamically distribute a large volume of traffic among many-core NIDS nodes based on packet service time, which is represented by the deep packet time in many-core NIDS nodes. From experiments, we show that compared to the commonly used load-balancing algorithm based on arrival rate, STEAL increases the number of received packets (i.e., decreases the number of dropped packets) in many-core NIDS. Specifically, by integrating an open source NIDS (i.e. Bro) with STEAL, we show that even under attack-dominant traffic and with many signatures, STEAL can rapidly improve the performance of many-core NIDS to realize high-speed intrusion detection.

80μW/MHz 0.68V Ultra Low-Power Variation-Tolerant Superscalar Dual-Core Application Processor

  • Kwon, Youngsu;Lee, Jae-Jin;Shin, Kyoung-Seon;Han, Jin-Ho;Byun, Kyung-Jin;Eum, Nak-Woong
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.4 no.2
    • /
    • pp.71-77
    • /
    • 2015
  • Upcoming ground-breaking applications for always-on tiny interconnected devices steadily demand two-fold features of processor cores: aggressively low power consumption and enhanced performance. We propose implementation of a novel superscalar low-power processor core with a low supply voltage. The core implements intra-core low-power microarchitecture with minimal performance degradation in instruction fetch, branch prediction, scheduling, and execution units. The inter-core lockstep not only detects malfunctions during low-voltage operation but also carries out software-based recovery. The chip incorporates a pair of cores, high-speed memory, and peripheral interfaces to be implemented with a 65nm node. The processor core consumes only 24mW at 350MHz and 0.68V, resulting in power efficiency of $80{\mu}W/MHz$. The operating frequency of the core reaches 850MHz at 1.2V.

Vulnerability Analysis on the Mobile Core Network using OpenAirInterface (OpenAirInterface를 통한 모바일 코어네트워크 보안위협 분석)

  • Oh, In Su;Park, Jun Young;Jung, Eun Seon;Yim, Kang Bin
    • Smart Media Journal
    • /
    • v.9 no.3
    • /
    • pp.71-79
    • /
    • 2020
  • Mobile network is used by many users worldwide for diverse services, including phone-call, messaging and data transfer over the Internet. However, this network may experience massive damage if it is exposed to cyber-attacks or denial-of-service attacks via wireless communication interference. Because the mobile network is also used as an emergency network in cases of disaster, evaluation or verification for security and safety is necessary as an important nation-wide asset. However, it is not easy to analyze the mobile core network because it's built and serviced by private service providers, exclusively operated, and there is even no separate network for testing. Thus, in this paper, a virtual mobile network is built using OpenAirInterface, which is implemented based on 3GPP standards and provided as an open source software, and the structure and protocols of the core network are analyzed. In particular, the S1AP protocol messages captured on S1-MME, the interface between the base station eNodeB and the mobility manager MME, are analyzed to identify potential security threats by evaluating the effect of the messages sent from the user terminal UE to the mobile core network.

Hierarchical Image Processing Method For Context-Awareness On Ubiquitous-Safety(U-Safety) (유비쿼터스 안전관리(U-Safety) 상에서의 상황인지를 위한 계층적 영상 처리 시스템)

  • Lim, Chul-Hoo;Song, Kang-Suk;Jeong, Moo-Il;Lee, Yong-Woog;Moon, SungMo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.553-557
    • /
    • 2009
  • USS(Ubiquitous Smart Space) give services, that fit in with customer's goal, by cognizing various situations that happens in a space and cooperating autonomously objects or services in a space. In USS, U-Safety is a system that cognizes more exact situations with multiple sensors in USS, deals with this and take proper actions. When men reason on situations objectively, it is most ideal that image data among collected data with used various sensors in U-Safety. A senter collects a lot of image data from image input devices equipped in various points and work a multiple situation cognition and inference that are based on this. So, senters spend many resources for processing massive data. This paper proposes hierarchical image processing method that does the first situation cognization in image input devices, blocks only points that situation cognization possibility is high among a total image, and transfers to senters. It improves the efficiency of smooth situation cognization by reducing resources that a senter spends on image processing. So, it reduces proportion of image data in U-Safety.

  • PDF

Security Core Technology Implementation for MTM Hardware-Based Smart Devices (MTM하드웨어 기반 스마트 단말 보안 핵심기술 구현)

  • Kim, Jeong Nyeo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1455-1459
    • /
    • 2016
  • Recently, the frequency of dealing important information regarding financial services like paying through smart device or internet banking on smart device has been increasing. Also, with the development of smart device execution environment towards open software environment, it became easier for users to download and use random application software, and its security aspect appears to be weakening. This study will inspect features of hardware-based smart device security technology. Furthermore, this study will propose a realization method in MTM hardware-based secure smart device execution environment for application software runs that in smart device.