• Title/Summary/Keyword: Smart IoT

Search Result 1,345, Processing Time 0.027 seconds

CNN Based 2D and 2.5D Face Recognition For Home Security System (홈보안 시스템을 위한 CNN 기반 2D와 2.5D 얼굴 인식)

  • MaYing, MaYing;Kim, Kang-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.6
    • /
    • pp.1207-1214
    • /
    • 2019
  • Technologies of the 4th industrial revolution have been unknowingly seeping into our lives. Many IoT based home security systems are using the convolutional neural network(CNN) as good biometrics to recognize a face and protect home and family from intruders since CNN has demonstrated its excellent ability in image recognition. In this paper, three layouts of CNN for 2D and 2.5D image of small dataset with various input image size and filter size are explored. The simulation results show that the layout of CNN with 50*50 input size of 2.5D image, 2 convolution and max pooling layer, and 3*3 filter size for small dataset of 2.5D image is optimal for a home security system with recognition accuracy of 0.966. In addition, the longest CPU time consumption for one input image is 0.057S. The proposed layout of CNN for a face recognition is suitable to control the actuators in the home security system because a home security system requires good face recognition and short recognition time.

An Effective Malware Detection Mechanism in Android Environment (안드로이드 환경에서의 효과적인 악성코드 탐지 메커니즘)

  • Kim, Eui Tak;Ryu, Keun Ho
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.4
    • /
    • pp.305-313
    • /
    • 2018
  • With the explosive growth of smart phones and efficiency, the Android of an open mobile operating system is gradually increasing in the use and the availability. Android systems has proven its availability and stability in the mobile devices, the home appliances's operating systems, the IoT products, and the mechatronics. However, as the usability increases, the malicious code based on Android also increases exponentially. Unlike ordinary PCs, if malicious codes are infiltrated into mobile products, mobile devices can not be used as a lock and can be leaked a large number of personal contacts, and can be lead to unnecessary billing, and can be cause a huge loss of financial services. Therefore, we proposed a method to detect and delete malicious files in real time in order to solve this problem. In this paper, we also designed a method to detect and delete malicious codes in a more effective manner through the process of installing Android-based applications and signature-based malicious code detection method. The method we proposed and designed can effectively detect malicious code in a limited resource environment, such as mobile environments.

The Technology of Connected Car (커넥티드 카의 기술)

  • Shim, Hyun-Bo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.3
    • /
    • pp.590-598
    • /
    • 2016
  • It comes into the spotlight as the new Blue Ocean in which the connected car industry in which the car and mobile communication technology is convergence. All sorts of infortainments services connecting with the portable electronic device(Smart phone, tablet PC, and MP3 player) and car are rapidly grown. The Connected car emphasizes the vehicle connectivity with the concept that the car has communication with the around on a real time basis and it provides the safety and expedience to the operator and using the thing of Internet (IoT) in the car and supports the application, presently, the entertainment service including the real-time Navigation, parking assistant function, not only the remote vehicle control and management service but also Email, multimedia streaming service, SNS and with the platform. Intelligent vehicle network is studied as the kind according to MANET(Mobile Ad Hoc Network) for the safety operation of the cars of the road and improving the efficiency of the driving.

Development of Multi-dimensional Flatbed Printer using Head Encoder and Trigger Control (Head Encoder와 Trigger 제어를 이용한 다입체 평판 프린터 개발)

  • Kim, Bong-Hyun
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.10
    • /
    • pp.47-52
    • /
    • 2020
  • The general flatbed printer system is composed of a PC and a dedicated S/W, which is inconvenient to use. In the end, there is a need for a technology that can easily and conveniently use various types of printing through simplification, smartization, etc. of a flatbed printer system configuration. That is, there is an increasing demand for multi-dimensional printer capable of printing on various types of materials with one printer and capable of printing various types of products. Therefore, in this paper, we developed a flatbed printer system capable of multi-dimensional printing using Head Encoder/Trigger control. To this end, we developed a flatbed printer that connects the internal module of the flatbed printer with an input type detection sensor and controls all operating states by the head encoder and head trigger signals of the printer through separate main controllers. Through this, the development and diffusion of IoT technology will expand the printer control of the smart environment to the developed form throughout the industry. It is expected to contribute to the development of the 3D printing industry in the future.

Proposal of Personalized Recommendation for Korean Food and Tour Using Beacon System (비콘을 활용한 개인 맞춤형 한식과 관광지 추천 관리 시스템 제안)

  • Sung, Kihyuk;Ryu, Gihwan;Yun, Daiyeol
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.3
    • /
    • pp.267-273
    • /
    • 2020
  • Beacon is a wireless communication device that can automatically recognize the smart device in the short distance and transmit the necessary data, Beacon is a representative Internet of Things (IoT) facility in the era of the 4th Industrial Revolution, which is utilized in various fields such as short-distance information delivery, mobile location service, shopping, and marketing, and is constantly evolving. In this paper, it is based on tourist site-based recommendation information service. A system is proposed that recommends customized information according to the user's interest, preference, etc. by incorporating beacon technology. In other words, it acts as an information agent that informs tourists of desired information. In order to meet the needs of tourists, it is necessary to build an intelligent tourism recommendation system. The personalized Korean food and tourism recommendation management system using the beacon technology proposed in this paper is expected to provide high-quality services not only to foreigners visiting Korea but also to Korean tourists.

A Study on Environmental Micro-Dust Level Detection and Remote Monitoring of Outdoor Facilities

  • Kim, Seung Kyun;Mariappan, Vinayagam;Cha, Jae Sang
    • International journal of advanced smart convergence
    • /
    • v.9 no.1
    • /
    • pp.63-69
    • /
    • 2020
  • The rapid development in modern industrialization pollutant the water and atmospheric air across the globe that have a major impact on the human and livings health. In worldwide, every country government increasing the importance to improve the outdoor air pollution monitoring and control to provide quality of life and prevent the citizens and livings life from hazard disease. We proposed the environmental dust level detection method for outdoor facilities using sensor fusion technology to measure precise micro-dust level and monitor in realtime. In this proposed approach use the camera sensor and commercial dust level sensor data to predict the micro-dust level with data fusion method. The camera sensor based dust level detection uses the optical flow based machine learning method to detect the dust level and then fused with commercial dust level sensor data to predict the precise micro-dust level of the outdoor facilities and send the dust level informations to the outdoor air pollution monitoring system. The proposed method implemented on raspberry pi based open-source hardware with Internet-of-Things (IoT) framework and evaluated the performance of the system in realtime. The experimental results confirm that the proposed micro-dust level detection is precise and reliable in sensing the air dust and pollution, which helps to indicate the change in the air pollution more precisely than the commercial sensor based method in some extent.

Study on the Application Methods of Big Data at a Corporation -Cases of A and Y corporation Big Data System Projects- (기업의 빅데이터 적용방안 연구 -A사, Y사 빅데이터 시스템 적용 사례-)

  • Lee, Jae Sung;Hong, Sung Chan
    • Journal of Internet Computing and Services
    • /
    • v.15 no.1
    • /
    • pp.103-112
    • /
    • 2014
  • In recent years, the rapid diffusion of smart devices and growth of internet usage and social media has led to a constant production of huge amount of valuable data set that includes personal information, buying patterns, location information and other things. IT and Production Infrastructure has also started to produce its own data with the vitalization of M2M (Machine-to-Machine) and IoT (Internet of Things). This analysis study researches the applicable effects of Structured and Unstructured Big Data in various business circumstances, and purposes to find out the value creation method for a corporation through the Structured and Unstructured Big Data case studies. The result demonstrates that corporations looking for the optimized big data utilization plan could maximize their creative values by utilizing Unstructured and Structured Big Data generated interior and exterior of corporations.

IoT-Based Module Development for Management and Real-time Activity Recognition of Disaster Recovery Resources (사물인터넷 기반 재난복구자원 관리 및 실시간 행동인지 모듈 개발)

  • Choe, Sangyun;Park, Juhyung;Han, Sumin;Park, Jinwoo;Chang, Tai-woo;Yun, Hyeokjin
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.4
    • /
    • pp.103-115
    • /
    • 2017
  • Globally, frequency and scale of natural disasters are growing, also the damage is increasing. In view of the damage by natural disasters for several years, it is true that Korea is not free from such damages. In this paper, we propose a process to efficiently manage recovery resources in case of disaster damage. We utilize the IoT technology to detect the resource status in real time, and configure the process so that the state and movement of the recovery resource can be grasped in real time through the resource activity recognition module. In addition, we designed the database that is necessary to actualize it, and developed and experimented resource activity recognition module using smart-phone sensors. This will contribute to building a quick and efficient disaster response system.

A Dual Security Technique based on Beacon (비콘 기반의 이중 보안 기법)

  • Park, Sang-Min;Kim, Chul-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.8
    • /
    • pp.311-317
    • /
    • 2016
  • Many services have been developed that are based on smart devices, and security between devices is emphasized. A beacon on the current IoT(Internet of Things) services has been utilized in the commercial field and is being applied to the services of the home IoT. On the other hand, the beacon is weak to security using Bluetooth-based services. Therefore, it is important to strengthen the security of the beacon. This paper proposes a dual security technique that can enhance the security of beacon-based services. The dual security architecture and security process is proposed based on beacon and authentication service. In addition, mobile application was developed and validated based on the beacon for proving the suitability of the proposed technique. The experimental method for verification are the authentication failure case, such as 1st authentication fail, and authentication success case, such as 1st authentication success and 2nd authentication success. The components of the verification experiments consists of two beacons (matched with Beacon ID, mismatched with Beacon ID), one mobile device and authentication application. This was tested to verify the compatibility of the dual security architecture and 1st/2nd authentication process.

Design of Encryption/Decryption IP for Lightweight Encryption LEA (경량 블록암호 LEA용 암·복호화 IP 설계)

  • Sonh, Seungil
    • Journal of Internet Computing and Services
    • /
    • v.18 no.5
    • /
    • pp.1-8
    • /
    • 2017
  • Lightweight Encryption Algorithm(LEA) was developed by National Security Research Institute(NSRI) in 2013 and targeted to be suitable for environments for big data processing, cloud service, and mobile. LEA specifies the 128-bit message block size and 128-, 192-, and 256-bit key sizes. In this paper, block cipher LEA algorithm which can encrypt and decrypt 128-bit messages is designed using Verilog-HDL. The designed IP for encryption and decryption has a maximum throughput of 874Mbps in 128-bit key mode and that of 749Mbps in 192 and 656Mbps in 256-bit key modes on Xilinx Vertex5. The cryptographic IP of this paper is applicable as security module of the mobile areas such as smart card, internet banking, e-commerce and IoT.