• 제목/요약/키워드: Smart Key

검색결과 1,200건 처리시간 0.026초

A Game Theory Based Interaction Strategy between Residential Users and an Electric Company

  • Wang, Jidong;Fang, Kaijie;Yang, Yuhao;Shi, Yingchen;Xu, Daoqiang;Zhao, Shuangshuang
    • Journal of Electrical Engineering and Technology
    • /
    • 제13권1호
    • /
    • pp.11-19
    • /
    • 2018
  • With the development of smart grid technology, it has become a hotspot to increase benefits of both residential users and electric power companies through demand response technology and interactive technology. In this paper, the game theory is introduced to the interaction between residential users and an electric company, making a mutually beneficial situation for the two. This paper solves the problem of electricity pricing and load shifting in the interactive behavior by building the game-theoretic process, proposing the interaction strategy and doing the optimization. In the simulation results, the residential users decrease their cost by 11% mainly through shifting the thermal loads and the electric company improves its benefits by 5.6% though electricity pricing. Simulation analysis verifies the validity of the proposed method and shows great revenue for the economy of both sides.

CAN 통신과 Smart Device를 이용한 차량 도난 방지 System (Car Theft Protection System using CAN Communication and Smart Devicenment)

  • 김재경;황만태;김영길
    • 한국정보통신학회논문지
    • /
    • 제15권10호
    • /
    • pp.2136-2142
    • /
    • 2011
  • 현재 도난방지를 위해 사용되는 방법은 Key를 이용한 방법, 원격 도어락과 차량 경보를 이용한 방법 등이 있다. 이 방법들은 차량의 Key를 분실할 경우 차량의 도난을 방지함에 있어 어려움이 있다. 그래서 본 논문에서는 Smart Device 와 CAN 통신을 이용한 차량 도난 방지 시스템에 대하여 제안한다. CAN의 차량 식별자 고유ID를 Head Unit에 보내고, Smart Phone을 통해 수신된 식별자 ID를 비교하여 동일한 ID 일 때 차량의 ACC(Accessory)를 on/off 하여 차량의 시동을 걸 수 있다.

NFC기반의 보안인증을 통한 이륜차 도난방지장치 구현 (Development of Motocycle's Anti-theft Device Based on NFC)

  • 진태석
    • 전기학회논문지
    • /
    • 제65권1호
    • /
    • pp.165-170
    • /
    • 2016
  • Recently, IoT(Internet of Things) technology is widely applied in not only our everyday lives but also in industry, medical field and security system. NFC system, the basis of IoT, is in the spotlight which can be an alternative solution of a anti-theft system for motorcycle as they basically have practicality and security issues. Anti-theft system for motorcycle using the NFC smart devices based on RFID has been proposed. because Progress of Smart Device If someone get the Key for motorcycle theft, he can be easily stolen motorcycle. We thought about the concept of NFC security devices as a wireless key and automatic solenoid valve for setting the lock and unlock module. In this study, we designed motorcycle smart key system with general-purpose NFC system and the automatic solenoid valve for setting the lock and unlock module. First, we designed control unit and NFC card reader for motorcycle smart key system. Then we propose an AES encryption algorithm and prove that the motorcycle key system is controllable by showing the result of implementing and testing, after installing.

Parameter Identification of 3R-C Equivalent Circuit Model Based on Full Life Cycle Database

  • Che, Yanbo;Jia, Jingjing;Yang, Yuexin;Wang, Shaohui;He, Wei
    • Journal of Electrical Engineering and Technology
    • /
    • 제13권4호
    • /
    • pp.1759-1768
    • /
    • 2018
  • The energy density, power density and ohm resistance of battery change significantly as results of battery aging, which lead to decrease in the accuracy of the equivalent model. A parameter identification method of the equivale6nt circuit model with 3 R-C branches based on the test database of battery life cycle is proposed in this paper. This database is built on the basis of experiments such as updating of available capacity, charging and discharging tests at different rates and relaxation characteristics tests. It can realize regular update and calibration of key parameters like SOH, so as to ensure the reliability of parameters identified. Taking SOH, SOC and T as independent variables, lookup table method is adopted to set initial value for the parameter matrix. Meanwhile, in order to ensure the validity of the model, the least square method based on variable forgetting factor is adopted for optimizing to complete the identification of equivalent model parameters. By comparing the simulation data with measured data for charging and discharging experiments of Li-ion battery, the effectiveness of the full life cycle database and the model are verified.

스마트 폰 터치스크린에서의 작은 터치 키의 사용성 연구 (Usability Evaluation of the Size of Small Touch Keys for the Smart Phone)

  • 김보람;김태일;임영재;정의승
    • 대한산업공학회지
    • /
    • 제38권2호
    • /
    • pp.80-88
    • /
    • 2012
  • This paper focuses on small touch key size and spacing that affect the usability of the smart phones. The experiments examined thirty-six different touch key designs, combinations of four touch key sizes (width (mm) ${\times}$height (mm); $4{\times}4$, $4{\times}7$, $7{\times}4$, and $7{\times}7$), and nine spacings (horizontal (mm)${\times}$vertical (mm); $0{\times}0$, $0{\times}1$, $0{\times}3$, $1{\times}0$, $1{\times}1$, $1{\times}3$, $3{\times}0$, $3{\times}1$, and $3{\times}3$). Forty participants volunteered in the experiment. The completion time, error rate, identification discomfort, and control discomfort were measured. The results revealed that the touch key sizes of $7{\times}7$ and $7{\times}4$ provide the best performance in terms of the error rate measure, while the touch key size of $7{\times}7$ provides the best results for other measures. In addition, touch key spacings of $1{\times}1$, $1{\times}3$ and $3{\times}1$ are regarded as the best for all the measures. The results of this study suggest a practical approach for the small touch key design for the smart phones.

인증 URL 기반의 스마트 포스터 인증기법 (Smart Poster Authentication Scheme based on Authentication URL)

  • 이재철;박창섭
    • 융합보안논문지
    • /
    • 제14권7호
    • /
    • pp.91-99
    • /
    • 2014
  • NFC(Near Field Communication)는 13.56MHz 주파수 대역에서 기기 간 데이터 교환 무선 통신기술이다. NFC Forum에서는 NFC Device와 NFC Tag간 데이터 교환을 위한 메시지 형식인 NDEF(NFC Data Exchange Format), 메시지 내의 탑재 가능한 레코드 유형을 정의한 NFC RTD(Record Type Definition), 기존의 종이포스터를 대체할 Smart Poster RTD, 레코드의 진위성과 무결성을 보장하기 위한 Signature RTD를 정의하였다. 그러나 기존 스마트 포스터 인증기법은 가장 빈번하게 일어나는 스마트 포스터 인증 과정에서 방대한 보안 기반구조인 PKI(Public Key Infrastructure) 및 인증서를 통해 스마트 포스터의 공개키 유효성을 확인하는 과정과 인증경로 상에 있는 인증서를 포함한다는 문제점을 가지고 있다. 따라서 본 논문에서는 스마트 포스터 인증과정에서 PKI와 인증서를 사용하지 않고 인증 URL, 서명, 공개키를 통해 스마트 포스터의 공개키의 유효성을 확인하여 스마트 포스터를 인증하는 기법을 제안하고 구현하였다.

결정적 사건기법(CIT)을 이용한 소비자의 스마트 의류 경험에 대한 연구 (Understanding the Consumer Experience about Smart Clothing Using the Critical Incident Technique)

  • 이재경;이하경
    • 한국의류산업학회지
    • /
    • 제25권3호
    • /
    • pp.304-314
    • /
    • 2023
  • The rapid development of digital technology is diversifying the fashion industry by influencing both the manufacturing processes and the characteristics of fashion products. Although various smart clothing technologies are being developed as part of the government's technology development policy, the number of smart clothing products available to consumers in stores remains very limited. To address this issue, this study analyzes the key attributes of smart clothing as expressed in consumer language. The CIT (Critical Incident Technique) research method was used, and data were collected through an online survey. The study focuses on identifying potential factors that may influence the development direction or strategy of smart clothing. By classifying past experiences and attitudes towards smart clothing into positive and negative categories, it was found that positive responses to smart clothing were heavily influenced by expectations from technology and convenience. Participants' experience with smart technology has had a positive impact on their evaluation of smart clothing. Consumers with negative attitudes towards smart clothing expressed expectations for new benefits resulting from technological development, and indicated that they would consider purchasing such clothing in the future when design and technology improve. Ultimately, this study provides a valuable reference for the development of smart clothing products in Korea by analyzing consumer experiences and acceptance conditions towards smart clothing.

스마트그리드 소비자 수용성 요인 연구 (A Study on Key Influencing Factors in Smart Grid Consumer Engagement)

  • 김현제;박지현;박찬국
    • 정보화정책
    • /
    • 제19권1호
    • /
    • pp.91-106
    • /
    • 2012
  • 스마트그리드를 성공적으로 구축하기 위해서는 소비자 수용성 확보라는 정책목표를 설정하고, 소비자 수용성에 영향을 미치는 요인을 과학적으로 분석해 나가야 한다. 결국 최종 소비자가 스마트그리드 제품 및 서비스를 받아들이느냐 여부에 따라 스마트그리드의 확산이 달려 있기 때문이다. 아직 국내에서 스마트그리드 소비자 수용성 요인을 체계적으로 연구한 사례가 없는 가운데, 본 연구는 기존 스마트그리드 수용성 요인에 대한 검토를 통해 스마트그리드 수용을 확대하기 위한 정책적 시사점을 이끌어내고자 하였다. 분석결과, 주요 수용요인으로 금전적 편익, 친환경성, 사이버 보안, 이해도 등을 확인하였다. 그리고 소비자 중심의 스마트그리드 교육 및 홍보, 환경 친화적 제도와 연계, 스마트그리드 사이버보안 강화 등에 대한 정책적 시사점을 제시하였다. 본 연구는 스마트그리드 소비자 수용성 관련 실증분석을 시행함에 있어 주요 참고자료로 활용될 수 있을 것이고, 스마트그리드 소비자 세분화 연구에 있어서도 주요 이론적 토대가 될 것이다.

  • PDF

A modified U-net for crack segmentation by Self-Attention-Self-Adaption neuron and random elastic deformation

  • Zhao, Jin;Hu, Fangqiao;Qiao, Weidong;Zhai, Weida;Xu, Yang;Bao, Yuequan;Li, Hui
    • Smart Structures and Systems
    • /
    • 제29권1호
    • /
    • pp.1-16
    • /
    • 2022
  • Despite recent breakthroughs in deep learning and computer vision fields, the pixel-wise identification of tiny objects in high-resolution images with complex disturbances remains challenging. This study proposes a modified U-net for tiny crack segmentation in real-world steel-box-girder bridges. The modified U-net adopts the common U-net framework and a novel Self-Attention-Self-Adaption (SASA) neuron as the fundamental computing element. The Self-Attention module applies softmax and gate operations to obtain the attention vector. It enables the neuron to focus on the most significant receptive fields when processing large-scale feature maps. The Self-Adaption module consists of a multiplayer perceptron subnet and achieves deeper feature extraction inside a single neuron. For data augmentation, a grid-based crack random elastic deformation (CRED) algorithm is designed to enrich the diversities and irregular shapes of distributed cracks. Grid-based uniform control nodes are first set on both input images and binary labels, random offsets are then employed on these control nodes, and bilinear interpolation is performed for the rest pixels. The proposed SASA neuron and CRED algorithm are simultaneously deployed to train the modified U-net. 200 raw images with a high resolution of 4928 × 3264 are collected, 160 for training and the rest 40 for the test. 512 × 512 patches are generated from the original images by a sliding window with an overlap of 256 as inputs. Results show that the average IoU between the recognized and ground-truth cracks reaches 0.409, which is 29.8% higher than the regular U-net. A five-fold cross-validation study is performed to verify that the proposed method is robust to different training and test images. Ablation experiments further demonstrate the effectiveness of the proposed SASA neuron and CRED algorithm. Promotions of the average IoU individually utilizing the SASA and CRED module add up to the final promotion of the full model, indicating that the SASA and CRED modules contribute to the different stages of model and data in the training process.

A Study on KSI-based Authentication Management and Communication for Secure Smart Home Environments

  • Ra, Gyeong-Jin;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권2호
    • /
    • pp.892-905
    • /
    • 2018
  • In smart home environment, certificate based signature technology is being studied by communication with Internet of Things(IoT) device. However, block - chain technology has attracted much attention because of the problems such as single - point error and management overhead of the trust server. Among them, Keyless Signature Infrastructure(KSI) provides integrity by configuring user authentication and global timestamp of distributed server into block chain by using hash-based one-time key. In this paper, we provide confidentiality by applying group key and key management based on multi - solution chain. In addition, we propose a smart home environment that can reduce the storage space by using Extended Merkle Tree and secure and efficient KSI-based authentication and communication with enhanced security strength.