• Title/Summary/Keyword: Smart On-Device

Search Result 1,703, Processing Time 0.028 seconds

Energy saving control system of wireless base station utilizing natural air-conditioning (자연공조를 활용한 무선기지국 Energy절감 제어시스템)

  • Ryu, Gu-Hwan;Kwon, Chang-Hee
    • Journal of Digital Convergence
    • /
    • v.17 no.10
    • /
    • pp.223-232
    • /
    • 2019
  • With the development of the information communication industry, the size of the communication device has been reduced to a system that generates a large amount of heat. Therefore, since the amount of heat generated by the wireless equipment is large in the wireless base station, the energy consumption is continuously consumed and the failure of the wireless base station may occur. Therefore, in this study, The study was analyzed. As a research method, we performed base station with a lot of calorific value and electric charge. We selected 25 base stations and obtained data for two weeks. To ensure reliability, the room temperature was kept constant at $27^{\circ}C$, and the control system was installed and equiped for two weeks to obtain the date analysis. In order to calculate the test results in the study method, the instrument was used with a computer, a digital thermometer, and dust measurement. For the date analysis, we conducted a research study on 25 wireless basestations before and after the installation of Control Sysetm.

User Visit Certification System using Inaudible Frequency

  • Chung, Myoungbeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.7
    • /
    • pp.57-64
    • /
    • 2021
  • In this paper, we propose and test the efficacy of an easy-to-use user location certification system for public places that relies on frequencies outside the audible range for humans. The inaudible frequencies come in signal frequency between 18-20 kHz and are generated by general audio speaker. After an individual's smart device detects the signal frequency, it sends the frequency value, user's personal ID, and user's location to a system server that certifies the user's visit location currently. The system server then saves a user visit record and categorizes it by individual. To show the usefulness of this proposed system, we developed a user visit certification application for smart devices linked to a system server. We then conducted a user visit certification experiment using the proposed system, with the result showing 99.6% accuracy. For a comparison, we then held a user visit certification experiment using a QR code, which confirmed that our proposed system performs better than QR code location certification. This proposed system can thus provide restaurants and other facilities reliable user contact tracing and electronic visitor access lists in the age of COVID-19.

Effect of Progressive Squat Exercise on Lower Body Muscles Activity and Foot Pressure in Male College Students

  • Jin-Wook, Lee;Jin-Young, Jung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.2
    • /
    • pp.143-151
    • /
    • 2023
  • This study examined the changes in lower body muscle activity and foot pressure during progressive squat exercise in male college students. It was conducted to help efficient exercise guidance by identifying and recognizing muscle imbalance using EMG and smart shoes and providing immediate feedback. The subjects of the study were 20 students from D University. As a result of this study, as the squat load increased, the activity of all muscles except for the left semitendinosus muscle and the anterior tibialis muscle significantly increased among. Foot pressure, when the squat load was increased, the pressure of the forefoot(FF) increased significantly and the pressure of the rear foot(RF) decreased significantly. Therefore, providing immediate feedback using a wearable device will prevent muscle imbalance and provide effective exercise guidance.

Analysis and Improved Solution of Hussian et al.'s Authentication Protocol for Digital Rights Management

  • Mi-Og Park
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.5
    • /
    • pp.67-74
    • /
    • 2023
  • In this paper, we analyze the authentication protocol for DRM proposed by Hussain et al. in 2022, and present an improved solution. Hussain et al. argued that their authentication protocol guarantees man-in-the-middle attack, replay attacks, and mutual authentication. However, as a result of analyzing Hussain et al.'s authentication protocol in this paper, Hussain et al.'s authentication protocol still has an insider attack problem, a problem with Yu et al.'s authentication protocol that they pointed out. For this reason, when an inside attacker acquires information on a mobile device, a user impersonation attack was also possible. In addition, there were problems with the user's lack of ID format verification and the problem of the secret key mismatch of the digital contents between the server and the user. Therefore, this paper proposes an improved solution to solve these problems. As a result of analysis in this paper, the improved solution is safe from various attacks such as smart card attack, insider attack, and password guessing attack and can safely authenticate users of DRM.

QoS-Aware Optimal SNN Model Parameter Generation Method in Neuromorphic Environment (뉴로모픽 환경에서 QoS를 고려한 최적의 SNN 모델 파라미터 생성 기법)

  • Seoyeon Kim;Bongjae Kim;Jinman Jung
    • Smart Media Journal
    • /
    • v.12 no.4
    • /
    • pp.19-26
    • /
    • 2023
  • IoT edge services utilizing neuromorphic hardware architectures are suitable for autonomous IoT applications as they perform intelligent processing on the device itself. However, spiking neural networks applied to neuromorphic hardware are difficult for IoT developers to comprehend due to their complex structures and various hyper-parameters. In this paper, we propose a method for generating spiking neural network (SNN) models that satisfy user performance requirements while considering the constraints of neuromorphic hardware. Our proposed method utilizes previously trained models from pre-processed data to find optimal SNN model parameters from profiling data. Comparing our method to a naive search method, both methods satisfy user requirements, but our proposed method shows better performance in terms of runtime. Additionally, even if the constraints of new hardware are not clearly known, the proposed method can provide high scalability by utilizing the profiled data of the hardware.

Design and Implementation of a Sensor Technology-based Safety Shoe Recognition System to Prevent Safety Accidents (안전사고 예방을 위한 센서 기술 기반 안전화 인식 시스템 설계 및 구현)

  • Kyoung-Jin Oh;Jeong-Min Park;Kwang-Jin, Kwak
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.6
    • /
    • pp.163-170
    • /
    • 2023
  • With the introduction of the law regarding severe penalties for major accidents, employers, management executives, and corporations have significantly increased the number of safety managers and invested extensively in acquiring ISO certifications to prevent accidents in industrial sites. Moreover, the implementation of the Smart Safety Management System (SSMS) has facilitated the management of personnel and safety equipment. While IoT-based management systems have been applied to safety gear such as helmets, safety harnesses, and protective clothing, the responsibility for safety shoes still primarily lies with on-site managers and individuals, leaving a vulnerability to accidents. In this study, we aim to implement a Raspberry Pi-based sensor device to proactively detect workers' safety shoe usage upon entering the site. The goal is to confirm the usage of safety shoes and prevent accidents that may occur due to non-compliance with safety shoes regulations.

Integrity Guarantee System in IoT Virtual Environment Platform: Through Hyperedfger Indy and MQTT (IoT 가상환경 플랫폼에서의 무결성 보장 시스템:Hyperledger Indy와 MQTT를 통하여)

  • Yoosung Hong;Geun-Hyung Kim
    • Smart Media Journal
    • /
    • v.13 no.4
    • /
    • pp.76-85
    • /
    • 2024
  • In this paper, we propose a system that improves the data integrity of IoT(Internet of Things) devices in the virtual environment by combining Hyperledger Indy and MQTT(Message Queuing Telemetry Transport). The system complements the limitations of the centralized system by realizing a DPKI(Decentralized Public Key Infrastructure) structure that utilizes a distributed network in publish-subscribe(pub/sub) pattern communication. Digital signature technology was applied to ensure the data integrity of IoT devices and communication scenarios between the four core components of the client, IoT device, broker, and blockchain, as well as a topic structure using a decentralized identifier to ensure safety in the virtual environment. We present a systematic method for transparent data exchange. To prove the performance of the proposed system, this paper conducted experiments on four scenarios and evaluated communication performance in a virtual environment. The experimental results confirmed that the proposed system provides a reliable IoT data communication structure in a virtual environment.

Design and Implementation of Location Based Silver Town u-Service System (위치인식 기반 실버타운 u-서비스 제공시스템 설계 및 구현)

  • Choi, Yeon-Suk;Park, Byoung-Tae;Choi, Yong-Ju
    • Journal of Internet Computing and Services
    • /
    • v.11 no.3
    • /
    • pp.53-63
    • /
    • 2010
  • In this paper, the u-Service system that is based on location-aware technology is designed and implemented for a silver town. On the real silver town the developed system has been employed and tested to provide convenient and secure living for residents. It provides services such as emergency call, intelligent elevator operation, and hands-free door access based on the location of the residents with personal device as called smart tag. It can also be applied to other service areas such as the location-aware u-Service for hospital, high-rising complex building, APT, etc.

A Study on the Emoticon Extraction based on Facial Expression Recognition using Deep Learning Technique (딥 러닝 기술 이용한 얼굴 표정 인식에 따른 이모티콘 추출 연구)

  • Jeong, Bong-Jae;Zhang, Fan
    • Korean Journal of Artificial Intelligence
    • /
    • v.5 no.2
    • /
    • pp.43-53
    • /
    • 2017
  • In this paper, the pattern of extracting the same expression is proposed by using the Android intelligent device to identify the facial expression. The understanding and expression of expression are very important to human computer interaction, and the technology to identify human expressions is very popular. Instead of searching for the emoticons that users often use, you can identify facial expressions with acamera, which is a useful technique that can be used now. This thesis puts forward the technology of the third data is available on the website of the set, use the content to improve the infrastructure of the facial expression recognition accuracy, in order to improve the synthesis of neural network algorithm, making the facial expression recognition model, the user's facial expressions and similar e xpressions, reached 66%.It doesn't need to search for emoticons. If you use the camera to recognize the expression, itwill appear emoticons immediately. So this service is the emoticons used when people send messages to others, and it can feel a lot of convenience. In countless emoticons, there is no need to find emoticons, which is an increasing trend in deep learning. So we need to use more suitable algorithm for expression recognition, and then improve accuracy.

Implementation of Integrated Interface based on Wire and Wireless Dual Network for Ensuring the Reliability of Intelligent LED Lighting System (지능형 LED 조명 시스템의 신뢰성 확보를 위한 유무선 이중망 통합 인터페이스 구현)

  • Lee, Un-Seon;Park, Tae-Jin;Park, Man-Gon
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.63 no.2
    • /
    • pp.306-312
    • /
    • 2014
  • The ZigBee communication method, which is the most frequently applied to the LED lighting control system, has drawbacks of low-speed and low-capacity, and the communication failure possibility due to environmental influences is on the rise. Therefore, it is important to secure the communication reliability by applying an integrated interface with a wire-wireless dual-network. This paper developed a communication module, which has a platform converging and combining the ZigBee of USN environments with the PLC of power line communication environments, to implement a dualized communication interface system supporting the wire-wireless integrated protocol, and implemented a wire-wireless networking device and a control system software technology. As a result, it was automatically switched into the PLC communication within 4.4 seconds on average when there was an access failure in the ZigBee communication network, so a reliable communication network was built.