• Title/Summary/Keyword: Wireless machine

Search Result 244, Processing Time 0.032 seconds

Design For System Algorithm for Implement Machine Socialization Environment (DDNS 기반 가정 에너지 관리 시스템 설계)

  • Lee, Chun-Hui;Kim, Wung-Jun;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.629-631
    • /
    • 2015
  • Recently, the actual demand for electricity usage to out of demand forecasting demand appears to be based on the power of Government to address the insecurity is there are a lot of efforts on a more efficient energy management. In 2011, the first major outage, blackout since the current rate of no more than 10% of our power plants, such as power supply and demand crisis is being repeated. In addition, energy management systems, the demand for care and social areas are being expanded. In this paper, Building power supply and wired/wireless router and to optimize the DDNS (Dynamic Domain Name Service) for remote control and monitoring device for electric consumption Presonal Energy Management System offers a way to implement it. In the future, remote control and access the user's can minimize the settings for additional research is needed.

  • PDF

System Implementation and Algorithm Development for Classification of the Activity States Using 3 Axial Accelerometer (3축 가속도를 이용한 활동상태 분류 시스템 구현 및 알고리즘 개발)

  • Noh, Yun-Hong;Ye, Soo-Young;Jeong, Do-Un
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.24 no.1
    • /
    • pp.81-88
    • /
    • 2011
  • A real time monitoring system from a PC has been developed which can be accessed through transmitted data, which incorporates an established low powered transport system equipped with a single chip combined with wireless sensor network technology from a three-axis acceleration sensor. In order to distinguish between static posture and dynamic posture, the extracted parameter from the rapidly transmitted data needs differentiation of movement and activity structures and status for an accurate measurement. When results interpret a static formation, statistics referring to each respective formation, known as the K-mean algorithm is utilized to carry out a determination of detailed positioning, and when results alter towards dynamic activity, fuzzy algorithm (fuzzy categorizer), which is the relationship between speed and ISVM, is used to categorize activity levels into 4 stages. Also, the ISVM is calculated with the instrumented acceleration speed on the running machine according to various speeds and its relationship with kinetic energy goes through correlation analysis. With the evaluation of the proposed system, the accuracy level stands at 100% at a static formation and also a 96.79% accuracy with kinetic energy and we can easily determine the energy consumption through the relationship between ISVM and kinetic energy.

Development of multi arcade game platform applying smart devices (스마트 디바이스 기반의 멀티 플랫폼 아케이드 게임 개발)

  • Yun, Chang Ok;Kim, Jun Hong;Ju, Woo Suk;Yun, Tae Soo
    • Journal of Korea Game Society
    • /
    • v.15 no.5
    • /
    • pp.119-130
    • /
    • 2015
  • In the recent gaming industry, the paradigm has been changed with upcoming core-platform as time goes by. Arcade, console, PC online and smart device platforms are representative ones. In recently, the platform is changed to multi-platform which connecting to smart device and other platforms. Besides, the multi-platform without PC is up-coming. This paper suggests that a kind of multi-platform which connecting from smart devices to arcade devices be aware of lack of continuous. It provides a new arcade gaming condition connecting to smart devices, then supplies online network conditions to the arcade gaming machine. The original arcade game was lack of continuous and the game platform was so simple, but now, it could be focused from players by connecting to smart devices to increase the gaming machines' continuity. Furthermore, Bluetooth communication module and wireless Wi-Fi communication module are used to adapt various communication environments. The Unity3D engine would make contents' expandability.

Implementation of Monitoring System for Smart Factory (스마트 팩토리를 위한 모니터링 시스템 구현)

  • Yoon, Jae-Hyeon;Jung, Jong-Mun;Ko, Bong-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.5
    • /
    • pp.485-489
    • /
    • 2018
  • For the construction of smart factory that are part of the Fourth Industrial Revolution, data from the production environments and production machines should be collected, analyzed, and feedback should be given to predict when failures take place or parts should be replaced. For this purpose, a system that monitors the production environments and the status of the production machines are required. In this paper, the monitoring system for mobile devices and PC is implemented by collecting environmental data from production sites and sensor data of production machine using LoRa, a low-power wireless communication technology. On the mobile devices, production environments and vibration data can be displayed in real time. In PC monitoring program, sensor data can be displayed graphically to check standard deviation and data variation. The implemented system is used to collect data such as temperature, humidity, and atmospheric pressure of the production environment, and vibration data of production machines.

A Study of Development for High-speed Cloud Video Service using SDN based Multi Radio Access Technology Control Methods (초고속 클라우드 비디오 서비스 실현을 위한 SDN 기반의 다중 무선접속 기술 제어에 관한 연구)

  • Kim, Dongha;Lee, Sungwon
    • Journal of Broadcast Engineering
    • /
    • v.19 no.1
    • /
    • pp.14-23
    • /
    • 2014
  • This paper proposed controlling methods for SDN(Software Defined Network) based multiple radio access technology as the solutions of following two issues which were mainly occurred by explosive increasing of video traffic. The first one is a requirement for traffic off-loading caused by 3rd-party video service providers from the mobile network operator's viewpoint. The other one is a provision of high-speed video contents transmission services with low price. Furthermore, the performance evaluation was also conducted on the real test-bed which is composed of OpenStack cloud and SDN technology such as OpenFlow and Open vSwitch. A virtual machine running on the OpenStack provide a video service and the terminal which is able to use multiple radio access technology supports two 2.4GHz WLANs(Wireless Local Area Network) and three 5GHz WLANs, concurrently. Finally, we can get 820Mbps of the maximum transmission speed by using that five WLAN links for the single service at the same time.

Analysis & defence of detection technology in network Attacker (네트워크 침입자탐지기법 분석과 대응)

  • Yun, Dong Sic
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.155-163
    • /
    • 2013
  • Connection hijacking attack using the vulnerability of the TCP protocol to redirect TCP stream goes through your machine actively (Active Attack). The SKEY such as one-time password protection mechanisms that are provided by a ticket-based authentication system such as Kerberos or redirection, the attacker can bypass.Someone TCP connection if you have access on TCP packet sniffer or packet generator is very vulnerable. Sniffer to defend against attacks such as one-time passwords and token-based authentication and user identification scheme has been used. Active protection, but these methods does not sign or encrypt the data stream from sniffing passwords over insecure networks, they are still vulnerable from attacks. For many people, an active attack is very difficult and so I think the threat is low, but here to help break the illusion successful intrusion on the UNIX host, a very aggressive attack is presented. The tools available on the Internet that attempt to exploit this vulnerability, known as the recent theoretical measures is required. In this paper, we propose analysis techniques on a wireless network intruder detection.

Efficient Allocation and Connection of Concentrators and Repeaters Using Approximate Steiner Minimum Tree in Automatic Meter Reading System (원격 검침 시스템에서 근사 최소 스타이너 트리를 이용한 집중기 및 중계기의 효율적인 배치와 연결)

  • Kim, Chae-Kak;Kim, In-Bum;Kim, Soo-In
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.10B
    • /
    • pp.994-1003
    • /
    • 2009
  • For Automatic Meter Reading System, good topology of check machines, concentrators, and repeaters in client field is important. Steiner Minimum Tree is a minimum cost tree connecting all given nodes with introducing Steiner points. In this paper, an efficient mechanism allocating and connecting check machines, concentrators and repeaters which are essential elements in automatic meter reading system is proposed, which conducts repeated applications of building approximate Minimum Steiner Trees. In the mechanism, input nodes and Steiner points might correspond to check machine, concentrators or repeaters and edges might do to the connections between them. Therefore, through suitable conversions and processes of them, an efficient network for automatic meter reading system with both wired and wireless communication techniques could be constructed. In our experiment, for 1000 input nodes and 200 max connections per node, the proposed mechanism shortened the length of produced network by 19.1% comparing with the length of Minimum Spanning Tree built by Prim's algorithm.

The development of industrial secure L2 switch and introduction example for management and security improvement of supervisory control network in purification plant (정수장 감시제어망의 관리와 보안개선을 위한 산업용 보안 L2스위치 개발 및 적용사례)

  • Kim, Yunha;Yu, Chool;Oh, Eun;Kim, Chanmoon;Park, Ikdong;Kim, Yongseong;Choi, Hyunju
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.33 no.5
    • /
    • pp.329-339
    • /
    • 2019
  • Recently, the advancement of information and communication technology(ICT) is expanding the connectivity through Internet of Things(IoT), and the media of connection is also expanding from wire/cable transmission to broadband wireless communication, which has significantly improved mobility. This hyperconnectivity has become a key element of the fourth industrial revolution, whereas the supervisory control network of purification plants in korea is operated as a communication network separated from the outside, thereby lagging in terms of connectivity. This is considered the best way to ensure security, and thus there is hardly any consideration of establishing alternatives to operate an efficient and stable communication network. Moreover, security for management of a commercialized communication network and network management solution may be accompanied by immense costs, making it more difficult to make new attempts. Therefore, to improve the conditions for the current supervisory control network of purification plants, this study developed a industrial security L2 switch that supports modbus TCP(Transmission Control Protocol) communication and encryption function of the transmission section. As a result, the communication security performance improved significantly, and the cost for implementing the network management system using Historical Trend and information of HMI(Human Machine Interface) could be reduced by approximately KRW 200 million. The results of this study may be applied to systems for gas, electricity and social safety nets that are infrastructure communication networks that are similar to purification plants.

Changes in the Industrial Structure caused by the IoT and AI (사물인터넷과 AI가 가져올 산업구조의 변화)

  • Kim, Jang-Hwan
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.93-99
    • /
    • 2017
  • Recently IoT(Internet of Things) service industry has grown very rapidly. In this paper, we investigated the changes in IoT service industry as well as new direction of human life in future global society. Under these changing market conditions, competition has been also changed into global and ecological competition. But compared to the platform initiatives and ecological strategies of global companies, Korean companies' vision of building ecosystems is still unclear. In addition, there is a need of internetworking between mobile and IoT services. IoT security Protocol has weakness of leaking out information from Gateway which connected wire and wireless communication. As such, we investigate the structure of IoT and AI service ecosystem in order to gain strategic implications and insights for the security industry in this paper.

Development of Automatic Segmentation Algorithm of Intima-media Thickness of Carotid Artery in Portable Ultrasound Image Based on Deep Learning (딥러닝 모델을 이용한 휴대용 무선 초음파 영상에서의 경동맥 내중막 두께 자동 분할 알고리즘 개발)

  • Choi, Ja-Young;Kim, Young Jae;You, Kyung Min;Jang, Albert Youngwoo;Chung, Wook-Jin;Kim, Kwang Gi
    • Journal of Biomedical Engineering Research
    • /
    • v.42 no.3
    • /
    • pp.100-106
    • /
    • 2021
  • Measuring Intima-media thickness (IMT) with ultrasound images can help early detection of coronary artery disease. As a result, numerous machine learning studies have been conducted to measure IMT. However, most of these studies require several steps of pre-treatment to extract the boundary, and some require manual intervention, so they are not suitable for on-site treatment in urgent situations. in this paper, we propose to use deep learning networks U-Net, Attention U-Net, and Pretrained U-Net to automatically segment the intima-media complex. This study also applied the HE, HS, and CLAHE preprocessing technique to wireless portable ultrasound diagnostic device images. As a result, The average dice coefficient of HE applied Models is 71% and CLAHE applied Models is 70%, while the HS applied Models have improved as 72% dice coefficient. Among them, Pretrained U-Net showed the highest performance with an average of 74%. When comparing this with the mean value of IMT measured by Conventional wired ultrasound equipment, the highest correlation coefficient value was shown in the HS applied pretrained U-Net.