• Title/Summary/Keyword: device access

Search Result 951, Processing Time 0.03 seconds

Building Control Box Attached Monitor based Color Grid Recognition Methods for User Access Authentication

  • Yoon, Sung Hoon;Lee, Kil Soo;Cha, Jae Sang;Khudaybergenov, Timur;Kim, Min Soo;Woo, Deok Gun;Kim, Jeong Uk
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.1-7
    • /
    • 2020
  • The secure access the lighting, Heating, ventilation, and air conditioning (HVAC), fire safety, and security control boxes of building facilities is the primary objective of future smart buildings. This paper proposes an authorized user access to the electrical, lighting, fire safety, and security control boxes in the smart building, by using color grid coded optical camera communication (OCC) with face recognition Technologies. The existing CCTV subsystem can be used as the face recognition security subsystem for the proposed approach. At the same time a smart device attached camera can used as an OCC receiver of color grid code for user access authentication data sent by the control boxes to proceed authorization. This proposed approach allows increasing an authorization control reliability and highly secured authentication on accessing building facility infrastructure. The result of color grid code sequence received by the unauthorized person and his face identification allows getting good results in security and gaining effectiveness of accessing building facility infrastructure. The proposed concept uses the encoded user access authentication information through control box monitor and the smart device application which detect and decode the color grid coded informations combinations and then send user through the smart building network to building management system for authentication verification in combination with the facial features that gives a high protection level. The proposed concept is implemented on testbed model and experiment results verified for the secured user authentication in real-time.

Augmented Reality Framework to Visualize Information about Construction Resources Based on Object Detection (웨어러블 AR 기기를 이용한 객체인식 기반의 건설 현장 정보 시각화 구현)

  • Pham, Hung;Nguyen, Linh;Lee, Yong-Ju;Park, Man-Woo;Song, Eun-Seok
    • Journal of KIBIM
    • /
    • v.11 no.3
    • /
    • pp.45-54
    • /
    • 2021
  • The augmented reality (AR) has recently became an attractive technology in construction industry, which can play a critical role in realizing smart construction concepts. The AR has a great potential to help construction workers access digitalized information about design and construction more flexibly and efficiently. Though several AR applications have been introduced for on-site made to enhance on-site and off-site tasks, few are utilized in actual construction fields. This paper proposes a new AR framework that provides on-site managers with an opportunity to easily access the information about construction resources such as workers and equipment. The framework records videos with the camera installed on a wearable AR device and streams the video in a server equipped with high-performance processors, which runs an object detection algorithm on the streamed video in real time. The detection results are sent back to the AR device so that menu buttons are visualized on the detected objects in the user's view. A user is allowed to access the information about a worker or equipment appeared in one's view, by touching the menu button visualized on the resource. This paper details implementing parts of the framework, which requires the data transmission between the AR device and the server. It also discusses thoroughly about accompanied issues and the feasibility of the proposed framework.

A Design of An UPnP Proxy Device for Home networking (홈 네트워킹을 위한 UPnP 프록시 디바이스의 설계)

  • 김철민;진성기;한상숙;은성배
    • Proceedings of the IEEK Conference
    • /
    • 2002.06a
    • /
    • pp.129-132
    • /
    • 2002
  • We investigates the functions of UPnP protocol that would be used to provide easy and cheap access for home networking. We suggest that a proxy device may reduce the cost of establishing UPnP network if it serves as an interface between UPnP and X10 protocol. We also describe the design of UPnP proxy device and the service scenario.

  • PDF

A MAC Enhancement Technique for Quality of Service Guarantee in Wireless Local Area Networks (무선 네트워크에서 QoS 보장을 위한 MAC 향상 기법)

  • Lee, Dong-Geon;Kim, Byoung-Hoon;Tak, Sung-Woo
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.10
    • /
    • pp.1446-1459
    • /
    • 2008
  • In an infrastructure-based wireless network, an access point is used for all communications among mobile devices. However, when a mobile device moves into a dead Bone, a connectivity disruption between the mobile device and the access point occurs. Such connectivity disruption consequently leads to another connectivity disruption between the mobile device moving toward the dead zone and other wireless-enabled devices located within the area of the infrastructure-based wireless network. To cope with the connectivity disruption in the infrastructure-based wireless network the ad hoc network that dynamically forms a network without any preexisting communication infrastructure needs to be set up to provide seamless connections among mobile devices. In this paper, we propose the DNSQ-MAC (Dynamic Network State aware QoS-Medium Access Control) technique that meets the deadlines of MAC frames forwarded over hop-by-hop multipaths and guarantees the QoS performance of an ad hoc-based wireless network. Mobile devices incorporating the DNSQ-MAC technique are capable of adjusting to the new dynamic network status in order to enhance the QoS performance in the ad hoc-based wireless network. A case study which exploits the Qualnet simulator shows that the proposed DNSQ-MAC technique can guarantee the deadlines of MAC frames forwarded over hop-by-hop multipaths and enhance the QoS performance of various routing protocols and packet schedulers running on the network layer above the MAC layer.

  • PDF

The Influence of Noise Environment upon Voice and Data Transmission in the RF-CBTC System

  • Kim, Min-Seok;Lee, Sang-Hyeok;Lee, Jong-Woo
    • International Journal of Railway
    • /
    • v.3 no.2
    • /
    • pp.39-45
    • /
    • 2010
  • The RF-CBTC (Radio Frequency-Communication Based Train Control) System is a communication system in railroad systems. The communication method of RF-CBTC system is the wireless between the wayside device and on-board device. The wayside device collects its location and speed from each train and transmits the distance from the forwarding train to the speed-limit position to it. The on-board device controlling device controls the speed optimum for the train. In the case of the RF-CBTC system used in Korea, transmission frequency is 2.4 [GHz]. It is the range of ISM(Industrial Scientific and Medical equipment) band and transmission of voice and data is performed by CDMA (Code Division Multiple Access) method. So noises are made in the AWGN (Additive White Gaussian Noise) and fading environment. Currently, the SNR (Signal to Noise Ratio) is about 20 [dB], so due to bit errors made by noises, transmission of reliable information to the train is not easy. Also, in the case that two tracks are put to a single direction, it is needed that two trains transmit reliable voice and data to a wayside device. But, by noises, it is not easy that just a train transmits reliable information. In this paper, we estimated the BER (Bit Error Rate) related to the SNR of voice and data transmission in the environment such as AWGN and fading from the RF-CBTC system using the CDMA method. Also, we supposed the SNR which is required to meet the BER standard for voice and data transmission. By increasing the processing gain that is a ratio of chip transmission to voice and data transmission, we made possible voice and data transmission from maximally two trains to a wayside device, and demonstrated it by using Matlab program.

  • PDF

Design and Implementation of Remote Device Management System based on LoRa Communication (LoRa 통신기반 원격 장비 관리 시스템 설계 및 구현)

  • Kim, Dong-Hyun;Lee, Chang-Hong;Kim, Jong-Deok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.12
    • /
    • pp.1654-1661
    • /
    • 2020
  • Internet of Things(IoT) technology can remotely collect and control a sensing information of device by attaching a small communication device to equipment that does not support communication. Low-Power Wide-Area Network (LPWAN), a low-power, long-distance communication technology, was proposed to support IoT technology, and Long Range(LoRa) is representative. Various systems, including network device, can collect and control the status information of device in real time through remote access. However, when a network failure occurs, remote access and status monitoring are impossible unless there is a separate additional network. To overcome this problem, in this paper, we propose an independent remote device management system that can be easily attached to device, which monitors and controls equipment remotely using an independent network. We will design and implement the proposed system, via which we will show its practicality and expandability.

A RBAC-based Access Control Framework in OSGi Service Platform (OSGi 서비스 플랫폼에서 RBAC 기반의 사용자 접근제어 프레임워크)

  • Cho, Eun-Ae;Moon, Chang-Joo;Baik, Doo-Kwon
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.5
    • /
    • pp.405-422
    • /
    • 2007
  • Recently, according to the network environment, there are many researches for home network. Nowadays, in home network, the method that access control policy is managed for each home device by using ACL is popular, and EAM (Extranet access management) is applied as a solution. In addition, the research about secure OS is ongoing based on open operating system and the research of user authentication mechanisms for home network using home server is also in progress. However, these researches have some problems as follows; First, the transmission scope of expected access technology in home network is wide, so unauthenticated outside terminal can access the home network. Second, user is inconvenient because user need to set the necessary information for each device. Third, user privacy and convenience are not considered. OSGi provides a service platform for heterogeneous technologies in home network environment. Here, user access control is one of the core parts which should have no problems such as above items, but there are no concrete researches yet. Thus in this paper, we propose an access control policy management framework and access control operation based on RBAC for user access control in home network environment in which OSGi service platform is operated. First, we list the consideration which is not clearly mentioned in OSGi standard, and then we solve these above problems through new framework. In addition, we propose the effective and economical operation method which reduces the policy change frequency for user access control by using RBAC concept though limited resource of home gateway. Besides, in this paper, these proposed policies are defined separately as user-role assignment policy and permission-role assignment policy, and user decide their own policies. In conclusion, we provide the scheme to enhance the user convenience and to solve the privacy problem.

W 도핑된 ZnO 박막을 이용한 저항 변화 메모리 특성 연구

  • Park, So-Yeon;Song, Min-Yeong;Hong, Seok-Man;Kim, Hui-Dong;An, Ho-Myeong;Kim, Tae-Geun
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2013.02a
    • /
    • pp.410-410
    • /
    • 2013
  • Next-generation nonvolatile memory (NVM) has attracted increasing attention about emerging NVMs such as ferroelectric random access memory, phase-change random access memory, magnetic random access memory and resistance random access memory (RRAM). Previous studies have demonstrated that RRAM is promising because of its excellent properties, including simple structure, high speed and high density integration. Many research groups have reported a lot of metal oxides as resistive materials like TiO2, NiO, SrTiO3 and ZnO [1]. Among them, the ZnO-based film is one of the most promising materials for RRAM because of its good switching characteristics, reliability and high transparency [2]. However, in many studies about ZnO-based RRAMs, there was a problem to get lower current level for reducing the operating power dissipation and improving the device reliability such an endurance and an retention time of memory devices. Thus in this paper, we investigated that highly reproducible bipolar resistive switching characteristics of W doped ZnO RRAM device and it showed low resistive switching current level and large ON/OFF ratio. This may be caused by the interdiffusion of the W atoms in the ZnO film, whch serves as dopants, and leakage current would rise resulting in the lowering of current level [3]. In this work, a ZnO film and W doped ZnO film were fabricated on a Si substrate using RF magnetron sputtering from ZnO and W targets at room temperature with Ar gas ambient, and compared their current levels. Compared with the conventional ZnO-based RRAM, the W doped ZnO ReRAM device shows the reduction of reset current from ~$10^{-6}$ A to ~$10^{-9}$ A and large ON/OFF ratio of ~$10^3$ along with self-rectifying characteristic as shown in Fig. 1. In addition, we observed good endurance of $10^3$ times and retention time of $10^4$ s in the W doped ZnO ReRAM device. With this advantageous characteristics, W doped ZnO thin film device is a promising candidates for CMOS compatible and high-density RRAM devices.

  • PDF

System Performance Improvement of IEEE 802.15.3a By Using Time Slot Synchronization In MAC Layer (UWB MAC의 Time Slot 동기를 통한 시스템 성능 개선)

  • Oh Dae-Gun;Chong Jong-Wha
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.3 s.345
    • /
    • pp.84-94
    • /
    • 2006
  • In this paper, we propose the algorithm to reduce guard time of UWB MAC time slot for throughput gain. In the proposed draft by multiband ofdm alliance (MBOA), Guard time of each medium access slot (MAS) is composed of shortest inter-frame space (SIFS) and MaxDrift which is the time caused by maximum frequency offset among devices. In this paper, to reduceguard time means that we nearly eliminate MaxDrift term from guard time. Each device of a piconet computes relative frequency offset from the device initiating piconet using periodically consecutive transferred beacon frames. Each device add or subtract the calculated relative frequency offset to the estimated each MAS starting point in order to synchronize with calculated MAS starting point of the device initiating piconet. According to verification of simulations, if the frequency offset estimator is implemented with 8 decimal bit, the ratio of the wasted time to Superframe is always less than 0.0001.

An Automatic AP Connections Scheme using iBeacon (iBeacon을 이용한 AP 자동접속 방안)

  • Nam, ChoonSung;Shin, DongRyeol
    • Journal of Internet Computing and Services
    • /
    • v.18 no.2
    • /
    • pp.1-11
    • /
    • 2017
  • There are two kinds of wireless network access to a certain place by using smart devices - 1) open (anonymous) - access and 2) user-authorized access. The open-access is a non-authorization connection method which does not need to require Smart device's user authorized information. It means open-access use only user's SSID (Service Set Identifier) information to access the wireless AP devices following public wireless network standard. This access mechanism is not suitable to use all of public wireless networks because users have to get all wireless network information around them. As a result, huge data for smart devices should be one of the most critical overload problems for them. Secondly, the user-authorized access method uses wireless network information (SSID and password) chosen by the users. So, the users have to remember and use the network access information data manually whenever accessing the network. Like open-access, this access method also has the operational and inconvenient problem for the users - manually inputting access information whenever connecting to the network. To overcome this problem in both schemes, we propose two improved wireless network access methods: 1) the implementation of automatic AP connection mechanism using user-authorization and iBeacon messages, and 2) SSID registration form for public wireless networks.