• Title, Summary, Keyword: smart sensor network

Search Result 469, Processing Time 0.035 seconds

The Smart Electronic Tagging System for Sexual Offenses Prevention Context-Aware Services in Extreme Situations such as Location Unrecognized (위치인식 불가의 극한상황에서 성범죄 예방 상황인지 서비스를 위한 스마트 전자발찌 시스템)

  • Lee, Gil-Yong;Park, Soo-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.11
    • /
    • pp.118-131
    • /
    • 2012
  • The existing electronic tagging system traces the location of a sex offender through communicating with GPS satellites and mobile phone base stations in order to prevent repeated crimes. However, the GPS satellite communication method does not work well in the interiors of downtown buildings or on the subways where it is difficult to receive satellite signals. In such cases, the location can be traced through communication with mobile phone base stations. But the distance between mobile phone base stations is several hundred meters, and as a result the margin of error for location tracing can be maximum of 2km in accuracy reduction. Take for example, if a kindergarten is located on the 2nd floor and a coffee shop and the sex offender are located on the 3rd floor in a 5-story building that is downtown, the existing electronic tagging system cannot trace the location of the sex offender as the GPS satellite communication does not work in the interior of the building and the exact floor that the sex offender is located on cannot be recognized through communication with mobile phone base stations. This occurrence is a big problem for the existing electronic tagging system, which is based on position recognition. Therefore, this study suggests a smart electronic tagging system that can monitor sex offenders by using a Ubiquitous Sensor Network in such extreme situations where position recognition is not possible.

Smart Device based ECG Sensing IoT Applications (스마트 디바이스 기반 ECG 감지 IoT 응용 서비스에 관한 연구)

  • Mariappan, Vinayagam;Lee, Seungyoun;Lee, Junghoon;Lee, Juyoung;Cha, Jaesang
    • Journal of Satellite, Information and Communications
    • /
    • v.11 no.3
    • /
    • pp.18-23
    • /
    • 2016
  • Internet of things (IoT) is revolutionizing in the patient-Centered medical monitoring and management by authorizing the Smartphone application and data analysis with medical centers. The network connectivity is basic requirement to collect the observed human beings' health information from Smartphone to monitor the health from IoT medical devices in personal healthcare. The IoT environment built in Smartphone is very effective and does not demand infrastructure. This paper presents the smart phone deployed personal IoT architecture for Non-Invasive ECG Capturing. The adaptable IoT medical device cum Gateway is used for personal healthcare with big data storage on cloud configuration. In this approach, the Smartphone camera based imaging technique used to extract the personal ECG waveform and forward it to the cloud based big data storage connectivity using IoT architecture. Elaborated algorithm allows for efficient ECG registration directly from face image captured from Smartphone or Tablet camera. The profound technique may have an exceptional value in monitoring personal healthcare after adequate enhancements are introduced.

Research on Communication and The Operating of Server System for Vehicle Diagnosis and Monitoring (차량진단 및 모니터링을 위한 통신과 서버시스템 운용에 관한 연구)

  • Ryoo, Hee-Soo;Won, Yong-Gwan;Park, Kwon-Chul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.6
    • /
    • pp.41-50
    • /
    • 2011
  • This article is concerned with the technology to provide car driver the car's status which are composed of car trouble code in car engine and many sensors. In addition, it installs vehicle diagnostic programs on wireless communication's portable device, for example, Smart phone, PDA, PMP, UMPC. As a result, this is to provide car manager with many information of car sensors when we go to car maintenance. it can monitor relevant information on vehicle by portable device in real time, alert drivers with specific messages and also enable them to address abnormalities immediately. Moreover, the technology could help the drivers who perhaps don't know very well about their vehicles to drive safely and economically as well; the reason is because the whole system is composed of just Vehicle-information collecting device and personal wireless communication's portables and transfers the relating data to server computers through wireless network in order to handle information on vehicles. This technology make us monitor vehicle's running, failure and disorder by using wireless communication's portable device. Finally, this study system is composed of a lot of application to display us the car's status which get car's inner sensor information while driving a car.

Entity Authentication Scheme for Secure WEB of Things Applications (안전한 WEB of Things 응용을 위한 개체 인증 기술)

  • Park, Jiye;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.5
    • /
    • pp.394-400
    • /
    • 2013
  • WoT (Web of Things) was proposed to realize intelligent thing to thing communications using WEB standard technology. It is difficult to adapt security protocols suited for existing Internet communications into WoT directly because WoT includes LLN(Low-power, Lossy Network) and resource constrained sensor devices. Recently, IETF standard group propose to use DTLS protocol for supporting security services in WoT environments. However, DTLS protocol is not an efficient solution for supporting end to end security in WoT since it introduces complex handshaking procedures and high communication overheads. We, therefore, divide WoT environment into two areas- one is DTLS enabled area and the other is an area using lightweight security scheme in order to improve them. Then we propose a mutual authentication scheme and a session key distribution scheme for the second area. The proposed system utilizes a smart device as a mobile gateway and WoT proxy. In the proposed authentication scheme, we modify the ISO 9798 standard to reduce both communication overhead and computing time of cryptographic primitives. In addition, our scheme is able to defend against replay attacks, spoofing attacks, select plaintext/ciphertext attacks, and DoS attacks, etc.

T-Cache: a Fast Cache Manager for Pipeline Time-Series Data (T-Cache: 시계열 배관 데이타를 위한 고성능 캐시 관리자)

  • Shin, Je-Yong;Lee, Jin-Soo;Kim, Won-Sik;Kim, Seon-Hyo;Yoon, Min-A;Han, Wook-Shin;Jung, Soon-Ki;Park, Se-Young
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.5
    • /
    • pp.293-299
    • /
    • 2007
  • Intelligent pipeline inspection gauges (PIGs) are inspection vehicles that move along within a (gas or oil) pipeline and acquire signals (also called sensor data) from their surrounding rings of sensors. By analyzing the signals captured in intelligent PIGs, we can detect pipeline defects, such as holes and curvatures and other potential causes of gas explosions. There are two major data access patterns apparent when an analyzer accesses the pipeline signal data. The first is a sequential pattern where an analyst reads the sensor data one time only in a sequential fashion. The second is the repetitive pattern where an analyzer repeatedly reads the signal data within a fixed range; this is the dominant pattern in analyzing the signal data. The existing PIG software reads signal data directly from the server at every user#s request, requiring network transfer and disk access cost. It works well only for the sequential pattern, but not for the more dominant repetitive pattern. This problem becomes very serious in a client/server environment where several analysts analyze the signal data concurrently. To tackle this problem, we devise a fast in-memory cache manager, called T-Cache, by considering pipeline sensor data as multiple time-series data and by efficiently caching the time-series data at T-Cache. To the best of the authors# knowledge, this is the first research on caching pipeline signals on the client-side. We propose a new concept of the signal cache line as a caching unit, which is a set of time-series signal data for a fixed distance. We also provide the various data structures including smart cursors and algorithms used in T-Cache. Experimental results show that T-Cache performs much better for the repetitive pattern in terms of disk I/Os and the elapsed time. Even with the sequential pattern, T-Cache shows almost the same performance as a system that does not use any caching, indicating the caching overhead in T-Cache is negligible.

Research on Light Application System for the Dynamic Moving Effect of The Design on Porcelain (도자기 표면의 문양을 역동적으로 움직이는 효과를 갖는 광응용 시스템연구)

  • Ryoo, Hee Soo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.11
    • /
    • pp.205-210
    • /
    • 2014
  • This is concerned with the technology to display the design on Porcelain and adjust malfunction for moving effect and light intensity by curator. More precisely, the technology makes it possible that the porcelain is connected to Light module which is the device for controlling light emission and rotating rolling plate, etc that are connected to LED light module, optical fiber and controller that is for scenario from the given storytelling. In addition, with a WiFi portable device (Smart-phone, other mobile device). equipped with a scenario programs, information for operation, failure and malfunction can be obtained and analyzed in real-time, and menu color and alarm is alerted when the displaying design is in abnormal status, which makes the early reactions to the status. Furthermore, the collected data can be sent through WiFi network to the device and PC managed by the curator specialized in managing the design on the Porcelain, thus the technology could help the curator who have less knowledge about moving pattern on the Porcelain. There is always a possibility of malfunction due to various condition that are caused by wring-harness when modules are wired-connected. In this research, in order to overcome this problem, we propose a system configuration that can do monitoring and diagnosis with a device for collecting data from LED control module, Light emission sensor and a personal WiFi device. Also, we performed connection between optical Fiber and LED and interlock for the system defined by the definition for information and storytelling scenario.

A Study of Monitoring and Operation for PEM Water Electrolysis and PEM Fuel Cell Through the Convergence of IoT in Smart Energy Campus Microgrid (스마트에너지캠퍼스 마이크로그리드에서 사물인터넷 융합 PEM 전기분해와 PEM 연료전지 모니터링 및 운영 연구)

  • Chang, Hui Il;Thapa, Prakash
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.6
    • /
    • pp.13-21
    • /
    • 2016
  • In this paper we are trying to explain the effect of temperature on polymer membrane exchange water electrolysis (PEMWE) and polymer membrane exchange fuel cell (PEMFC) simultaneously. A comprehensive studying approach is proposed and applied to a 50Watt PEM fuel cell system in the laboratory. The monitoring process is carried out through wireless LoRa node and gateway network concept. In this experiment, temperature sensor measure the temperature level of electrolyzer, fuel cell stack and $H_2$ storage tank and transmitted the measured value of data to the management control unit (MCU) through the individual node and gateway of each PEMWE and PEMFC. In MCU we can monitor the temperature and its effect on the performance of the fuel cell system and control it to keep the lower heating value to increase the efficiency of the fuel cell system. And we also proposed a mathematical model and operation algorithm for PEMWE and PEMFC. In this model, PEMWE gives higher efficiency at lower heating level where as PEMFC gives higher efficiency at higher heating value. In order to increase the performance of the fuel cell system, we are going to monitor, communicate and control the temperature and pressure of PEMWE and PEMFC by installing these systems in a building of university which is located in the southern part of Korea.

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

Requirement Analysis for Agricultural Meteorology Information Service Systems based on the Fourth Industrial Revolution Technologies (4차 산업혁명 기술에 기반한 농업 기상 정보 시스템의 요구도 분석)

  • Kim, Kwang Soo;Yoo, Byoung Hyun;Hyun, Shinwoo;Kang, DaeGyoon
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.21 no.3
    • /
    • pp.175-186
    • /
    • 2019
  • Efforts have been made to introduce the climate smart agriculture (CSA) for adaptation to future climate conditions, which would require collection and management of site specific meteorological data. The objectives of this study were to identify requirements for construction of agricultural meteorology information service system (AMISS) using technologies that lead to the fourth industrial revolution, e.g., internet of things (IoT), artificial intelligence, and cloud computing. The IoT sensors that require low cost and low operating current would be useful to organize wireless sensor network (WSN) for collection and analysis of weather measurement data, which would help assessment of productivity for an agricultural ecosystem. It would be recommended to extend the spatial extent of the WSN to a rural community, which would benefit a greater number of farms. It is preferred to create the big data for agricultural meteorology in order to produce and evaluate the site specific data in rural areas. The digital climate map can be improved using artificial intelligence such as deep neural networks. Furthermore, cloud computing and fog computing would help reduce costs and enhance the user experience of the AMISS. In addition, it would be advantageous to combine environmental data and farm management data, e.g., price data for the produce of interest. It would also be needed to develop a mobile application whose user interface could meet the needs of stakeholders. These fourth industrial revolution technologies would facilitate the development of the AMISS and wide application of the CSA.