• Title/Summary/Keyword: 도움노드

Search Result 174, Processing Time 0.021 seconds

Development of ROM Measurement Device capable of IoT-based Real-time Monitoring for Rehabilitation Patients (재활환자를 위한 IoT 기반의 실시간 모니터링이 가능한 ROM 측정 장치 개발)

  • Kang, Min-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.4
    • /
    • pp.111-116
    • /
    • 2018
  • In this thesis, the range of motion of the joint was measured using a flexible sensor without using a goniometer, and the measured values were transferred to a smart device. Current range of joint motion measurement is measured by a person using a goniometer. Since the method of measuring by a person is different according to the measuring method and position of the measuring person, it is difficult to make consistent measurement, and an error may occur. The sensor for measurement is a flexible sensor that measures the resistance value that changes according to the movement of the joint. The sensed value can be transmitted to the smart device wirelessly through the ROM sensor node. Also, the sensed analog values were converted to digital values using an ADC. The converted value can be transmitted to the smart device wirelessly through the sensor node. The developed ROM measuring device can perform more consistent measurement than the measurement using general articulator and real time monitoring by interlocking with smart device, so that rapid diagnosis according to the movement of the joint can help the patient's rapid treatment and rehabilitation medical advancement will be.

A Secure Tunnel Broker for the IPv6 based Wireless Ad-hoc Network (IPv6 기반 이동 Ad-hoc 네트워크를 위한 안전한 터널 브로커)

  • Yang Jong-Won;Kim Won-Joo;Seo Chang-Ho;Kim Seok-Woo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.41-49
    • /
    • 2006
  • Wireless AD-hoc network can construct a network itself without any arbitrator. Therefore, it is difficult to make preparation for disguised assault from an illegal node, and because lots of packets from disguised assault spread over whole network, it influences the network usability and livability. This thesis proposed a safe IPv6 tunnel broker (TB) based on TSP (Tunnel Setup Protocol) to improve safety of the wireless Ad-hoc network, and to solve security problem of a tunnel broker that makes a linkage IPv4 and IPv6. To communicate between client and the tunnel broker, proposed method does not base on HTTP, but S-HTTP (Secure-HTTP) and it uses encryption/decryption to send and receive XML document. Finally, this method encrypts (decrypts) important information by applying IPSec between client and TS (Tunnel Server).

Improved Throughput Scaling of Large Ultra-Wide Band Ad Hoc Networks (거대 초 광 대역 애드 혹 네트워크에서의 개선된 용량 스케일링)

  • Shin, Won-Yong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.2
    • /
    • pp.303-310
    • /
    • 2014
  • We show improved throughput scaling laws for an ultra-wide band (UWB) ad hoc network, in which n wireless nodes are randomly located. First, we consider the case where a modified hierarchical cooperation (HC) strategy is used. Then, in a dense network of unit area, our result indicates that the derived throughput scaling depends on the path-loss exponent ${\alpha}$ for certain operating regimes due to the power-limited characteristics. It also turns out that the HC protocol is dominant for 2 < ${\alpha}$ < 3 while using the nearest multihop (MH) routing leads to a higher throughput for ${\alpha}{\geq}3$. Second, the impact and benefits of infrastructure support are analyzed, where m base stations (BSs) are regularly placed in UWB networks. In this case, the derived throughput scaling depends on ${\alpha}$ due to the power-limited characteristics for all operating regimes. Furthermore, it is shown that the total throughput scales linearly with parameter m as m is larger than a certain level. Hence, the use of either HC or infrastructure is helpful in improving the throughput of UWB networks in some conditions.

The Analysis of Crypto Communication Relay Effect in the Security Framework Technique of Network Centric Warfare Environment (NCW환경의 보안 프레임워크 기술에서 암호통신 중계영향 분석)

  • Hong, Jin-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.4
    • /
    • pp.788-794
    • /
    • 2007
  • The policy of US DoD is moving towards implementation of Network Centric Warfare(NCW) concepts. NCW is commonly described as the integration and synchronization of four key interdependent elements such as command and control, sensor system, engagement systems and the network. Therefore the military policy of Korea military is needed to access and examine the policy of NCW communication environment and crypto communication, which is able to apply it. In this case study, We are reviewed the security framework of the concept of network centric warfare in the centering around the US. It is introduced the core technology in the network centric warfare, and it is reviewed the security framework such as, the requirements of security, the characteristics security of global information grid, joint tactical radion system, net centric enterprise services, transformational communication satellite, in the basis of core technology, and analysis the effect of crypto communication relay between command node and surbornate node in NCW environment. This report support the assistance, which is considered the elements of surrounding effects in the varied crypto communication research area of NCW.

  • PDF

Development of the software transforming a transportation analysis network from GIS (GIS로부터 교통분석용 네트워크를 생성하는 소프트웨어의 개발)

  • 성낙문;조범철;이창렬
    • Journal of Korean Society of Transportation
    • /
    • v.20 no.7
    • /
    • pp.69-76
    • /
    • 2002
  • In conducting studies related to the national base networks, it is very important to construct a simulation network. This research provides an algorithm to construct the simulation network from the digital transportation map which is constructed based on the National Geographic Information System(NGIS). The algorithm consists of three functions(extraction of networks from transportation digital map, transform of the derived network into one suitable to transportation simulation model, and inspection of errors in the network). The direct derivation of a simulation network from GIS enables to enhance the reliability of an analysis related to a transportation facility investment as well as to reduce cost and time. In this research, Emme/2 which is generally accepted transportation planning fields is adapted for the target system. However, this algorithm will be extended to other simulation models such as Satong-Paldal which is the only transportation simulation model developed in Korea, and Tranplan in the near future.

An Energy-Efficient Self-organizing Hierarchical Sensor Network Model for Vehicle Approach Warning Systems (VAWS) (차량 접근 경고 시스템을 위한 에너지 효율적 자가 구성 센서 네트워크 모델)

  • Shin, Hong-Hyul;Lee, Hyuk-Joon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.4
    • /
    • pp.118-129
    • /
    • 2008
  • This paper describes an IEEE 802.15.4-based hierarchical sensor network model for a VAWS(Vehicle Approach Warning System) which provides the drivers of vehicles approaching a sharp turn with the information about vehicles approaching the same turn from the opposite end. In the proposed network model, a tree-structured topology, that can prolong the lifetime of network is formed in a self-organizing manner by a topology control protocol. A simple but efficient routing protocol, that creates and maintains routing tables based on the network topology organized by the topology control protocol, transports data packets generated from the sensor nodes to the base station which then forwards it to a display processor. These protocols are designed as a network layer extension to the IEEE 802.15.4 MAC. In the simulation, which models a scenario with a sharp turn, it is shown that the proposed network model achieves a high-level performance in terms of both energy efficiency and throughput simultaneously.

  • PDF

The Blockchain based Undeniable Multi-Signature Scheme for Protection of Multiple Authorship on Wisdom Contents (지혜콘텐츠 공동저작권 보호에 적합한 블록체인 기반 부인봉쇄 다중서명 기법)

  • Yun, Sunghyun
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.2
    • /
    • pp.7-12
    • /
    • 2021
  • Wisdom Contents are created with experiences and ideas of multiple authors, and consumed in Internet based Social Network Services that are not subjected to regional restrictions. Existing copyright management systems are designed for the protection of professional authors' rights, and effective in domestic area. On the contrary, the blockchain protocol is subjected to the service and the block is added by the consensus of participating nodes. If the data is stored to the blockchain, it cannot be modified or deleted. In this paper, we propose the blockchain based undeniable multi-signature scheme for the protection of multiple authorship on Wizdom Contents. The proposed scheme is consisted of co-authors' common public key generation, multi-signature generation and verification protocols. In the undeniable signature scheme, the signature cannot be verified without help of the signer. The proposed scheme is best suited to the contents purchase protocol. All co-authors cannot deny the fairness of the automated profit distribution through the verification of multiple authorship on Wizdom Contents.

Blockchain-based lightweight consensus algorithm (L-PBFT) for building trust networks in IoT environment (IoT 환경에서 신뢰 네트워크 구축을 위한 블록체인 기반의 경량 합의 알고리즘(L-PBFT))

  • Park, Jung-Oh
    • Journal of Industrial Convergence
    • /
    • v.20 no.6
    • /
    • pp.37-45
    • /
    • 2022
  • With the development of the Internet of Things (IoT), related network infrastructures require new technologies to protect against threats such as external hacking. This study proposes an L-PBFT consensus algorithm that can protect IoT networks based on a blockchain consensus algorithm. We designed a blockchain (private) model suitable for small networks, tested processing performance for ultra-small/low-power IoT devices, and verified stability. As a result of performance analysis, L-PBFT proved that at least the number of nodes complies with the operation of the consensus algorithm(minimum 14%, maximum 29%) and establishes a trust network(separation of secure channels) different from existing security protocols. This study is a 4th industry convergence research and will be a foundation technology that will help develop IoT device security products in the future.

Study on Distributed Ledger Technology using Thing-user Group Management of Network of Everything (만물네트워크의 사물유저 그룹 관리 기반의 분산원장 기술에 대한 연구)

  • Kim, Suyeon;Kahng, Hyun Kook
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.77-85
    • /
    • 2020
  • In this paper, We studied the operation of distributed ledger technology used as a core technology for smart contracts and the components of distributed ledger technology. As a solution applying the entity of distributed ledger technology to NoE, we proposed the protocol of the distributed ledger technology using the thing user social group management function of NoE protocols being standardized in ISO/IEC JTC1 SC6. The management function of things user social group in NoE provides stable protocol functions and data transmission management, and provides group management functions such as member discovery function and data transmission channel management function. It is expected to be useful for member management functions of distributed ledger nodes by providing a service that apply the component of distributed ledger technology. We intend to actively reflect this technology in the future network functions of ISO/IEC JTC1 SC6, which is undergoing standardization.

Air Pollution Risk Prediction System Utilizing Deep Learning Focused on Cardiovascular Disease

  • Lee, Jisu;Moon, Yoo-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.12
    • /
    • pp.267-275
    • /
    • 2022
  • This paper proposed a Deep Neural Network Model system utilizing Keras for predicting air pollution risk of the cardiovascular disease through the effect of each component of air on the harmful virus using past air information, with analyzing 18,000 data sets of the Seoul Open Data Plaza. By experiments, the model performed tasks with higher accuracy when using methods of sigmoid, binary_crossentropy, adam, and accuracy through 3 hidden layers with each 8 nodes, resulting in 88.92% accuracy. It is meaningful in that any respiratory disease can utilize the risk prediction system if there are data on the effects of each component of air pollution and fine dust on oil-borne diseases. It can be further developed to provide useful information to companies that produce masks and air purification products.