• Title/Summary/Keyword: 산업용 네트워크

Search Result 255, Processing Time 0.028 seconds

Implementation of Integration Module of Vision and Motion Controller using Zynq (Zynq를 이용한 비전 및 모션 컨트롤러 통합모듈 구현)

  • Moon, Yong-Seon;Roh, Sang-Hyun;Lee, Young-Pil
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.1
    • /
    • pp.159-164
    • /
    • 2013
  • Recently the solution integrated of vision and motion controller which are important element in automatiomn system has been many developed. However typically such a solutions has a many case that integrated vision processing and motion control into network or organized two chip solution on one module. We implement one chip solution integrated into vision and motion controller using Zynq-7000 that is developed recently as extended processing platform. We also apply EtherCAT to motion control that is industrial Ethernet protocol which have compatibility for open standardization Ethernet in order to control of motion because EtherCAT has a secure to realtime control and can treat massive data.

Analysis of Tendencies on WLAN Security Technology (무선랜 보안 기술 및 운영 현황 분석)

  • Kim, Su-Jin;Seo, Jong-Kyun;Han, Ki-Cheon;Jung, Hoe-kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.685-687
    • /
    • 2013
  • Today, as wireless communications devices such as laptops, smart phones are generalized, wireless LAN has been widely installed in the corporate office conference rooms, industrial warehouses, Internet-ready classrooms, and even in a coffee shop. Though a wired network can be accessed and attacked only by the physical penetration, the wireless network which can be accessed anywhere within the reach of anyone has relative vulnerability by unauthorized users' attack. To defend these vulnerabilities, the introduction of WIDS / WIPS is required. In this paper, we recognize the limitations of WLAN security technology, review the current technology trends and propose the solutions in the future security problems.

  • PDF

Development of a Multimedia Streaming System using MEP Based on MOST150 for Premium Express Buses (MOST150기반 MEP를 이용한 프리미엄 고속버스용 멀티미디어 스트리밍 시스템 개발)

  • Lee, Jae-kyu;Lee, Sang-yub;Cho, Hyun-joong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.5
    • /
    • pp.1049-1057
    • /
    • 2017
  • In-vehicle multimedia systems are one of the most important factors in the automotive industry. Especially, multimedia systems are more important in advanced commercial vehicles such as premium express buses. In this paper, we proposed a multimedia streaming system architecture using MEP(MOST Ethernet Packets) for premium express buses based on MOST150. We have designed and implemented the prototype of proposed multimedia streaming system. We have designed a board based on i.MX6 to operate a proposed multimedia streaming system. The software has designed a multimedia system for premium express buses based on Android which is an open source platform. MOST(Media Oriented Systems Transport) is a high-speed multimedia network technology for in-vehicle multimedia system. The MOST network is able to manage up to 64 devices and ring topology is used basically. In addition, the MOST Network meets EMI(Electro-Magnetic Interference)/ EMC(Electro-Magnetic Compatibility) requirements because it uses plastic optical fibers(POF).

A Insight Study on Keyword of 4th Industrial Revolution Utilizing Big Data (빅데이터 분석을 활용한 4차 산업혁명 키워드에 대한 통찰)

  • Nam, Soo-Tai;Jin, Chan-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.153-155
    • /
    • 2017
  • 빅데이터 분석은 데이터베이스에 잘 정리된 정형 데이터뿐 아니라 인터넷, 소셜 네트워크 서비스, 모바일 환경에서 생성되는 웹 문서, 이메일, 소셜 데이터 등 비정형 데이터를 효과적으로 분석하는 기술을 말한다. 대부분의 빅데이터 분석 기술 방법들은 기존 통계학과 전산학에서 사용되던 데이터 마이닝, 기계 학습, 자연 언어 처리, 패턴 인식 등이 이에 해당된다. 글로벌 리서치 기관들은 빅데이터를 2011년 이래로 최근 가장 주목받는 신기술로 지목해오고 있다. 따라서 대부분의 산업에서 기업들은 빅데이터의 적용을 통해 가치 창출을 위한 노력을 기하고 있다. 본 연구에서는 다음 커뮤니케이션의 빅데이터 분석도구인 소셜 매트릭스를 활용하여 2017년 5월, 1개월 시점을 설정하고 "4차 산업혁명" 키워드에 대한 소비자들의 인식들을 살펴보았다. 빅데이터 분석의 결과는 다음과 같다. 첫째, 4차 산업혁명 키워드에 대한 연관 검색어 1위는 "후보"가 빈도수(7,613)인 것으로 나타났다. 둘째, 연관 검색어 2위는 "안철수"가 빈도수(7,297), 3위는 "문재인"이 빈도수(5,183)로 각각 나타났다. 다음으로 "4차 산업혁명" 키워드에 대한 검색어 긍정적 여론 빈도수 1위는 새로운(895)으로 나타났고, 부정적 여론 빈도수 1위는 위기(516)가 차지하였다. 이러한 결과 분석결과를 바탕으로 연구의 한계와 시사점을 제시하고자 한다.

  • PDF

Topic Modeling on Research Trends of Industry 4.0 Using Text Mining (텍스트 마이닝을 이용한 4차 산업 연구 동향 토픽 모델링)

  • Cho, Kyoung Won;Woo, Young Woon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.7
    • /
    • pp.764-770
    • /
    • 2019
  • In this research, text mining techniques were used to analyze the papers related to the "4th Industry". In order to analyze the papers, total of 685 papers were collected by searching with the keyword "4th industry" in Korea Journal Index(KCI) from 2016 to 2019. We used Python-based web scraping program to collect papers and use topic modeling techniques based on LDA algorithm implemented in R language for data analysis. As a result of perplexity analysis on the collected papers, nine topics were determined optimally and nine representative topics of the collected papers were extracted using the Gibbs sampling method. As a result, it was confirmed that artificial intelligence, big data, Internet of things(IoT), digital, network and so on have emerged as the major technologies, and it was confirmed that research has been conducted on the changes due to the major technologies in various fields related to the 4th industry such as industry, government, education field, and job.

The MANET based Distributed Control Communications for Remote Controlled drones (원거리 드론 제어를 위한 MANET기반의 분산제어 통신)

  • Jeong, Seong Soon;Kwon, Ki Mun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.5
    • /
    • pp.168-173
    • /
    • 2016
  • The latest drone market is evolving rapidly. The commercial drone market developed rapid growth. Up to now, one controller had controlled the only one drone. So Remote control and information collection of the remote drone was impossible. Therefore we suggests drone intercommunication distributed network based on the MANET. Subsequently classified according to the characteristics of the drone intercommunication distributed network(speed, distance, applications) and chose a MANET routing protocol in accordance with the classification result.

A study on network based long distance data interworking system using multiple unmanned vehicle (다수 무인이동체를 이용한 네트워크 기반의 원거리 데이터 연동 시스템에 관한 연구)

  • Son, Hyeon-seo;Choi, Sung-chan;Park, Jong-hong;Jung, Sung-wook;Ahn, Il-yeop
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.605-607
    • /
    • 2022
  • As the industry using unmanned vehicles expands, scenarios in which multiple unmanned vehicles are applied to various fields are attracting attention. One unmanned vehicle has limitations in operating time and range, and by using multiple unmanned vehicles, it has the advantage of providing services in a much wider range and shortening the operating time. Taking advantage of these advantages, recent attempts are being made to apply a number of unmanned mobile vehicles to fields such as disasters and broadcasting beyond military use. In this paper, we present a scenario for a data interworking system that can send and receive data from a distance based on a network using multiple unmanned vehicles.

  • PDF

Implementation of higo-speed vehicle state verification system using wireless network (무선 네트워크를 이용한 고속 차량 상태 확인 시스템 구현)

  • Song, Min-Seob;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.407-410
    • /
    • 2012
  • Recently, wireless network services are widely used, depending on the development of wireless network module technologies and the utilization gradually expanded, and thus is a trend that appears a lot of IT convergence industries. For this study, the OBD-II communication to Import your vehicle information, and other external devices in high-speed driving condition of the vehicle to verify the information system was developed to transfer data to an external server. From various sensors inside the vehicle using the OBD-II connector easily convert all users to read the information, then, Sent to the external server using the wireless network module, high-speed vehicle status check system was implemented. It was to test the performance of the system was developed using the actual circuit in a high-speed road racing vehicles. Transfer data generated from high-speed driving vehicles through the OBD-II scanner and check the status of a high-speed vehicle system was confirmed that this data is normally received. In the future, these new cars convergence of IT technology will grow as a new field of research.

  • PDF

Security Threats Analysis and Security Requirement for Industrial Wireless Protocols : ISA 100.11a and WirelessHART (ISA 100.11a 및 WirelessHART 기반 보안위협 식별 및 보안요구사항 도출 연구)

  • Jeong, Jae-Han;Kwon, Sung-Moon;Shon, Tae-Shik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1063-1075
    • /
    • 2019
  • In recent years, industrial automation has been established and WISN (Wireless Industrial Sensor Network) has been introduced for efficient system management. By introducing WISN, many engineering costs have been reduced and process processors have been optimized. And communication flow using wireless is increasing. An empirical study on industrial wireless sensor networks is actively conducted, but there are few security studies on them and they are exposed to such threats. If there is a problem with the standard of the wireless communication protocol itself, the device that is certified according to the standard may also be subject to security threats including problems. We analyze security functions and threats of ISA 100.11a and WirelessHART protocol stack based on standards. Procedures for distributing the security key are not provided or it is vulnerable using the Global Data Link key when the device enters the network. This paper presents the problems of the standard itself and presents the security requirements accordingly.

Comparison of Unplugged Activities at Home and Abroad using Semantic Network Analysis (시맨틱 네트워크 분석을 이용한 국내외 언플러그드 활동 관련 연구 비교)

  • Kang, Doo Bong
    • The Journal of Korean Association of Computer Education
    • /
    • v.22 no.4
    • /
    • pp.21-34
    • /
    • 2019
  • SW education is being implemented in all the school due to the application of the 2015 Curriculum. The purpose of SW education is to improve Computational Thinking by using Unplugged Activities, Educational Programming Language, and Physical Computing. Among them, 73 domestic and 85 overseas researches related to 'Unplugged Activities' were compared and analyzed using semantic network analysis techniques. As a result, the research on 'Unplugged Activities' has been started from 1998, and the research has started in Korea since 2006. As the CT is recognized as a core competence for the future society in line with the 4th Industrial Revolution, researches have been rapidly increasing in both the domestic and overseas countries since 2016. In Korean studies, it was analyzed that many main words related to the elemental factors such as 'unplugged activity', 'robot utilization', 'educational programming language' were found. This suggests that future research should move toward research for the promotion of 'CT' which is the purpose of computer science.