• Title/Summary/Keyword: 전자정보실

Search Result 212, Processing Time 0.027 seconds

Design of Marine IoT Wireless Network for Building Fishing Gear Monitoring System (어구 모니터링 시스템 구축을 위한 해상 IoT 무선망 설계)

  • Kwak, Jae-Min;Kim, Se-Hoon;Lee, Seong-Real
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.2
    • /
    • pp.76-83
    • /
    • 2018
  • In order to prevent overusing the fishing gear and to reduce discarded fishing gear, there is a need for a technique that can efficiently transmit the information including the type and location of the fishing gear and the user's real name to the fishing boat and the control center using IoT-based communication. In order to do this, it is necessary to be able to confirm the position information of a plurality of buoys that can be identified by the base stations on the land. In this paper, in order to service the maritime IoT communication system, we calculate the link budget between the land base station and the targets on the sea to derive the service coverage. To design a marine IoT radio network for building a fishing gear monitoring system, we calculate link budget for wireless service optimization at sea for NB-IoT using 1.8 GHz frequency band and LoRa service using 900 MHz frequency band. In addition, the link budget between the land base station and buoy, the link budget between the land base station and fishing boat are calculated and the results are analyzed.

An Attack Origin Detection Mechanism in IP Traceback Using Marking Algorithm (마킹 알고리듬 기반 IP 역추적에서의 공격 근원지 발견 기법)

  • 김병룡;김수덕;김유성;김기창
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.19-26
    • /
    • 2003
  • Recently, the number of internet service companies is increasing and so is the number of malicious attackers. Damage such as distrust about credit and instability of the service by these attacks may influence us fatally as it makes companies image failing down. One of the frequent and fatal attacks is DoS(Denial-of-Service). Because the attacker performs IP spoofing for hiding his location in DoS attack it is hard to get an exact location of the attacker from source IP address only. and even if the system recovers from the attack successfully, if attack origin has not been identified, we have to consider the possibility that there may be another attack again in near future by the same attacker. This study suggests to find the attack origin through MAC address marking of the attack origin. It is based on an IP trace algorithm, called Marking Algorithm. It modifies the Martins Algorithm so that we can convey the MAC address of the intervening routers, and as a result it can trace the exact IP address of the original attacker. To improve the detection time, our algorithm also contains a technique to improve the packet arrival rate. By adjusting marking probability according to the distance from the packet origin we were able to decrease the number of needed packets to traceback the IP address.

e-Learning Classroom using Bi-directional Education Equipment (양방향 e-Learning 교육환경 구축)

  • Kim, Hyeog-Gu
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2007.04a
    • /
    • pp.271-271
    • /
    • 2007
  • 본 내용은 첨단 정보통신 기술을 이용하여 강의자 중심의 단방향 교육(Teaching) 환경을 학생 중심의 양방향 교육(Learning) 환경으로 개선하여 보다 창의적인 인재를 양성할 수 있는 교육환경 구축에 관한 내용이다. 우리나라를 포함한 OECD 국가들은 ICT활용 수업에 대한 필요성을 공감하고 교단 선진화를 위한 연구 및 지원을 다양하게 진행하고 있다. 학생들에게 지급하는 교과서를 인쇄매체 대신에 메모리 스틱, CD-ROM 및 인터넷을 통한 전자 매체로 대체하는 방안 등이 그 예이다. 따라서 학생들이 강의실에서 멀티미디어를 이용해 강의를 듣고, 과제를 풀며 정리된 내용을 발표하고 토론할 수 있는 양방향 수업환경이 요구된다. 그러나 컴퓨터를 활용한 수업을 진행할 때의 문제점이 강의내용을 학생들에게 효율적으로 전달하기가 어렵고, 학생들의 컴퓨터를 통제할 수 없기 때문에 수업을 이탈하는 경우가 발생되는 등 교육에 역효과가 초래된다. 본 내용에서 소개하는 양방향 수업진행 장비(드림랩)는 강의자가 학생들의 컴퓨터 모니터, 키보드 및 마우스를 자유로이 통제할 수 있어서 강의자의 화면과 음성을 실시간으로 선명하게 학생들에게 전달하고, 학생들의 내용을 모니터하고 제어할 수 있으며, 개인지도 및 수준별 그룹지도가 가능하다. 또한 강의자에게 개인적으로 질문을 할 수 있고, 학생들의 내용을 자신의 자리에서 전체 학생들에게 발표할 수도 있다. 드림랩은 순수 하드웨어로 구성되어 컴퓨터 기종이나 운영체제에 영향을 받지 않으며, 컴퓨터 자원과 네트워크 자원을 사용하지 않기 때문에 컴퓨터나 네트워크의 성능을 저하시키지 않는다. 또한 사용법이 간단하고 유지관리가 쉬운 장점 등이 있다. 따라서 컴퓨터를 활용한 수업진행이 원활하여 다양한 과목에 활용 가능하고, 학생들의 자발적인 수업 참여로 강의 중심 교육에서 자기 주도적 수업환경(T2L, Teaching to Learning)으로 자연스럽게 전환되어 교육의 질적 향상과 함께 창의적인 인재를 양성할 수 있을 것으로 기대된다.

  • PDF

Test of Communication Distance Measurement of Fishing Gear Automatic System Based on Private LoRa (Private LoRa 기반 어구 자동식별 시스템의 거리 측정 시험)

  • Lee, Seong-Real;Kim, Se-Hoon
    • Journal of Advanced Navigation Technology
    • /
    • v.24 no.2
    • /
    • pp.61-66
    • /
    • 2020
  • Since the ocean accounts for 70.8 percent of the earth's surface, the success of IoT technology in the marine industry is to collect information from devices placed in a wider range. LPWA is a feature with a wide range of communication and is very suitable for deployment in the ocean. In this paper, the real-sea performance distance experiment was carried out based on Private LoRa, a key technology for executing the electronic phrase real-name system. A private LoRa module based on sx1276 was developed, and Gateway was developed to transfer data received by private LoRa to the server using SKT Cat. M1. After installing gateways at 599 meters above sea level and experimenting with data transmission and reception at 25 km, 40 km and 60 km, we were able to see that the communication success rate was obtained to be 96.1%. 97.1% and 96.2% respectively.

The Development of a Mobile-based E-Bookstore system (모바일 E-Book Store System의 설계 및 구현)

  • Min, Gi-Hong;Jeon, Seung-Min;Kim, Song-Rae;Park, Dong-Won
    • The Journal of Engineering Research
    • /
    • v.6 no.1
    • /
    • pp.29-39
    • /
    • 2004
  • In the recent IT field, the biggest concerns may be Mobile environment. This means that it becomes part of our life: the Mobile is applied to the areas of teaching, studying, commercial transaction, entertainment etc. In this paper, we implemented Mobile E-BOOK bookstore using WEB, DB, and a Mobile technology. This system takes duplex from to be available in Mobile WEB environment by PDA and actuality WEB site under desk top environment. This paper have presented big possibility in terms of embodied electronic commerce based on the Mobile-based E-BOOKstore system that has not attempted yet commercially.

  • PDF

Anomaly Detection Method Based on Trajectory Classification in Surveillance Systems (감시 시스템에서 궤적 분류를 이용한 이상 탐지 방법)

  • Jeonghun Seo;Jiin Hwang;Pal Abhishek;Haeun Lee;Daesik Ko;Seokil Song
    • Journal of Platform Technology
    • /
    • v.12 no.3
    • /
    • pp.62-70
    • /
    • 2024
  • Recent surveillance systems employ multiple sensors, such as cameras and radars, to enhance the accuracy of intrusion detection. However, object recognition through camera (RGB, Thermal) sensors may not always be accurate during nighttime, in adverse weather conditions, or when the intruder is camouflaged. In such situations, it is possible to detect intruders by utilizing the trajectories of objects extracted from camera or radar sensors. This paper proposes a method to detect intruders using only trajectory information in environments where object recognition is challenging. The proposed method involves training an LSTM-Attention based trajectory classification model using normal and abnormal (intrusion, loitering) trajectory data of animals and humans. This model is then used to identify abnormal human trajectories and perform intrusion detection. Finally, the validity of the proposed method is demonstrated through experiments using real data.

  • PDF

Research on Fault Tolerant Avionics Memory Design through Multi Level Cell Flash Memory Reliability Analysis (멀티 레벨 셀 플래시 메모리 신뢰성 분석을 통한 항공 전자장비용 내결함성 메모리 설계 연구)

  • Jeong, Sang-gyu;Jun, Byung-kyu;Kim, Young-mok;Chang, In-ki
    • Journal of Advanced Navigation Technology
    • /
    • v.20 no.4
    • /
    • pp.321-328
    • /
    • 2016
  • Typical MLC NAND flash devices are considered less reliable than SLC NAND flash devices. Although raw bit error rate (RBER) of MLC flash had been considered approximately 1000times or more higher than that of SLC flash, recent research conducted on Google's data center shows that it is much lower than such expectation. Based on the research, we devised In Drive Data Duplication (IDDD) scheme that efficiently exploit MLC flash's sufficient capacity to improve its data reliability without structural complexity increment using SSD intrinsic firmware layer, and showed the data reliability expectation of MLC flash could be significantly higher than that of SLC flash from measured and calculated error rates. Even though RBER of SLC flash was lower than that of MLC flash in 44 out of 48 cases we studied, applying IDDD scheme, RBER of MLC flash was became lower than that of SLC in all 48 cases and uncorrectable bit error rate (UBER) of MLC flash was became lower than that of SLC flash in 45 out of 48 cases.

The Aspectual Theory of the Cybercharacter (사이버캐릭터의 위상론)

  • 이선교
    • Archives of design research
    • /
    • v.12 no.4
    • /
    • pp.182-190
    • /
    • 1999
  • There has been the rapid change of paradigm with the overflow of terms related to computers such as information, digital, cyber, virtual world and the change of time concept on the ground that it is common to change the world into virtual time. This study is about cybercharacters working in air-broadcasting with rapidly-developing internet, The cybercharacters including 3D animation developed from 2D animation are know to be manufactured with use of electronic mediun and computers and to exist in electronics. Though the emergence of the cybercharacters has a lot of gflnetic roots according to their objectives, they have in common that they are made by 3D graphics and they work in the virtual space, The great traits of the cybercharaters lie in the extension of interfacial function and ecological growth. In the cyberspace the interface, the meeting point between a computer and its users is the most important, The cybercharacters as medium providing new ruman interface become effective with growing interest in virtual reality, The cybercharacters also keep the ecological traits, They can also bring about added value with infusion of image and development of the network, These cybercharacters can also play the important parts in the continually developing cyberspace, The successful birth of the cybercharacter are based on, the technological power. assistance of fund and the ctrltural background, The information-entertainment of the cybercharacters functions well with the accompinimene of these three things, The cybercharacters can make a subject which keeps single issue as a central point of the virtual realty, The cybercharacters can also be connected with equity of "Korean knowledge information society" in the cultural rule of the internet and sociocul tural identity, identity.

  • PDF

A Study on Determinants of VR Video Content Popularity (VR 영상 조회수 결정요인 연구)

  • Soojeong Kim;Chanhee Kwak;Minhyung Lee;Junyeong Lee;Heeseok Lee
    • Information Systems Review
    • /
    • v.22 no.2
    • /
    • pp.25-41
    • /
    • 2020
  • Along with the expectation about 5G network commercialization, interests in realistic and immersive media industries such as virtual reality (VR) are increasing. However, most of studies on VR still focus on video technologies instead of factors for popularity and consumption. Thus, the main objective of this research is to identify meaningful factors, which affect the view counts of VR videos and to provide business implications of the content strategies for VR video creators and service providers. Using a regression analysis with 700 VR videos, this study tries to find major factors that affect the view counts of VR videos. As a result, user assessment factors such as number of likes and sicknesses have a strong influence on the view counts. In addition, the result shows that both general information factors (video length and age) and content characteristic factors (series, one source multi use (OSMU), and category) are all influential factors. The findings suggest that it is necessary to support recommendation and curation based on user assessments for increasing popularity and diffusion of VR video streaming.

A Framework of Recognition and Tracking for Underwater Objects based on Sonar Images : Part 2. Design and Implementation of Realtime Framework using Probabilistic Candidate Selection (소나 영상 기반의 수중 물체 인식과 추종을 위한 구조 : Part 2. 확률적 후보 선택을 통한 실시간 프레임워크의 설계 및 구현)

  • Lee, Yeongjun;Kim, Tae Gyun;Lee, Jihong;Choi, Hyun-Taek
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.3
    • /
    • pp.164-173
    • /
    • 2014
  • In underwater robotics, vision would be a key element for recognition in underwater environments. However, due to turbidity an underwater optical camera is rarely available. An underwater imaging sonar, as an alternative, delivers low quality sonar images which are not stable and accurate enough to find out natural objects by image processing. For this, artificial landmarks based on the characteristics of ultrasonic waves and their recognition method by a shape matrix transformation were proposed and were proven in Part 1. But, this is not working properly in undulating and dynamically noisy sea-bottom. To solve this, we propose a framework providing a selection phase of likelihood candidates, a selection phase for final candidates, recognition phase and tracking phase in sequence images, where a particle filter based selection mechanism to eliminate fake candidates and a mean shift based tracking algorithm are also proposed. All 4 steps are running in parallel and real-time processing. The proposed framework is flexible to add and to modify internal algorithms. A pool test and sea trial are carried out to prove the performance, and detail analysis of experimental results are done. Information is obtained from tracking phase such as relative distance, bearing will be expected to be used for control and navigation of underwater robots.