• Title/Summary/Keyword: 통신서버

Search Result 3,520, Processing Time 0.033 seconds

433 MHz Radio Frequency and 2G based Smart Irrigation Monitoring System (433 MHz 무선주파수와 2G 통신 기반의 스마트 관개 모니터링 시스템)

  • Manongi, Frank Andrew;Ahn, Sung-Hoon
    • Journal of Appropriate Technology
    • /
    • v.6 no.2
    • /
    • pp.136-145
    • /
    • 2020
  • Agriculture is the backbone of the economy of most developing countries. In these countries, agriculture or farming is mostly done manually with little integration of machinery, intelligent systems and data monitoring. Irrigation is an essential process that directly influences crop production. The fluctuating amount of rainfall per year has led to the adoption of irrigation systems in most farms. The absence of smart sensors, monitoring methods and control, has led to low harvests and draining water sources. In this research paper, we introduce a 433 MHz Radio Frequency and 2G based Smart Irrigation Meter System and a water prepayment system for rural areas of Tanzania with no reliable internet coverage. Specifically, Ngurudoto area in Arusha region where it will be used as a case study for data collection. The proposed system is hybrid, comprising of both weather data (evapotranspiration) and soil moisture data. The architecture of the system has on-site weather measurement controllers, soil moisture sensors buried on the ground, water flow sensors, a solenoid valve, and a prepayment system. To achieve high precision in linear and nonlinear regression and to improve classification and prediction, this work cascades a Dynamic Regression Algorithm and Naïve Bayes algorithm.

Development of Software-Defined Perimeter-based Access Control System for Security of Cloud and IoT System (Cloud 및 IoT 시스템의 보안을 위한 소프트웨어 정의 경계기반의 접근제어시스템 개발)

  • Park, Seung-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.2
    • /
    • pp.15-26
    • /
    • 2021
  • Recently, as the introduction of cloud, mobile, and IoT has become active, there is a growing need for technology development that can supplement the limitations of traditional security solutions based on fixed perimeters such as firewalls and Network Access Control (NAC). In response to this, SDP (Software Defined Perimeter) has recently emerged as a new base technology. Unlike existing security technologies, SDP can sets security boundaries (install Gateway S/W) regardless of the location of the protected resources (servers, IoT gateways, etc.) and neutralize most of the network-based hacking attacks that are becoming increasingly sofiscated. In particular, SDP is regarded as a security technology suitable for the cloud and IoT fields. In this study, a new access control system was proposed by combining SDP and hash tree-based large-scale data high-speed signature technology. Through the process authentication function using large-scale data high-speed signature technology, it prevents the threat of unknown malware intruding into the endpoint in advance, and implements a kernel-level security technology that makes it impossible for user-level attacks during the backup and recovery of major data. As a result, endpoint security, which is a weak part of SDP, has been strengthened. The proposed system was developed as a prototype, and the performance test was completed through a test of an authorized testing agency (TTA V&V Test). The SDP-based access control solution is a technology with high potential that can be used in smart car security.

Development of CanSat System With 3D Rendering and Real-time Object Detection Functions (3D 렌더링 및 실시간 물체 검출 기능 탑재 캔위성 시스템 개발)

  • Kim, Youngjun;Park, Junsoo;Nam, Jaeyoung;Yoo, Seunghoon;Kim, Songhyon;Lee, Sanghyun;Lee, Younggun
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.49 no.8
    • /
    • pp.671-680
    • /
    • 2021
  • This paper deals with the contents of designing and producing reconnaissance hardware and software, and verifying the functions after being installed on the CanSat platform and ground stations. The main reconnaissance mission is largely composed of two things: terrain search that renders the surrounding terrain in 3D using radar, GPS, and IMU sensors, and real-time detection of major objects through optical camera image analysis. In addition, data analysis efficiency was improved through GUI software to enhance the completeness of the CanSat system. Specifically, software that can check terrain information and object detection information in real time at the ground station was produced, and mission failure was prevented through abnormal packet exception processing and system initialization functions. Communication through LTE and AWS server was used as the main channel, and ZigBee was used as the auxiliary channel. The completed CanSat was tested for air fall using a rocket launch method and a drone mount method. In experimental results, the terrain search and object detection performance was excellent, and all the results were processed in real-time and then successfully displayed on the ground station software.

Cat Behavior Pattern Analysis and Disease Prediction System of Home CCTV Images using AI (AI를 이용한 홈CCTV 영상의 반려묘 행동 패턴 분석 및 질병 예측 시스템 연구)

  • Han, Su-yeon;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.9
    • /
    • pp.1266-1271
    • /
    • 2022
  • Cats have strong wildness so they have a characteristic of hiding diseases well. The disease may have already worsened when the guardian finds out that the cat has a disease. It will be of great help in treating the cat's disease if the owner can recognize the cat's polydipsia, polyuria, and frequent urination more quickly. In this paper, 1) Efficient version of DeepLabCut for pose estimation, 2) YOLO v4 for object detection, 3) LSTM is used for behavior prediction, and 4) BoT-SORT is used for object tracking running on an artificial intelligence device. Using artificial intelligence technology, it predicts the cat's next, polyuria and frequency of urination through the analysis of the cat's behavior pattern from the home CCTV video and the weight sensor of the water bowl. And, through analysis of cat behavior patterns, we propose an application that reports disease prediction and abnormal behavior to the guardian and delivers it to the guardian's mobile and the server system.

Flood Disaster Prediction and Prevention through Hybrid BigData Analysis (하이브리드 빅데이터 분석을 통한 홍수 재해 예측 및 예방)

  • Ki-Yeol Eom;Jai-Hyun Lee
    • The Journal of Bigdata
    • /
    • v.8 no.1
    • /
    • pp.99-109
    • /
    • 2023
  • Recently, not only in Korea but also around the world, we have been experiencing constant disasters such as typhoons, wildfires, and heavy rains. The property damage caused by typhoons and heavy rain in South Korea alone has exceeded 1 trillion won. These disasters have resulted in significant loss of life and property damage, and the recovery process will also take a considerable amount of time. In addition, the government's contingency funds are insufficient for the current situation. To prevent and effectively respond to these issues, it is necessary to collect and analyze accurate data in real-time. However, delays and data loss can occur depending on the environment where the sensors are located, the status of the communication network, and the receiving servers. In this paper, we propose a two-stage hybrid situation analysis and prediction algorithm that can accurately analyze even in such communication network conditions. In the first step, data on river and stream levels are collected, filtered, and refined from diverse sensors of different types and stored in a bigdata. An AI rule-based inference algorithm is applied to analyze the crisis alert levels. If the rainfall exceeds a certain threshold, but it remains below the desired level of interest, the second step of deep learning image analysis is performed to determine the final crisis alert level.

Design of a designated lane enforcement system based on deep learning (딥러닝 기반 지정차로제 단속 시스템 설계)

  • Bae, Ga-hyeong;Jang, Jong-wook;Jang, Sung-jin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.236-238
    • /
    • 2022
  • According to the current Road Traffic Act, the 2020 amendment bill is currently in effect as a system that designates vehicle types for each lane for the purpose of securing road use efficiency and traffic safety. When comparing the number of traffic accident fatalities per 10,000 vehicles in Germany and Korea, the number of traffic accident deaths in Germany is significantly lower than in Korea. The representative case of the German autobahn, which did not impose a speed limit, suggests that Korea's speeding laws are not the only answer to reducing the accident rate. The designated lane system, which is observed in accordance with the keep right principle of the Autobahn Expressway, plays a major role in reducing traffic accidents. Based on this fact, we propose a traffic enforcement system to crack down on vehicles violating the designated lane system and improve the compliance rate. We develop a designated lane enforcement system that recognizes vehicle types using Yolo5, a deep learning object recognition model, recognizes license plates and lanes using OpenCV, and stores the extracted data in the server to determine whether or not laws are violated.Accordingly, it is expected that there will be an effect of reducing the traffic accident rate through the improvement of driver's awareness and compliance rate.

  • PDF

Cortex M3 Based Lightweight Security Protocol for Authentication and Encrypt Communication between Smart Meters and Data Concentrate Unit (스마트미터와 데이터 집중 장치간 인증 및 암호화 통신을 위한 Cortex M3 기반 경량 보안 프로토콜)

  • Shin, Dong-Myung;Ko, Sang-Jun
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.2
    • /
    • pp.111-119
    • /
    • 2019
  • The existing smart grid device authentication system is concentrated on DCU, meter reading FEP and MDMS, and the authentication system for smart meters is not established. Although some cryptographic chips have been developed at present, it is difficult to complete the PKI authentication scheme because it is at the low level of simple encryption. Unlike existing power grids, smart grids are based on open two-way communication, increasing the risk of accidents as information security vulnerabilities increase. However, PKI is difficult to apply to smart meters, and there is a possibility of accidents such as system shutdown by sending manipulated packets and sending false information to the operating system. Issuing an existing PKI certificate to smart meters with high hardware constraints makes authentication and certificate renewal difficult, so an ultra-lightweight password authentication protocol that can operate even on the poor performance of smart meters (such as non-IP networks, processors, memory, and storage space) was designed and implemented. As a result of the experiment, lightweight cryptographic authentication protocol was able to be executed quickly in the Cortex-M3 environment, and it is expected that it will help to prepare a more secure authentication system in the smart grid industry.

Implementation of IoT-Based Irrigation Valve for Rice Cultivation (벼 재배용 사물인터넷 기반 물꼬 구현)

  • Byeonghan Lee;Deok-Gyeong Seong;Young Min Jin;Yeon-Hyeon Hwang;Young-Gwang Kim
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.6
    • /
    • pp.93-98
    • /
    • 2023
  • In paddy rice farming, water management is a critical task. To suppress weed emergence during the early stages of growth, fields are deeply flooded, and after transplantation, the water level is reduced to promote rooting and stimulate stem generation. Later, water is drained to prevent the production of sterile tillers. The adequacy of water supply is influenced by various factors such as field location, irrigation channels, soil conditions, and weather, requiring farmers to frequently check water levels and control the ingress and egress of water. This effort increases if the fields are scattered in remote locations. Automated irrigation systems have been considered to reduce labor and improve productivity. However, the net income from rice production in 2022 was about KRW 320,000/10a on average, making it financially unfeasible to implement high-cost devices or construct new infrastructure. This study focused on developing an IoT-Based irrigation valve that can be easily integrated into existing agricultural infrastructure without additional construction. The research was carried out in three main areas: Firstly, an irrigation valve was designed for quick and easy installation on existing agricultural pipes. Secondly, a power circuit was developed to connect a low-power Cat M1 communication modem with an Arduino Nano board for remote operation. Thirdly, a cloud-based platform was used to set up a server and database environment and create a web interface that users can easily access.

Hybrid Offloading Technique Based on Auction Theory and Reinforcement Learning in MEC Industrial IoT Environment (MEC 산업용 IoT 환경에서 경매 이론과 강화 학습 기반의 하이브리드 오프로딩 기법)

  • Bae Hyeon Ji;Kim Sung Wook
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.9
    • /
    • pp.263-272
    • /
    • 2023
  • Industrial Internet of Things (IIoT) is an important factor in increasing production efficiency in industrial sectors, along with data collection, exchange and analysis through large-scale connectivity. However, as traffic increases explosively due to the recent spread of IIoT, an allocation method that can efficiently process traffic is required. In this thesis, I propose a two-stage task offloading decision method to increase successful task throughput in an IIoT environment. In addition, I consider a hybrid offloading system that can offload compute-intensive tasks to a mobile edge computing server via a cellular link or to a nearby IIoT device via a Device to Device (D2D) link. The first stage is to design an incentive mechanism to prevent devices participating in task offloading from acting selfishly and giving difficulties in improving task throughput. Among the mechanism design, McAfee's mechanism is used to control the selfish behavior of the devices that process the task and to increase the overall system throughput. After that, in stage 2, I propose a multi-armed bandit (MAB)-based task offloading decision method in a non-stationary environment by considering the irregular movement of the IIoT device. Experimental results show that the proposed method can obtain better performance in terms of overall system throughput, communication failure rate and regret compared to other existing methods.

Intelligent Transportation System (ITS) research optimized for autonomous driving using edge computing (엣지 컴퓨팅을 이용하여 자율주행에 최적화된 지능형 교통 시스템 연구(ITS))

  • Sunghyuck Hong
    • Advanced Industrial SCIence
    • /
    • v.3 no.1
    • /
    • pp.23-29
    • /
    • 2024
  • In this scholarly investigation, the focus is placed on the transformative potential of edge computing in enhancing Intelligent Transportation Systems (ITS) for the facilitation of autonomous driving. The intrinsic capability of edge computing to process voluminous datasets locally and in a real-time manner is identified as paramount in meeting the exigent requirements of autonomous vehicles, encompassing expedited decision-making processes and the bolstering of safety protocols. This inquiry delves into the synergy between edge computing and extant ITS infrastructures, elucidating the manner in which localized data processing can substantially diminish latency, thereby augmenting the responsiveness of autonomous vehicles. Further, the study scrutinizes the deployment of edge servers, an array of sensors, and Vehicle-to-Everything (V2X) communication technologies, positing these elements as constituents of a robust framework designed to support instantaneous traffic management, collision avoidance mechanisms, and the dynamic optimization of vehicular routes. Moreover, this research addresses the principal challenges encountered in the incorporation of edge computing within ITS, including issues related to security, the integration of data, and the scalability of systems. It proffers insights into viable solutions and delineates directions for future scholarly inquiry.